0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:26:29 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5452, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:26:29 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x300, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:26:29 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:26:29 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 5) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:26:29 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:26:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000800480000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:26:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000580000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:26:29 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x2, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1756.151998] device veth0_vlan entered promiscuous mode [ 1756.152665] FAULT_INJECTION: forcing a failure. [ 1756.152665] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.153944] CPU: 0 PID: 10855 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1756.154688] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1756.155590] Call Trace: [ 1756.155881] dump_stack+0x107/0x167 [ 1756.156271] should_fail.cold+0x5/0xa [ 1756.156688] ? __alloc_skb+0x6d/0x5b0 [ 1756.157112] should_failslab+0x5/0x20 [ 1756.157525] kmem_cache_alloc_node+0x55/0x330 [ 1756.158003] __alloc_skb+0x6d/0x5b0 [ 1756.158403] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1756.158897] rtmsg_ifinfo+0x83/0x120 [ 1756.159299] __dev_notify_flags+0x22a/0x2c0 [ 1756.159756] ? dev_change_name+0x660/0x660 [ 1756.160217] ? __dev_change_flags+0x4cf/0x6e0 [ 1756.160703] ? dev_set_allmulti+0x30/0x30 [ 1756.161151] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1756.161736] dev_change_flags+0x100/0x160 [ 1756.162190] devinet_ioctl+0x14de/0x1db0 [ 1756.162647] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1756.163143] inet_ioctl+0x34f/0x390 [ 1756.163554] ? inet_dgram_connect+0x220/0x220 [ 1756.164063] ? __lock_acquire+0xbb1/0x5b00 [ 1756.164541] ? perf_trace_lock+0xac/0x490 [ 1756.165020] packet_ioctl+0xb3/0x260 [ 1756.165441] sock_do_ioctl+0xd3/0x300 [ 1756.165865] ? compat_ifr_data_ioctl+0x180/0x180 [ 1756.166400] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1756.167041] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1756.167617] ? do_vfs_ioctl+0x283/0x10d0 [ 1756.168061] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1756.168647] ? generic_block_fiemap+0x60/0x60 [ 1756.169171] sock_ioctl+0x3ea/0x700 [ 1756.169571] ? dlci_ioctl_set+0x30/0x30 [ 1756.170015] ? selinux_file_ioctl+0xb6/0x270 [ 1756.170512] ? dlci_ioctl_set+0x30/0x30 [ 1756.170954] __x64_sys_ioctl+0x19a/0x210 [ 1756.171408] do_syscall_64+0x33/0x40 [ 1756.171823] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1756.172400] RIP: 0033:0x7f4a38965b19 [ 1756.172824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1756.174793] RSP: 002b:00007f4a35edb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1756.175643] RAX: ffffffffffffffda RBX: 00007f4a38a78f60 RCX: 00007f4a38965b19 [ 1756.176446] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1756.177262] RBP: 00007f4a35edb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1756.178068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1756.178859] R13: 00007ffefe21595f R14: 00007f4a35edb300 R15: 0000000000022000 [ 1756.182786] FAULT_INJECTION: forcing a failure. [ 1756.182786] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.184058] CPU: 0 PID: 10868 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1756.184830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1756.185779] Call Trace: [ 1756.186081] dump_stack+0x107/0x167 [ 1756.186490] should_fail.cold+0x5/0xa [ 1756.186925] ? create_object.isra.0+0x3a/0xa20 [ 1756.187441] should_failslab+0x5/0x20 [ 1756.187866] kmem_cache_alloc+0x5b/0x310 [ 1756.188329] create_object.isra.0+0x3a/0xa20 [ 1756.188823] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1756.189401] kmem_cache_alloc+0x159/0x310 [ 1756.189872] anon_vma_clone+0xdc/0x590 [ 1756.190318] anon_vma_fork+0x82/0x640 [ 1756.190754] ? __vm_enough_memory+0x184/0x360 [ 1756.191264] copy_process+0x7218/0x7800 [ 1756.191729] ? __cleanup_sighand+0xb0/0xb0 [ 1756.192207] ? find_held_lock+0x2c/0x110 [ 1756.192661] kernel_clone+0xe7/0x980 [ 1756.193087] ? lock_downgrade+0x6d0/0x6d0 [ 1756.193548] ? find_held_lock+0x2c/0x110 [ 1756.194005] ? create_io_thread+0xf0/0xf0 [ 1756.194473] ? ksys_write+0x12d/0x260 [ 1756.194906] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1756.195451] __do_sys_fork+0x8a/0xc0 [ 1756.195867] ? kernel_thread+0xf0/0xf0 [ 1756.196317] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1756.196916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1756.197496] ? trace_hardirqs_on+0x5b/0x180 [ 1756.197985] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1756.198562] do_syscall_64+0x33/0x40 [ 1756.198982] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1756.199558] RIP: 0033:0x7fadf412db19 [ 1756.199958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1756.202002] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1756.202857] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1756.203594] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1756.204395] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1756.205205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1756.206005] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 1756.207871] FAULT_INJECTION: forcing a failure. [ 1756.207871] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.209170] CPU: 0 PID: 10853 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1756.209936] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1756.210768] Call Trace: [ 1756.211066] dump_stack+0x107/0x167 [ 1756.211477] should_fail.cold+0x5/0xa [ 1756.211906] ? create_object.isra.0+0x3a/0xa20 [ 1756.212421] should_failslab+0x5/0x20 [ 1756.212841] kmem_cache_alloc+0x5b/0x310 [ 1756.213320] create_object.isra.0+0x3a/0xa20 [ 1756.213824] kmemleak_alloc_percpu+0xa0/0x100 [ 1756.214328] pcpu_alloc+0x4e2/0x1240 [ 1756.214755] qdisc_alloc+0x2d6/0xc80 [ 1756.215172] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1756.215763] ? trace_hardirqs_on+0x5b/0x180 [ 1756.216253] qdisc_create_dflt+0x71/0x370 [ 1756.216720] dev_activate+0x7c3/0xd70 [ 1756.217164] __dev_open+0x38a/0x4e0 [ 1756.217577] ? dev_set_rx_mode+0x80/0x80 [ 1756.218034] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1756.218625] ? __local_bh_enable_ip+0x9d/0x100 [ 1756.219140] __dev_change_flags+0x521/0x6e0 [ 1756.219620] ? dev_set_allmulti+0x30/0x30 [ 1756.220090] ? netdev_name_node_lookup+0xd5/0x150 [ 1756.220573] dev_change_flags+0x8a/0x160 [ 1756.221042] devinet_ioctl+0x14de/0x1db0 [ 1756.221500] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1756.221999] inet_ioctl+0x34f/0x390 [ 1756.222412] ? inet_dgram_connect+0x220/0x220 [ 1756.222920] ? __lock_acquire+0xbb1/0x5b00 [ 1756.223408] ? perf_trace_lock+0xac/0x490 [ 1756.223879] packet_ioctl+0xb3/0x260 [ 1756.224301] sock_do_ioctl+0xd3/0x300 [ 1756.224726] ? compat_ifr_data_ioctl+0x180/0x180 [ 1756.225270] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1756.225914] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1756.226496] ? do_vfs_ioctl+0x283/0x10d0 [ 1756.226952] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1756.227548] ? generic_block_fiemap+0x60/0x60 [ 1756.228050] sock_ioctl+0x3ea/0x700 [ 1756.228462] ? dlci_ioctl_set+0x30/0x30 [ 1756.228917] ? selinux_file_ioctl+0xb6/0x270 [ 1756.229407] ? dlci_ioctl_set+0x30/0x30 [ 1756.229866] __x64_sys_ioctl+0x19a/0x210 [ 1756.230327] do_syscall_64+0x33/0x40 [ 1756.230746] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1756.231319] RIP: 0033:0x7f07a4a4eb19 [ 1756.231736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1756.233816] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1756.234679] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1756.235477] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1756.236275] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1756.237082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1756.237883] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:26:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000680000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1756.267831] device veth0_vlan entered promiscuous mode [ 1756.273116] FAULT_INJECTION: forcing a failure. [ 1756.273116] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.276037] CPU: 1 PID: 10857 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1756.277550] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1756.279342] Call Trace: [ 1756.279921] dump_stack+0x107/0x167 [ 1756.280717] should_fail.cold+0x5/0xa [ 1756.281575] ? create_object.isra.0+0x3a/0xa20 [ 1756.282569] should_failslab+0x5/0x20 [ 1756.283396] kmem_cache_alloc+0x5b/0x310 [ 1756.284279] ? mark_held_locks+0x9e/0xe0 [ 1756.285171] create_object.isra.0+0x3a/0xa20 [ 1756.286132] kmemleak_alloc_percpu+0xa0/0x100 [ 1756.287107] pcpu_alloc+0x4e2/0x1240 [ 1756.287937] qdisc_alloc+0x399/0xc80 [ 1756.288755] qdisc_create_dflt+0x71/0x370 [ 1756.289670] dev_activate+0x7c3/0xd70 [ 1756.290515] __dev_open+0x38a/0x4e0 [ 1756.291304] ? dev_set_rx_mode+0x80/0x80 [ 1756.292187] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1756.293336] ? __local_bh_enable_ip+0x9d/0x100 [ 1756.294324] __dev_change_flags+0x521/0x6e0 [ 1756.295258] ? dev_set_allmulti+0x30/0x30 [ 1756.296159] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1756.297346] dev_change_flags+0x8a/0x160 [ 1756.298235] devinet_ioctl+0x14de/0x1db0 [ 1756.299125] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1756.300087] inet_ioctl+0x34f/0x390 [ 1756.300898] ? inet_dgram_connect+0x220/0x220 [ 1756.301884] ? __lock_acquire+0xbb1/0x5b00 [ 1756.302804] ? perf_trace_lock+0xac/0x490 [ 1756.303711] packet_ioctl+0xb3/0x260 [ 1756.304519] sock_do_ioctl+0xd3/0x300 [ 1756.305341] ? compat_ifr_data_ioctl+0x180/0x180 [ 1756.306372] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1756.307592] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1756.308706] ? do_vfs_ioctl+0x283/0x10d0 [ 1756.309579] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1756.310713] ? generic_block_fiemap+0x60/0x60 [ 1756.311675] sock_ioctl+0x3ea/0x700 [ 1756.312463] ? dlci_ioctl_set+0x30/0x30 [ 1756.313334] ? dlci_ioctl_set+0x30/0x30 [ 1756.314202] ? sock_ioctl+0x13/0x700 [ 1756.314992] ? dlci_ioctl_set+0x30/0x30 [ 1756.315855] __x64_sys_ioctl+0x19a/0x210 [ 1756.316721] do_syscall_64+0x33/0x40 [ 1756.317534] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1756.318619] RIP: 0033:0x7feded0d7b19 [ 1756.319427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1756.323302] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1756.324951] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1756.326487] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1756.328021] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1756.329566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1756.331101] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:26:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000780000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:26:29 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x4b47, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:26:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000001880000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1756.381130] device veth0_vlan entered promiscuous mode 02:26:29 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x330, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:26:46 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 46) 02:26:46 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x500, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:26:46 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:26:46 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x4b49, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:26:46 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5460, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:26:46 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:26:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000001c80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:26:46 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:26:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000002080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1773.275680] audit: type=1326 audit(1693276006.267:115): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10898 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:26:46 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x5411, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1773.331105] FAULT_INJECTION: forcing a failure. [ 1773.331105] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.333910] CPU: 0 PID: 10895 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1773.335555] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.337459] Call Trace: [ 1773.338104] dump_stack+0x107/0x167 [ 1773.338948] should_fail.cold+0x5/0xa [ 1773.339831] ? create_object.isra.0+0x3a/0xa20 [ 1773.340893] should_failslab+0x5/0x20 [ 1773.341795] kmem_cache_alloc+0x5b/0x310 [ 1773.342746] create_object.isra.0+0x3a/0xa20 [ 1773.343783] kmemleak_alloc_percpu+0xa0/0x100 [ 1773.344833] pcpu_alloc+0x4e2/0x1240 [ 1773.345744] qdisc_alloc+0x399/0xc80 [ 1773.346744] qdisc_create_dflt+0x71/0x370 [ 1773.347758] dev_activate+0x7c3/0xd70 [ 1773.348670] __dev_open+0x38a/0x4e0 [ 1773.349457] ? __dev_change_flags+0x1fd/0x6e0 [ 1773.350459] ? dev_set_rx_mode+0x80/0x80 [ 1773.351409] ? __local_bh_enable_ip+0x9d/0x100 [ 1773.352515] __dev_change_flags+0x521/0x6e0 [ 1773.353457] ? dev_set_allmulti+0x30/0x30 [ 1773.354384] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1773.355645] dev_change_flags+0x8a/0x160 [ 1773.356626] devinet_ioctl+0x14de/0x1db0 [ 1773.357528] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1773.358425] inet_ioctl+0x34f/0x390 [ 1773.359168] ? inet_dgram_connect+0x220/0x220 [ 1773.360088] ? __lock_acquire+0xbb1/0x5b00 [ 1773.360974] ? perf_trace_lock+0xac/0x490 [ 1773.361823] packet_ioctl+0xb3/0x260 [ 1773.362588] sock_do_ioctl+0xd3/0x300 [ 1773.363354] ? compat_ifr_data_ioctl+0x180/0x180 [ 1773.364330] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1773.365512] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1773.366583] ? do_vfs_ioctl+0x283/0x10d0 [ 1773.367398] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1773.368481] ? generic_block_fiemap+0x60/0x60 [ 1773.369418] sock_ioctl+0x3ea/0x700 [ 1773.370173] ? dlci_ioctl_set+0x30/0x30 [ 1773.370988] ? selinux_file_ioctl+0xb6/0x270 [ 1773.371884] ? dlci_ioctl_set+0x30/0x30 [ 1773.372689] __x64_sys_ioctl+0x19a/0x210 [ 1773.373556] do_syscall_64+0x33/0x40 [ 1773.374341] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.375376] RIP: 0033:0x7f07a4a4eb19 [ 1773.376145] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.376660] FAULT_INJECTION: forcing a failure. [ 1773.376660] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.379859] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1773.379883] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1773.379895] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1773.379908] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1773.379920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1773.379931] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1773.392335] CPU: 1 PID: 10912 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1773.393854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.395641] Call Trace: [ 1773.396231] dump_stack+0x107/0x167 [ 1773.397025] should_fail.cold+0x5/0xa [ 1773.397859] ? down_write+0xe0/0x160 [ 1773.398667] ? anon_vma_clone+0xdc/0x590 [ 1773.399550] should_failslab+0x5/0x20 [ 1773.400376] kmem_cache_alloc+0x5b/0x310 [ 1773.401284] anon_vma_clone+0xdc/0x590 [ 1773.402143] anon_vma_fork+0x82/0x640 [ 1773.402994] ? __vm_enough_memory+0x184/0x360 [ 1773.403966] copy_process+0x7218/0x7800 [ 1773.404866] ? __cleanup_sighand+0xb0/0xb0 [ 1773.405813] ? find_held_lock+0x2c/0x110 [ 1773.406695] kernel_clone+0xe7/0x980 [ 1773.407509] ? lock_downgrade+0x6d0/0x6d0 [ 1773.408400] ? find_held_lock+0x2c/0x110 [ 1773.409283] ? create_io_thread+0xf0/0xf0 [ 1773.410178] ? ksys_write+0x12d/0x260 [ 1773.411010] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1773.412056] __do_sys_fork+0x8a/0xc0 [ 1773.412860] ? kernel_thread+0xf0/0xf0 [ 1773.413735] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1773.414868] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1773.415097] device veth0_vlan entered promiscuous mode [ 1773.415972] ? trace_hardirqs_on+0x5b/0x180 [ 1773.415995] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1773.416018] do_syscall_64+0x33/0x40 [ 1773.416042] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.416068] RIP: 0033:0x7fadf412db19 [ 1773.421902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.426056] FAULT_INJECTION: forcing a failure. [ 1773.426056] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.428474] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1773.430137] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1773.431678] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1773.433238] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1773.434786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1773.436326] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 1773.438124] CPU: 0 PID: 10903 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1773.439702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.441600] Call Trace: [ 1773.442209] dump_stack+0x107/0x167 [ 1773.443054] should_fail.cold+0x5/0xa [ 1773.443832] ? kvmalloc_node+0x119/0x170 [ 1773.444742] should_failslab+0x5/0x20 [ 1773.445649] __kmalloc_node+0x76/0x420 [ 1773.446567] kvmalloc_node+0x119/0x170 [ 1773.447473] pfifo_fast_init+0xea/0x3d0 [ 1773.448360] ? __netdev_watchdog_up+0x190/0x190 [ 1773.449343] qdisc_create_dflt+0x103/0x370 [ 1773.450329] dev_activate+0x7c3/0xd70 [ 1773.451208] __dev_open+0x38a/0x4e0 [ 1773.451949] ? dev_set_rx_mode+0x80/0x80 [ 1773.452882] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1773.454129] ? __local_bh_enable_ip+0x9d/0x100 [ 1773.455191] __dev_change_flags+0x521/0x6e0 [ 1773.456069] ? dev_set_allmulti+0x30/0x30 [ 1773.457073] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1773.458355] dev_change_flags+0x8a/0x160 [ 1773.459294] devinet_ioctl+0x14de/0x1db0 [ 1773.460148] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1773.461216] inet_ioctl+0x34f/0x390 [ 1773.462082] ? inet_dgram_connect+0x220/0x220 [ 1773.463160] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1773.464254] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1773.465562] ? trace_hardirqs_on+0x5b/0x180 [ 1773.466597] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1773.467772] packet_ioctl+0xb3/0x260 [ 1773.468610] sock_do_ioctl+0xd3/0x300 [ 1773.469466] ? compat_ifr_data_ioctl+0x180/0x180 [ 1773.470424] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1773.471568] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1773.472605] ? do_vfs_ioctl+0x283/0x10d0 [ 1773.473418] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1773.474489] ? generic_block_fiemap+0x60/0x60 [ 1773.475400] sock_ioctl+0x3ea/0x700 [ 1773.476141] ? trace_hardirqs_on+0x5b/0x180 [ 1773.477004] ? dlci_ioctl_set+0x30/0x30 [ 1773.477832] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1773.478928] ? __x64_sys_ioctl+0x11c/0x210 [ 1773.479784] ? dlci_ioctl_set+0x30/0x30 [ 1773.480605] __x64_sys_ioctl+0x19a/0x210 [ 1773.481452] do_syscall_64+0x33/0x40 [ 1773.482218] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.483256] RIP: 0033:0x7feded0d7b19 [ 1773.484011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.487748] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1773.489324] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1773.490838] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1773.492296] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1773.493816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1773.495309] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1773.498029] veth0_vlan: default qdisc (pfifo_fast) fail, fallback to noqueue 02:26:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000003f80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:26:46 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x700, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:26:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000006780000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1773.564076] device veth0_vlan entered promiscuous mode 02:26:46 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x541b, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:26:46 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:26:46 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1773.719278] FAULT_INJECTION: forcing a failure. [ 1773.719278] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.722033] CPU: 0 PID: 10914 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1773.723403] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.725086] Call Trace: [ 1773.725622] dump_stack+0x107/0x167 [ 1773.726366] should_fail.cold+0x5/0xa [ 1773.727133] ? create_object.isra.0+0x3a/0xa20 [ 1773.728072] should_failslab+0x5/0x20 [ 1773.728829] kmem_cache_alloc+0x5b/0x310 [ 1773.729687] create_object.isra.0+0x3a/0xa20 [ 1773.730561] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1773.731600] __kmalloc_node+0x1ae/0x420 [ 1773.732400] qdisc_alloc+0xac/0xc80 [ 1773.733165] qdisc_create_dflt+0x71/0x370 [ 1773.733989] dev_activate+0x7c3/0xd70 [ 1773.734785] __dev_open+0x38a/0x4e0 [ 1773.735510] ? dev_set_rx_mode+0x80/0x80 [ 1773.736349] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1773.737401] ? __local_bh_enable_ip+0x9d/0x100 [ 1773.738351] __dev_change_flags+0x521/0x6e0 [ 1773.739211] ? dev_set_allmulti+0x30/0x30 [ 1773.740065] ? strcmp+0x4c/0xb0 [ 1773.740755] dev_change_flags+0x8a/0x160 [ 1773.741633] devinet_ioctl+0x14de/0x1db0 [ 1773.742470] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1773.743383] inet_ioctl+0x34f/0x390 [ 1773.744114] ? inet_dgram_connect+0x220/0x220 [ 1773.745045] ? __lock_acquire+0xbb1/0x5b00 [ 1773.745930] ? perf_trace_lock+0xac/0x490 [ 1773.746785] packet_ioctl+0xb3/0x260 [ 1773.747550] sock_do_ioctl+0xd3/0x300 [ 1773.748326] ? compat_ifr_data_ioctl+0x180/0x180 [ 1773.749315] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1773.750491] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1773.751546] ? do_vfs_ioctl+0x283/0x10d0 [ 1773.752372] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1773.753459] ? generic_block_fiemap+0x60/0x60 [ 1773.754379] sock_ioctl+0x3ea/0x700 [ 1773.755133] ? dlci_ioctl_set+0x30/0x30 [ 1773.755941] ? selinux_file_ioctl+0xb6/0x270 [ 1773.756860] ? dlci_ioctl_set+0x30/0x30 [ 1773.757673] __x64_sys_ioctl+0x19a/0x210 [ 1773.758518] do_syscall_64+0x33/0x40 [ 1773.759274] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.760333] RIP: 0033:0x7f4a38965b19 [ 1773.761109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.764880] RSP: 002b:00007f4a35eba188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1773.766443] RAX: ffffffffffffffda RBX: 00007f4a38a79020 RCX: 00007f4a38965b19 [ 1773.767905] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1773.769372] RBP: 00007f4a35eba1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1773.770830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1773.772287] R13: 00007ffefe21595f R14: 00007f4a35eba300 R15: 0000000000022000 [ 1773.790110] FAULT_INJECTION: forcing a failure. [ 1773.790110] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.792528] CPU: 0 PID: 10937 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1773.793958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.795651] Call Trace: [ 1773.796199] dump_stack+0x107/0x167 [ 1773.796951] should_fail.cold+0x5/0xa [ 1773.797756] ? create_object.isra.0+0x3a/0xa20 [ 1773.798680] should_failslab+0x5/0x20 [ 1773.799467] kmem_cache_alloc+0x5b/0x310 [ 1773.800284] ? lock_downgrade+0x6d0/0x6d0 [ 1773.801172] create_object.isra.0+0x3a/0xa20 [ 1773.802061] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1773.803107] kmem_cache_alloc_trace+0x151/0x320 [ 1773.804065] call_usermodehelper_setup+0xa2/0x2f0 [ 1773.805032] ? copy_regset_to_user+0x170/0x170 [ 1773.805962] ? dev_load+0x22d/0x250 [ 1773.806691] __request_module+0x3f9/0x920 [ 1773.807527] ? free_modprobe_argv+0x90/0x90 [ 1773.808402] ? cred_has_capability.isra.0+0x143/0x2b0 [ 1773.809441] ? cred_has_capability.isra.0+0x152/0x2b0 [ 1773.810482] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 1773.811479] ? lock_acquire+0x197/0x470 [ 1773.812273] ? find_held_lock+0x2c/0x110 [ 1773.813111] ? dev_load+0x7b/0x250 [ 1773.813829] ? cap_capable+0x1d6/0x240 [ 1773.814616] ? security_capable+0x95/0xc0 [ 1773.815459] dev_load+0x22d/0x250 [ 1773.816158] devinet_ioctl+0x10b/0x1db0 [ 1773.816965] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1773.817863] inet_ioctl+0x34f/0x390 [ 1773.818595] ? inet_dgram_connect+0x220/0x220 [ 1773.819510] ? __lock_acquire+0xbb1/0x5b00 [ 1773.820379] ? perf_trace_lock+0xac/0x490 [ 1773.821234] packet_ioctl+0xb3/0x260 [ 1773.821984] sock_do_ioctl+0xd3/0x300 [ 1773.822748] ? compat_ifr_data_ioctl+0x180/0x180 [ 1773.823706] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1773.824862] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1773.825911] ? do_vfs_ioctl+0x283/0x10d0 [ 1773.826725] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1773.827775] ? generic_block_fiemap+0x60/0x60 [ 1773.828681] sock_ioctl+0x3ea/0x700 [ 1773.829419] ? dlci_ioctl_set+0x30/0x30 [ 1773.830220] ? selinux_file_ioctl+0xb6/0x270 [ 1773.831107] ? dlci_ioctl_set+0x30/0x30 [ 1773.831910] __x64_sys_ioctl+0x19a/0x210 [ 1773.832728] do_syscall_64+0x33/0x40 [ 1773.833500] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.834530] RIP: 0033:0x7f07a4a4eb19 [ 1773.835286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.838982] RSP: 002b:00007f07a1fa3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1773.840508] RAX: ffffffffffffffda RBX: 00007f07a4b62020 RCX: 00007f07a4a4eb19 [ 1773.841962] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1773.843250] device veth0_vlan entered promiscuous mode [ 1773.843402] RBP: 00007f07a1fa31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1773.843423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1773.847435] R13: 00007ffca8d8bf7f R14: 00007f07a1fa3300 R15: 0000000000022000 [ 1773.908948] FAULT_INJECTION: forcing a failure. [ 1773.908948] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.911941] CPU: 1 PID: 10938 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1773.913446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1773.914106] device veth0_vlan entered promiscuous mode [ 1773.915238] Call Trace: [ 1773.915268] dump_stack+0x107/0x167 [ 1773.915303] should_fail.cold+0x5/0xa [ 1773.918590] ? create_object.isra.0+0x3a/0xa20 [ 1773.919609] should_failslab+0x5/0x20 [ 1773.920426] kmem_cache_alloc+0x5b/0x310 [ 1773.921304] create_object.isra.0+0x3a/0xa20 [ 1773.922233] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1773.923324] kmem_cache_alloc_trace+0x151/0x320 [ 1773.924306] ? dev_load+0x20b/0x250 [ 1773.925113] __request_module+0x2e0/0x920 [ 1773.926007] ? free_modprobe_argv+0x90/0x90 [ 1773.926941] ? cred_has_capability.isra.0+0x143/0x2b0 [ 1773.928042] ? cred_has_capability.isra.0+0x152/0x2b0 [ 1773.929156] ? check_nnp_nosuid.isra.0+0x2a0/0x2a0 [ 1773.930210] ? lock_acquire+0x197/0x470 [ 1773.931061] ? find_held_lock+0x2c/0x110 [ 1773.931913] ? dev_load+0x7b/0x250 [ 1773.932672] ? cap_capable+0x1d6/0x240 [ 1773.933507] ? security_capable+0x95/0xc0 [ 1773.934401] dev_load+0x20b/0x250 [ 1773.935153] devinet_ioctl+0x10b/0x1db0 [ 1773.936018] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1773.936955] inet_ioctl+0x34f/0x390 [ 1773.937754] ? inet_dgram_connect+0x220/0x220 [ 1773.938704] ? __lock_acquire+0xbb1/0x5b00 [ 1773.939624] ? perf_trace_lock+0xac/0x490 [ 1773.940500] packet_ioctl+0xb3/0x260 [ 1773.941309] sock_do_ioctl+0xd3/0x300 [ 1773.942104] ? compat_ifr_data_ioctl+0x180/0x180 [ 1773.943125] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1773.944321] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1773.945435] ? do_vfs_ioctl+0x283/0x10d0 [ 1773.946298] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1773.947424] ? generic_block_fiemap+0x60/0x60 [ 1773.948420] sock_ioctl+0x3ea/0x700 [ 1773.949215] ? dlci_ioctl_set+0x30/0x30 [ 1773.950121] ? selinux_file_ioctl+0xb6/0x270 [ 1773.951070] ? dlci_ioctl_set+0x30/0x30 [ 1773.951967] __x64_sys_ioctl+0x19a/0x210 [ 1773.952849] do_syscall_64+0x33/0x40 [ 1773.953706] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1773.954807] RIP: 0033:0x7feded0d7b19 [ 1773.955610] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1773.959780] RSP: 002b:00007fedea62c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1773.961451] RAX: ffffffffffffffda RBX: 00007feded1eb020 RCX: 00007feded0d7b19 [ 1773.962983] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1773.964512] RBP: 00007fedea62c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1773.966055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1773.967582] R13: 00007ffef51d5a1f R14: 00007fedea62c300 R15: 0000000000022000 [ 1773.996321] device veth0_vlan entered promiscuous mode 02:27:00 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 47) 02:27:00 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:27:00 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x3003, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:27:00 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8901, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:27:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000048080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:00 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 16) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:27:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x5421, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:27:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1787.103029] device veth0_vlan entered promiscuous mode [ 1787.103833] FAULT_INJECTION: forcing a failure. [ 1787.103833] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.105103] CPU: 0 PID: 10951 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1787.105854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1787.106738] Call Trace: [ 1787.107025] dump_stack+0x107/0x167 [ 1787.107417] should_fail.cold+0x5/0xa [ 1787.107829] should_failslab+0x5/0x20 [ 1787.108236] __kmalloc_node_track_caller+0x74/0x3b0 [ 1787.108766] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1787.109291] __alloc_skb+0xb1/0x5b0 [ 1787.109684] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1787.110184] rtmsg_ifinfo+0x83/0x120 [ 1787.110587] __dev_notify_flags+0x22a/0x2c0 [ 1787.111058] ? dev_change_name+0x660/0x660 [ 1787.111506] ? __dev_change_flags+0x4cf/0x6e0 [ 1787.111991] ? dev_set_allmulti+0x30/0x30 [ 1787.112434] ? cap_capable+0x1d6/0x240 [ 1787.112865] ? full_name_hash+0xb5/0xf0 [ 1787.113295] dev_change_flags+0x100/0x160 [ 1787.113758] devinet_ioctl+0x14de/0x1db0 [ 1787.114202] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1787.114692] inet_ioctl+0x34f/0x390 [ 1787.115082] ? inet_dgram_connect+0x220/0x220 [ 1787.115583] ? __lock_acquire+0xbb1/0x5b00 [ 1787.116047] ? perf_trace_lock+0xac/0x490 [ 1787.116511] packet_ioctl+0xb3/0x260 [ 1787.116918] sock_do_ioctl+0xd3/0x300 [ 1787.117346] ? compat_ifr_data_ioctl+0x180/0x180 [ 1787.117853] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1787.118478] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1787.119031] ? do_vfs_ioctl+0x283/0x10d0 [ 1787.119482] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1787.120062] ? generic_block_fiemap+0x60/0x60 [ 1787.120541] sock_ioctl+0x3ea/0x700 [ 1787.120939] ? dlci_ioctl_set+0x30/0x30 [ 1787.121382] ? selinux_file_ioctl+0xb6/0x270 [ 1787.121869] ? dlci_ioctl_set+0x30/0x30 [ 1787.122303] __x64_sys_ioctl+0x19a/0x210 [ 1787.122762] do_syscall_64+0x33/0x40 [ 1787.123162] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1787.123729] RIP: 0033:0x7f4a38965b19 [ 1787.124131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.126157] RSP: 002b:00007f4a35edb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1787.126967] RAX: ffffffffffffffda RBX: 00007f4a38a78f60 RCX: 00007f4a38965b19 [ 1787.127751] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1787.128537] RBP: 00007f4a35edb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1787.129345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1787.130137] R13: 00007ffefe21595f R14: 00007f4a35edb300 R15: 0000000000022000 02:27:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x5450, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1787.152338] FAULT_INJECTION: forcing a failure. [ 1787.152338] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.153710] CPU: 0 PID: 10956 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1787.154446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1787.155333] Call Trace: [ 1787.155636] dump_stack+0x107/0x167 [ 1787.156032] should_fail.cold+0x5/0xa [ 1787.156448] ? kvmalloc_node+0x119/0x170 [ 1787.156895] should_failslab+0x5/0x20 [ 1787.157321] __kmalloc_node+0x76/0x420 [ 1787.157746] ? lockdep_init_map_type+0x2c7/0x780 [ 1787.158274] kvmalloc_node+0x119/0x170 [ 1787.158697] pfifo_fast_init+0xea/0x3d0 [ 1787.159127] ? __netdev_watchdog_up+0x190/0x190 [ 1787.159620] qdisc_create_dflt+0x103/0x370 [ 1787.160076] dev_activate+0x7c3/0xd70 [ 1787.160496] __dev_open+0x38a/0x4e0 [ 1787.160889] ? dev_set_rx_mode+0x80/0x80 [ 1787.161341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.161918] ? __local_bh_enable_ip+0x9d/0x100 [ 1787.162425] __dev_change_flags+0x521/0x6e0 [ 1787.162908] ? dev_set_allmulti+0x30/0x30 [ 1787.163371] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 1787.163898] ? full_name_hash+0xb5/0xf0 [ 1787.164346] dev_change_flags+0x8a/0x160 [ 1787.164799] devinet_ioctl+0x14de/0x1db0 [ 1787.165279] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1787.165777] inet_ioctl+0x34f/0x390 [ 1787.166180] ? inet_dgram_connect+0x220/0x220 [ 1787.166684] ? __lock_acquire+0xbb1/0x5b00 [ 1787.167175] ? perf_trace_lock+0xac/0x490 [ 1787.167644] packet_ioctl+0xb3/0x260 [ 1787.168058] sock_do_ioctl+0xd3/0x300 [ 1787.168486] ? compat_ifr_data_ioctl+0x180/0x180 [ 1787.169026] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1787.169680] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1787.170260] ? do_vfs_ioctl+0x283/0x10d0 [ 1787.170708] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1787.171289] ? generic_block_fiemap+0x60/0x60 [ 1787.171788] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.172376] sock_ioctl+0x3ea/0x700 [ 1787.172772] ? dlci_ioctl_set+0x30/0x30 [ 1787.173024] FAULT_INJECTION: forcing a failure. [ 1787.173024] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.173225] ? security_file_ioctl+0x62/0xb0 [ 1787.176097] ? kcov_remote_stop+0x310/0x310 [ 1787.176585] ? dlci_ioctl_set+0x30/0x30 [ 1787.177024] __x64_sys_ioctl+0x19a/0x210 [ 1787.177498] do_syscall_64+0x33/0x40 [ 1787.177912] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1787.178481] RIP: 0033:0x7feded0d7b19 [ 1787.178890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.180918] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1787.181777] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1787.182555] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1787.183353] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1787.184128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1787.184924] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1787.185764] CPU: 1 PID: 10965 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1787.185966] veth0_vlan: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1787.187281] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1787.187289] Call Trace: [ 1787.187313] dump_stack+0x107/0x167 [ 1787.187340] should_fail.cold+0x5/0xa [ 1787.192020] ? create_object.isra.0+0x3a/0xa20 [ 1787.192583] device veth0_vlan entered promiscuous mode [ 1787.193018] should_failslab+0x5/0x20 [ 1787.193039] kmem_cache_alloc+0x5b/0x310 [ 1787.195309] create_object.isra.0+0x3a/0xa20 [ 1787.196267] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1787.197380] kmem_cache_alloc+0x159/0x310 [ 1787.198288] vm_area_dup+0x78/0x290 [ 1787.199095] ? copy_page_range+0x24e9/0x3810 [ 1787.200092] ? vm_area_alloc+0x110/0x110 [ 1787.200980] ? vm_iomap_memory+0x190/0x190 [ 1787.201924] ? __vma_link_rb+0x540/0x700 [ 1787.202822] copy_process+0x291b/0x7800 [ 1787.203725] ? __cleanup_sighand+0xb0/0xb0 [ 1787.204663] ? find_held_lock+0x2c/0x110 [ 1787.205570] kernel_clone+0xe7/0x980 [ 1787.206378] ? lock_downgrade+0x6d0/0x6d0 [ 1787.207272] ? find_held_lock+0x2c/0x110 [ 1787.208151] ? create_io_thread+0xf0/0xf0 [ 1787.209095] ? ksys_write+0x12d/0x260 [ 1787.209979] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1787.211035] __do_sys_fork+0x8a/0xc0 [ 1787.211844] ? kernel_thread+0xf0/0xf0 [ 1787.212723] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.213869] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1787.214982] ? trace_hardirqs_on+0x5b/0x180 [ 1787.215933] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1787.217051] do_syscall_64+0x33/0x40 [ 1787.217886] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1787.218999] RIP: 0033:0x7fadf412db19 [ 1787.219809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.223790] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1787.225448] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1787.226988] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1787.228529] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1787.230217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1787.231806] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 1787.240043] audit: type=1326 audit(1693276020.226:116): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10955 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:27:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000fdef80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1787.269126] FAULT_INJECTION: forcing a failure. [ 1787.269126] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.272145] CPU: 1 PID: 10960 Comm: syz-executor.3 Not tainted 5.10.192 #1 02:27:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000f080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1787.273655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1787.275535] Call Trace: [ 1787.276124] dump_stack+0x107/0x167 [ 1787.276940] should_fail.cold+0x5/0xa [ 1787.277797] ? kvmalloc_node+0x119/0x170 [ 1787.278680] should_failslab+0x5/0x20 [ 1787.279502] __kmalloc_node+0x76/0x420 [ 1787.280356] kvmalloc_node+0x119/0x170 [ 1787.281207] pfifo_fast_init+0xea/0x3d0 [ 1787.282081] ? __netdev_watchdog_up+0x190/0x190 [ 1787.283085] qdisc_create_dflt+0x103/0x370 [ 1787.284001] dev_activate+0x7c3/0xd70 [ 1787.284844] __dev_open+0x38a/0x4e0 [ 1787.285655] ? dev_set_rx_mode+0x80/0x80 [ 1787.286549] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.287677] ? __local_bh_enable_ip+0x9d/0x100 [ 1787.288669] __dev_change_flags+0x521/0x6e0 [ 1787.289615] ? dev_set_allmulti+0x30/0x30 [ 1787.290516] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1787.291692] dev_change_flags+0x8a/0x160 [ 1787.292577] devinet_ioctl+0x14de/0x1db0 [ 1787.293480] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1787.294444] inet_ioctl+0x34f/0x390 [ 1787.295233] ? inet_dgram_connect+0x220/0x220 [ 1787.296213] ? __lock_acquire+0xbb1/0x5b00 [ 1787.297146] ? perf_trace_lock+0xac/0x490 [ 1787.298057] packet_ioctl+0xb3/0x260 [ 1787.298868] sock_do_ioctl+0xd3/0x300 [ 1787.299691] ? compat_ifr_data_ioctl+0x180/0x180 [ 1787.300719] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1787.301971] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1787.303112] ? do_vfs_ioctl+0x283/0x10d0 [ 1787.303990] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1787.305125] ? generic_block_fiemap+0x60/0x60 [ 1787.306118] sock_ioctl+0x3ea/0x700 [ 1787.306907] ? dlci_ioctl_set+0x30/0x30 [ 1787.307779] ? selinux_file_ioctl+0xb6/0x270 [ 1787.308734] ? dlci_ioctl_set+0x30/0x30 [ 1787.309604] __x64_sys_ioctl+0x19a/0x210 [ 1787.310486] do_syscall_64+0x33/0x40 [ 1787.311290] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1787.312389] RIP: 0033:0x7f07a4a4eb19 [ 1787.313190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.317147] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1787.318791] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1787.320318] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1787.321854] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1787.323382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1787.324912] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1787.327074] veth0_vlan: default qdisc (pfifo_fast) fail, fallback to noqueue 02:27:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000effd80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x5451, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:27:00 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 48) 02:27:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000007f000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:00 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x3f00, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:27:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x5452, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1787.405951] device veth0_vlan entered promiscuous mode 02:27:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x5460, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:27:00 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 11) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1787.513690] audit: type=1326 audit(1693276020.493:117): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=10991 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:27:00 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8902, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:27:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000280000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1787.564020] FAULT_INJECTION: forcing a failure. [ 1787.564020] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.567159] CPU: 1 PID: 11000 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1787.568657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1787.570464] Call Trace: [ 1787.571040] dump_stack+0x107/0x167 [ 1787.571831] should_fail.cold+0x5/0xa [ 1787.572656] ? create_object.isra.0+0x3a/0xa20 [ 1787.573653] should_failslab+0x5/0x20 [ 1787.574474] kmem_cache_alloc+0x5b/0x310 [ 1787.575350] ? mark_held_locks+0x9e/0xe0 [ 1787.576229] create_object.isra.0+0x3a/0xa20 [ 1787.577185] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1787.578289] __kmalloc_node+0x1ae/0x420 [ 1787.579146] ? lockdep_init_map_type+0x2c7/0x780 [ 1787.580176] kvmalloc_node+0x119/0x170 [ 1787.581017] pfifo_fast_init+0xea/0x3d0 [ 1787.581900] ? __netdev_watchdog_up+0x190/0x190 [ 1787.582901] qdisc_create_dflt+0x103/0x370 [ 1787.583817] dev_activate+0x7c3/0xd70 [ 1787.584655] __dev_open+0x38a/0x4e0 [ 1787.585451] ? dev_set_rx_mode+0x80/0x80 [ 1787.586331] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.587458] ? __local_bh_enable_ip+0x9d/0x100 [ 1787.588443] __dev_change_flags+0x521/0x6e0 [ 1787.589379] ? dev_set_allmulti+0x30/0x30 [ 1787.590277] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1787.591450] dev_change_flags+0x8a/0x160 [ 1787.592333] devinet_ioctl+0x14de/0x1db0 [ 1787.593218] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1787.594189] inet_ioctl+0x34f/0x390 [ 1787.594976] ? inet_dgram_connect+0x220/0x220 [ 1787.595957] ? __lock_acquire+0xbb1/0x5b00 [ 1787.596889] ? perf_trace_lock+0xac/0x490 [ 1787.597797] packet_ioctl+0xb3/0x260 [ 1787.598625] sock_do_ioctl+0xd3/0x300 [ 1787.599461] ? compat_ifr_data_ioctl+0x180/0x180 [ 1787.600487] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1787.601746] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1787.602857] ? do_vfs_ioctl+0x283/0x10d0 [ 1787.603729] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1787.604855] ? generic_block_fiemap+0x60/0x60 [ 1787.605835] sock_ioctl+0x3ea/0x700 [ 1787.606636] ? dlci_ioctl_set+0x30/0x30 [ 1787.607498] ? selinux_file_ioctl+0xb6/0x270 [ 1787.608447] ? dlci_ioctl_set+0x30/0x30 [ 1787.609323] __x64_sys_ioctl+0x19a/0x210 [ 1787.610203] do_syscall_64+0x33/0x40 [ 1787.611009] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1787.612112] RIP: 0033:0x7feded0d7b19 [ 1787.612918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.616892] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1787.618536] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1787.620067] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1787.621614] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1787.623149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1787.624683] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1787.629073] FAULT_INJECTION: forcing a failure. [ 1787.629073] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.631591] CPU: 1 PID: 11004 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1787.633082] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1787.634870] Call Trace: [ 1787.635446] dump_stack+0x107/0x167 [ 1787.636242] should_fail.cold+0x5/0xa [ 1787.637068] ? anon_vma_clone+0xdc/0x590 [ 1787.637956] should_failslab+0x5/0x20 [ 1787.638777] kmem_cache_alloc+0x5b/0x310 [ 1787.639666] anon_vma_clone+0xdc/0x590 [ 1787.640543] anon_vma_fork+0x82/0x640 [ 1787.641400] ? __vm_enough_memory+0x184/0x360 [ 1787.642377] copy_process+0x7218/0x7800 [ 1787.643289] ? __cleanup_sighand+0xb0/0xb0 [ 1787.644223] ? find_held_lock+0x2c/0x110 [ 1787.645109] kernel_clone+0xe7/0x980 [ 1787.645923] ? lock_downgrade+0x6d0/0x6d0 [ 1787.646816] ? find_held_lock+0x2c/0x110 [ 1787.647691] ? create_io_thread+0xf0/0xf0 [ 1787.648607] ? ksys_write+0x12d/0x260 [ 1787.649447] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1787.650499] __do_sys_fork+0x8a/0xc0 [ 1787.651305] ? kernel_thread+0xf0/0xf0 [ 1787.652169] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1787.653322] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1787.654435] ? trace_hardirqs_on+0x5b/0x180 [ 1787.655381] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1787.656490] do_syscall_64+0x33/0x40 [ 1787.657302] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1787.658404] RIP: 0033:0x7fadf412db19 [ 1787.659209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1787.663155] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1787.664790] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1787.666336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1787.667867] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1787.668830] device veth0_vlan entered promiscuous mode [ 1787.669401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1787.669415] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:27:14 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 49) 02:27:14 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0xfeff3f, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:27:14 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8903, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:27:14 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8901, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:27:14 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:27:14 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 17) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:27:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000380000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:14 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 12) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1801.876364] audit: type=1326 audit(1693276034.868:118): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11012 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:27:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000480000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1801.927393] device veth0_vlan entered promiscuous mode [ 1801.929080] FAULT_INJECTION: forcing a failure. [ 1801.929080] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.931464] CPU: 1 PID: 11016 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1801.932895] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1801.934609] Call Trace: [ 1801.935159] dump_stack+0x107/0x167 [ 1801.935912] should_fail.cold+0x5/0xa [ 1801.936693] ? ___slab_alloc+0x360/0x700 [ 1801.937541] ? create_object.isra.0+0x3a/0xa20 [ 1801.938500] should_failslab+0x5/0x20 [ 1801.939302] kmem_cache_alloc+0x5b/0x310 [ 1801.940139] create_object.isra.0+0x3a/0xa20 [ 1801.941038] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1801.942092] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1801.943134] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1801.944110] __alloc_skb+0xb1/0x5b0 [ 1801.944867] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1801.945815] rtmsg_ifinfo+0x83/0x120 [ 1801.946590] __dev_notify_flags+0x22a/0x2c0 [ 1801.947478] ? dev_change_name+0x660/0x660 [ 1801.948344] ? __dev_change_flags+0x4cf/0x6e0 [ 1801.949270] ? dev_set_allmulti+0x30/0x30 [ 1801.950150] ? cap_capable+0x1d6/0x240 [ 1801.950961] ? full_name_hash+0xb5/0xf0 [ 1801.951787] dev_change_flags+0x100/0x160 [ 1801.952652] devinet_ioctl+0x14de/0x1db0 [ 1801.953510] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1801.954431] inet_ioctl+0x34f/0x390 [ 1801.955187] ? inet_dgram_connect+0x220/0x220 [ 1801.956129] ? __lock_acquire+0xbb1/0x5b00 [ 1801.957022] ? perf_trace_lock+0xac/0x490 [ 1801.957909] packet_ioctl+0xb3/0x260 [ 1801.958691] sock_do_ioctl+0xd3/0x300 [ 1801.959483] ? compat_ifr_data_ioctl+0x180/0x180 [ 1801.960470] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1801.961694] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1801.962757] ? do_vfs_ioctl+0x283/0x10d0 [ 1801.963593] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1801.964667] ? generic_block_fiemap+0x60/0x60 [ 1801.965615] sock_ioctl+0x3ea/0x700 [ 1801.966369] ? dlci_ioctl_set+0x30/0x30 [ 1801.967207] ? selinux_file_ioctl+0xb6/0x270 [ 1801.968122] ? dlci_ioctl_set+0x30/0x30 [ 1801.968948] __x64_sys_ioctl+0x19a/0x210 [ 1801.969802] do_syscall_64+0x33/0x40 [ 1801.970584] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1801.971657] RIP: 0033:0x7f4a38965b19 [ 1801.972436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1801.976292] RSP: 002b:00007f4a35edb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1801.977901] RAX: ffffffffffffffda RBX: 00007f4a38a78f60 RCX: 00007f4a38965b19 [ 1801.979398] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1801.980901] RBP: 00007f4a35edb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1801.982376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1801.983886] R13: 00007ffefe21595f R14: 00007f4a35edb300 R15: 0000000000022000 02:27:14 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8902, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:27:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000580000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1801.997367] FAULT_INJECTION: forcing a failure. [ 1801.997367] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.999686] CPU: 0 PID: 11033 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1802.001080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.002772] Call Trace: [ 1802.003322] dump_stack+0x107/0x167 [ 1802.004077] should_fail.cold+0x5/0xa [ 1802.004853] ? create_object.isra.0+0x3a/0xa20 [ 1802.005812] should_failslab+0x5/0x20 [ 1802.006592] kmem_cache_alloc+0x5b/0x310 [ 1802.007438] create_object.isra.0+0x3a/0xa20 [ 1802.008332] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1802.009366] kmem_cache_alloc+0x159/0x310 [ 1802.010226] anon_vma_clone+0xdc/0x590 [ 1802.011036] anon_vma_fork+0x82/0x640 [ 1802.011821] ? __vm_enough_memory+0x184/0x360 [ 1802.012742] copy_process+0x7218/0x7800 [ 1802.013596] ? __cleanup_sighand+0xb0/0xb0 [ 1802.014487] ? find_held_lock+0x2c/0x110 [ 1802.015335] kernel_clone+0xe7/0x980 [ 1802.016106] ? lock_downgrade+0x6d0/0x6d0 [ 1802.017112] ? find_held_lock+0x2c/0x110 [ 1802.018173] ? create_io_thread+0xf0/0xf0 [ 1802.019213] ? ksys_write+0x12d/0x260 [ 1802.020081] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1802.021076] __do_sys_fork+0x8a/0xc0 [ 1802.021852] ? kernel_thread+0xf0/0xf0 [ 1802.022669] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1802.023739] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1802.024782] ? trace_hardirqs_on+0x5b/0x180 [ 1802.025671] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1802.026720] do_syscall_64+0x33/0x40 [ 1802.027478] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1802.028524] RIP: 0033:0x7fadf412db19 [ 1802.029290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.033044] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1802.034617] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1802.036074] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1802.037525] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1802.038953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1802.040384] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 1802.045956] FAULT_INJECTION: forcing a failure. [ 1802.045956] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.048446] CPU: 0 PID: 11019 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1802.049854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.051523] Call Trace: [ 1802.052062] dump_stack+0x107/0x167 [ 1802.052803] should_fail.cold+0x5/0xa [ 1802.053581] ? create_object.isra.0+0x3a/0xa20 [ 1802.054506] should_failslab+0x5/0x20 [ 1802.055278] kmem_cache_alloc+0x5b/0x310 [ 1802.056105] create_object.isra.0+0x3a/0xa20 [ 1802.056993] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1802.058044] __kmalloc_node+0x1ae/0x420 [ 1802.058859] kvmalloc_node+0x119/0x170 [ 1802.059650] pfifo_fast_init+0xea/0x3d0 [ 1802.060460] ? __netdev_watchdog_up+0x190/0x190 [ 1802.061401] qdisc_create_dflt+0x103/0x370 [ 1802.062267] dev_activate+0x7c3/0xd70 [ 1802.063061] __dev_open+0x38a/0x4e0 [ 1802.063800] ? dev_set_rx_mode+0x80/0x80 [ 1802.064627] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1802.065701] ? __local_bh_enable_ip+0x9d/0x100 [ 1802.066627] __dev_change_flags+0x521/0x6e0 [ 1802.067501] ? dev_set_allmulti+0x30/0x30 [ 1802.068338] ? cap_capable+0x1d6/0x240 [ 1802.069129] ? full_name_hash+0xb5/0xf0 [ 1802.069945] dev_change_flags+0x8a/0x160 [ 1802.070775] devinet_ioctl+0x14de/0x1db0 [ 1802.071610] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1802.072510] inet_ioctl+0x34f/0x390 [ 1802.073250] ? inet_dgram_connect+0x220/0x220 [ 1802.074182] ? __lock_acquire+0xbb1/0x5b00 [ 1802.075055] ? perf_trace_lock+0xac/0x490 [ 1802.075898] packet_ioctl+0xb3/0x260 [ 1802.076659] sock_do_ioctl+0xd3/0x300 [ 1802.077440] ? compat_ifr_data_ioctl+0x180/0x180 [ 1802.078402] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1802.079559] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1802.080598] ? do_vfs_ioctl+0x283/0x10d0 [ 1802.081434] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1802.082492] ? generic_block_fiemap+0x60/0x60 [ 1802.083403] sock_ioctl+0x3ea/0x700 [ 1802.084138] ? dlci_ioctl_set+0x30/0x30 [ 1802.084946] ? selinux_file_ioctl+0xb6/0x270 [ 1802.085844] ? dlci_ioctl_set+0x30/0x30 [ 1802.086651] __x64_sys_ioctl+0x19a/0x210 [ 1802.087476] do_syscall_64+0x33/0x40 [ 1802.088231] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1802.089263] RIP: 0033:0x7f07a4a4eb19 [ 1802.090023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.093737] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1802.095269] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1802.096707] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1802.098195] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1802.099633] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1802.101078] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1802.110861] device veth0_vlan entered promiscuous mode 02:27:15 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x1000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1802.143049] FAULT_INJECTION: forcing a failure. [ 1802.143049] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.145897] CPU: 0 PID: 11022 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1802.147302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1802.148978] Call Trace: [ 1802.149527] dump_stack+0x107/0x167 [ 1802.150278] should_fail.cold+0x5/0xa [ 1802.151056] ? kvmalloc_node+0x119/0x170 [ 1802.151881] should_failslab+0x5/0x20 [ 1802.152649] __kmalloc_node+0x76/0x420 [ 1802.153461] ? lockdep_init_map_type+0x2c7/0x780 [ 1802.154426] kvmalloc_node+0x119/0x170 [ 1802.155218] pfifo_fast_init+0xea/0x3d0 [ 1802.156027] ? __netdev_watchdog_up+0x190/0x190 [ 1802.156965] qdisc_create_dflt+0x103/0x370 [ 1802.157838] dev_activate+0x7c3/0xd70 [ 1802.158621] __dev_open+0x38a/0x4e0 [ 1802.159358] ? dev_set_rx_mode+0x80/0x80 [ 1802.160183] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1802.161236] ? __local_bh_enable_ip+0x9d/0x100 [ 1802.162174] __dev_change_flags+0x521/0x6e0 [ 1802.163046] ? dev_set_allmulti+0x30/0x30 [ 1802.163884] ? cap_capable+0x1d6/0x240 [ 1802.164674] ? full_name_hash+0xb5/0xf0 [ 1802.165498] dev_change_flags+0x8a/0x160 [ 1802.166328] devinet_ioctl+0x14de/0x1db0 [ 1802.167160] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1802.168060] inet_ioctl+0x34f/0x390 [ 1802.168799] ? inet_dgram_connect+0x220/0x220 [ 1802.169728] ? __lock_acquire+0xbb1/0x5b00 [ 1802.170602] ? perf_trace_lock+0xac/0x490 [ 1802.171446] packet_ioctl+0xb3/0x260 [ 1802.172202] sock_do_ioctl+0xd3/0x300 [ 1802.172972] ? compat_ifr_data_ioctl+0x180/0x180 [ 1802.173954] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1802.175112] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1802.176153] ? do_vfs_ioctl+0x283/0x10d0 [ 1802.176973] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1802.178041] ? generic_block_fiemap+0x60/0x60 [ 1802.178955] sock_ioctl+0x3ea/0x700 [ 1802.179691] ? dlci_ioctl_set+0x30/0x30 [ 1802.180501] ? selinux_file_ioctl+0xb6/0x270 [ 1802.181402] ? dlci_ioctl_set+0x30/0x30 [ 1802.182213] __x64_sys_ioctl+0x19a/0x210 [ 1802.183040] do_syscall_64+0x33/0x40 [ 1802.183797] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1802.184836] RIP: 0033:0x7feded0d7b19 [ 1802.185613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1802.189314] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1802.190853] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1802.192288] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1802.193737] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1802.195172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1802.196608] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1802.198913] veth0_vlan: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1802.207272] device veth0_vlan entered promiscuous mode 02:27:15 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8903, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:27:31 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 50) 02:27:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000680000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:31 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:27:32 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x2000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:27:32 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8904, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:27:32 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8904, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:27:32 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 13) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:27:32 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1819.048337] audit: type=1326 audit(1693276052.040:119): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11057 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 1819.089400] FAULT_INJECTION: forcing a failure. [ 1819.089400] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.092375] CPU: 1 PID: 11056 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1819.093793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.095507] Call Trace: [ 1819.096073] dump_stack+0x107/0x167 [ 1819.096834] should_fail.cold+0x5/0xa [ 1819.097650] ? kvmalloc_node+0x119/0x170 [ 1819.098502] should_failslab+0x5/0x20 [ 1819.099295] __kmalloc_node+0x76/0x420 [ 1819.100105] ? lockdep_init_map_type+0x2c7/0x780 [ 1819.101086] kvmalloc_node+0x119/0x170 [ 1819.101908] pfifo_fast_init+0xea/0x3d0 [ 1819.102733] ? __netdev_watchdog_up+0x190/0x190 [ 1819.103683] qdisc_create_dflt+0x103/0x370 [ 1819.104561] dev_activate+0x7c3/0xd70 [ 1819.105371] __dev_open+0x38a/0x4e0 [ 1819.106129] ? dev_set_rx_mode+0x80/0x80 [ 1819.106971] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.108047] ? __local_bh_enable_ip+0x9d/0x100 [ 1819.108990] __dev_change_flags+0x521/0x6e0 [ 1819.109902] ? dev_set_allmulti+0x30/0x30 [ 1819.110760] ? cap_capable+0x1d6/0x240 [ 1819.111564] ? full_name_hash+0xb5/0xf0 [ 1819.112387] dev_change_flags+0x8a/0x160 [ 1819.113227] devinet_ioctl+0x14de/0x1db0 [ 1819.114068] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1819.114973] inet_ioctl+0x34f/0x390 [ 1819.115736] ? inet_dgram_connect+0x220/0x220 [ 1819.116699] ? __lock_acquire+0xbb1/0x5b00 [ 1819.117582] ? perf_trace_lock+0xac/0x490 [ 1819.118448] packet_ioctl+0xb3/0x260 [ 1819.119214] sock_do_ioctl+0xd3/0x300 [ 1819.120002] ? compat_ifr_data_ioctl+0x180/0x180 [ 1819.120985] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1819.122178] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1819.123232] ? do_vfs_ioctl+0x283/0x10d0 [ 1819.124057] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1819.125132] ? generic_block_fiemap+0x60/0x60 [ 1819.126061] sock_ioctl+0x3ea/0x700 [ 1819.126796] ? dlci_ioctl_set+0x30/0x30 [ 1819.127612] ? selinux_file_ioctl+0xb6/0x270 [ 1819.128512] ? dlci_ioctl_set+0x30/0x30 [ 1819.129320] __x64_sys_ioctl+0x19a/0x210 [ 1819.130162] do_syscall_64+0x33/0x40 [ 1819.130921] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.131965] RIP: 0033:0x7f07a4a4eb19 [ 1819.132722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.136439] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1819.137988] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1819.139428] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1819.140870] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.142327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1819.143772] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1819.145925] veth0_vlan: default qdisc (pfifo_fast) fail, fallback to noqueue 02:27:32 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8906, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1819.153978] FAULT_INJECTION: forcing a failure. [ 1819.153978] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.156339] CPU: 0 PID: 11077 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1819.157753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.159429] Call Trace: [ 1819.159975] dump_stack+0x107/0x167 [ 1819.160732] should_fail.cold+0x5/0xa [ 1819.161508] ? anon_vma_fork+0xf1/0x640 [ 1819.162334] should_failslab+0x5/0x20 [ 1819.163110] kmem_cache_alloc+0x5b/0x310 [ 1819.163943] anon_vma_fork+0xf1/0x640 [ 1819.164724] ? __vm_enough_memory+0x184/0x360 [ 1819.165675] copy_process+0x7218/0x7800 [ 1819.166533] ? __cleanup_sighand+0xb0/0xb0 [ 1819.167432] ? find_held_lock+0x2c/0x110 [ 1819.168286] kernel_clone+0xe7/0x980 [ 1819.169056] ? lock_downgrade+0x6d0/0x6d0 [ 1819.169915] ? find_held_lock+0x2c/0x110 [ 1819.170752] ? create_io_thread+0xf0/0xf0 [ 1819.171614] ? ksys_write+0x12d/0x260 [ 1819.172414] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1819.173415] __do_sys_fork+0x8a/0xc0 [ 1819.174187] ? kernel_thread+0xf0/0xf0 [ 1819.175011] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.176095] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.177162] ? trace_hardirqs_on+0x5b/0x180 [ 1819.178063] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1819.179133] do_syscall_64+0x33/0x40 [ 1819.179903] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.180959] RIP: 0033:0x7fadf412db19 [ 1819.181738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.185553] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1819.187150] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1819.188623] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1819.190094] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.191543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1819.192993] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:27:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000780000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000880000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:32 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8907, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1819.276058] device veth0_vlan entered promiscuous mode 02:27:32 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x3000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1819.295089] FAULT_INJECTION: forcing a failure. [ 1819.295089] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.297454] CPU: 1 PID: 11066 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1819.298866] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.300543] Call Trace: [ 1819.301083] dump_stack+0x107/0x167 [ 1819.301841] should_fail.cold+0x5/0xa [ 1819.302617] ? create_object.isra.0+0x3a/0xa20 [ 1819.303546] should_failslab+0x5/0x20 [ 1819.304315] kmem_cache_alloc+0x5b/0x310 [ 1819.305160] create_object.isra.0+0x3a/0xa20 [ 1819.306086] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1819.307142] __kmalloc_node+0x1ae/0x420 [ 1819.307975] kvmalloc_node+0x119/0x170 [ 1819.308785] pfifo_fast_init+0xea/0x3d0 [ 1819.309611] ? __netdev_watchdog_up+0x190/0x190 [ 1819.310588] qdisc_create_dflt+0x103/0x370 [ 1819.311458] dev_activate+0x7c3/0xd70 [ 1819.312260] __dev_open+0x38a/0x4e0 [ 1819.313004] ? dev_set_rx_mode+0x80/0x80 [ 1819.313858] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.314934] ? __local_bh_enable_ip+0x9d/0x100 [ 1819.315867] __dev_change_flags+0x521/0x6e0 [ 1819.316754] ? dev_set_allmulti+0x30/0x30 [ 1819.317596] ? cap_capable+0x1d6/0x240 [ 1819.318419] ? full_name_hash+0xb5/0xf0 [ 1819.319241] dev_change_flags+0x8a/0x160 [ 1819.320096] devinet_ioctl+0x14de/0x1db0 [ 1819.320957] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1819.321883] inet_ioctl+0x34f/0x390 [ 1819.322627] ? inet_dgram_connect+0x220/0x220 [ 1819.323546] ? __lock_acquire+0xbb1/0x5b00 [ 1819.324418] ? perf_trace_lock+0xac/0x490 [ 1819.325262] packet_ioctl+0xb3/0x260 [ 1819.326043] sock_do_ioctl+0xd3/0x300 [ 1819.326807] ? compat_ifr_data_ioctl+0x180/0x180 [ 1819.327767] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1819.328933] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1819.329993] ? do_vfs_ioctl+0x283/0x10d0 [ 1819.330824] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1819.331899] ? generic_block_fiemap+0x60/0x60 [ 1819.332823] sock_ioctl+0x3ea/0x700 [ 1819.333571] ? dlci_ioctl_set+0x30/0x30 [ 1819.334415] ? selinux_file_ioctl+0xb6/0x270 [ 1819.335315] ? dlci_ioctl_set+0x30/0x30 [ 1819.336141] __x64_sys_ioctl+0x19a/0x210 [ 1819.336980] do_syscall_64+0x33/0x40 [ 1819.337771] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.338819] RIP: 0033:0x7feded0d7b19 [ 1819.339584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.343349] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1819.344884] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1819.346354] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1819.347793] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.349235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1819.350683] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1819.352878] device veth0_vlan entered promiscuous mode 02:27:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000001880000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:32 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x890b, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1819.475046] FAULT_INJECTION: forcing a failure. [ 1819.475046] name failslab, interval 1, probability 0, space 0, times 0 [ 1819.477499] CPU: 0 PID: 11074 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1819.478926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1819.480607] Call Trace: [ 1819.481155] dump_stack+0x107/0x167 [ 1819.481915] should_fail.cold+0x5/0xa [ 1819.482695] ? create_object.isra.0+0x3a/0xa20 [ 1819.483635] should_failslab+0x5/0x20 [ 1819.484414] kmem_cache_alloc+0x5b/0x310 [ 1819.485253] create_object.isra.0+0x3a/0xa20 [ 1819.486184] kmemleak_alloc_percpu+0xa0/0x100 [ 1819.487112] pcpu_alloc+0x4e2/0x1240 [ 1819.487901] qdisc_alloc+0x399/0xc80 [ 1819.488677] qdisc_create_dflt+0x71/0x370 [ 1819.489534] dev_activate+0x7c3/0xd70 [ 1819.490355] __dev_open+0x38a/0x4e0 [ 1819.491113] ? dev_set_rx_mode+0x80/0x80 [ 1819.491964] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1819.493047] ? __local_bh_enable_ip+0x9d/0x100 [ 1819.494004] __dev_change_flags+0x521/0x6e0 [ 1819.494895] ? dev_set_allmulti+0x30/0x30 [ 1819.495757] ? netdev_name_node_lookup+0xd5/0x150 [ 1819.496757] dev_change_flags+0x8a/0x160 [ 1819.497610] devinet_ioctl+0x14de/0x1db0 [ 1819.498456] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1819.499372] inet_ioctl+0x34f/0x390 [ 1819.500120] ? inet_dgram_connect+0x220/0x220 [ 1819.501046] ? __lock_acquire+0xbb1/0x5b00 [ 1819.501944] ? perf_trace_lock+0xac/0x490 [ 1819.502812] packet_ioctl+0xb3/0x260 [ 1819.503576] sock_do_ioctl+0xd3/0x300 [ 1819.504363] ? compat_ifr_data_ioctl+0x180/0x180 [ 1819.505351] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1819.506551] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1819.507614] ? do_vfs_ioctl+0x283/0x10d0 [ 1819.508446] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1819.509527] ? generic_block_fiemap+0x60/0x60 [ 1819.510460] sock_ioctl+0x3ea/0x700 [ 1819.511212] ? dlci_ioctl_set+0x30/0x30 [ 1819.512040] ? selinux_file_ioctl+0xb6/0x270 [ 1819.512951] ? dlci_ioctl_set+0x30/0x30 [ 1819.513790] __x64_sys_ioctl+0x19a/0x210 [ 1819.514634] do_syscall_64+0x33/0x40 [ 1819.515409] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1819.516455] RIP: 0033:0x7f4a38965b19 [ 1819.517229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1819.520977] RSP: 002b:00007f4a35eba188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1819.522524] RAX: ffffffffffffffda RBX: 00007f4a38a79020 RCX: 00007f4a38965b19 [ 1819.523968] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1819.525412] RBP: 00007f4a35eba1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1819.526872] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1819.528345] R13: 00007ffefe21595f R14: 00007f4a35eba300 R15: 0000000000022000 [ 1819.554149] device veth0_vlan entered promiscuous mode 02:27:48 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 51) 02:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000001c80000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:48 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x890c, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:27:48 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 19) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:27:48 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x3003eff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:27:48 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8905, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:27:48 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:27:48 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 11) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1835.163280] audit: type=1326 audit(1693276068.155:120): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11105 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 1835.179174] device veth0_vlan entered promiscuous mode [ 1835.181098] FAULT_INJECTION: forcing a failure. [ 1835.181098] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.184232] CPU: 0 PID: 11109 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1835.185875] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1835.187771] Call Trace: [ 1835.188376] dump_stack+0x107/0x167 [ 1835.189210] should_fail.cold+0x5/0xa [ 1835.190166] ? create_object.isra.0+0x3a/0xa20 [ 1835.191140] should_failslab+0x5/0x20 [ 1835.191911] kmem_cache_alloc+0x5b/0x310 [ 1835.192743] create_object.isra.0+0x3a/0xa20 [ 1835.193687] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1835.194746] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1835.195774] ? netlink_trim+0x1ee/0x250 [ 1835.196589] pskb_expand_head+0x15a/0x1040 [ 1835.197461] netlink_trim+0x1ee/0x250 [ 1835.198259] netlink_broadcast_filtered+0x60/0xdc0 [ 1835.199318] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1835.200289] ? rtmsg_ifinfo_build_skb+0xd1/0x1a0 [ 1835.201263] nlmsg_notify+0x94/0x290 [ 1835.202048] rtmsg_ifinfo+0xf0/0x120 [ 1835.202817] __dev_notify_flags+0x22a/0x2c0 [ 1835.203699] ? dev_change_name+0x660/0x660 [ 1835.204608] ? __dev_change_flags+0x4cf/0x6e0 [ 1835.205556] ? dev_set_allmulti+0x30/0x30 [ 1835.206428] ? cap_capable+0x1d6/0x240 [ 1835.207229] ? full_name_hash+0xb5/0xf0 [ 1835.208085] dev_change_flags+0x100/0x160 [ 1835.208966] devinet_ioctl+0x14de/0x1db0 [ 1835.209813] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1835.210736] inet_ioctl+0x34f/0x390 [ 1835.211483] ? inet_dgram_connect+0x220/0x220 [ 1835.212416] ? __lock_acquire+0xbb1/0x5b00 [ 1835.213301] ? perf_trace_lock+0xac/0x490 [ 1835.214176] packet_ioctl+0xb3/0x260 [ 1835.214972] sock_do_ioctl+0xd3/0x300 [ 1835.215797] ? compat_ifr_data_ioctl+0x180/0x180 [ 1835.216780] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1835.217971] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1835.219031] ? do_vfs_ioctl+0x283/0x10d0 [ 1835.219871] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1835.221026] ? generic_block_fiemap+0x60/0x60 [ 1835.221974] sock_ioctl+0x3ea/0x700 [ 1835.222730] ? dlci_ioctl_set+0x30/0x30 [ 1835.223559] ? selinux_file_ioctl+0xb6/0x270 [ 1835.224477] ? dlci_ioctl_set+0x30/0x30 [ 1835.225307] __x64_sys_ioctl+0x19a/0x210 [ 1835.226255] do_syscall_64+0x33/0x40 [ 1835.227028] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1835.228111] RIP: 0033:0x7f4a38965b19 [ 1835.228891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1835.232788] RSP: 002b:00007f4a35edb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1835.234394] RAX: ffffffffffffffda RBX: 00007f4a38a78f60 RCX: 00007f4a38965b19 [ 1835.235950] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1835.237432] RBP: 00007f4a35edb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.238934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1835.240458] R13: 00007ffefe21595f R14: 00007f4a35edb300 R15: 0000000000022000 02:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000006780000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1835.251092] FAULT_INJECTION: forcing a failure. [ 1835.251092] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.253469] CPU: 0 PID: 11123 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1835.254961] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1835.256750] Call Trace: [ 1835.257388] dump_stack+0x107/0x167 [ 1835.258202] should_fail.cold+0x5/0xa [ 1835.259017] ? create_object.isra.0+0x3a/0xa20 [ 1835.259991] should_failslab+0x5/0x20 [ 1835.260801] kmem_cache_alloc+0x5b/0x310 [ 1835.261672] create_object.isra.0+0x3a/0xa20 [ 1835.262619] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1835.263710] kmem_cache_alloc+0x159/0x310 [ 1835.264679] anon_vma_fork+0xf1/0x640 [ 1835.265507] ? __vm_enough_memory+0x184/0x360 [ 1835.266509] copy_process+0x7218/0x7800 [ 1835.267383] ? __cleanup_sighand+0xb0/0xb0 [ 1835.268284] ? find_held_lock+0x2c/0x110 [ 1835.269167] kernel_clone+0xe7/0x980 [ 1835.270022] ? lock_downgrade+0x6d0/0x6d0 [ 1835.270910] ? find_held_lock+0x2c/0x110 [ 1835.271789] ? create_io_thread+0xf0/0xf0 [ 1835.272691] ? ksys_write+0x12d/0x260 [ 1835.273523] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1835.274650] __do_sys_fork+0x8a/0xc0 [ 1835.275458] ? kernel_thread+0xf0/0xf0 [ 1835.276318] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1835.277442] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1835.278580] ? trace_hardirqs_on+0x5b/0x180 [ 1835.279510] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1835.280686] do_syscall_64+0x33/0x40 [ 1835.281539] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1835.282669] RIP: 0033:0x7fadf412db19 [ 1835.283481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1835.287556] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1835.289226] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1835.290864] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1835.292453] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.294032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1835.295605] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000020000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1835.317274] FAULT_INJECTION: forcing a failure. [ 1835.317274] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.320259] CPU: 1 PID: 11127 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1835.321853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1835.323634] Call Trace: [ 1835.324173] dump_stack+0x107/0x167 [ 1835.324920] should_fail.cold+0x5/0xa [ 1835.325694] ? create_object.isra.0+0x3a/0xa20 [ 1835.326653] should_failslab+0x5/0x20 [ 1835.327426] kmem_cache_alloc+0x5b/0x310 [ 1835.328256] create_object.isra.0+0x3a/0xa20 [ 1835.329147] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1835.330206] __kmalloc_node+0x1ae/0x420 [ 1835.331039] kvmalloc_node+0x119/0x170 [ 1835.331848] pfifo_fast_init+0xea/0x3d0 [ 1835.332684] ? __netdev_watchdog_up+0x190/0x190 [ 1835.333644] qdisc_create_dflt+0x103/0x370 [ 1835.334548] dev_activate+0x7c3/0xd70 [ 1835.335343] __dev_open+0x38a/0x4e0 [ 1835.336099] ? dev_set_rx_mode+0x80/0x80 [ 1835.336939] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1835.338032] ? __local_bh_enable_ip+0x9d/0x100 [ 1835.338970] __dev_change_flags+0x521/0x6e0 [ 1835.339919] ? dev_set_allmulti+0x30/0x30 [ 1835.340793] ? cap_capable+0x1d6/0x240 [ 1835.341593] ? full_name_hash+0xb5/0xf0 [ 1835.342431] dev_change_flags+0x8a/0x160 [ 1835.343276] devinet_ioctl+0x14de/0x1db0 [ 1835.344117] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1835.345034] inet_ioctl+0x34f/0x390 [ 1835.345820] ? inet_dgram_connect+0x220/0x220 [ 1835.346811] ? __lock_acquire+0xbb1/0x5b00 [ 1835.347698] ? perf_trace_lock+0xac/0x490 [ 1835.348555] packet_ioctl+0xb3/0x260 [ 1835.349328] sock_do_ioctl+0xd3/0x300 [ 1835.350125] ? compat_ifr_data_ioctl+0x180/0x180 [ 1835.351093] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1835.352285] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1835.353339] ? do_vfs_ioctl+0x283/0x10d0 [ 1835.354199] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1835.355270] ? generic_block_fiemap+0x60/0x60 [ 1835.356192] sock_ioctl+0x3ea/0x700 [ 1835.356930] ? dlci_ioctl_set+0x30/0x30 [ 1835.357743] ? selinux_file_ioctl+0xb6/0x270 [ 1835.358645] ? dlci_ioctl_set+0x30/0x30 [ 1835.359454] __x64_sys_ioctl+0x19a/0x210 [ 1835.360289] do_syscall_64+0x33/0x40 [ 1835.361047] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1835.362105] RIP: 0033:0x7f07a4a4eb19 [ 1835.362864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1835.366595] RSP: 002b:00007f07a1fa3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1835.368138] RAX: ffffffffffffffda RBX: 00007f07a4b62020 RCX: 00007f07a4a4eb19 [ 1835.369583] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1835.371052] RBP: 00007f07a1fa31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.372494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1835.373952] R13: 00007ffca8d8bf7f R14: 00007f07a1fa3300 R15: 0000000000022000 02:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080020000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1835.388016] device veth0_vlan entered promiscuous mode [ 1835.408542] FAULT_INJECTION: forcing a failure. [ 1835.408542] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.411314] CPU: 1 PID: 11122 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1835.412735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1835.414456] Call Trace: [ 1835.415008] dump_stack+0x107/0x167 [ 1835.415768] should_fail.cold+0x5/0xa [ 1835.416553] ? qdisc_alloc+0xac/0xc80 [ 1835.417341] should_failslab+0x5/0x20 [ 1835.418144] __kmalloc_node+0x76/0x420 [ 1835.418944] qdisc_alloc+0xac/0xc80 [ 1835.419694] qdisc_create_dflt+0x71/0x370 [ 1835.420573] dev_activate+0x7c3/0xd70 [ 1835.421363] __dev_open+0x38a/0x4e0 [ 1835.422117] ? dev_set_rx_mode+0x80/0x80 [ 1835.422959] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1835.424034] ? __local_bh_enable_ip+0x9d/0x100 [ 1835.424965] __dev_change_flags+0x521/0x6e0 [ 1835.425887] ? dev_set_allmulti+0x30/0x30 [ 1835.426733] ? cap_capable+0x1d6/0x240 [ 1835.427530] ? full_name_hash+0xb5/0xf0 [ 1835.428341] dev_change_flags+0x8a/0x160 [ 1835.429183] devinet_ioctl+0x14de/0x1db0 [ 1835.430057] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1835.430964] inet_ioctl+0x34f/0x390 [ 1835.431707] ? inet_dgram_connect+0x220/0x220 [ 1835.432651] ? __lock_acquire+0xbb1/0x5b00 [ 1835.433540] ? perf_trace_lock+0xac/0x490 [ 1835.434433] packet_ioctl+0xb3/0x260 [ 1835.435190] sock_do_ioctl+0xd3/0x300 [ 1835.435961] ? compat_ifr_data_ioctl+0x180/0x180 [ 1835.436954] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1835.438140] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1835.439189] ? do_vfs_ioctl+0x283/0x10d0 [ 1835.440022] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1835.441084] ? generic_block_fiemap+0x60/0x60 [ 1835.442008] sock_ioctl+0x3ea/0x700 [ 1835.442745] ? dlci_ioctl_set+0x30/0x30 [ 1835.443554] ? selinux_file_ioctl+0xb6/0x270 [ 1835.444450] ? dlci_ioctl_set+0x30/0x30 [ 1835.445272] __x64_sys_ioctl+0x19a/0x210 [ 1835.446117] do_syscall_64+0x33/0x40 [ 1835.446894] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1835.447935] RIP: 0033:0x7feded0d7b19 [ 1835.448710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1835.452419] RSP: 002b:00007fedea62c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1835.453971] RAX: ffffffffffffffda RBX: 00007feded1eb020 RCX: 00007feded0d7b19 [ 1835.455406] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1835.456844] RBP: 00007fedea62c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.458294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1835.459733] R13: 00007ffef51d5a1f R14: 00007fedea62c300 R15: 0000000000022000 [ 1835.463249] veth0_vlan: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1835.470365] device veth0_vlan entered promiscuous mode 02:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080030000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:48 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x3300000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:27:48 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x890d, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:27:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080040000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:27:48 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 12) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1835.725280] FAULT_INJECTION: forcing a failure. [ 1835.725280] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.728156] CPU: 0 PID: 11149 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1835.729599] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1835.731300] Call Trace: [ 1835.731840] dump_stack+0x107/0x167 [ 1835.732588] should_fail.cold+0x5/0xa [ 1835.733363] ? kvmalloc_node+0x119/0x170 [ 1835.734200] ? kvmalloc_node+0x119/0x170 [ 1835.735023] should_failslab+0x5/0x20 [ 1835.735802] __kmalloc_node+0x76/0x420 [ 1835.736591] ? lockdep_init_map_type+0x2c7/0x780 [ 1835.737562] kvmalloc_node+0x119/0x170 [ 1835.738406] pfifo_fast_init+0xea/0x3d0 [ 1835.739224] ? __netdev_watchdog_up+0x190/0x190 [ 1835.740192] qdisc_create_dflt+0x103/0x370 [ 1835.741051] dev_activate+0x7c3/0xd70 [ 1835.741876] __dev_open+0x38a/0x4e0 [ 1835.742619] ? dev_set_rx_mode+0x80/0x80 [ 1835.743478] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1835.744537] ? __local_bh_enable_ip+0x9d/0x100 [ 1835.745476] __dev_change_flags+0x521/0x6e0 [ 1835.746372] ? dev_set_allmulti+0x30/0x30 [ 1835.747219] ? cap_capable+0x1d6/0x240 [ 1835.748009] ? full_name_hash+0xb5/0xf0 [ 1835.748839] dev_change_flags+0x8a/0x160 [ 1835.749673] devinet_ioctl+0x14de/0x1db0 [ 1835.750538] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1835.751442] inet_ioctl+0x34f/0x390 [ 1835.752182] ? inet_dgram_connect+0x220/0x220 [ 1835.753113] ? __lock_acquire+0xbb1/0x5b00 [ 1835.754015] ? perf_trace_lock+0xac/0x490 [ 1835.754872] packet_ioctl+0xb3/0x260 [ 1835.755650] sock_do_ioctl+0xd3/0x300 [ 1835.756421] ? compat_ifr_data_ioctl+0x180/0x180 [ 1835.757392] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1835.758562] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1835.759628] ? do_vfs_ioctl+0x283/0x10d0 [ 1835.760467] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1835.761535] ? generic_block_fiemap+0x60/0x60 [ 1835.762479] sock_ioctl+0x3ea/0x700 [ 1835.763217] ? dlci_ioctl_set+0x30/0x30 [ 1835.764061] ? selinux_file_ioctl+0xb6/0x270 [ 1835.764966] ? dlci_ioctl_set+0x30/0x30 [ 1835.765798] __x64_sys_ioctl+0x19a/0x210 [ 1835.766655] do_syscall_64+0x33/0x40 [ 1835.767433] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1835.768482] RIP: 0033:0x7f07a4a4eb19 [ 1835.769250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1835.773073] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1835.774643] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1835.776146] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1835.777613] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1835.779121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1835.780574] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1835.784930] veth0_vlan: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1835.811927] device veth0_vlan entered promiscuous mode 02:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080050000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:04 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 52) 02:28:04 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 13) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:04 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:04 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:04 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8906, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:28:04 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8914, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:28:04 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1851.074591] audit: type=1326 audit(1693276084.066:121): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11154 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 1851.144049] device veth0_vlan entered promiscuous mode 02:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080060000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1851.155255] FAULT_INJECTION: forcing a failure. [ 1851.155255] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.158161] CPU: 0 PID: 11165 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1851.159591] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1851.161267] Call Trace: [ 1851.161814] dump_stack+0x107/0x167 [ 1851.162575] should_fail.cold+0x5/0xa [ 1851.163349] ? ____ip_mc_inc_group+0x277/0xca0 [ 1851.164293] ? ____ip_mc_inc_group+0x277/0xca0 [ 1851.165219] should_failslab+0x5/0x20 [ 1851.165990] kmem_cache_alloc_trace+0x55/0x320 [ 1851.166942] ____ip_mc_inc_group+0x277/0xca0 [ 1851.167835] ? kfree_skbmem+0xef/0x1b0 [ 1851.168630] ? ip_mc_add_src+0xe00/0xe00 [ 1851.169477] ip_mc_up+0x14b/0x3a0 [ 1851.170217] inetdev_event+0xbe3/0x1610 [ 1851.171045] ? devinet_init_net+0x650/0x650 [ 1851.171916] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.172966] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.174001] ? nh_netdev_event+0x8c/0x370 [ 1851.174867] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.175911] raw_notifier_call_chain+0xb3/0x110 [ 1851.176851] call_netdevice_notifiers_info+0xb5/0x130 [ 1851.177891] __dev_notify_flags+0x110/0x2c0 [ 1851.178777] ? dev_change_name+0x660/0x660 [ 1851.179627] ? __dev_change_flags+0x4cf/0x6e0 [ 1851.180531] ? dev_set_allmulti+0x30/0x30 [ 1851.181378] ? cap_capable+0x1d6/0x240 [ 1851.182179] ? full_name_hash+0xb5/0xf0 [ 1851.182980] dev_change_flags+0x100/0x160 [ 1851.183832] devinet_ioctl+0x14de/0x1db0 [ 1851.184667] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1851.185584] inet_ioctl+0x34f/0x390 [ 1851.186326] ? inet_dgram_connect+0x220/0x220 [ 1851.187256] ? __lock_acquire+0xbb1/0x5b00 [ 1851.188153] ? perf_trace_lock+0xac/0x490 [ 1851.189011] packet_ioctl+0xb3/0x260 [ 1851.189773] sock_do_ioctl+0xd3/0x300 [ 1851.190575] ? compat_ifr_data_ioctl+0x180/0x180 [ 1851.191555] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1851.192724] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.193779] ? do_vfs_ioctl+0x283/0x10d0 [ 1851.194625] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1851.195683] ? generic_block_fiemap+0x60/0x60 [ 1851.196602] sock_ioctl+0x3ea/0x700 [ 1851.197338] ? dlci_ioctl_set+0x30/0x30 [ 1851.198159] ? selinux_file_ioctl+0xb6/0x270 [ 1851.199055] ? dlci_ioctl_set+0x30/0x30 [ 1851.199866] __x64_sys_ioctl+0x19a/0x210 [ 1851.200698] do_syscall_64+0x33/0x40 [ 1851.201453] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1851.202511] RIP: 0033:0x7f4a38965b19 [ 1851.203270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.207011] RSP: 002b:00007f4a35edb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1851.208547] RAX: ffffffffffffffda RBX: 00007f4a38a78f60 RCX: 00007f4a38965b19 [ 1851.209988] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1851.211440] RBP: 00007f4a35edb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1851.212890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1851.214339] R13: 00007ffefe21595f R14: 00007f4a35edb300 R15: 0000000000022000 02:28:04 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x5000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1851.222652] FAULT_INJECTION: forcing a failure. [ 1851.222652] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.224968] CPU: 1 PID: 11179 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1851.226352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1851.227998] Call Trace: [ 1851.228539] dump_stack+0x107/0x167 [ 1851.229273] should_fail.cold+0x5/0xa [ 1851.230057] ? anon_vma_fork+0x1ff/0x640 [ 1851.230905] should_failslab+0x5/0x20 [ 1851.231677] kmem_cache_alloc+0x5b/0x310 [ 1851.232514] anon_vma_fork+0x1ff/0x640 [ 1851.233327] copy_process+0x7218/0x7800 [ 1851.234187] ? __cleanup_sighand+0xb0/0xb0 [ 1851.235054] ? find_held_lock+0x2c/0x110 [ 1851.235897] kernel_clone+0xe7/0x980 [ 1851.236670] ? lock_downgrade+0x6d0/0x6d0 [ 1851.237503] ? find_held_lock+0x2c/0x110 [ 1851.238328] ? create_io_thread+0xf0/0xf0 [ 1851.239160] ? ksys_write+0x12d/0x260 [ 1851.239929] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1851.240923] __do_sys_fork+0x8a/0xc0 [ 1851.241668] ? kernel_thread+0xf0/0xf0 [ 1851.242483] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1851.243558] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1851.244608] ? trace_hardirqs_on+0x5b/0x180 [ 1851.245507] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1851.246581] do_syscall_64+0x33/0x40 [ 1851.247343] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1851.248365] RIP: 0033:0x7fadf412db19 [ 1851.249106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.252771] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1851.254324] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1851.255758] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1851.257187] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1851.258641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1851.260080] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 1851.279282] device veth0_vlan entered promiscuous mode [ 1851.281048] FAULT_INJECTION: forcing a failure. [ 1851.281048] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.283420] CPU: 1 PID: 11168 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1851.284839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1851.286548] Call Trace: [ 1851.287080] dump_stack+0x107/0x167 [ 1851.287809] should_fail.cold+0x5/0xa [ 1851.288569] ? create_object.isra.0+0x3a/0xa20 [ 1851.289476] should_failslab+0x5/0x20 [ 1851.290252] kmem_cache_alloc+0x5b/0x310 [ 1851.291073] create_object.isra.0+0x3a/0xa20 [ 1851.291944] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1851.292956] kmem_cache_alloc_node+0x169/0x330 [ 1851.293912] __alloc_skb+0x6d/0x5b0 [ 1851.294662] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1851.295578] rtmsg_ifinfo+0x83/0x120 [ 1851.296368] __dev_notify_flags+0x22a/0x2c0 [ 1851.297233] ? dev_change_name+0x660/0x660 [ 1851.298118] ? __dev_change_flags+0x4cf/0x6e0 [ 1851.299054] ? dev_set_allmulti+0x30/0x30 [ 1851.299906] ? cap_capable+0x1d6/0x240 [ 1851.300726] ? full_name_hash+0xb5/0xf0 [ 1851.301528] dev_change_flags+0x100/0x160 [ 1851.302410] devinet_ioctl+0x14de/0x1db0 [ 1851.303232] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1851.304143] inet_ioctl+0x34f/0x390 [ 1851.304874] ? inet_dgram_connect+0x220/0x220 [ 1851.305782] ? __lock_acquire+0xbb1/0x5b00 [ 1851.306648] ? perf_trace_lock+0xac/0x490 [ 1851.307482] packet_ioctl+0xb3/0x260 [ 1851.308224] sock_do_ioctl+0xd3/0x300 [ 1851.308979] ? compat_ifr_data_ioctl+0x180/0x180 [ 1851.309922] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1851.311077] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.312104] ? do_vfs_ioctl+0x283/0x10d0 [ 1851.312954] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1851.313994] ? generic_block_fiemap+0x60/0x60 [ 1851.314920] sock_ioctl+0x3ea/0x700 [ 1851.315677] ? dlci_ioctl_set+0x30/0x30 [ 1851.316501] ? selinux_file_ioctl+0xb6/0x270 [ 1851.317422] ? dlci_ioctl_set+0x30/0x30 [ 1851.318228] __x64_sys_ioctl+0x19a/0x210 [ 1851.319047] do_syscall_64+0x33/0x40 [ 1851.319817] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1851.320833] RIP: 0033:0x7feded0d7b19 [ 1851.321581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.325310] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1851.326854] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1851.328300] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1851.329732] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1851.331190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1851.332634] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080070000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1851.377672] FAULT_INJECTION: forcing a failure. [ 1851.377672] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.380077] CPU: 1 PID: 11177 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1851.381483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1851.383193] Call Trace: [ 1851.383733] dump_stack+0x107/0x167 [ 1851.384488] should_fail.cold+0x5/0xa [ 1851.385265] ? create_object.isra.0+0x3a/0xa20 [ 1851.386228] should_failslab+0x5/0x20 [ 1851.387006] kmem_cache_alloc+0x5b/0x310 [ 1851.387821] ? mark_held_locks+0x9e/0xe0 [ 1851.388652] create_object.isra.0+0x3a/0xa20 [ 1851.389530] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1851.390573] __kmalloc_node+0x1ae/0x420 [ 1851.391370] ? lockdep_init_map_type+0x2c7/0x780 [ 1851.392319] kvmalloc_node+0x119/0x170 [ 1851.393095] pfifo_fast_init+0xea/0x3d0 [ 1851.393896] ? __netdev_watchdog_up+0x190/0x190 [ 1851.394840] qdisc_create_dflt+0x103/0x370 [ 1851.395687] dev_activate+0x7c3/0xd70 [ 1851.396485] __dev_open+0x38a/0x4e0 [ 1851.397217] ? dev_set_rx_mode+0x80/0x80 [ 1851.398053] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1851.399095] ? __local_bh_enable_ip+0x9d/0x100 [ 1851.400030] __dev_change_flags+0x521/0x6e0 [ 1851.400897] ? dev_set_allmulti+0x30/0x30 [ 1851.401715] ? cap_capable+0x1d6/0x240 [ 1851.402538] ? full_name_hash+0xb5/0xf0 [ 1851.403342] dev_change_flags+0x8a/0x160 [ 1851.404195] devinet_ioctl+0x14de/0x1db0 [ 1851.405040] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1851.405950] inet_ioctl+0x34f/0x390 [ 1851.406683] ? inet_dgram_connect+0x220/0x220 [ 1851.407587] ? __lock_acquire+0xbb1/0x5b00 [ 1851.408436] ? perf_trace_lock+0xac/0x490 [ 1851.409265] packet_ioctl+0xb3/0x260 [ 1851.410008] sock_do_ioctl+0xd3/0x300 [ 1851.410790] ? compat_ifr_data_ioctl+0x180/0x180 [ 1851.411733] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1851.412874] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.413977] ? do_vfs_ioctl+0x283/0x10d0 [ 1851.414798] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1851.415844] ? generic_block_fiemap+0x60/0x60 [ 1851.416741] sock_ioctl+0x3ea/0x700 [ 1851.417468] ? dlci_ioctl_set+0x30/0x30 [ 1851.418282] ? selinux_file_ioctl+0xb6/0x270 [ 1851.419164] ? dlci_ioctl_set+0x30/0x30 [ 1851.419960] __x64_sys_ioctl+0x19a/0x210 [ 1851.420777] do_syscall_64+0x33/0x40 [ 1851.421532] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1851.422575] RIP: 0033:0x7f07a4a4eb19 [ 1851.423355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.427000] RSP: 002b:00007f07a1fa3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1851.428508] RAX: ffffffffffffffda RBX: 00007f07a4b62020 RCX: 00007f07a4a4eb19 [ 1851.429946] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1851.431377] RBP: 00007f07a1fa31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1851.432790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1851.434215] R13: 00007ffca8d8bf7f R14: 00007f07a1fa3300 R15: 0000000000022000 [ 1851.437093] device veth0_vlan entered promiscuous mode 02:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080080000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:04 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x7000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:28:04 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8907, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:28:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080180000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:04 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 21) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:04 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8915, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1851.697350] device veth0_vlan entered promiscuous mode [ 1851.705212] FAULT_INJECTION: forcing a failure. [ 1851.705212] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.708123] CPU: 0 PID: 11200 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1851.709565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1851.711275] Call Trace: [ 1851.711825] dump_stack+0x107/0x167 [ 1851.712582] should_fail.cold+0x5/0xa [ 1851.713378] ? create_object.isra.0+0x3a/0xa20 [ 1851.714334] should_failslab+0x5/0x20 [ 1851.715108] kmem_cache_alloc+0x5b/0x310 [ 1851.715945] create_object.isra.0+0x3a/0xa20 [ 1851.716831] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1851.717880] kmem_cache_alloc_trace+0x151/0x320 [ 1851.718843] ____ip_mc_inc_group+0x277/0xca0 [ 1851.719787] ? kfree_skbmem+0xef/0x1b0 [ 1851.720579] ? ip_mc_add_src+0xe00/0xe00 [ 1851.721406] ip_mc_up+0x14b/0x3a0 [ 1851.722136] inetdev_event+0xbe3/0x1610 [ 1851.722943] ? devinet_init_net+0x650/0x650 [ 1851.723819] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.724870] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.725930] ? nh_netdev_event+0x8c/0x370 [ 1851.726775] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.727825] raw_notifier_call_chain+0xb3/0x110 [ 1851.728776] call_netdevice_notifiers_info+0xb5/0x130 [ 1851.729841] __dev_notify_flags+0x110/0x2c0 [ 1851.730728] ? dev_change_name+0x660/0x660 [ 1851.731605] ? __dev_change_flags+0x4cf/0x6e0 [ 1851.732522] ? dev_set_allmulti+0x30/0x30 [ 1851.733366] ? cap_capable+0x1d6/0x240 [ 1851.734166] ? full_name_hash+0xb5/0xf0 [ 1851.734992] dev_change_flags+0x100/0x160 [ 1851.735908] devinet_ioctl+0x14de/0x1db0 [ 1851.736798] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1851.737742] inet_ioctl+0x34f/0x390 [ 1851.738509] ? inet_dgram_connect+0x220/0x220 [ 1851.739451] ? __lock_acquire+0xbb1/0x5b00 [ 1851.740362] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1851.741454] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1851.742609] ? trace_hardirqs_on+0x5b/0x180 [ 1851.743505] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1851.744645] packet_ioctl+0xb3/0x260 [ 1851.745412] sock_do_ioctl+0xd3/0x300 [ 1851.746214] ? compat_ifr_data_ioctl+0x180/0x180 [ 1851.747226] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1851.748401] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1851.749464] ? do_vfs_ioctl+0x283/0x10d0 [ 1851.750310] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1851.751382] ? generic_block_fiemap+0x60/0x60 [ 1851.752315] sock_ioctl+0x3ea/0x700 [ 1851.753053] ? dlci_ioctl_set+0x30/0x30 [ 1851.753865] ? selinux_file_ioctl+0xb6/0x270 [ 1851.754785] ? dlci_ioctl_set+0x30/0x30 [ 1851.755592] __x64_sys_ioctl+0x19a/0x210 [ 1851.756418] do_syscall_64+0x33/0x40 [ 1851.757207] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1851.758297] RIP: 0033:0x7f4a38965b19 [ 1851.759054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1851.762936] RSP: 002b:00007f4a35edb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1851.764481] RAX: ffffffffffffffda RBX: 00007f4a38a78f60 RCX: 00007f4a38965b19 [ 1851.765922] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1851.767364] RBP: 00007f4a35edb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1851.768822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1851.770300] R13: 00007ffefe21595f R14: 00007f4a35edb300 R15: 0000000000022000 02:28:19 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8916, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="20000000801c0000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:19 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:19 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 16) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:19 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x8000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:28:19 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8908, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:28:19 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 22) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:19 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 53) [ 1866.154006] audit: type=1326 audit(1693276099.145:122): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11224 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 1866.161022] device veth0_vlan entered promiscuous mode [ 1866.162914] FAULT_INJECTION: forcing a failure. [ 1866.162914] name failslab, interval 1, probability 0, space 0, times 0 [ 1866.165406] CPU: 1 PID: 11215 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1866.166807] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1866.168496] Call Trace: [ 1866.169035] dump_stack+0x107/0x167 [ 1866.169777] should_fail.cold+0x5/0xa [ 1866.170557] ? create_object.isra.0+0x3a/0xa20 [ 1866.171485] should_failslab+0x5/0x20 [ 1866.172252] kmem_cache_alloc+0x5b/0x310 [ 1866.173078] create_object.isra.0+0x3a/0xa20 [ 1866.173966] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1866.175014] kmem_cache_alloc_node+0x169/0x330 [ 1866.175945] __alloc_skb+0x6d/0x5b0 [ 1866.176692] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1866.177618] rtmsg_ifinfo+0x83/0x120 [ 1866.178387] __dev_notify_flags+0x22a/0x2c0 [ 1866.179261] ? dev_change_name+0x660/0x660 [ 1866.180116] ? __dev_change_flags+0x4cf/0x6e0 [ 1866.181023] ? dev_set_allmulti+0x30/0x30 [ 1866.181873] ? cap_capable+0x1d6/0x240 [ 1866.182667] ? full_name_hash+0xb5/0xf0 [ 1866.183482] dev_change_flags+0x100/0x160 [ 1866.184330] devinet_ioctl+0x14de/0x1db0 [ 1866.185162] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1866.186066] inet_ioctl+0x34f/0x390 [ 1866.186822] ? inet_dgram_connect+0x220/0x220 [ 1866.187735] ? __lock_acquire+0xbb1/0x5b00 02:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080670000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1866.188616] ? perf_trace_lock+0xac/0x490 [ 1866.189588] packet_ioctl+0xb3/0x260 [ 1866.190357] sock_do_ioctl+0xd3/0x300 [ 1866.191129] ? compat_ifr_data_ioctl+0x180/0x180 [ 1866.192092] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1866.193256] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1866.194320] ? do_vfs_ioctl+0x283/0x10d0 [ 1866.195155] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1866.196231] ? generic_block_fiemap+0x60/0x60 [ 1866.197149] sock_ioctl+0x3ea/0x700 [ 1866.197885] ? dlci_ioctl_set+0x30/0x30 [ 1866.198709] ? selinux_file_ioctl+0xb6/0x270 [ 1866.199604] ? dlci_ioctl_set+0x30/0x30 [ 1866.200416] __x64_sys_ioctl+0x19a/0x210 [ 1866.201238] do_syscall_64+0x33/0x40 [ 1866.201995] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1866.203049] RIP: 0033:0x7feded0d7b19 [ 1866.203806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1866.207504] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1866.209045] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1866.210490] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1866.211930] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1866.213361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1866.214813] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1866.240052] device veth0_vlan entered promiscuous mode [ 1866.241842] FAULT_INJECTION: forcing a failure. [ 1866.241842] name failslab, interval 1, probability 0, space 0, times 0 [ 1866.244085] CPU: 0 PID: 11213 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1866.245455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1866.247121] Call Trace: [ 1866.247659] dump_stack+0x107/0x167 [ 1866.248399] should_fail.cold+0x5/0xa [ 1866.249214] ? __alloc_skb+0x6d/0x5b0 [ 1866.249994] should_failslab+0x5/0x20 [ 1866.250769] kmem_cache_alloc_node+0x55/0x330 [ 1866.251741] __alloc_skb+0x6d/0x5b0 [ 1866.252561] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1866.253685] rtmsg_ifinfo+0x83/0x120 [ 1866.254571] __dev_notify_flags+0x22a/0x2c0 [ 1866.255528] ? dev_change_name+0x660/0x660 [ 1866.256458] ? __dev_change_flags+0x4cf/0x6e0 [ 1866.257449] ? dev_set_allmulti+0x30/0x30 [ 1866.258381] ? strnlen+0x4a/0x70 [ 1866.259140] ? full_name_hash+0xb5/0xf0 [ 1866.259938] dev_change_flags+0x100/0x160 [ 1866.260774] devinet_ioctl+0x14de/0x1db0 [ 1866.261593] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1866.262497] inet_ioctl+0x34f/0x390 [ 1866.263226] ? inet_dgram_connect+0x220/0x220 [ 1866.264146] ? __lock_acquire+0xbb1/0x5b00 [ 1866.265006] ? perf_trace_lock+0xac/0x490 [ 1866.265840] packet_ioctl+0xb3/0x260 [ 1866.266600] sock_do_ioctl+0xd3/0x300 [ 1866.267370] ? compat_ifr_data_ioctl+0x180/0x180 [ 1866.268319] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1866.269773] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1866.270967] ? do_vfs_ioctl+0x283/0x10d0 [ 1866.272082] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1866.273274] ? generic_block_fiemap+0x60/0x60 [ 1866.274393] sock_ioctl+0x3ea/0x700 [ 1866.275224] ? dlci_ioctl_set+0x30/0x30 [ 1866.276138] ? selinux_file_ioctl+0xb6/0x270 [ 1866.277143] ? dlci_ioctl_set+0x30/0x30 [ 1866.278053] __x64_sys_ioctl+0x19a/0x210 [ 1866.278999] do_syscall_64+0x33/0x40 [ 1866.279857] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1866.281039] RIP: 0033:0x7f07a4a4eb19 [ 1866.281903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1866.285736] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1866.287267] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1866.288677] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1866.290091] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1866.291513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1866.293146] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080f00000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1866.302088] FAULT_INJECTION: forcing a failure. [ 1866.302088] name failslab, interval 1, probability 0, space 0, times 0 [ 1866.304345] CPU: 0 PID: 11235 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1866.305713] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1866.307360] Call Trace: [ 1866.307888] dump_stack+0x107/0x167 [ 1866.308615] should_fail.cold+0x5/0xa [ 1866.309380] ? create_object.isra.0+0x3a/0xa20 [ 1866.310312] should_failslab+0x5/0x20 [ 1866.311074] kmem_cache_alloc+0x5b/0x310 [ 1866.311886] create_object.isra.0+0x3a/0xa20 [ 1866.312776] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1866.313787] kmem_cache_alloc+0x159/0x310 [ 1866.314630] anon_vma_fork+0xf1/0x640 [ 1866.315396] ? __vm_enough_memory+0x184/0x360 [ 1866.316293] copy_process+0x7218/0x7800 [ 1866.317123] ? __cleanup_sighand+0xb0/0xb0 [ 1866.317980] ? find_held_lock+0x2c/0x110 [ 1866.318805] kernel_clone+0xe7/0x980 [ 1866.319550] ? lock_downgrade+0x6d0/0x6d0 [ 1866.320371] ? find_held_lock+0x2c/0x110 [ 1866.321184] ? create_io_thread+0xf0/0xf0 [ 1866.322014] ? ksys_write+0x12d/0x260 [ 1866.322843] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1866.323810] __do_sys_fork+0x8a/0xc0 [ 1866.324549] ? kernel_thread+0xf0/0xf0 [ 1866.325341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1866.326389] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1866.327415] ? trace_hardirqs_on+0x5b/0x180 [ 1866.328269] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1866.329294] do_syscall_64+0x33/0x40 [ 1866.330035] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1866.331066] RIP: 0033:0x7fadf412db19 [ 1866.331810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1866.335434] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1866.336942] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1866.338356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1866.339771] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1866.341189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1866.342620] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:28:19 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x3f000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000300060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:19 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8917, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:28:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080800400060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1866.486043] FAULT_INJECTION: forcing a failure. [ 1866.486043] name failslab, interval 1, probability 0, space 0, times 0 [ 1866.491040] CPU: 0 PID: 11229 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1866.492434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1866.494084] Call Trace: [ 1866.494623] dump_stack+0x107/0x167 [ 1866.495358] should_fail.cold+0x5/0xa [ 1866.496124] ? kvmalloc_node+0x119/0x170 [ 1866.496939] should_failslab+0x5/0x20 [ 1866.497699] __kmalloc_node+0x76/0x420 [ 1866.498499] ? lockdep_init_map_type+0x2c7/0x780 [ 1866.499444] kvmalloc_node+0x119/0x170 [ 1866.500231] pfifo_fast_init+0xea/0x3d0 [ 1866.501038] ? __netdev_watchdog_up+0x190/0x190 [ 1866.501963] qdisc_create_dflt+0x103/0x370 [ 1866.502818] dev_activate+0x7c3/0xd70 [ 1866.503599] __dev_open+0x38a/0x4e0 [ 1866.504327] ? dev_set_rx_mode+0x80/0x80 [ 1866.505142] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1866.506199] ? __local_bh_enable_ip+0x9d/0x100 [ 1866.507116] __dev_change_flags+0x521/0x6e0 [ 1866.507979] ? dev_set_allmulti+0x30/0x30 [ 1866.508808] ? full_name_hash+0xb5/0xf0 [ 1866.509602] dev_change_flags+0x8a/0x160 [ 1866.510434] devinet_ioctl+0x14de/0x1db0 [ 1866.511257] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1866.512141] inet_ioctl+0x34f/0x390 [ 1866.512871] ? inet_dgram_connect+0x220/0x220 [ 1866.513775] ? __lock_acquire+0xbb1/0x5b00 [ 1866.514654] ? perf_trace_lock+0xac/0x490 [ 1866.515480] packet_ioctl+0xb3/0x260 [ 1866.516220] sock_do_ioctl+0xd3/0x300 [ 1866.516981] ? compat_ifr_data_ioctl+0x180/0x180 [ 1866.517950] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1866.519103] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1866.520127] ? do_vfs_ioctl+0x283/0x10d0 [ 1866.520925] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1866.521971] ? generic_block_fiemap+0x60/0x60 [ 1866.522876] sock_ioctl+0x3ea/0x700 [ 1866.523600] ? dlci_ioctl_set+0x30/0x30 [ 1866.524391] ? selinux_file_ioctl+0xb6/0x270 [ 1866.525265] ? dlci_ioctl_set+0x30/0x30 [ 1866.526055] __x64_sys_ioctl+0x19a/0x210 [ 1866.526890] do_syscall_64+0x33/0x40 [ 1866.527639] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1866.528657] RIP: 0033:0x7f4a38965b19 [ 1866.529397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1866.533176] RSP: 002b:00007f4a35edb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1866.534710] RAX: ffffffffffffffda RBX: 00007f4a38a78f60 RCX: 00007f4a38965b19 [ 1866.536125] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1866.537541] RBP: 00007f4a35edb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1866.538967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1866.540376] R13: 00007ffefe21595f R14: 00007f4a35edb300 R15: 0000000000022000 [ 1866.542869] veth0_vlan: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1866.604007] device veth0_vlan entered promiscuous mode 02:28:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000500060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:34 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8918, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:28:34 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 54) 02:28:34 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8909, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:28:34 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x3ffffe00, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:28:34 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 17) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:34 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 15) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:34 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 23) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1881.392232] audit: type=1326 audit(1693276114.384:123): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11267 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:28:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000600060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1881.436379] device veth0_vlan entered promiscuous mode [ 1881.438977] FAULT_INJECTION: forcing a failure. [ 1881.438977] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.443204] CPU: 0 PID: 11275 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1881.444611] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.446289] Call Trace: [ 1881.446842] dump_stack+0x107/0x167 [ 1881.447596] should_fail.cold+0x5/0xa [ 1881.448374] ? ___slab_alloc+0x360/0x700 [ 1881.449198] ? create_object.isra.0+0x3a/0xa20 [ 1881.450128] should_failslab+0x5/0x20 [ 1881.450918] kmem_cache_alloc+0x5b/0x310 [ 1881.451755] create_object.isra.0+0x3a/0xa20 [ 1881.452660] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1881.453705] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1881.454757] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1881.455730] __alloc_skb+0xb1/0x5b0 [ 1881.456474] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1881.457418] rtmsg_ifinfo+0x83/0x120 [ 1881.458178] __dev_notify_flags+0x22a/0x2c0 [ 1881.459061] ? dev_change_name+0x660/0x660 [ 1881.459923] ? __dev_change_flags+0x4cf/0x6e0 [ 1881.460841] ? dev_set_allmulti+0x30/0x30 [ 1881.461686] ? cap_capable+0x1d6/0x240 [ 1881.462497] ? full_name_hash+0xb5/0xf0 [ 1881.463307] dev_change_flags+0x100/0x160 [ 1881.464159] devinet_ioctl+0x14de/0x1db0 [ 1881.464995] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1881.465891] inet_ioctl+0x34f/0x390 [ 1881.466641] ? inet_dgram_connect+0x220/0x220 [ 1881.467566] ? __lock_acquire+0xbb1/0x5b00 [ 1881.468445] ? perf_trace_lock+0xac/0x490 [ 1881.469289] packet_ioctl+0xb3/0x260 [ 1881.470040] sock_do_ioctl+0xd3/0x300 [ 1881.470830] ? compat_ifr_data_ioctl+0x180/0x180 [ 1881.471777] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1881.472916] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1881.473940] ? do_vfs_ioctl+0x283/0x10d0 [ 1881.474766] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1881.475811] ? generic_block_fiemap+0x60/0x60 [ 1881.476712] sock_ioctl+0x3ea/0x700 [ 1881.477456] ? dlci_ioctl_set+0x30/0x30 [ 1881.478260] ? selinux_file_ioctl+0xb6/0x270 [ 1881.479149] ? dlci_ioctl_set+0x30/0x30 [ 1881.479946] __x64_sys_ioctl+0x19a/0x210 [ 1881.480754] do_syscall_64+0x33/0x40 [ 1881.481516] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.482573] RIP: 0033:0x7feded0d7b19 [ 1881.483344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:28:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000700060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1881.487075] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1881.488776] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1881.490225] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1881.491679] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.493107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.494549] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1881.551555] FAULT_INJECTION: forcing a failure. [ 1881.551555] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.553844] CPU: 0 PID: 11292 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1881.555245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.556926] Call Trace: [ 1881.557471] dump_stack+0x107/0x167 [ 1881.558219] should_fail.cold+0x5/0xa [ 1881.559060] ? anon_vma_fork+0x1ff/0x640 [ 1881.559895] should_failslab+0x5/0x20 [ 1881.560664] kmem_cache_alloc+0x5b/0x310 [ 1881.561502] anon_vma_fork+0x1ff/0x640 [ 1881.562308] copy_process+0x7218/0x7800 [ 1881.563172] ? __cleanup_sighand+0xb0/0xb0 [ 1881.564058] ? find_held_lock+0x2c/0x110 [ 1881.564889] kernel_clone+0xe7/0x980 [ 1881.565652] ? lock_downgrade+0x6d0/0x6d0 [ 1881.566503] ? find_held_lock+0x2c/0x110 [ 1881.567324] ? create_io_thread+0xf0/0xf0 [ 1881.568188] ? ksys_write+0x12d/0x260 [ 1881.568968] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1881.569964] __do_sys_fork+0x8a/0xc0 [ 1881.570737] ? kernel_thread+0xf0/0xf0 [ 1881.571548] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.572611] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1881.573673] ? trace_hardirqs_on+0x5b/0x180 [ 1881.574574] ? syscall_enter_from_user_mode+0x1d/0x50 02:28:34 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8919, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1881.575633] do_syscall_64+0x33/0x40 [ 1881.576518] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.577558] RIP: 0033:0x7fadf412db19 [ 1881.578321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.582067] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1881.583637] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1881.585090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1881.586546] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.588000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.589473] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 1881.597024] device veth0_vlan entered promiscuous mode [ 1881.599050] FAULT_INJECTION: forcing a failure. [ 1881.599050] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.601432] CPU: 0 PID: 11272 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1881.602860] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.604553] Call Trace: [ 1881.605091] dump_stack+0x107/0x167 [ 1881.605843] should_fail.cold+0x5/0xa [ 1881.606642] ? __alloc_skb+0x6d/0x5b0 [ 1881.607426] should_failslab+0x5/0x20 [ 1881.608217] kmem_cache_alloc_node+0x55/0x330 [ 1881.609162] __alloc_skb+0x6d/0x5b0 [ 1881.609917] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1881.610876] rtmsg_ifinfo+0x83/0x120 [ 1881.611660] __dev_notify_flags+0x22a/0x2c0 [ 1881.612563] ? dev_change_name+0x660/0x660 02:28:34 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0xff3e0003, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1881.613422] ? __dev_change_flags+0x4cf/0x6e0 [ 1881.614480] ? dev_set_allmulti+0x30/0x30 [ 1881.615334] ? strcmp+0x3a/0xb0 [ 1881.616021] dev_change_flags+0x100/0x160 02:28:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080001800060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1881.616871] devinet_ioctl+0x14de/0x1db0 [ 1881.617760] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1881.618678] inet_ioctl+0x34f/0x390 [ 1881.619429] ? inet_dgram_connect+0x220/0x220 [ 1881.620363] ? __lock_acquire+0xbb1/0x5b00 [ 1881.621239] ? perf_trace_lock+0xac/0x490 [ 1881.622090] packet_ioctl+0xb3/0x260 [ 1881.622868] sock_do_ioctl+0xd3/0x300 [ 1881.623642] ? compat_ifr_data_ioctl+0x180/0x180 [ 1881.624616] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1881.625792] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1881.626843] ? do_vfs_ioctl+0x283/0x10d0 [ 1881.627663] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1881.628734] ? generic_block_fiemap+0x60/0x60 [ 1881.629648] sock_ioctl+0x3ea/0x700 [ 1881.630385] ? dlci_ioctl_set+0x30/0x30 [ 1881.631229] ? selinux_file_ioctl+0xb6/0x270 [ 1881.632130] ? dlci_ioctl_set+0x30/0x30 [ 1881.632936] __x64_sys_ioctl+0x19a/0x210 [ 1881.633764] do_syscall_64+0x33/0x40 [ 1881.634534] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.635578] RIP: 0033:0x7f07a4a4eb19 [ 1881.636330] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.640275] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1881.642170] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1881.643927] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1881.645639] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.647353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.648802] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:28:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080001c00060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1881.711320] device veth0_vlan entered promiscuous mode [ 1881.714290] FAULT_INJECTION: forcing a failure. [ 1881.714290] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.717225] CPU: 1 PID: 11280 Comm: syz-executor.4 Not tainted 5.10.192 #1 [ 1881.718731] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1881.720507] Call Trace: [ 1881.721086] dump_stack+0x107/0x167 [ 1881.721871] should_fail.cold+0x5/0xa [ 1881.722699] ? create_object.isra.0+0x3a/0xa20 [ 1881.723681] should_failslab+0x5/0x20 [ 1881.724498] kmem_cache_alloc+0x5b/0x310 [ 1881.725374] create_object.isra.0+0x3a/0xa20 [ 1881.726317] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1881.727422] __kmalloc+0x16e/0x390 [ 1881.728202] fib6_info_alloc+0x3c/0x110 [ 1881.729058] ip6_route_info_create+0x37a/0x1a00 [ 1881.730053] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1881.731196] ? fib6_nh_init+0x19e0/0x19e0 [ 1881.732089] ? lock_chain_count+0x20/0x20 [ 1881.732980] ? perf_trace_lock+0xac/0x490 [ 1881.733877] ip6_route_add+0x24/0x150 [ 1881.734715] addrconf_add_mroute+0x120/0x180 [ 1881.735657] ? ipv6_generate_eui64+0xa40/0xa40 [ 1881.736633] ? find_held_lock+0x2c/0x110 [ 1881.737529] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.738676] ? __local_bh_enable_ip+0x9d/0x100 [ 1881.739663] ? trace_hardirqs_on+0x5b/0x180 [ 1881.740592] ? ipv6_find_idev+0x174/0x220 [ 1881.741477] ? __local_bh_enable_ip+0x9d/0x100 [ 1881.742463] addrconf_add_dev+0x16a/0x1e0 [ 1881.743356] addrconf_dev_config+0x1f2/0x440 [ 1881.744304] addrconf_notify+0xc95/0x2410 [ 1881.745203] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1881.746332] ? inet6_ifinfo_notify+0x150/0x150 [ 1881.747334] ? failover_register+0x530/0x530 [ 1881.748286] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1881.749470] ? ipmr_device_event+0x18b/0x1f0 [ 1881.750423] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1881.751542] raw_notifier_call_chain+0xb3/0x110 [ 1881.752550] call_netdevice_notifiers_info+0xb5/0x130 [ 1881.753659] __dev_notify_flags+0x110/0x2c0 [ 1881.754603] ? dev_change_name+0x660/0x660 [ 1881.755504] ? __dev_change_flags+0x4cf/0x6e0 [ 1881.756470] ? dev_set_allmulti+0x30/0x30 [ 1881.757360] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1881.758548] dev_change_flags+0x100/0x160 [ 1881.759450] devinet_ioctl+0x14de/0x1db0 [ 1881.760332] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1881.761291] inet_ioctl+0x34f/0x390 [ 1881.762075] ? inet_dgram_connect+0x220/0x220 [ 1881.763053] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1881.764178] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1881.765335] ? trace_hardirqs_on+0x5b/0x180 [ 1881.766263] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1881.767448] ? packet_ioctl+0x48/0x260 [ 1881.768286] ? __sanitizer_cov_trace_switch+0x37/0x80 [ 1881.769399] packet_ioctl+0xb3/0x260 [ 1881.770202] sock_do_ioctl+0xd3/0x300 [ 1881.771039] ? compat_ifr_data_ioctl+0x180/0x180 [ 1881.772057] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1881.773289] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1881.774393] ? do_vfs_ioctl+0x283/0x10d0 [ 1881.775279] ? generic_block_fiemap+0x60/0x60 [ 1881.776243] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1881.777405] sock_ioctl+0x3ea/0x700 [ 1881.778187] ? dlci_ioctl_set+0x30/0x30 [ 1881.779060] ? selinux_file_ioctl+0xb6/0x270 [ 1881.780004] ? __sanitizer_cov_trace_pc+0x30/0x60 [ 1881.781039] ? selinux_file_ioctl+0xb6/0x270 [ 1881.781983] ? dlci_ioctl_set+0x30/0x30 [ 1881.782847] __x64_sys_ioctl+0x19a/0x210 [ 1881.783724] do_syscall_64+0x33/0x40 [ 1881.784526] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1881.785628] RIP: 0033:0x7f4a38965b19 [ 1881.786436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1881.790369] RSP: 002b:00007f4a35edb188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1881.792018] RAX: ffffffffffffffda RBX: 00007f4a38a78f60 RCX: 00007f4a38965b19 [ 1881.793544] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1881.795078] RBP: 00007f4a35edb1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1881.796615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1881.798143] R13: 00007ffefe21595f R14: 00007f4a35edb300 R15: 0000000000022000 02:28:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080002000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:34 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0xfeff3f00000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:28:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080003f00060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:48 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x891a, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:28:48 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:28:48 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 55) 02:28:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080006700060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:48 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:48 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 16) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:48 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:48 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 1895.508081] audit: type=1326 audit(1693276128.500:124): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11332 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 1895.515634] device veth0_vlan entered promiscuous mode [ 1895.516528] FAULT_INJECTION: forcing a failure. [ 1895.516528] name failslab, interval 1, probability 0, space 0, times 0 [ 1895.517918] CPU: 1 PID: 11323 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1895.518753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1895.519740] Call Trace: [ 1895.520061] dump_stack+0x107/0x167 [ 1895.520501] should_fail.cold+0x5/0xa [ 1895.520959] should_failslab+0x5/0x20 [ 1895.521408] __kmalloc_node_track_caller+0x74/0x3b0 [ 1895.521989] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1895.522549] __alloc_skb+0xb1/0x5b0 [ 1895.522981] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1895.523514] rtmsg_ifinfo+0x83/0x120 [ 1895.523953] __dev_notify_flags+0x22a/0x2c0 [ 1895.524459] ? dev_change_name+0x660/0x660 [ 1895.524943] ? __dev_change_flags+0x4cf/0x6e0 [ 1895.525462] ? dev_set_allmulti+0x30/0x30 [ 1895.525954] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1895.526611] dev_change_flags+0x100/0x160 [ 1895.527115] devinet_ioctl+0x14de/0x1db0 [ 1895.527619] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1895.528158] inet_ioctl+0x34f/0x390 [ 1895.528599] ? inet_dgram_connect+0x220/0x220 [ 1895.529157] ? __lock_acquire+0xbb1/0x5b00 [ 1895.529679] ? perf_trace_lock+0xac/0x490 [ 1895.530190] packet_ioctl+0xb3/0x260 [ 1895.530631] sock_do_ioctl+0xd3/0x300 [ 1895.531088] ? compat_ifr_data_ioctl+0x180/0x180 [ 1895.531669] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1895.532388] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1895.533068] ? do_vfs_ioctl+0x283/0x10d0 [ 1895.533574] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1895.534208] ? generic_block_fiemap+0x60/0x60 [ 1895.534780] sock_ioctl+0x3ea/0x700 [ 1895.535222] ? dlci_ioctl_set+0x30/0x30 [ 1895.535727] ? selinux_file_ioctl+0xb6/0x270 [ 1895.536261] ? dlci_ioctl_set+0x30/0x30 [ 1895.536746] __x64_sys_ioctl+0x19a/0x210 [ 1895.537241] do_syscall_64+0x33/0x40 [ 1895.537709] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1895.538349] RIP: 0033:0x7f07a4a4eb19 [ 1895.538818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1895.541068] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1895.542010] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1895.542923] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1895.543800] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1895.544675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1895.545554] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1895.569061] device veth0_vlan entered promiscuous mode [ 1895.573034] FAULT_INJECTION: forcing a failure. [ 1895.573034] name failslab, interval 1, probability 0, space 0, times 0 [ 1895.575831] CPU: 0 PID: 11326 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1895.577239] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1895.578922] Call Trace: [ 1895.579463] dump_stack+0x107/0x167 [ 1895.580204] should_fail.cold+0x5/0xa [ 1895.580982] should_failslab+0x5/0x20 [ 1895.581758] __kmalloc_node_track_caller+0x74/0x3b0 [ 1895.582819] ? netlink_trim+0x1ee/0x250 [ 1895.583706] pskb_expand_head+0x15a/0x1040 [ 1895.584584] netlink_trim+0x1ee/0x250 [ 1895.585358] netlink_broadcast_filtered+0x60/0xdc0 [ 1895.586361] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1895.587341] ? rtmsg_ifinfo_build_skb+0xd1/0x1a0 [ 1895.588299] nlmsg_notify+0x94/0x290 [ 1895.589053] rtmsg_ifinfo+0xf0/0x120 [ 1895.589820] __dev_notify_flags+0x22a/0x2c0 [ 1895.590731] ? dev_change_name+0x660/0x660 [ 1895.591589] ? __dev_change_flags+0x4cf/0x6e0 [ 1895.592500] ? dev_set_allmulti+0x30/0x30 [ 1895.593344] dev_change_flags+0x100/0x160 [ 1895.594186] devinet_ioctl+0x14de/0x1db0 [ 1895.595042] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1895.595937] inet_ioctl+0x34f/0x390 [ 1895.596675] ? inet_dgram_connect+0x220/0x220 [ 1895.597595] ? __lock_acquire+0xbb1/0x5b00 [ 1895.598475] ? perf_trace_lock+0xac/0x490 [ 1895.599348] packet_ioctl+0xb3/0x260 [ 1895.600104] sock_do_ioctl+0xd3/0x300 [ 1895.600878] ? compat_ifr_data_ioctl+0x180/0x180 [ 1895.601843] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1895.603008] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1895.604052] ? do_vfs_ioctl+0x283/0x10d0 [ 1895.604874] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1895.605933] ? generic_block_fiemap+0x60/0x60 [ 1895.606857] sock_ioctl+0x3ea/0x700 [ 1895.607596] ? dlci_ioctl_set+0x30/0x30 [ 1895.608407] ? selinux_file_ioctl+0xb6/0x270 [ 1895.609307] ? dlci_ioctl_set+0x30/0x30 [ 1895.610116] __x64_sys_ioctl+0x19a/0x210 [ 1895.610963] do_syscall_64+0x33/0x40 [ 1895.611722] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1895.612760] RIP: 0033:0x7feded0d7b19 [ 1895.613519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1895.617241] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1895.618790] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1895.620233] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1895.621676] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1895.623135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1895.624578] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:28:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080048000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1895.635998] FAULT_INJECTION: forcing a failure. [ 1895.635998] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1895.637407] CPU: 1 PID: 11346 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1895.638196] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1895.639160] Call Trace: [ 1895.639474] dump_stack+0x107/0x167 [ 1895.639895] should_fail.cold+0x5/0xa [ 1895.640349] __alloc_pages_nodemask+0x182/0x600 [ 1895.640893] ? lock_acquire+0x197/0x470 [ 1895.641354] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1895.642055] ? lock_downgrade+0x6d0/0x6d0 [ 1895.642527] ? do_raw_spin_lock+0x121/0x260 [ 1895.643026] alloc_pages_current+0x187/0x280 [ 1895.643540] __pmd_alloc+0x37/0x5e0 [ 1895.643957] copy_page_range+0x2bd8/0x3810 [ 1895.644442] ? perf_trace_lock+0xac/0x490 [ 1895.644929] ? lock_chain_count+0x20/0x20 [ 1895.645430] ? up_write+0x191/0x550 [ 1895.645860] ? vm_iomap_memory+0x190/0x190 [ 1895.646357] ? downgrade_write+0x3a0/0x3a0 [ 1895.646864] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1895.647499] ? __vma_link_rb+0x540/0x700 [ 1895.647980] copy_process+0x759b/0x7800 [ 1895.648472] ? __cleanup_sighand+0xb0/0xb0 [ 1895.648966] ? find_held_lock+0x2c/0x110 [ 1895.649458] kernel_clone+0xe7/0x980 [ 1895.649881] ? lock_downgrade+0x6d0/0x6d0 [ 1895.650374] ? find_held_lock+0x2c/0x110 [ 1895.650853] ? create_io_thread+0xf0/0xf0 [ 1895.651349] ? ksys_write+0x12d/0x260 [ 1895.651786] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1895.652367] __do_sys_fork+0x8a/0xc0 [ 1895.652803] ? kernel_thread+0xf0/0xf0 [ 1895.653284] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1895.653880] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1895.654499] ? trace_hardirqs_on+0x5b/0x180 [ 1895.655003] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1895.655622] do_syscall_64+0x33/0x40 [ 1895.656070] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1895.656697] RIP: 0033:0x7fadf412db19 [ 1895.657142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1895.659340] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1895.660250] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1895.661096] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1895.661947] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1895.662807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1895.663670] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:28:48 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x891b, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:28:48 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:28:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080fdef00060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000f000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080effd00060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:28:48 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:28:48 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 17) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:28:48 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:28:48 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 19) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1895.914849] device veth0_vlan entered promiscuous mode [ 1895.915634] FAULT_INJECTION: forcing a failure. [ 1895.915634] name failslab, interval 1, probability 0, space 0, times 0 [ 1895.916896] CPU: 1 PID: 11372 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1895.917654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1895.918549] Call Trace: [ 1895.918843] dump_stack+0x107/0x167 [ 1895.919240] should_fail.cold+0x5/0xa [ 1895.919663] ? create_object.isra.0+0x3a/0xa20 [ 1895.920151] should_failslab+0x5/0x20 [ 1895.920560] kmem_cache_alloc+0x5b/0x310 [ 1895.920994] create_object.isra.0+0x3a/0xa20 [ 1895.921465] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1895.922008] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1895.922547] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1895.923065] __alloc_skb+0xb1/0x5b0 [ 1895.923457] rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1895.923954] rtmsg_ifinfo+0x83/0x120 [ 1895.924374] __dev_notify_flags+0x22a/0x2c0 [ 1895.924850] ? dev_change_name+0x660/0x660 [ 1895.925321] ? __dev_change_flags+0x4cf/0x6e0 [ 1895.925825] ? dev_set_allmulti+0x30/0x30 [ 1895.926279] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1895.926857] dev_change_flags+0x100/0x160 [ 1895.927323] devinet_ioctl+0x14de/0x1db0 [ 1895.927778] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1895.928274] inet_ioctl+0x34f/0x390 [ 1895.928677] ? inet_dgram_connect+0x220/0x220 [ 1895.929185] ? __lock_acquire+0xbb1/0x5b00 [ 1895.929670] ? perf_trace_lock+0xac/0x490 [ 1895.930133] packet_ioctl+0xb3/0x260 [ 1895.930545] sock_do_ioctl+0xd3/0x300 [ 1895.930964] ? compat_ifr_data_ioctl+0x180/0x180 [ 1895.931497] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1895.932111] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1895.932692] ? do_vfs_ioctl+0x283/0x10d0 [ 1895.933121] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1895.933708] ? generic_block_fiemap+0x60/0x60 [ 1895.934192] sock_ioctl+0x3ea/0x700 [ 1895.934600] ? dlci_ioctl_set+0x30/0x30 [ 1895.935032] ? selinux_file_ioctl+0xb6/0x270 [ 1895.935518] ? dlci_ioctl_set+0x30/0x30 [ 1895.935959] __x64_sys_ioctl+0x19a/0x210 [ 1895.936432] do_syscall_64+0x33/0x40 [ 1895.936846] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1895.937418] RIP: 0033:0x7f07a4a4eb19 [ 1895.937831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1895.939874] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1895.940719] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1895.941512] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1895.942302] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1895.943101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1895.943894] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1895.949884] device veth0_vlan entered promiscuous mode [ 1895.950816] FAULT_INJECTION: forcing a failure. [ 1895.950816] name failslab, interval 1, probability 0, space 0, times 0 [ 1895.952095] CPU: 1 PID: 11373 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1895.952872] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1895.953795] Call Trace: [ 1895.954078] dump_stack+0x107/0x167 [ 1895.954486] should_fail.cold+0x5/0xa [ 1895.954903] ? create_object.isra.0+0x3a/0xa20 [ 1895.955403] should_failslab+0x5/0x20 [ 1895.955823] kmem_cache_alloc+0x5b/0x310 [ 1895.956281] create_object.isra.0+0x3a/0xa20 [ 1895.956766] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1895.957335] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1895.957902] ? netlink_trim+0x1ee/0x250 [ 1895.958349] pskb_expand_head+0x15a/0x1040 [ 1895.958817] netlink_trim+0x1ee/0x250 [ 1895.959239] netlink_broadcast_filtered+0x60/0xdc0 [ 1895.959789] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1895.960366] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1895.960971] ? trace_hardirqs_on+0x5b/0x180 [ 1895.961458] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1895.962066] nlmsg_notify+0x94/0x290 [ 1895.962471] ? rtmsg_ifinfo+0x91/0x120 [ 1895.962925] rtmsg_ifinfo+0xf0/0x120 [ 1895.963338] __dev_notify_flags+0x22a/0x2c0 [ 1895.963814] ? dev_change_name+0x660/0x660 [ 1895.964278] ? __dev_change_flags+0x4cf/0x6e0 [ 1895.964780] ? dev_set_allmulti+0x30/0x30 [ 1895.965248] ? full_name_hash+0xb5/0xf0 [ 1895.965690] dev_change_flags+0x100/0x160 [ 1895.966153] devinet_ioctl+0x14de/0x1db0 [ 1895.966598] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1895.967096] inet_ioctl+0x34f/0x390 [ 1895.967506] ? inet_dgram_connect+0x220/0x220 [ 1895.968013] ? __lock_acquire+0xbb1/0x5b00 [ 1895.968495] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1895.969073] ? perf_trace_lock+0xac/0x490 [ 1895.969544] packet_ioctl+0xb3/0x260 [ 1895.969962] sock_do_ioctl+0xd3/0x300 [ 1895.970366] ? compat_ifr_data_ioctl+0x180/0x180 [ 1895.970904] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1895.971540] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1895.972112] ? do_vfs_ioctl+0x283/0x10d0 [ 1895.972571] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1895.973157] ? generic_block_fiemap+0x60/0x60 [ 1895.973664] sock_ioctl+0x3ea/0x700 [ 1895.974071] ? trace_hardirqs_on+0x5b/0x180 [ 1895.974552] ? dlci_ioctl_set+0x30/0x30 [ 1895.974977] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1895.975581] ? dlci_ioctl_set+0x30/0x30 [ 1895.976003] ? dlci_ioctl_set+0x30/0x30 [ 1895.976449] __x64_sys_ioctl+0x19a/0x210 [ 1895.976908] do_syscall_64+0x33/0x40 [ 1895.977330] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1895.977902] RIP: 0033:0x7feded0d7b19 [ 1895.978318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1895.980309] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1895.981158] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1895.981918] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1895.982720] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1895.983512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1895.984307] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:29:02 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:29:02 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x330000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:29:02 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 56) 02:29:02 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x891c, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:29:02 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000830000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:02 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:02 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1909.753864] device veth0_vlan entered promiscuous mode [ 1909.754928] FAULT_INJECTION: forcing a failure. [ 1909.754928] name failslab, interval 1, probability 0, space 0, times 0 [ 1909.756212] CPU: 1 PID: 11391 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1909.756973] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1909.757898] Call Trace: [ 1909.758197] dump_stack+0x107/0x167 [ 1909.758611] should_fail.cold+0x5/0xa [ 1909.759070] ? create_object.isra.0+0x3a/0xa20 [ 1909.759577] should_failslab+0x5/0x20 [ 1909.759996] kmem_cache_alloc+0x5b/0x310 [ 1909.760449] create_object.isra.0+0x3a/0xa20 [ 1909.760930] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1909.761499] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1909.762066] ? netlink_trim+0x1ee/0x250 [ 1909.762515] pskb_expand_head+0x15a/0x1040 [ 1909.763034] netlink_trim+0x1ee/0x250 [ 1909.763459] netlink_broadcast_filtered+0x60/0xdc0 [ 1909.764005] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1909.764531] ? rtmsg_ifinfo_build_skb+0xd1/0x1a0 [ 1909.765066] nlmsg_notify+0x94/0x290 [ 1909.765480] rtmsg_ifinfo+0xf0/0x120 [ 1909.765896] __dev_notify_flags+0x22a/0x2c0 [ 1909.766371] ? dev_change_name+0x660/0x660 [ 1909.766864] ? __dev_change_flags+0x4cf/0x6e0 [ 1909.767377] ? dev_set_allmulti+0x30/0x30 [ 1909.767832] dev_change_flags+0x100/0x160 [ 1909.768296] devinet_ioctl+0x14de/0x1db0 [ 1909.768745] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1909.769235] inet_ioctl+0x34f/0x390 [ 1909.769636] ? inet_dgram_connect+0x220/0x220 [ 1909.770140] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1909.770715] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1909.771341] ? trace_hardirqs_on+0x5b/0x180 [ 1909.771829] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1909.772458] ? packet_ioctl+0x48/0x260 [ 1909.772899] ? write_comp_data+0x2f/0x80 [ 1909.773358] packet_ioctl+0xb3/0x260 [ 1909.773784] sock_do_ioctl+0xd3/0x300 [ 1909.774202] ? compat_ifr_data_ioctl+0x180/0x180 [ 1909.774760] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1909.775425] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1909.776008] ? do_vfs_ioctl+0x283/0x10d0 [ 1909.776478] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1909.777066] ? generic_block_fiemap+0x60/0x60 [ 1909.777578] sock_ioctl+0x3ea/0x700 [ 1909.777996] ? dlci_ioctl_set+0x30/0x30 [ 1909.778451] ? selinux_file_ioctl+0xb6/0x270 [ 1909.778962] ? dlci_ioctl_set+0x30/0x30 [ 1909.779421] __x64_sys_ioctl+0x19a/0x210 [ 1909.779885] do_syscall_64+0x33/0x40 [ 1909.780307] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1909.780886] RIP: 0033:0x7feded0d7b19 [ 1909.781316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1909.783390] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1909.784249] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1909.785037] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1909.785853] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1909.786644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1909.787482] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:29:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000200060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1909.822217] audit: type=1326 audit(1693276142.814:125): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11388 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 1909.831932] device veth0_vlan entered promiscuous mode [ 1909.832922] FAULT_INJECTION: forcing a failure. [ 1909.832922] name failslab, interval 1, probability 0, space 0, times 0 [ 1909.834197] CPU: 1 PID: 11387 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1909.834980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1909.835892] Call Trace: [ 1909.836184] dump_stack+0x107/0x167 [ 1909.836583] should_fail.cold+0x5/0xa [ 1909.837011] should_failslab+0x5/0x20 [ 1909.837429] __kmalloc_node_track_caller+0x74/0x3b0 [ 1909.837979] ? netlink_trim+0x1ee/0x250 [ 1909.838410] pskb_expand_head+0x15a/0x1040 [ 1909.838893] netlink_trim+0x1ee/0x250 [ 1909.839363] netlink_broadcast_filtered+0x60/0xdc0 [ 1909.839909] ? __ksize+0x26/0xf0 [ 1909.840275] ? rtmsg_ifinfo_build_skb+0xd1/0x1a0 [ 1909.840785] nlmsg_notify+0x94/0x290 [ 1909.841197] rtmsg_ifinfo+0xf0/0x120 [ 1909.841602] __dev_notify_flags+0x22a/0x2c0 [ 1909.842080] ? dev_change_name+0x660/0x660 [ 1909.842543] ? __dev_change_flags+0x4cf/0x6e0 [ 1909.843073] ? dev_set_allmulti+0x30/0x30 [ 1909.843534] dev_change_flags+0x100/0x160 [ 1909.843986] devinet_ioctl+0x14de/0x1db0 [ 1909.844436] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1909.844920] inet_ioctl+0x34f/0x390 [ 1909.845317] ? inet_dgram_connect+0x220/0x220 [ 1909.845816] ? __lock_acquire+0xbb1/0x5b00 [ 1909.846293] ? perf_trace_lock+0xac/0x490 [ 1909.846756] packet_ioctl+0xb3/0x260 [ 1909.847189] sock_do_ioctl+0xd3/0x300 [ 1909.847604] ? compat_ifr_data_ioctl+0x180/0x180 [ 1909.848122] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1909.848745] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1909.849301] ? do_vfs_ioctl+0x283/0x10d0 [ 1909.849744] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1909.850322] ? generic_block_fiemap+0x60/0x60 [ 1909.850839] sock_ioctl+0x3ea/0x700 [ 1909.851238] ? dlci_ioctl_set+0x30/0x30 [ 1909.851675] ? selinux_file_ioctl+0xb6/0x270 [ 1909.852154] ? dlci_ioctl_set+0x30/0x30 [ 1909.852596] __x64_sys_ioctl+0x19a/0x210 [ 1909.853043] do_syscall_64+0x33/0x40 [ 1909.853444] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1909.854002] RIP: 0033:0x7f07a4a4eb19 [ 1909.854407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1909.856413] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1909.857234] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1909.858001] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1909.858791] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1909.859580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1909.860398] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1909.879944] FAULT_INJECTION: forcing a failure. [ 1909.879944] name failslab, interval 1, probability 0, space 0, times 0 [ 1909.881158] CPU: 1 PID: 11406 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1909.881889] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1909.882791] Call Trace: [ 1909.883082] dump_stack+0x107/0x167 [ 1909.883470] should_fail.cold+0x5/0xa [ 1909.883878] ? __pmd_alloc+0x94/0x5e0 [ 1909.884281] should_failslab+0x5/0x20 [ 1909.884686] kmem_cache_alloc+0x5b/0x310 [ 1909.885123] __pmd_alloc+0x94/0x5e0 [ 1909.885512] copy_page_range+0x2bd8/0x3810 [ 1909.885960] ? perf_trace_lock+0xac/0x490 [ 1909.886401] ? lock_chain_count+0x20/0x20 [ 1909.886886] ? up_write+0x191/0x550 [ 1909.887281] ? vm_iomap_memory+0x190/0x190 [ 1909.887746] ? downgrade_write+0x3a0/0x3a0 [ 1909.888210] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1909.888807] ? __vma_link_rb+0x540/0x700 [ 1909.889258] copy_process+0x759b/0x7800 [ 1909.889717] ? __cleanup_sighand+0xb0/0xb0 [ 1909.890178] ? find_held_lock+0x2c/0x110 [ 1909.890630] kernel_clone+0xe7/0x980 [ 1909.891060] ? lock_downgrade+0x6d0/0x6d0 [ 1909.891513] ? find_held_lock+0x2c/0x110 [ 1909.891961] ? create_io_thread+0xf0/0xf0 [ 1909.892408] ? ksys_write+0x12d/0x260 [ 1909.892832] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1909.893362] __do_sys_fork+0x8a/0xc0 [ 1909.893763] ? kernel_thread+0xf0/0xf0 [ 1909.894201] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1909.894767] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1909.895354] ? trace_hardirqs_on+0x5b/0x180 [ 1909.895829] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1909.896399] do_syscall_64+0x33/0x40 [ 1909.896810] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1909.897377] RIP: 0033:0x7fadf412db19 [ 1909.897777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1909.899830] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1909.900646] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1909.901435] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1909.902217] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1909.903028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1909.903809] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:29:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000300060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:02 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1909.917166] device veth0_vlan entered promiscuous mode 02:29:02 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 21) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:02 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8934, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:29:02 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 19) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1910.026646] device veth0_vlan entered promiscuous mode [ 1910.044907] FAULT_INJECTION: forcing a failure. [ 1910.044907] name failslab, interval 1, probability 0, space 0, times 0 [ 1910.046656] CPU: 1 PID: 11418 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1910.047407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1910.048308] Call Trace: [ 1910.048614] dump_stack+0x107/0x167 [ 1910.049005] should_fail.cold+0x5/0xa [ 1910.049413] ? create_object.isra.0+0x3a/0xa20 [ 1910.049899] should_failslab+0x5/0x20 [ 1910.050303] kmem_cache_alloc+0x5b/0x310 [ 1910.050738] create_object.isra.0+0x3a/0xa20 [ 1910.051226] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1910.051773] kmem_cache_alloc_trace+0x151/0x320 [ 1910.052295] ____ip_mc_inc_group+0x277/0xca0 [ 1910.052780] ? kfree_skbmem+0xef/0x1b0 [ 1910.053211] ? ip_mc_add_src+0xe00/0xe00 [ 1910.053664] ip_mc_up+0x14b/0x3a0 [ 1910.054050] inetdev_event+0xbe3/0x1610 [ 1910.054484] ? devinet_init_net+0x650/0x650 [ 1910.054987] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1910.055555] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1910.056117] ? nh_netdev_event+0x8c/0x370 [ 1910.056577] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1910.057149] raw_notifier_call_chain+0xb3/0x110 [ 1910.057669] call_netdevice_notifiers_info+0xb5/0x130 [ 1910.058245] __dev_notify_flags+0x110/0x2c0 [ 1910.058721] ? dev_change_name+0x660/0x660 [ 1910.059207] ? __dev_change_flags+0x4cf/0x6e0 [ 1910.059700] ? dev_set_allmulti+0x30/0x30 [ 1910.060155] ? cap_capable+0x1d6/0x240 [ 1910.060583] ? full_name_hash+0xb5/0xf0 [ 1910.061027] dev_change_flags+0x100/0x160 02:29:03 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x2, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:03 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890d, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:29:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000400060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:03 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1910.061490] devinet_ioctl+0x14de/0x1db0 [ 1910.062153] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1910.062677] inet_ioctl+0x34f/0x390 [ 1910.063098] ? inet_dgram_connect+0x220/0x220 [ 1910.063605] ? __lock_acquire+0xbb1/0x5b00 [ 1910.064073] ? perf_trace_lock+0xac/0x490 [ 1910.064531] packet_ioctl+0xb3/0x260 [ 1910.064937] sock_do_ioctl+0xd3/0x300 [ 1910.065342] ? compat_ifr_data_ioctl+0x180/0x180 [ 1910.065859] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1910.066482] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1910.067062] ? do_vfs_ioctl+0x283/0x10d0 [ 1910.067502] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1910.068074] ? generic_block_fiemap+0x60/0x60 [ 1910.068558] sock_ioctl+0x3ea/0x700 [ 1910.068949] ? dlci_ioctl_set+0x30/0x30 [ 1910.069375] ? selinux_file_ioctl+0xb6/0x270 [ 1910.069860] ? dlci_ioctl_set+0x30/0x30 [ 1910.070291] __x64_sys_ioctl+0x19a/0x210 [ 1910.070737] do_syscall_64+0x33/0x40 [ 1910.071159] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1910.071720] RIP: 0033:0x7feded0d7b19 [ 1910.072135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1910.074172] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1910.075028] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1910.075804] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1910.076557] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1910.077309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1910.078068] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1910.153861] device veth0_vlan entered promiscuous mode [ 1910.155950] FAULT_INJECTION: forcing a failure. [ 1910.155950] name failslab, interval 1, probability 0, space 0, times 0 [ 1910.158861] CPU: 0 PID: 11421 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1910.160269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1910.161949] Call Trace: [ 1910.162495] dump_stack+0x107/0x167 [ 1910.163264] should_fail.cold+0x5/0xa [ 1910.164042] ? create_object.isra.0+0x3a/0xa20 [ 1910.164972] should_failslab+0x5/0x20 [ 1910.165748] kmem_cache_alloc+0x5b/0x310 [ 1910.166574] create_object.isra.0+0x3a/0xa20 [ 1910.167475] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1910.168512] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1910.169540] ? netlink_trim+0x1ee/0x250 [ 1910.170355] pskb_expand_head+0x15a/0x1040 [ 1910.171245] netlink_trim+0x1ee/0x250 [ 1910.172023] netlink_broadcast_filtered+0x60/0xdc0 [ 1910.173020] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1910.173972] ? __alloc_skb+0x24/0x5b0 [ 1910.174761] ? rtmsg_ifinfo_build_skb+0xd1/0x1a0 [ 1910.175726] nlmsg_notify+0x94/0x290 [ 1910.176489] rtmsg_ifinfo+0xf0/0x120 [ 1910.177251] __dev_notify_flags+0x22a/0x2c0 [ 1910.178127] ? dev_change_name+0x660/0x660 [ 1910.178997] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1910.180110] dev_change_flags+0x100/0x160 [ 1910.180959] devinet_ioctl+0x14de/0x1db0 [ 1910.181791] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1910.182691] inet_ioctl+0x34f/0x390 [ 1910.183453] ? inet_dgram_connect+0x220/0x220 [ 1910.184375] ? __lock_acquire+0xbb1/0x5b00 [ 1910.185249] ? perf_trace_lock+0xac/0x490 [ 1910.186097] packet_ioctl+0xb3/0x260 [ 1910.186861] sock_do_ioctl+0xd3/0x300 [ 1910.187631] ? compat_ifr_data_ioctl+0x180/0x180 [ 1910.188594] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1910.189757] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1910.190809] ? do_vfs_ioctl+0x283/0x10d0 [ 1910.191629] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1910.192688] ? generic_block_fiemap+0x60/0x60 [ 1910.193601] sock_ioctl+0x3ea/0x700 [ 1910.194338] ? dlci_ioctl_set+0x30/0x30 [ 1910.195164] ? selinux_file_ioctl+0xb6/0x270 [ 1910.196060] ? dlci_ioctl_set+0x30/0x30 [ 1910.196866] __x64_sys_ioctl+0x19a/0x210 [ 1910.197691] do_syscall_64+0x33/0x40 [ 1910.198447] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1910.199490] RIP: 0033:0x7f07a4a4eb19 [ 1910.200245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1910.203955] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1910.205491] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1910.206948] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1910.208387] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1910.209827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1910.211273] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:29:17 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8935, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:29:17 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 57) 02:29:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000500060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:17 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x4b47, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:17 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 22) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:17 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:29:17 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890e, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:29:17 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 20) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1924.568677] audit: type=1326 audit(1693276157.553:126): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11441 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 1924.596079] device veth0_vlan entered promiscuous mode [ 1924.597259] FAULT_INJECTION: forcing a failure. [ 1924.597259] name failslab, interval 1, probability 0, space 0, times 0 [ 1924.598664] CPU: 0 PID: 11446 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1924.599541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1924.600541] Call Trace: [ 1924.600878] dump_stack+0x107/0x167 [ 1924.601326] should_fail.cold+0x5/0xa [ 1924.601791] ? create_object.isra.0+0x3a/0xa20 [ 1924.602360] should_failslab+0x5/0x20 [ 1924.602824] kmem_cache_alloc+0x5b/0x310 [ 1924.603327] create_object.isra.0+0x3a/0xa20 [ 1924.603860] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1924.604488] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 1924.605105] ? netlink_trim+0x1ee/0x250 [ 1924.605596] pskb_expand_head+0x15a/0x1040 [ 1924.606122] netlink_trim+0x1ee/0x250 [ 1924.606614] netlink_broadcast_filtered+0x60/0xdc0 [ 1924.607307] ? rtmsg_ifinfo_build_skb+0x72/0x1a0 [ 1924.607923] ? rtmsg_ifinfo_build_skb+0xd1/0x1a0 [ 1924.608507] nlmsg_notify+0x94/0x290 [ 1924.608993] rtmsg_ifinfo+0xf0/0x120 [ 1924.609460] __dev_notify_flags+0x22a/0x2c0 [ 1924.609987] ? dev_change_name+0x660/0x660 [ 1924.610504] ? __dev_change_flags+0x4cf/0x6e0 [ 1924.611069] ? dev_set_allmulti+0x30/0x30 [ 1924.611585] dev_change_flags+0x100/0x160 [ 1924.612100] devinet_ioctl+0x14de/0x1db0 [ 1924.612606] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1924.613154] inet_ioctl+0x34f/0x390 [ 1924.613598] ? inet_dgram_connect+0x220/0x220 [ 1924.614155] ? __lock_acquire+0xbb1/0x5b00 [ 1924.614684] ? perf_trace_lock+0xac/0x490 [ 1924.615222] packet_ioctl+0xb3/0x260 [ 1924.615677] sock_do_ioctl+0xd3/0x300 [ 1924.616153] ? compat_ifr_data_ioctl+0x180/0x180 [ 1924.616741] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1924.617443] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1924.618058] ? do_vfs_ioctl+0x283/0x10d0 [ 1924.618540] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1924.619192] ? generic_block_fiemap+0x60/0x60 [ 1924.619730] sock_ioctl+0x3ea/0x700 [ 1924.620167] ? dlci_ioctl_set+0x30/0x30 [ 1924.620644] ? selinux_file_ioctl+0xb6/0x270 [ 1924.621170] ? dlci_ioctl_set+0x30/0x30 [ 1924.621648] __x64_sys_ioctl+0x19a/0x210 [ 1924.622139] do_syscall_64+0x33/0x40 [ 1924.622586] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1924.623199] RIP: 0033:0x7f07a4a4eb19 [ 1924.623646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1924.625799] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1924.626695] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1924.627541] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1924.628379] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1924.629217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1924.630055] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:29:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000600060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:17 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8940, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1924.665902] device veth0_vlan entered promiscuous mode [ 1924.667051] FAULT_INJECTION: forcing a failure. [ 1924.667051] name failslab, interval 1, probability 0, space 0, times 0 [ 1924.668402] CPU: 0 PID: 11449 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1924.669209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1924.670184] Call Trace: [ 1924.670512] dump_stack+0x107/0x167 [ 1924.670954] should_fail.cold+0x5/0xa [ 1924.671423] ? fib6_info_alloc+0x3c/0x110 [ 1924.671949] should_failslab+0x5/0x20 [ 1924.672426] __kmalloc+0x72/0x390 [ 1924.672853] fib6_info_alloc+0x3c/0x110 [ 1924.673344] ip6_route_info_create+0x37a/0x1a00 [ 1924.673924] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1924.674573] ? fib6_nh_init+0x19e0/0x19e0 [ 1924.675102] ? lock_chain_count+0x20/0x20 [ 1924.675613] ? perf_trace_lock+0xac/0x490 [ 1924.676121] ip6_route_add+0x24/0x150 [ 1924.676589] addrconf_add_mroute+0x120/0x180 [ 1924.677121] ? ipv6_generate_eui64+0xa40/0xa40 [ 1924.677678] ? find_held_lock+0x2c/0x110 [ 1924.678203] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1924.678848] ? __local_bh_enable_ip+0x9d/0x100 [ 1924.679429] ? trace_hardirqs_on+0x5b/0x180 [ 1924.679962] ? ipv6_find_idev+0x174/0x220 [ 1924.680454] ? __local_bh_enable_ip+0x9d/0x100 [ 1924.681023] addrconf_add_dev+0x16a/0x1e0 [ 1924.681560] addrconf_dev_config+0x1f2/0x440 [ 1924.682095] addrconf_notify+0xc95/0x2410 [ 1924.682608] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1924.683253] ? inet6_ifinfo_notify+0x150/0x150 [ 1924.683806] ? failover_register+0x530/0x530 [ 1924.684369] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1924.685046] ? ipmr_device_event+0x18b/0x1f0 [ 1924.685576] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1924.686202] raw_notifier_call_chain+0xb3/0x110 [ 1924.686767] call_netdevice_notifiers_info+0xb5/0x130 [ 1924.687407] __dev_notify_flags+0x110/0x2c0 [ 1924.687936] ? dev_change_name+0x660/0x660 [ 1924.688452] ? __dev_change_flags+0x4cf/0x6e0 [ 1924.688999] ? dev_set_allmulti+0x30/0x30 [ 1924.689502] ? netdev_name_node_lookup+0xd5/0x150 [ 1924.690100] dev_change_flags+0x100/0x160 [ 1924.690611] devinet_ioctl+0x14de/0x1db0 [ 1924.691121] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1924.691660] inet_ioctl+0x34f/0x390 [ 1924.692101] ? inet_dgram_connect+0x220/0x220 [ 1924.692659] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1924.693310] ? trace_hardirqs_on+0x5b/0x180 [ 1924.693844] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1924.694509] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1924.695155] packet_ioctl+0xb3/0x260 [ 1924.695618] sock_do_ioctl+0xd3/0x300 [ 1924.696079] ? compat_ifr_data_ioctl+0x180/0x180 [ 1924.696655] ? do_vfs_ioctl+0xbb/0x10d0 [ 1924.697134] ? do_vfs_ioctl+0xb46/0x10d0 [ 1924.697633] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 1924.698202] ? do_vfs_ioctl+0x283/0x10d0 [ 1924.698695] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1924.699338] ? generic_block_fiemap+0x60/0x60 [ 1924.699877] sock_ioctl+0x3ea/0x700 [ 1924.700311] ? dlci_ioctl_set+0x30/0x30 [ 1924.700800] ? selinux_file_ioctl+0xb6/0x270 [ 1924.701336] ? dlci_ioctl_set+0x30/0x30 [ 1924.701814] __x64_sys_ioctl+0x19a/0x210 [ 1924.702309] do_syscall_64+0x33/0x40 [ 1924.702766] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1924.703400] RIP: 0033:0x7feded0d7b19 [ 1924.703853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1924.706100] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1924.707041] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1924.707925] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1924.708793] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1924.709659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1924.710518] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1924.715573] FAULT_INJECTION: forcing a failure. [ 1924.715573] name failslab, interval 1, probability 0, space 0, times 0 [ 1924.717919] CPU: 1 PID: 11467 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1924.719427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1924.721293] Call Trace: [ 1924.721894] dump_stack+0x107/0x167 [ 1924.722691] should_fail.cold+0x5/0xa [ 1924.723512] ? create_object.isra.0+0x3a/0xa20 [ 1924.724556] should_failslab+0x5/0x20 [ 1924.725446] kmem_cache_alloc+0x5b/0x310 [ 1924.726392] create_object.isra.0+0x3a/0xa20 [ 1924.727350] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1924.728434] kmem_cache_alloc+0x159/0x310 [ 1924.729357] __pmd_alloc+0x94/0x5e0 [ 1924.730114] copy_page_range+0x2bd8/0x3810 [ 1924.731092] ? perf_trace_lock+0xac/0x490 [ 1924.731981] ? lock_chain_count+0x20/0x20 [ 1924.732856] ? up_write+0x191/0x550 [ 1924.733612] ? vm_iomap_memory+0x190/0x190 [ 1924.734440] ? downgrade_write+0x3a0/0x3a0 [ 1924.735363] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1924.736545] ? __vma_link_rb+0x540/0x700 [ 1924.737394] copy_process+0x759b/0x7800 [ 1924.738278] ? __cleanup_sighand+0xb0/0xb0 [ 1924.739216] ? find_held_lock+0x2c/0x110 [ 1924.740027] kernel_clone+0xe7/0x980 [ 1924.740773] ? lock_downgrade+0x6d0/0x6d0 [ 1924.741587] ? find_held_lock+0x2c/0x110 [ 1924.742382] ? create_io_thread+0xf0/0xf0 [ 1924.743213] ? ksys_write+0x12d/0x260 [ 1924.743975] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1924.744954] __do_sys_fork+0x8a/0xc0 [ 1924.745701] ? kernel_thread+0xf0/0xf0 [ 1924.746490] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1924.747542] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1924.748571] ? trace_hardirqs_on+0x5b/0x180 [ 1924.749423] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1924.750454] do_syscall_64+0x33/0x40 [ 1924.751195] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1924.752169] RIP: 0033:0x7fadf412db19 02:29:17 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890f, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 1924.752925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1924.756771] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1924.758275] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1924.759701] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1924.761111] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1924.762529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1924.763951] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:29:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000700060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000800060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:17 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 23) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:17 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:29:17 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 21) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:17 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8941, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1924.936957] device veth0_vlan entered promiscuous mode [ 1924.941264] FAULT_INJECTION: forcing a failure. [ 1924.941264] name failslab, interval 1, probability 0, space 0, times 0 [ 1924.942553] CPU: 0 PID: 11488 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1924.943298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1924.944181] Call Trace: [ 1924.944484] dump_stack+0x107/0x167 [ 1924.944881] should_fail.cold+0x5/0xa [ 1924.945289] ? create_object.isra.0+0x3a/0xa20 [ 1924.945779] should_failslab+0x5/0x20 [ 1924.946184] kmem_cache_alloc+0x5b/0x310 [ 1924.946616] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1924.947189] create_object.isra.0+0x3a/0xa20 [ 1924.947656] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1924.948197] __kmalloc+0x16e/0x390 [ 1924.948581] fib6_info_alloc+0x3c/0x110 [ 1924.949005] ip6_route_info_create+0x37a/0x1a00 [ 1924.949504] ? fib6_nh_init+0x19e0/0x19e0 [ 1924.949947] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 1924.950505] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1924.951083] ? perf_trace_lock+0xac/0x490 [ 1924.951532] ip6_route_add+0x24/0x150 [ 1924.951938] addrconf_add_mroute+0x120/0x180 [ 1924.952413] ? ipv6_generate_eui64+0xa40/0xa40 [ 1924.952907] ? find_held_lock+0x2c/0x110 [ 1924.953357] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1924.953937] ? __local_bh_enable_ip+0x9d/0x100 [ 1924.954439] ? trace_hardirqs_on+0x5b/0x180 [ 1924.954919] ? ipv6_find_idev+0x174/0x220 [ 1924.955376] ? __local_bh_enable_ip+0x9d/0x100 [ 1924.955880] addrconf_add_dev+0x16a/0x1e0 [ 1924.956338] addrconf_dev_config+0x1f2/0x440 [ 1924.956831] addrconf_notify+0xc95/0x2410 [ 1924.957299] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1924.957881] ? inet6_ifinfo_notify+0x150/0x150 [ 1924.958380] ? failover_register+0x530/0x530 [ 1924.958869] ? rt_cache_flush+0x1/0x30 [ 1924.959310] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1924.959927] ? ipmr_device_event+0x18b/0x1f0 [ 1924.960400] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1924.960977] raw_notifier_call_chain+0xb3/0x110 [ 1924.961508] call_netdevice_notifiers_info+0xb5/0x130 [ 1924.962084] __dev_notify_flags+0x110/0x2c0 [ 1924.962574] ? dev_change_name+0x660/0x660 [ 1924.963055] ? __dev_change_flags+0x4cf/0x6e0 [ 1924.963554] ? dev_set_allmulti+0x30/0x30 [ 1924.964019] ? cap_capable+0x1d6/0x240 [ 1924.964460] ? full_name_hash+0xb5/0xf0 [ 1924.964907] dev_change_flags+0x100/0x160 [ 1924.965374] devinet_ioctl+0x14de/0x1db0 [ 1924.965833] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1924.966335] inet_ioctl+0x34f/0x390 [ 1924.966739] ? inet_dgram_connect+0x220/0x220 [ 1924.967270] ? __lock_acquire+0xbb1/0x5b00 [ 1924.967747] ? perf_trace_lock+0xac/0x490 [ 1924.968211] packet_ioctl+0xb3/0x260 [ 1924.968626] sock_do_ioctl+0xd3/0x300 [ 1924.969051] ? compat_ifr_data_ioctl+0x180/0x180 [ 1924.969580] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1924.970216] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1924.970783] ? do_vfs_ioctl+0x283/0x10d0 [ 1924.971245] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1924.971824] ? generic_block_fiemap+0x60/0x60 [ 1924.972328] sock_ioctl+0x3ea/0x700 [ 1924.972721] ? dlci_ioctl_set+0x30/0x30 [ 1924.973169] ? selinux_file_ioctl+0xb6/0x270 [ 1924.973647] ? dlci_ioctl_set+0x30/0x30 [ 1924.974098] __x64_sys_ioctl+0x19a/0x210 [ 1924.974553] do_syscall_64+0x33/0x40 [ 1924.974979] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1924.975549] RIP: 0033:0x7feded0d7b19 [ 1924.975963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1924.978003] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1924.978844] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1924.979635] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1924.980433] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1924.981236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1924.982031] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1924.991860] device veth0_vlan entered promiscuous mode [ 1924.993583] FAULT_INJECTION: forcing a failure. [ 1924.993583] name failslab, interval 1, probability 0, space 0, times 0 [ 1924.995273] CPU: 0 PID: 11486 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1924.996068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1924.997014] Call Trace: [ 1924.997323] dump_stack+0x107/0x167 [ 1924.997754] should_fail.cold+0x5/0xa [ 1924.998193] ? create_object.isra.0+0x3a/0xa20 [ 1924.998717] should_failslab+0x5/0x20 [ 1924.999184] kmem_cache_alloc+0x5b/0x310 [ 1924.999669] create_object.isra.0+0x3a/0xa20 [ 1925.000176] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1925.000758] kmem_cache_alloc_trace+0x151/0x320 [ 1925.001300] ____ip_mc_inc_group+0x277/0xca0 [ 1925.001814] ? kfree_skbmem+0xef/0x1b0 [ 1925.002272] ? ip_mc_add_src+0xe00/0xe00 [ 1925.002745] ip_mc_up+0x14b/0x3a0 [ 1925.003169] inetdev_event+0xbe3/0x1610 [ 1925.003642] ? devinet_init_net+0x650/0x650 [ 1925.004145] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1925.004743] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1925.005336] ? nh_netdev_event+0x8c/0x370 [ 1925.005813] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1925.006399] raw_notifier_call_chain+0xb3/0x110 [ 1925.006929] call_netdevice_notifiers_info+0xb5/0x130 [ 1925.007525] __dev_notify_flags+0x110/0x2c0 [ 1925.008007] ? dev_change_name+0x660/0x660 [ 1925.008477] ? __dev_change_flags+0x4cf/0x6e0 [ 1925.008988] ? dev_set_allmulti+0x30/0x30 [ 1925.009452] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1925.010062] dev_change_flags+0x100/0x160 [ 1925.010534] devinet_ioctl+0x14de/0x1db0 [ 1925.010998] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1925.011495] inet_ioctl+0x34f/0x390 [ 1925.011905] ? inet_dgram_connect+0x220/0x220 [ 1925.012413] ? __lock_acquire+0xbb1/0x5b00 [ 1925.012892] ? perf_trace_lock+0xac/0x490 [ 1925.013365] packet_ioctl+0xb3/0x260 [ 1925.013780] sock_do_ioctl+0xd3/0x300 [ 1925.014209] ? compat_ifr_data_ioctl+0x180/0x180 [ 1925.014739] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1925.015469] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1925.016049] ? do_vfs_ioctl+0x283/0x10d0 [ 1925.016501] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1925.017083] ? generic_block_fiemap+0x60/0x60 [ 1925.017589] sock_ioctl+0x3ea/0x700 [ 1925.017991] ? dlci_ioctl_set+0x30/0x30 [ 1925.018446] ? selinux_file_ioctl+0xb6/0x270 [ 1925.018930] ? dlci_ioctl_set+0x30/0x30 [ 1925.019388] __x64_sys_ioctl+0x19a/0x210 [ 1925.019841] do_syscall_64+0x33/0x40 [ 1925.020262] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1925.020835] RIP: 0033:0x7f07a4a4eb19 [ 1925.021256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1925.023298] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1925.024146] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1925.024942] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1925.025735] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1925.026534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1925.027340] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:29:38 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 58) 02:29:38 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8910, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:29:38 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080001800060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:38 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x894c, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:29:38 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x4b49, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:38 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:29:38 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 22) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1945.648284] audit: type=1326 audit(1693276178.640:127): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11503 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:29:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080001c00060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1945.688845] device veth0_vlan entered promiscuous mode [ 1945.690255] FAULT_INJECTION: forcing a failure. [ 1945.690255] name failslab, interval 1, probability 0, space 0, times 0 [ 1945.691571] CPU: 0 PID: 11502 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1945.692317] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1945.693206] Call Trace: [ 1945.693502] dump_stack+0x107/0x167 [ 1945.693895] should_fail.cold+0x5/0xa [ 1945.694305] ? create_object.isra.0+0x3a/0xa20 [ 1945.694797] should_failslab+0x5/0x20 [ 1945.695226] kmem_cache_alloc+0x5b/0x310 [ 1945.695667] create_object.isra.0+0x3a/0xa20 [ 1945.696147] kmemleak_alloc_percpu+0xa0/0x100 [ 1945.696634] pcpu_alloc+0x4e2/0x1240 [ 1945.697053] fib_nh_common_init+0x2d/0x160 [ 1945.697525] fib6_nh_init+0xa21/0x19e0 [ 1945.697952] ? icmp6_dst_alloc+0x650/0x650 [ 1945.698419] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 1945.698914] ? gre_gro_complete+0x530/0x530 [ 1945.699411] ? kasan_unpoison_shadow+0x33/0x50 [ 1945.699909] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1945.700490] ip6_route_info_create+0x1185/0x1a00 [ 1945.701041] ? fib6_nh_init+0x19e0/0x19e0 [ 1945.701519] ip6_route_add+0x24/0x150 [ 1945.701960] addrconf_add_mroute+0x120/0x180 [ 1945.702448] ? ipv6_generate_eui64+0xa40/0xa40 [ 1945.702950] ? find_held_lock+0x2c/0x110 [ 1945.703424] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1945.704015] ? __local_bh_enable_ip+0x9d/0x100 [ 1945.704531] ? trace_hardirqs_on+0x5b/0x180 [ 1945.705015] ? ipv6_find_idev+0x174/0x220 [ 1945.705486] ? __local_bh_enable_ip+0x9d/0x100 [ 1945.706002] addrconf_add_dev+0x16a/0x1e0 [ 1945.706462] addrconf_dev_config+0x1f2/0x440 [ 1945.706956] addrconf_notify+0xc95/0x2410 [ 1945.707430] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1945.708031] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1945.708607] ? inet6_ifinfo_notify+0x150/0x150 [ 1945.709119] ? failover_register+0x530/0x530 [ 1945.709615] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1945.710228] ? ipmr_device_event+0x18b/0x1f0 [ 1945.710720] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1945.711324] raw_notifier_call_chain+0xb3/0x110 [ 1945.711849] call_netdevice_notifiers_info+0xb5/0x130 [ 1945.712427] __dev_notify_flags+0x110/0x2c0 [ 1945.712914] ? dev_change_name+0x660/0x660 [ 1945.713383] ? __dev_change_flags+0x4cf/0x6e0 [ 1945.713871] ? dev_set_allmulti+0x30/0x30 [ 1945.714339] ? full_name_hash+0xb5/0xf0 [ 1945.714785] ? full_name_hash+0xcb/0xf0 [ 1945.715244] dev_change_flags+0x100/0x160 [ 1945.715695] devinet_ioctl+0x14de/0x1db0 [ 1945.716158] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1945.716658] inet_ioctl+0x34f/0x390 [ 1945.717068] ? inet_dgram_connect+0x220/0x220 [ 1945.717576] ? __lock_acquire+0xbb1/0x5b00 [ 1945.718059] ? perf_trace_lock+0xac/0x490 [ 1945.718530] packet_ioctl+0xb3/0x260 [ 1945.718943] sock_do_ioctl+0xd3/0x300 [ 1945.719375] ? compat_ifr_data_ioctl+0x180/0x180 [ 1945.719893] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1945.720538] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1945.721089] ? do_vfs_ioctl+0x283/0x10d0 [ 1945.721545] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1945.722131] ? generic_block_fiemap+0x60/0x60 [ 1945.722636] sock_ioctl+0x3ea/0x700 [ 1945.723043] ? dlci_ioctl_set+0x30/0x30 [ 1945.723491] ? selinux_file_ioctl+0xb6/0x270 [ 1945.723985] ? dlci_ioctl_set+0x30/0x30 [ 1945.724430] __x64_sys_ioctl+0x19a/0x210 [ 1945.724892] do_syscall_64+0x33/0x40 [ 1945.725312] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1945.725884] RIP: 0033:0x7feded0d7b19 [ 1945.726295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1945.728347] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1945.729192] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1945.729965] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1945.730750] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1945.731525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1945.732324] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:29:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080006700060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:38 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8954, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1945.781873] device veth0_vlan entered promiscuous mode [ 1945.786002] FAULT_INJECTION: forcing a failure. [ 1945.786002] name failslab, interval 1, probability 0, space 0, times 0 [ 1945.788392] FAULT_INJECTION: forcing a failure. [ 1945.788392] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1945.788410] CPU: 0 PID: 11527 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1945.788417] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1945.788420] Call Trace: [ 1945.788435] dump_stack+0x107/0x167 [ 1945.788448] should_fail.cold+0x5/0xa [ 1945.788465] __alloc_pages_nodemask+0x182/0x600 [ 1945.788482] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1945.788491] ? find_held_lock+0x2c/0x110 [ 1945.788507] ? __pmd_alloc+0x2db/0x5e0 [ 1945.788518] ? lock_downgrade+0x6d0/0x6d0 [ 1945.788530] ? do_raw_spin_lock+0x121/0x260 [ 1945.788544] alloc_pages_current+0x187/0x280 [ 1945.788558] pte_alloc_one+0x16/0x1a0 [ 1945.788570] __pte_alloc+0x1d/0x330 [ 1945.788583] copy_page_range+0x1b62/0x3810 [ 1945.788593] ? perf_trace_lock+0xac/0x490 [ 1945.788603] ? lock_chain_count+0x20/0x20 [ 1945.788637] ? up_write+0x191/0x550 [ 1945.788648] ? vm_iomap_memory+0x190/0x190 [ 1945.788658] ? downgrade_write+0x3a0/0x3a0 [ 1945.788671] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1945.788686] ? __vma_link_rb+0x540/0x700 [ 1945.788702] copy_process+0x759b/0x7800 [ 1945.788734] ? __cleanup_sighand+0xb0/0xb0 [ 1945.788755] ? find_held_lock+0x2c/0x110 [ 1945.788769] kernel_clone+0xe7/0x980 [ 1945.788781] ? lock_downgrade+0x6d0/0x6d0 [ 1945.788790] ? find_held_lock+0x2c/0x110 [ 1945.788801] ? create_io_thread+0xf0/0xf0 [ 1945.788814] ? ksys_write+0x12d/0x260 [ 1945.788830] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1945.788847] __do_sys_fork+0x8a/0xc0 [ 1945.788857] ? kernel_thread+0xf0/0xf0 [ 1945.788879] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1945.807025] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1945.807631] ? trace_hardirqs_on+0x5b/0x180 [ 1945.808116] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1945.808701] do_syscall_64+0x33/0x40 [ 1945.809120] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1945.809687] RIP: 0033:0x7fadf412db19 [ 1945.810112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1945.812185] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1945.813040] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1945.813823] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1945.814623] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1945.815438] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1945.816240] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 1945.817080] CPU: 1 PID: 11512 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1945.818493] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1945.820175] Call Trace: [ 1945.820717] dump_stack+0x107/0x167 [ 1945.821460] should_fail.cold+0x5/0xa [ 1945.822244] ? fib6_info_alloc+0x3c/0x110 [ 1945.823088] should_failslab+0x5/0x20 [ 1945.823865] __kmalloc+0x72/0x390 [ 1945.824579] fib6_info_alloc+0x3c/0x110 [ 1945.825387] ip6_route_info_create+0x37a/0x1a00 [ 1945.826334] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1945.827422] ? fib6_nh_init+0x19e0/0x19e0 [ 1945.828260] ? lock_chain_count+0x20/0x20 [ 1945.829098] ? perf_trace_lock+0xac/0x490 [ 1945.829946] ip6_route_add+0x24/0x150 [ 1945.830724] addrconf_add_mroute+0x120/0x180 [ 1945.831625] ? ipv6_generate_eui64+0xa40/0xa40 [ 1945.832551] ? find_held_lock+0x2c/0x110 [ 1945.833396] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1945.834459] ? __local_bh_enable_ip+0x9d/0x100 [ 1945.835399] ? trace_hardirqs_on+0x5b/0x180 [ 1945.836269] ? ipv6_find_idev+0x174/0x220 [ 1945.837103] ? __local_bh_enable_ip+0x9d/0x100 [ 1945.838034] addrconf_add_dev+0x16a/0x1e0 [ 1945.838873] addrconf_dev_config+0x1f2/0x440 [ 1945.839767] addrconf_notify+0xc95/0x2410 [ 1945.840618] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1945.841665] ? inet6_ifinfo_notify+0x150/0x150 [ 1945.842588] ? failover_register+0x530/0x530 [ 1945.843501] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1945.844615] ? ipmr_device_event+0x18b/0x1f0 [ 1945.845507] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1945.846556] raw_notifier_call_chain+0xb3/0x110 [ 1945.847515] call_netdevice_notifiers_info+0xb5/0x130 [ 1945.848572] __dev_notify_flags+0x110/0x2c0 [ 1945.849447] ? dev_change_name+0x660/0x660 [ 1945.850302] ? __dev_change_flags+0x4cf/0x6e0 [ 1945.851232] ? dev_set_allmulti+0x30/0x30 [ 1945.852077] ? strnlen+0x3f/0x70 [ 1945.852765] ? full_name_hash+0xb5/0xf0 [ 1945.853577] dev_change_flags+0x100/0x160 [ 1945.854428] devinet_ioctl+0x14de/0x1db0 [ 1945.855275] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1945.856174] inet_ioctl+0x34f/0x390 [ 1945.856913] ? inet_dgram_connect+0x220/0x220 [ 1945.857834] ? __lock_acquire+0xbb1/0x5b00 [ 1945.858707] ? perf_trace_lock+0xac/0x490 [ 1945.859582] packet_ioctl+0xb3/0x260 [ 1945.860343] sock_do_ioctl+0xd3/0x300 [ 1945.861114] ? compat_ifr_data_ioctl+0x180/0x180 [ 1945.862075] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1945.863250] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1945.864294] ? do_vfs_ioctl+0x283/0x10d0 [ 1945.865112] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1945.866168] ? generic_block_fiemap+0x60/0x60 [ 1945.867083] sock_ioctl+0x3ea/0x700 [ 1945.867825] ? dlci_ioctl_set+0x30/0x30 [ 1945.868636] ? selinux_file_ioctl+0xb6/0x270 [ 1945.869533] ? dlci_ioctl_set+0x30/0x30 [ 1945.870340] __x64_sys_ioctl+0x19a/0x210 [ 1945.871167] do_syscall_64+0x33/0x40 [ 1945.871949] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1945.872991] RIP: 0033:0x7f07a4a4eb19 [ 1945.873769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1945.877531] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1945.879081] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1945.880542] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1945.882003] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1945.883457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1945.884895] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:29:53 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 59) 02:29:53 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 25) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:53 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 23) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:53 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0xff3e000300000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1960.322298] audit: type=1326 audit(1693276193.314:128): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11534 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:29:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000f000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:53 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:29:53 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8911, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:29:53 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5411, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 1960.356892] device veth0_vlan entered promiscuous mode [ 1960.358591] FAULT_INJECTION: forcing a failure. [ 1960.358591] name failslab, interval 1, probability 0, space 0, times 0 [ 1960.360010] CPU: 0 PID: 11538 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1960.360763] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1960.361653] Call Trace: [ 1960.361944] dump_stack+0x107/0x167 [ 1960.362336] should_fail.cold+0x5/0xa [ 1960.362741] ? fib6_info_alloc+0x3c/0x110 02:29:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000003060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1960.363183] should_failslab+0x5/0x20 [ 1960.363723] __kmalloc+0x72/0x390 [ 1960.364098] fib6_info_alloc+0x3c/0x110 [ 1960.364533] ip6_route_info_create+0x37a/0x1a00 [ 1960.365028] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1960.365596] ? fib6_nh_init+0x19e0/0x19e0 [ 1960.366052] ? lock_chain_count+0x20/0x20 [ 1960.366500] ? perf_trace_lock+0xac/0x490 [ 1960.366968] ip6_route_add+0x24/0x150 [ 1960.367399] addrconf_add_mroute+0x120/0x180 [ 1960.367875] ? ipv6_generate_eui64+0xa40/0xa40 [ 1960.368376] ? find_held_lock+0x2c/0x110 [ 1960.368841] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1960.369414] ? __local_bh_enable_ip+0x9d/0x100 [ 1960.369915] ? trace_hardirqs_on+0x5b/0x180 [ 1960.370373] ? ipv6_find_idev+0x174/0x220 [ 1960.370816] ? __local_bh_enable_ip+0x9d/0x100 [ 1960.371328] addrconf_add_dev+0x16a/0x1e0 [ 1960.371792] addrconf_dev_config+0x1f2/0x440 [ 1960.372277] addrconf_notify+0xc95/0x2410 [ 1960.372745] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1960.373353] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1960.373934] ? inet6_ifinfo_notify+0x150/0x150 [ 1960.374448] ? failover_register+0x530/0x530 [ 1960.374941] ? failover_register+0x530/0x530 [ 1960.375427] raw_notifier_call_chain+0xb3/0x110 [ 1960.375986] call_netdevice_notifiers_info+0xb5/0x130 [ 1960.376588] __dev_notify_flags+0x110/0x2c0 [ 1960.377103] ? dev_change_name+0x660/0x660 [ 1960.377597] ? __dev_change_flags+0x4cf/0x6e0 [ 1960.378089] ? dev_set_allmulti+0x30/0x30 [ 1960.378568] ? cap_capable+0x1d6/0x240 [ 1960.379023] ? full_name_hash+0xb5/0xf0 [ 1960.379491] dev_change_flags+0x100/0x160 [ 1960.379979] devinet_ioctl+0x14de/0x1db0 [ 1960.380466] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1960.380984] inet_ioctl+0x34f/0x390 [ 1960.381404] ? inet_dgram_connect+0x220/0x220 [ 1960.381935] ? __lock_acquire+0xbb1/0x5b00 [ 1960.382434] ? perf_trace_lock+0xac/0x490 [ 1960.382926] packet_ioctl+0xb3/0x260 [ 1960.383363] sock_do_ioctl+0xd3/0x300 [ 1960.383826] ? compat_ifr_data_ioctl+0x180/0x180 [ 1960.384375] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1960.385037] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1960.385645] ? do_vfs_ioctl+0x283/0x10d0 [ 1960.386116] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1960.386728] ? generic_block_fiemap+0x60/0x60 [ 1960.387252] sock_ioctl+0x3ea/0x700 [ 1960.387701] ? dlci_ioctl_set+0x30/0x30 [ 1960.388173] ? selinux_file_ioctl+0xb6/0x270 [ 1960.388691] ? dlci_ioctl_set+0x30/0x30 [ 1960.389153] __x64_sys_ioctl+0x19a/0x210 [ 1960.389630] do_syscall_64+0x33/0x40 [ 1960.390063] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1960.390658] RIP: 0033:0x7f07a4a4eb19 [ 1960.391098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1960.393236] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1960.394113] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1960.394909] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1960.395743] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1960.396557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1960.397362] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1960.406846] device veth0_vlan entered promiscuous mode [ 1960.408086] FAULT_INJECTION: forcing a failure. [ 1960.408086] name failslab, interval 1, probability 0, space 0, times 0 [ 1960.409842] CPU: 0 PID: 11536 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1960.410601] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1960.411561] Call Trace: [ 1960.411860] dump_stack+0x107/0x167 [ 1960.412272] should_fail.cold+0x5/0xa [ 1960.412705] ? create_object.isra.0+0x3a/0xa20 [ 1960.413213] should_failslab+0x5/0x20 [ 1960.413642] kmem_cache_alloc+0x5b/0x310 [ 1960.414097] create_object.isra.0+0x3a/0xa20 [ 1960.414596] kmemleak_alloc_percpu+0xa0/0x100 [ 1960.415105] pcpu_alloc+0x4e2/0x1240 [ 1960.415523] fib_nh_common_init+0x2d/0x160 [ 1960.416024] fib6_nh_init+0xa21/0x19e0 [ 1960.416475] ? icmp6_dst_alloc+0x650/0x650 [ 1960.416967] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 1960.417494] ? gre_gro_complete+0x530/0x530 [ 1960.418012] ? kasan_unpoison_shadow+0x33/0x50 [ 1960.418546] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1960.419128] ip6_route_info_create+0x1185/0x1a00 [ 1960.419686] ? fib6_nh_init+0x19e0/0x19e0 [ 1960.420149] ? lock_chain_count+0x20/0x20 [ 1960.420616] ? perf_trace_lock+0xac/0x490 [ 1960.421085] ip6_route_add+0x24/0x150 [ 1960.421516] addrconf_add_mroute+0x120/0x180 [ 1960.422011] ? ipv6_generate_eui64+0xa40/0xa40 [ 1960.422526] ? find_held_lock+0x2c/0x110 [ 1960.422993] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1960.423613] ? __local_bh_enable_ip+0x9d/0x100 [ 1960.423705] FAULT_INJECTION: forcing a failure. [ 1960.423705] name failslab, interval 1, probability 0, space 0, times 0 [ 1960.424126] ? trace_hardirqs_on+0x5b/0x180 [ 1960.424137] ? ipv6_find_idev+0x174/0x220 [ 1960.424146] ? __local_bh_enable_ip+0x9d/0x100 [ 1960.424164] addrconf_add_dev+0x16a/0x1e0 [ 1960.428557] addrconf_dev_config+0x1f2/0x440 [ 1960.429066] addrconf_notify+0xc95/0x2410 [ 1960.429547] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1960.430141] ? inet6_ifinfo_notify+0x150/0x150 [ 1960.430664] ? failover_register+0x530/0x530 [ 1960.431173] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1960.431830] ? ipmr_device_event+0x18b/0x1f0 [ 1960.432342] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1960.432947] raw_notifier_call_chain+0xb3/0x110 [ 1960.433489] call_netdevice_notifiers_info+0xb5/0x130 [ 1960.434087] __dev_notify_flags+0x110/0x2c0 [ 1960.434584] ? dev_change_name+0x660/0x660 [ 1960.435088] dev_change_flags+0x100/0x160 [ 1960.435590] devinet_ioctl+0x14de/0x1db0 [ 1960.436068] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1960.436589] inet_ioctl+0x34f/0x390 [ 1960.437008] ? inet_dgram_connect+0x220/0x220 [ 1960.437532] ? __lock_acquire+0xbb1/0x5b00 [ 1960.438023] ? perf_trace_lock+0xac/0x490 [ 1960.438505] packet_ioctl+0xb3/0x260 [ 1960.438940] sock_do_ioctl+0xd3/0x300 [ 1960.439386] ? compat_ifr_data_ioctl+0x180/0x180 [ 1960.439934] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1960.440601] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1960.441195] ? do_vfs_ioctl+0x283/0x10d0 [ 1960.441666] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1960.442273] ? generic_block_fiemap+0x60/0x60 [ 1960.442778] sock_ioctl+0x3ea/0x700 [ 1960.443185] ? dlci_ioctl_set+0x30/0x30 [ 1960.443651] ? selinux_file_ioctl+0xb6/0x270 [ 1960.444146] ? dlci_ioctl_set+0x30/0x30 [ 1960.444593] __x64_sys_ioctl+0x19a/0x210 [ 1960.445045] do_syscall_64+0x33/0x40 [ 1960.445470] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1960.446044] RIP: 0033:0x7feded0d7b19 [ 1960.446460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1960.448529] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1960.449379] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1960.450175] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1960.450972] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1960.451790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1960.452591] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1960.453446] CPU: 1 PID: 11557 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1960.454995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1960.456836] Call Trace: [ 1960.457431] dump_stack+0x107/0x167 [ 1960.458246] should_fail.cold+0x5/0xa [ 1960.459095] ? ptlock_alloc+0x1d/0x70 [ 1960.459979] should_failslab+0x5/0x20 [ 1960.460826] kmem_cache_alloc+0x5b/0x310 [ 1960.461743] ptlock_alloc+0x1d/0x70 [ 1960.462558] pte_alloc_one+0x68/0x1a0 [ 1960.463428] __pte_alloc+0x1d/0x330 [ 1960.464264] copy_page_range+0x1b62/0x3810 [ 1960.465231] ? perf_trace_lock+0xac/0x490 [ 1960.466173] ? lock_chain_count+0x20/0x20 [ 1960.467161] ? up_write+0x191/0x550 [ 1960.467966] ? vm_iomap_memory+0x190/0x190 [ 1960.468821] ? downgrade_write+0x3a0/0x3a0 [ 1960.469687] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1960.470809] ? __vma_link_rb+0x540/0x700 [ 1960.471654] copy_process+0x759b/0x7800 [ 1960.472509] ? __cleanup_sighand+0xb0/0xb0 [ 1960.473366] ? find_held_lock+0x2c/0x110 [ 1960.474199] kernel_clone+0xe7/0x980 [ 1960.474959] ? lock_downgrade+0x6d0/0x6d0 [ 1960.475792] ? find_held_lock+0x2c/0x110 [ 1960.476616] ? create_io_thread+0xf0/0xf0 [ 1960.477444] ? ksys_write+0x12d/0x260 [ 1960.478227] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1960.479196] __do_sys_fork+0x8a/0xc0 [ 1960.479956] ? kernel_thread+0xf0/0xf0 [ 1960.480754] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1960.481818] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1960.482843] ? trace_hardirqs_on+0x5b/0x180 [ 1960.483736] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1960.484759] do_syscall_64+0x33/0x40 [ 1960.485519] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1960.486533] RIP: 0033:0x7fadf412db19 [ 1960.487292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1960.490971] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1960.492541] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1960.494002] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1960.495432] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1960.496852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1960.498255] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:29:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080008004060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:53 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8980, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:29:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000005060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:29:53 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:53 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 26) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:29:53 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:29:53 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8912, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 1960.669145] device veth0_vlan entered promiscuous mode [ 1960.671896] FAULT_INJECTION: forcing a failure. [ 1960.671896] name failslab, interval 1, probability 0, space 0, times 0 [ 1960.673677] CPU: 0 PID: 11577 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1960.674402] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1960.675270] Call Trace: [ 1960.675579] dump_stack+0x107/0x167 [ 1960.675970] should_fail.cold+0x5/0xa [ 1960.676388] ? create_object.isra.0+0x3a/0xa20 [ 1960.676874] should_failslab+0x5/0x20 [ 1960.677280] kmem_cache_alloc+0x5b/0x310 [ 1960.677709] create_object.isra.0+0x3a/0xa20 [ 1960.678182] kmemleak_alloc_percpu+0xa0/0x100 [ 1960.678670] pcpu_alloc+0x4e2/0x1240 [ 1960.679089] fib6_nh_init+0xa51/0x19e0 [ 1960.679520] ? mark_held_locks+0x9e/0xe0 [ 1960.679972] ? icmp6_dst_alloc+0x650/0x650 [ 1960.680444] ? trace_hardirqs_on+0x5b/0x180 [ 1960.680920] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 1960.681418] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1960.682014] ? gre_gro_complete+0x530/0x530 [ 1960.682502] ip6_route_info_create+0x1185/0x1a00 [ 1960.683021] ? fib6_nh_init+0x19e0/0x19e0 [ 1960.683491] ? lock_chain_count+0x20/0x20 [ 1960.683944] ? perf_trace_lock+0xac/0x490 [ 1960.684407] ip6_route_add+0x24/0x150 [ 1960.684839] addrconf_add_mroute+0x120/0x180 [ 1960.685331] ? ipv6_generate_eui64+0xa40/0xa40 [ 1960.685834] ? find_held_lock+0x2c/0x110 [ 1960.686303] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1960.686884] ? __local_bh_enable_ip+0x9d/0x100 [ 1960.687391] ? trace_hardirqs_on+0x5b/0x180 [ 1960.687873] ? ipv6_find_idev+0x174/0x220 [ 1960.688327] ? __local_bh_enable_ip+0x9d/0x100 [ 1960.688838] addrconf_add_dev+0x16a/0x1e0 [ 1960.689291] addrconf_dev_config+0x1f2/0x440 [ 1960.689778] addrconf_notify+0xc95/0x2410 [ 1960.690234] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1960.690806] ? inet6_ifinfo_notify+0x150/0x150 [ 1960.691310] ? failover_register+0x530/0x530 [ 1960.691802] ? __sanitizer_cov_trace_const_cmp8+0x4/0x20 [ 1960.692403] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1960.693004] ? ipmr_device_event+0x18b/0x1f0 [ 1960.693484] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1960.694050] raw_notifier_call_chain+0xb3/0x110 [ 1960.694566] call_netdevice_notifiers_info+0xb5/0x130 [ 1960.695136] __dev_notify_flags+0x110/0x2c0 [ 1960.695614] ? dev_change_name+0x660/0x660 [ 1960.696075] ? __dev_change_flags+0x4cf/0x6e0 [ 1960.696567] ? dev_set_allmulti+0x30/0x30 [ 1960.697027] dev_change_flags+0x100/0x160 [ 1960.697487] devinet_ioctl+0x14de/0x1db0 [ 1960.697936] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1960.698414] inet_ioctl+0x34f/0x390 [ 1960.698812] ? inet_dgram_connect+0x220/0x220 [ 1960.699317] ? __lock_acquire+0xbb1/0x5b00 [ 1960.699811] ? perf_trace_lock+0xac/0x490 [ 1960.700276] packet_ioctl+0xb3/0x260 [ 1960.700688] sock_do_ioctl+0xd3/0x300 [ 1960.701109] ? compat_ifr_data_ioctl+0x180/0x180 [ 1960.701642] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1960.702280] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1960.702852] ? do_vfs_ioctl+0x283/0x10d0 [ 1960.703305] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1960.703889] ? generic_block_fiemap+0x60/0x60 [ 1960.704387] sock_ioctl+0x3ea/0x700 [ 1960.704789] ? dlci_ioctl_set+0x30/0x30 [ 1960.705219] ? selinux_file_ioctl+0xb6/0x270 [ 1960.705703] ? dlci_ioctl_set+0x30/0x30 [ 1960.706138] __x64_sys_ioctl+0x19a/0x210 [ 1960.706593] do_syscall_64+0x33/0x40 [ 1960.707009] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1960.707570] RIP: 0033:0x7feded0d7b19 [ 1960.707982] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1960.710000] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1960.710837] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1960.711626] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1960.712405] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1960.713195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1960.713979] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 1960.796853] FAULT_INJECTION: forcing a failure. [ 1960.796853] name failslab, interval 1, probability 0, space 0, times 0 [ 1960.799181] CPU: 0 PID: 11580 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1960.799927] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1960.800803] Call Trace: [ 1960.801108] dump_stack+0x107/0x167 [ 1960.801498] should_fail.cold+0x5/0xa [ 1960.801911] ? kvmalloc_node+0x119/0x170 [ 1960.802345] should_failslab+0x5/0x20 [ 1960.802755] __kmalloc_node+0x76/0x420 [ 1960.803166] ? lockdep_init_map_type+0x2c7/0x780 [ 1960.803688] kvmalloc_node+0x119/0x170 [ 1960.804103] pfifo_fast_init+0xea/0x3d0 [ 1960.804533] ? __netdev_watchdog_up+0x190/0x190 [ 1960.805028] qdisc_create_dflt+0x103/0x370 [ 1960.805483] dev_activate+0x7c3/0xd70 [ 1960.805914] __dev_open+0x38a/0x4e0 [ 1960.806317] ? dev_set_rx_mode+0x80/0x80 [ 1960.806762] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1960.807335] ? __local_bh_enable_ip+0x9d/0x100 [ 1960.807850] __dev_change_flags+0x521/0x6e0 [ 1960.808327] ? dev_set_allmulti+0x30/0x30 [ 1960.808793] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1960.809391] dev_change_flags+0x8a/0x160 [ 1960.809845] devinet_ioctl+0x14de/0x1db0 [ 1960.810302] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1960.810796] inet_ioctl+0x34f/0x390 [ 1960.811204] ? inet_dgram_connect+0x220/0x220 [ 1960.811728] ? __lock_acquire+0xbb1/0x5b00 [ 1960.812204] ? perf_trace_lock+0xac/0x490 [ 1960.812671] packet_ioctl+0xb3/0x260 [ 1960.813084] sock_do_ioctl+0xd3/0x300 [ 1960.813503] ? compat_ifr_data_ioctl+0x180/0x180 [ 1960.814033] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1960.814666] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1960.815215] ? do_vfs_ioctl+0x283/0x10d0 [ 1960.815678] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1960.816256] ? generic_block_fiemap+0x60/0x60 [ 1960.816760] sock_ioctl+0x3ea/0x700 [ 1960.817169] ? dlci_ioctl_set+0x30/0x30 [ 1960.817615] ? selinux_file_ioctl+0xb6/0x270 [ 1960.818105] ? dlci_ioctl_set+0x30/0x30 [ 1960.818546] __x64_sys_ioctl+0x19a/0x210 [ 1960.819003] do_syscall_64+0x33/0x40 [ 1960.819417] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1960.819990] RIP: 0033:0x7f07a4a4eb19 [ 1960.820408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1960.822457] RSP: 002b:00007f07a1fa3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1960.823309] RAX: ffffffffffffffda RBX: 00007f07a4b62020 RCX: 00007f07a4a4eb19 [ 1960.824124] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1960.824905] RBP: 00007f07a1fa31d0 R08: 0000000000000000 R09: 0000000000000000 [ 1960.825689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1960.826495] R13: 00007ffca8d8bf7f R14: 00007f07a1fa3300 R15: 0000000000022000 [ 1960.828193] veth0_vlan: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1960.835016] device veth0_vlan entered promiscuous mode 02:30:08 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 25) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:08 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 60) 02:30:08 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:30:08 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x541b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000006060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:08 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 27) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:08 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8981, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:30:08 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8915, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 1975.234092] audit: type=1326 audit(1693276208.226:129): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11597 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:30:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000007060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1975.260217] device veth0_vlan entered promiscuous mode 02:30:08 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8916, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 1975.271647] FAULT_INJECTION: forcing a failure. [ 1975.271647] name failslab, interval 1, probability 0, space 0, times 0 [ 1975.274959] CPU: 1 PID: 11592 Comm: syz-executor.3 Not tainted 5.10.192 #1 02:30:08 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8982, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 1975.276357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1975.278144] Call Trace: [ 1975.278685] dump_stack+0x107/0x167 [ 1975.279426] should_fail.cold+0x5/0xa [ 1975.280270] ? create_object.isra.0+0x3a/0xa20 [ 1975.281190] should_failslab+0x5/0x20 [ 1975.281956] kmem_cache_alloc+0x5b/0x310 [ 1975.282778] create_object.isra.0+0x3a/0xa20 [ 1975.283681] kmemleak_alloc_percpu+0xa0/0x100 [ 1975.284588] pcpu_alloc+0x4e2/0x1240 [ 1975.285356] fib_nh_common_init+0x2d/0x160 [ 1975.286209] fib6_nh_init+0xa21/0x19e0 [ 1975.287019] ? icmp6_dst_alloc+0x650/0x650 [ 1975.287878] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 1975.288812] ? gre_gro_complete+0x530/0x530 [ 1975.289699] ? kasan_unpoison_shadow+0x33/0x50 [ 1975.290619] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1975.291676] ip6_route_info_create+0x1185/0x1a00 [ 1975.292643] ? fib6_nh_init+0x19e0/0x19e0 [ 1975.293492] ? lock_chain_count+0x20/0x20 [ 1975.294331] ? perf_trace_lock+0xac/0x490 [ 1975.295190] ip6_route_add+0x24/0x150 [ 1975.295970] addrconf_add_mroute+0x120/0x180 [ 1975.296861] ? ipv6_generate_eui64+0xa40/0xa40 [ 1975.297785] ? find_held_lock+0x2c/0x110 [ 1975.298624] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1975.299709] ? __local_bh_enable_ip+0x9d/0x100 [ 1975.300635] ? trace_hardirqs_on+0x5b/0x180 [ 1975.301523] ? ipv6_find_idev+0x174/0x220 [ 1975.302361] ? __local_bh_enable_ip+0x9d/0x100 [ 1975.303289] addrconf_add_dev+0x16a/0x1e0 [ 1975.304138] addrconf_dev_config+0x1f2/0x440 [ 1975.305043] addrconf_notify+0xc95/0x2410 [ 1975.305894] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1975.306946] ? inet6_ifinfo_notify+0x150/0x150 [ 1975.307879] ? failover_register+0x530/0x530 [ 1975.308771] ? rt_cache_flush+0x1/0x30 [ 1975.309569] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1975.310685] ? ipmr_device_event+0x18b/0x1f0 [ 1975.311596] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1975.312645] raw_notifier_call_chain+0xb3/0x110 [ 1975.313595] call_netdevice_notifiers_info+0xb5/0x130 [ 1975.314645] __dev_notify_flags+0x110/0x2c0 [ 1975.315531] ? dev_change_name+0x660/0x660 02:30:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000018060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1975.316398] ? __dev_change_flags+0x4cf/0x6e0 [ 1975.317415] ? dev_set_allmulti+0x30/0x30 [ 1975.318252] ? cap_capable+0x1d6/0x240 [ 1975.319039] ? full_name_hash+0xb5/0xf0 [ 1975.319861] dev_change_flags+0x100/0x160 [ 1975.320705] devinet_ioctl+0x14de/0x1db0 [ 1975.321540] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1975.322441] inet_ioctl+0x34f/0x390 [ 1975.323180] ? inet_dgram_connect+0x220/0x220 [ 1975.324110] ? __lock_acquire+0xbb1/0x5b00 [ 1975.324986] ? perf_trace_lock+0xac/0x490 [ 1975.325830] packet_ioctl+0xb3/0x260 [ 1975.326590] sock_do_ioctl+0xd3/0x300 [ 1975.327361] ? compat_ifr_data_ioctl+0x180/0x180 [ 1975.328339] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1975.329507] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1975.330553] ? do_vfs_ioctl+0x283/0x10d0 [ 1975.331393] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1975.332458] ? generic_block_fiemap+0x60/0x60 [ 1975.333371] sock_ioctl+0x3ea/0x700 [ 1975.334111] ? dlci_ioctl_set+0x30/0x30 02:30:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000001c060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1975.334930] ? selinux_file_ioctl+0xb6/0x270 [ 1975.335935] ? dlci_ioctl_set+0x30/0x30 [ 1975.336746] __x64_sys_ioctl+0x19a/0x210 [ 1975.337583] do_syscall_64+0x33/0x40 [ 1975.338341] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1975.339394] RIP: 0033:0x7f07a4a4eb19 [ 1975.340175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1975.343903] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1975.345445] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1975.346897] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1975.348358] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1975.349797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1975.351241] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 1975.356894] device veth0_vlan entered promiscuous mode [ 1975.358226] FAULT_INJECTION: forcing a failure. [ 1975.358226] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1975.358827] FAULT_INJECTION: forcing a failure. [ 1975.358827] name failslab, interval 1, probability 0, space 0, times 0 [ 1975.360726] CPU: 1 PID: 11625 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1975.360738] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1975.360744] Call Trace: [ 1975.360767] dump_stack+0x107/0x167 [ 1975.360792] should_fail.cold+0x5/0xa [ 1975.360822] __alloc_pages_nodemask+0x182/0x600 [ 1975.360840] ? __lockdep_reset_lock+0x180/0x180 [ 1975.360869] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1975.360905] ? copy_page_range+0x28e1/0x3810 [ 1975.360931] alloc_pages_current+0x187/0x280 [ 1975.360956] get_zeroed_page+0x14/0xb0 [ 1975.360975] __pud_alloc+0x33/0x270 [ 1975.360999] copy_page_range+0x2ca1/0x3810 [ 1975.361018] ? perf_trace_lock+0xac/0x490 [ 1975.361036] ? lock_chain_count+0x20/0x20 [ 1975.361079] ? lock_downgrade+0x6d0/0x6d0 [ 1975.377179] ? up_write+0x191/0x550 [ 1975.377933] ? vm_iomap_memory+0x190/0x190 [ 1975.378809] ? downgrade_write+0x3a0/0x3a0 [ 1975.379689] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1975.380804] ? __vma_link_rb+0x540/0x700 [ 1975.381651] copy_process+0x759b/0x7800 [ 1975.382505] ? __cleanup_sighand+0xb0/0xb0 [ 1975.383393] ? find_held_lock+0x2c/0x110 [ 1975.384248] kernel_clone+0xe7/0x980 [ 1975.385019] ? lock_downgrade+0x6d0/0x6d0 [ 1975.385877] ? find_held_lock+0x2c/0x110 [ 1975.386707] ? create_io_thread+0xf0/0xf0 [ 1975.387562] ? ksys_write+0x12d/0x260 [ 1975.388356] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1975.389363] __do_sys_fork+0x8a/0xc0 [ 1975.390163] ? kernel_thread+0xf0/0xf0 [ 1975.390981] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1975.392060] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1975.393127] ? trace_hardirqs_on+0x5b/0x180 [ 1975.394020] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1975.395070] do_syscall_64+0x33/0x40 [ 1975.395844] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1975.396899] RIP: 0033:0x7fadf412db19 [ 1975.397659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1975.401415] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1975.402978] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1975.404463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1975.405928] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1975.407391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1975.408859] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 1975.410345] CPU: 0 PID: 11608 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1975.411088] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1975.411996] Call Trace: [ 1975.412305] dump_stack+0x107/0x167 [ 1975.412703] should_fail.cold+0x5/0xa [ 1975.413133] ? create_object.isra.0+0x3a/0xa20 [ 1975.413653] should_failslab+0x5/0x20 [ 1975.414069] kmem_cache_alloc+0x5b/0x310 [ 1975.414513] ? mark_held_locks+0x9e/0xe0 [ 1975.414946] create_object.isra.0+0x3a/0xa20 [ 1975.415438] kmemleak_alloc_percpu+0xa0/0x100 [ 1975.415939] pcpu_alloc+0x4e2/0x1240 [ 1975.416366] fib6_nh_init+0xa51/0x19e0 [ 1975.416797] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1975.417407] ? icmp6_dst_alloc+0x650/0x650 [ 1975.417876] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 1975.418381] ? gre_gro_complete+0x530/0x530 [ 1975.418860] ? kasan_unpoison_shadow+0x33/0x50 [ 1975.419351] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1975.419933] ip6_route_info_create+0x1185/0x1a00 [ 1975.420470] ? fib6_nh_init+0x19e0/0x19e0 [ 1975.420929] ? lock_chain_count+0x20/0x20 [ 1975.421387] ? perf_trace_lock+0xac/0x490 [ 1975.421853] ip6_route_add+0x24/0x150 [ 1975.422281] addrconf_add_mroute+0x120/0x180 [ 1975.422768] ? ipv6_generate_eui64+0xa40/0xa40 [ 1975.423292] ? addrconf_add_dev+0x9a/0x1e0 [ 1975.423781] ? kcov_remote_stop+0x310/0x310 [ 1975.424259] addrconf_add_dev+0x16a/0x1e0 [ 1975.424715] addrconf_dev_config+0x1f2/0x440 [ 1975.425199] addrconf_notify+0xc95/0x2410 [ 1975.425659] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1975.426232] ? inet6_ifinfo_notify+0x150/0x150 [ 1975.426740] ? failover_register+0x530/0x530 [ 1975.427233] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1975.427845] ? ipmr_device_event+0x18b/0x1f0 [ 1975.428326] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1975.428911] raw_notifier_call_chain+0xb3/0x110 [ 1975.429441] call_netdevice_notifiers_info+0xb5/0x130 [ 1975.430011] __dev_notify_flags+0x110/0x2c0 [ 1975.430491] ? dev_change_name+0x660/0x660 [ 1975.430958] ? __dev_change_flags+0x4cf/0x6e0 [ 1975.431457] ? dev_set_allmulti+0x30/0x30 [ 1975.431941] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1975.432541] dev_change_flags+0x100/0x160 [ 1975.433011] devinet_ioctl+0x14de/0x1db0 [ 1975.433471] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1975.433961] inet_ioctl+0x34f/0x390 [ 1975.434369] ? inet_dgram_connect+0x220/0x220 [ 1975.434878] ? __lock_acquire+0xbb1/0x5b00 [ 1975.435358] ? perf_trace_lock+0xac/0x490 [ 1975.435838] packet_ioctl+0xb3/0x260 [ 1975.436253] sock_do_ioctl+0xd3/0x300 [ 1975.436680] ? compat_ifr_data_ioctl+0x180/0x180 [ 1975.437206] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1975.437812] ? sock_ioctl+0x115/0x700 [ 1975.438231] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 1975.438801] sock_ioctl+0x3ea/0x700 [ 1975.439202] ? dlci_ioctl_set+0x30/0x30 [ 1975.439651] ? selinux_file_ioctl+0xb6/0x270 [ 1975.440144] ? dlci_ioctl_set+0x30/0x30 [ 1975.440594] __x64_sys_ioctl+0x19a/0x210 [ 1975.441056] do_syscall_64+0x33/0x40 [ 1975.441474] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1975.442016] RIP: 0033:0x7feded0d7b19 [ 1975.442425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1975.444464] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1975.445310] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1975.446099] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1975.446882] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1975.447682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1975.448482] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:30:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000020060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:08 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8983, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:30:08 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:30:26 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 61) 02:30:26 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x89a0, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:30:26 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8917, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:30:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000003f060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:26 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 26) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:26 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 28) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:26 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5421, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:26 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 1993.411559] audit: type=1326 audit(1693276226.403:130): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11645 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:30:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000067060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1993.493064] device veth0_vlan entered promiscuous mode [ 1993.503834] FAULT_INJECTION: forcing a failure. [ 1993.503834] name failslab, interval 1, probability 0, space 0, times 0 [ 1993.506126] CPU: 0 PID: 11667 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 1993.507534] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1993.509260] Call Trace: [ 1993.509803] dump_stack+0x107/0x167 [ 1993.510558] should_fail.cold+0x5/0xa [ 1993.511339] ? vm_area_dup+0x78/0x290 [ 1993.512136] should_failslab+0x5/0x20 [ 1993.512911] kmem_cache_alloc+0x5b/0x310 [ 1993.513742] ? lock_downgrade+0x6d0/0x6d0 [ 1993.514593] vm_area_dup+0x78/0x290 [ 1993.515348] ? _cond_resched+0x12/0x80 [ 1993.516147] ? copy_page_range+0x24e9/0x3810 [ 1993.517095] ? vm_area_alloc+0x110/0x110 [ 1993.517951] ? up_write+0x191/0x550 [ 1993.518693] ? vm_iomap_memory+0x190/0x190 [ 1993.519553] ? downgrade_write+0x3a0/0x3a0 [ 1993.520425] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1993.521529] ? __vma_link_rb+0x540/0x700 [ 1993.522352] copy_process+0x291b/0x7800 [ 1993.523199] ? __cleanup_sighand+0xb0/0xb0 [ 1993.524092] ? find_held_lock+0x2c/0x110 [ 1993.524929] kernel_clone+0xe7/0x980 [ 1993.525691] ? lock_downgrade+0x6d0/0x6d0 [ 1993.526532] ? find_held_lock+0x2c/0x110 02:30:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000480060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1993.527358] ? create_io_thread+0xf0/0xf0 [ 1993.528330] ? ksys_write+0x12d/0x260 [ 1993.529120] ? __mutex_unlock_slowpath+0xe1/0x600 [ 1993.530115] __do_sys_fork+0x8a/0xc0 [ 1993.530873] ? kernel_thread+0xf0/0xf0 [ 1993.531688] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1993.532765] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1993.533809] ? trace_hardirqs_on+0x5b/0x180 [ 1993.534687] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1993.535737] do_syscall_64+0x33/0x40 [ 1993.536499] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1993.537544] RIP: 0033:0x7fadf412db19 [ 1993.538303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1993.542047] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 1993.543595] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 1993.545085] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1993.546513] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 1993.547956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1993.549381] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 1993.558024] FAULT_INJECTION: forcing a failure. [ 1993.558024] name failslab, interval 1, probability 0, space 0, times 0 [ 1993.560206] CPU: 1 PID: 11660 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 1993.561415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1993.562858] Call Trace: [ 1993.563330] dump_stack+0x107/0x167 [ 1993.564001] should_fail.cold+0x5/0xa [ 1993.564687] ? create_object.isra.0+0x3a/0xa20 [ 1993.565492] should_failslab+0x5/0x20 [ 1993.566162] kmem_cache_alloc+0x5b/0x310 [ 1993.566874] ? mark_held_locks+0x9e/0xe0 [ 1993.567583] create_object.isra.0+0x3a/0xa20 [ 1993.568366] kmemleak_alloc_percpu+0xa0/0x100 [ 1993.569153] pcpu_alloc+0x4e2/0x1240 [ 1993.569824] fib6_nh_init+0xa51/0x19e0 [ 1993.570514] ? icmp6_dst_alloc+0x650/0x650 [ 1993.571286] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 1993.572106] ? gre_gro_complete+0x530/0x530 [ 1993.572920] ? kasan_unpoison_shadow+0x33/0x50 [ 1993.573709] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1993.574645] ip6_route_info_create+0x1185/0x1a00 [ 1993.575469] ? fib6_nh_init+0x19e0/0x19e0 [ 1993.576220] ? lock_chain_count+0x20/0x20 [ 1993.576933] ? perf_trace_lock+0xac/0x490 [ 1993.577685] ip6_route_add+0x24/0x150 [ 1993.578342] addrconf_add_mroute+0x120/0x180 [ 1993.579124] ? ipv6_generate_eui64+0xa40/0xa40 [ 1993.579917] ? find_held_lock+0x2c/0x110 [ 1993.580701] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1993.581596] ? __local_bh_enable_ip+0x9d/0x100 [ 1993.582384] ? trace_hardirqs_on+0x5b/0x180 [ 1993.583125] ? ipv6_find_idev+0x174/0x220 [ 1993.583859] ? __local_bh_enable_ip+0x9d/0x100 [ 1993.584659] addrconf_add_dev+0x16a/0x1e0 [ 1993.585365] addrconf_dev_config+0x1f2/0x440 [ 1993.586137] addrconf_notify+0xc95/0x2410 [ 1993.586863] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1993.587783] ? inet6_ifinfo_notify+0x150/0x150 [ 1993.588577] ? failover_register+0x530/0x530 [ 1993.589355] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1993.590297] ? ipmr_device_event+0x18b/0x1f0 [ 1993.591041] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1993.591964] raw_notifier_call_chain+0xb3/0x110 [ 1993.592776] call_netdevice_notifiers_info+0xb5/0x130 [ 1993.593666] __dev_notify_flags+0x110/0x2c0 [ 1993.594410] ? dev_change_name+0x660/0x660 [ 1993.595129] ? __dev_change_flags+0x4cf/0x6e0 [ 1993.595897] ? dev_set_allmulti+0x30/0x30 [ 1993.596614] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1993.597538] dev_change_flags+0x100/0x160 [ 1993.598265] devinet_ioctl+0x14de/0x1db0 [ 1993.598964] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1993.599750] inet_ioctl+0x34f/0x390 [ 1993.600390] ? inet_dgram_connect+0x220/0x220 [ 1993.601172] ? __lock_acquire+0xbb1/0x5b00 [ 1993.601915] ? perf_trace_lock+0xac/0x490 [ 1993.602630] packet_ioctl+0xb3/0x260 [ 1993.603272] sock_do_ioctl+0xd3/0x300 [ 1993.603940] ? compat_ifr_data_ioctl+0x180/0x180 [ 1993.604746] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1993.605716] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1993.606620] ? do_vfs_ioctl+0x283/0x10d0 [ 1993.607319] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1993.608232] ? generic_block_fiemap+0x60/0x60 [ 1993.608996] sock_ioctl+0x3ea/0x700 [ 1993.609614] ? dlci_ioctl_set+0x30/0x30 [ 1993.610293] ? selinux_file_ioctl+0xb6/0x270 [ 1993.611042] ? dlci_ioctl_set+0x30/0x30 [ 1993.611721] __x64_sys_ioctl+0x19a/0x210 [ 1993.612426] do_syscall_64+0x33/0x40 [ 1993.613068] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1993.613960] RIP: 0033:0x7feded0d7b19 [ 1993.614600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1993.617718] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1993.619013] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 1993.620242] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1993.621448] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1993.622649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1993.623867] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:30:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000fdef060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:26 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x89a1, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:30:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="20000000800000f0060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:26 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:30:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000effd060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 1993.767052] device veth0_vlan entered promiscuous mode [ 1993.782456] FAULT_INJECTION: forcing a failure. [ 1993.782456] name failslab, interval 1, probability 0, space 0, times 0 [ 1993.785373] CPU: 0 PID: 11659 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 1993.786762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1993.788434] Call Trace: [ 1993.788970] dump_stack+0x107/0x167 [ 1993.789709] should_fail.cold+0x5/0xa [ 1993.790478] ? create_object.isra.0+0x3a/0xa20 [ 1993.791398] should_failslab+0x5/0x20 [ 1993.792193] kmem_cache_alloc+0x5b/0x310 [ 1993.793025] ? trace_hardirqs_on+0x5b/0x180 [ 1993.793909] create_object.isra.0+0x3a/0xa20 [ 1993.794820] kmemleak_alloc_percpu+0xa0/0x100 [ 1993.795743] pcpu_alloc+0x4e2/0x1240 [ 1993.796536] fib6_nh_init+0xa51/0x19e0 [ 1993.797341] ? icmp6_dst_alloc+0x650/0x650 [ 1993.798216] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 1993.799158] ? gre_gro_complete+0x530/0x530 [ 1993.800060] ? kasan_unpoison_shadow+0x33/0x50 [ 1993.801002] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1993.802050] ip6_route_info_create+0x1185/0x1a00 [ 1993.803030] ? fib6_nh_init+0x19e0/0x19e0 [ 1993.803886] ? lock_chain_count+0x20/0x20 [ 1993.804734] ? perf_trace_lock+0xac/0x490 [ 1993.805587] ip6_route_add+0x24/0x150 [ 1993.806367] addrconf_add_mroute+0x120/0x180 [ 1993.807268] ? ipv6_generate_eui64+0xa40/0xa40 [ 1993.808201] ? find_held_lock+0x2c/0x110 [ 1993.809056] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1993.810125] ? __local_bh_enable_ip+0x9d/0x100 [ 1993.811047] ? trace_hardirqs_on+0x5b/0x180 [ 1993.811935] ? ipv6_find_idev+0x174/0x220 [ 1993.812772] ? __local_bh_enable_ip+0x9d/0x100 [ 1993.813709] addrconf_add_dev+0x16a/0x1e0 [ 1993.814555] addrconf_dev_config+0x1f2/0x440 [ 1993.815450] addrconf_notify+0xc95/0x2410 [ 1993.816319] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1993.817386] ? inet6_ifinfo_notify+0x150/0x150 [ 1993.818322] ? failover_register+0x530/0x530 [ 1993.819221] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 1993.820340] ? ipmr_device_event+0x18b/0x1f0 [ 1993.821241] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1993.822305] raw_notifier_call_chain+0xb3/0x110 [ 1993.823265] call_netdevice_notifiers_info+0xb5/0x130 [ 1993.824331] __dev_notify_flags+0x110/0x2c0 [ 1993.825218] ? dev_change_name+0x660/0x660 [ 1993.826079] ? __dev_change_flags+0x4cf/0x6e0 [ 1993.826992] ? dev_set_allmulti+0x30/0x30 [ 1993.827861] ? netdev_name_node_lookup+0xd5/0x150 [ 1993.828857] dev_change_flags+0x100/0x160 [ 1993.829728] devinet_ioctl+0x14de/0x1db0 [ 1993.830586] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 1993.831493] inet_ioctl+0x34f/0x390 [ 1993.832251] ? inet_dgram_connect+0x220/0x220 [ 1993.833202] ? __lock_acquire+0xbb1/0x5b00 [ 1993.834079] ? perf_trace_lock+0xac/0x490 [ 1993.834930] packet_ioctl+0xb3/0x260 [ 1993.835687] sock_do_ioctl+0xd3/0x300 [ 1993.836480] ? compat_ifr_data_ioctl+0x180/0x180 [ 1993.837447] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1993.838608] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1993.839656] ? do_vfs_ioctl+0x283/0x10d0 [ 1993.840483] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1993.841549] ? generic_block_fiemap+0x60/0x60 [ 1993.842468] sock_ioctl+0x3ea/0x700 [ 1993.843208] ? dlci_ioctl_set+0x30/0x30 [ 1993.844029] ? selinux_file_ioctl+0xb6/0x270 [ 1993.844929] ? dlci_ioctl_set+0x30/0x30 [ 1993.845762] __x64_sys_ioctl+0x19a/0x210 [ 1993.846599] do_syscall_64+0x33/0x40 [ 1993.847352] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1993.848399] RIP: 0033:0x7f07a4a4eb19 [ 1993.849148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1993.852923] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1993.854451] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 1993.855886] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 1993.857313] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 1993.858741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1993.860183] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:30:41 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 62) 02:30:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000002060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:41 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 27) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:41 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5450, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:41 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x40049409, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:30:41 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:30:41 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 29) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:41 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8918, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2008.045497] device veth0_vlan entered promiscuous mode [ 2008.048930] FAULT_INJECTION: forcing a failure. [ 2008.048930] name failslab, interval 1, probability 0, space 0, times 0 [ 2008.050862] CPU: 1 PID: 11703 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2008.051629] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2008.052562] Call Trace: [ 2008.052868] dump_stack+0x107/0x167 [ 2008.053261] should_fail.cold+0x5/0xa [ 2008.053654] ? create_object.isra.0+0x3a/0xa20 [ 2008.054121] should_failslab+0x5/0x20 [ 2008.054517] kmem_cache_alloc+0x5b/0x310 [ 2008.054940] ? mark_held_locks+0x9e/0xe0 [ 2008.055358] create_object.isra.0+0x3a/0xa20 [ 2008.055823] kmemleak_alloc_percpu+0xa0/0x100 [ 2008.056328] pcpu_alloc+0x4e2/0x1240 [ 2008.056723] fib6_nh_init+0xa51/0x19e0 [ 2008.057126] ? icmp6_dst_alloc+0x650/0x650 [ 2008.057564] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2008.058027] ? gre_gro_complete+0x530/0x530 [ 2008.058480] ip6_route_info_create+0x1185/0x1a00 [ 2008.058964] ? fib6_nh_init+0x19e0/0x19e0 [ 2008.059386] ? lock_chain_count+0x20/0x20 [ 2008.059841] ? perf_trace_lock+0xac/0x490 [ 2008.060276] ip6_route_add+0x24/0x150 [ 2008.060699] addrconf_add_mroute+0x120/0x180 [ 2008.061154] ? ipv6_generate_eui64+0xa40/0xa40 [ 2008.061643] ? __local_bh_enable_ip+0x9d/0x100 [ 2008.062125] ? __local_bh_enable_ip+0x9f/0x100 [ 2008.062626] addrconf_add_dev+0x16a/0x1e0 [ 2008.063070] addrconf_dev_config+0x1f2/0x440 [ 2008.063543] addrconf_notify+0xc95/0x2410 [ 2008.063999] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2008.064553] ? inet6_ifinfo_notify+0x150/0x150 [ 2008.065035] ? failover_register+0x530/0x530 [ 2008.065507] ? __sanitizer_cov_trace_switch+0xe/0x80 [ 2008.066054] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2008.066637] ? ipmr_device_event+0x18b/0x1f0 [ 2008.067105] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2008.067658] raw_notifier_call_chain+0xb3/0x110 [ 2008.068170] call_netdevice_notifiers_info+0xb5/0x130 [ 2008.068720] __dev_notify_flags+0x110/0x2c0 [ 2008.069170] ? dev_change_name+0x660/0x660 [ 2008.069616] ? __dev_change_flags+0x4cf/0x6e0 [ 2008.070107] ? dev_set_allmulti+0x30/0x30 [ 2008.070547] ? cap_capable+0x1d6/0x240 [ 2008.070958] ? full_name_hash+0xb5/0xf0 [ 2008.071374] dev_change_flags+0x100/0x160 [ 2008.071816] devinet_ioctl+0x14de/0x1db0 [ 2008.072255] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2008.072731] inet_ioctl+0x34f/0x390 [ 2008.073115] ? inet_dgram_connect+0x220/0x220 [ 2008.073593] ? __lock_acquire+0xbb1/0x5b00 [ 2008.074049] ? perf_trace_lock+0xac/0x490 [ 2008.074487] packet_ioctl+0xb3/0x260 [ 2008.074885] sock_do_ioctl+0xd3/0x300 [ 2008.075286] ? compat_ifr_data_ioctl+0x180/0x180 [ 2008.075793] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2008.076411] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2008.076958] ? do_vfs_ioctl+0x283/0x10d0 [ 2008.077385] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2008.077929] ? generic_block_fiemap+0x60/0x60 [ 2008.078403] sock_ioctl+0x3ea/0x700 [ 2008.078790] ? dlci_ioctl_set+0x30/0x30 [ 2008.079212] ? selinux_file_ioctl+0xb6/0x270 [ 2008.079675] ? dlci_ioctl_set+0x30/0x30 [ 2008.080106] __x64_sys_ioctl+0x19a/0x210 [ 2008.080555] do_syscall_64+0x33/0x40 [ 2008.080953] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2008.081488] RIP: 0033:0x7f07a4a4eb19 [ 2008.081905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2008.083821] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2008.084626] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2008.085370] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2008.086146] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2008.086898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2008.087647] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 2008.098531] audit: type=1326 audit(1693276241.090:131): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11701 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:30:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000003060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:41 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x40086602, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:30:41 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x40087602, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2008.167403] device veth0_vlan entered promiscuous mode [ 2008.176179] FAULT_INJECTION: forcing a failure. [ 2008.176179] name failslab, interval 1, probability 0, space 0, times 0 [ 2008.177447] CPU: 1 PID: 11711 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2008.178154] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2008.178990] Call Trace: [ 2008.179281] dump_stack+0x107/0x167 [ 2008.179668] should_fail.cold+0x5/0xa [ 2008.180585] ? create_object.isra.0+0x3a/0xa20 [ 2008.181804] should_failslab+0x5/0x20 [ 2008.182812] kmem_cache_alloc+0x5b/0x310 [ 2008.183887] ? pcpu_alloc+0x12a/0x1240 [ 2008.184946] create_object.isra.0+0x3a/0xa20 [ 2008.186110] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2008.187462] kmem_cache_alloc_node+0x169/0x330 [ 2008.188708] __alloc_skb+0x6d/0x5b0 [ 2008.189687] inet6_rt_notify+0xed/0x2a0 [ 2008.190636] fib6_add+0x3223/0x45d0 [ 2008.191539] ? fib6_update_sernum_stub+0x80/0x80 [ 2008.192656] ? do_raw_spin_lock+0x121/0x260 [ 2008.193686] ? rwlock_bug.part.0+0x90/0x90 [ 2008.194723] ip6_route_add+0x8b/0x150 [ 2008.195641] addrconf_add_mroute+0x120/0x180 [ 2008.196638] ? ipv6_generate_eui64+0xa40/0xa40 [ 2008.197705] ? find_held_lock+0x2c/0x110 [ 2008.198696] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2008.198811] FAULT_INJECTION: forcing a failure. [ 2008.198811] name failslab, interval 1, probability 0, space 0, times 0 [ 2008.199927] ? __local_bh_enable_ip+0x9d/0x100 [ 2008.199976] ? trace_hardirqs_on+0x5b/0x180 [ 2008.204641] ? ipv6_find_idev+0x174/0x220 [ 2008.205630] ? __local_bh_enable_ip+0x9d/0x100 [ 2008.206702] addrconf_add_dev+0x16a/0x1e0 [ 2008.207680] addrconf_dev_config+0x1f2/0x440 [ 2008.208731] addrconf_notify+0xc95/0x2410 [ 2008.209712] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2008.210818] ? inet6_ifinfo_notify+0x150/0x150 [ 2008.211898] ? failover_register+0x530/0x530 [ 2008.212946] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2008.214246] raw_notifier_call_chain+0xb3/0x110 [ 2008.215299] call_netdevice_notifiers_info+0xb5/0x130 [ 2008.216500] __dev_notify_flags+0x110/0x2c0 [ 2008.217521] ? dev_change_name+0x660/0x660 [ 2008.218449] ? __dev_change_flags+0x4cf/0x6e0 [ 2008.219468] ? dev_set_allmulti+0x30/0x30 [ 2008.220473] ? cap_capable+0x1d6/0x240 [ 2008.221396] ? full_name_hash+0xb5/0xf0 [ 2008.222299] dev_change_flags+0x100/0x160 [ 2008.223252] devinet_ioctl+0x14de/0x1db0 [ 2008.224255] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2008.225307] inet_ioctl+0x34f/0x390 [ 2008.226149] ? inet_dgram_connect+0x220/0x220 [ 2008.227189] ? __lock_acquire+0xbb1/0x5b00 [ 2008.228234] ? perf_trace_lock+0xac/0x490 [ 2008.229224] packet_ioctl+0xb3/0x260 [ 2008.230096] sock_do_ioctl+0xd3/0x300 [ 2008.230907] ? compat_ifr_data_ioctl+0x180/0x180 [ 2008.232075] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2008.233434] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2008.234587] ? do_vfs_ioctl+0x283/0x10d0 [ 2008.235525] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2008.236795] ? generic_block_fiemap+0x60/0x60 [ 2008.237879] sock_ioctl+0x3ea/0x700 [ 2008.238668] ? dlci_ioctl_set+0x30/0x30 [ 2008.239601] ? selinux_file_ioctl+0xb6/0x270 [ 2008.240679] ? dlci_ioctl_set+0x30/0x30 [ 2008.241633] __x64_sys_ioctl+0x19a/0x210 [ 2008.242541] do_syscall_64+0x33/0x40 [ 2008.243403] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2008.244637] RIP: 0033:0x7feded0d7b19 [ 2008.245537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2008.249885] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2008.251604] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2008.253319] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2008.254909] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2008.256416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2008.257913] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2008.259476] CPU: 0 PID: 11723 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2008.260982] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2008.262647] Call Trace: [ 2008.263185] dump_stack+0x107/0x167 [ 2008.263914] should_fail.cold+0x5/0xa [ 2008.264733] ? create_object.isra.0+0x3a/0xa20 [ 2008.265654] should_failslab+0x5/0x20 [ 2008.266429] kmem_cache_alloc+0x5b/0x310 [ 2008.267247] create_object.isra.0+0x3a/0xa20 [ 2008.268162] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 02:30:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000004060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2008.269180] kmem_cache_alloc+0x159/0x310 [ 2008.270120] vm_area_dup+0x78/0x290 [ 2008.270859] ? _cond_resched+0x12/0x80 [ 2008.271632] ? copy_page_range+0x24e9/0x3810 [ 2008.272555] ? vm_area_alloc+0x110/0x110 [ 2008.273367] ? up_write+0x191/0x550 [ 2008.274093] ? vm_iomap_memory+0x190/0x190 [ 2008.274932] ? downgrade_write+0x3a0/0x3a0 [ 2008.275778] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2008.276871] ? __vma_link_rb+0x540/0x700 [ 2008.277689] copy_process+0x291b/0x7800 [ 2008.278524] ? __cleanup_sighand+0xb0/0xb0 [ 2008.279398] ? find_held_lock+0x2c/0x110 [ 2008.280232] kernel_clone+0xe7/0x980 [ 2008.280978] ? lock_downgrade+0x6d0/0x6d0 [ 2008.281801] ? find_held_lock+0x2c/0x110 [ 2008.282611] ? create_io_thread+0xf0/0xf0 [ 2008.283441] ? ksys_write+0x12d/0x260 [ 2008.284216] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2008.285179] __do_sys_fork+0x8a/0xc0 [ 2008.285915] ? kernel_thread+0xf0/0xf0 [ 2008.286705] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2008.287739] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2008.288777] ? trace_hardirqs_on+0x5b/0x180 [ 2008.289634] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2008.290646] do_syscall_64+0x33/0x40 [ 2008.291382] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2008.292393] RIP: 0033:0x7fadf412db19 [ 2008.293129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2008.296755] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2008.298255] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2008.299662] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2008.301082] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2008.302532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2008.303944] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:30:41 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:30:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000005060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:41 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x4020940d, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:30:41 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:30:55 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 63) 02:30:55 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x300, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:30:55 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 28) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:55 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8919, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:30:55 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 30) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000006060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:55 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5451, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:30:55 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x80086601, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2023.015823] audit: type=1326 audit(1693276256.008:132): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11757 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:30:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000007060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:56 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x80087601, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2023.040183] device veth0_vlan entered promiscuous mode [ 2023.044418] FAULT_INJECTION: forcing a failure. [ 2023.044418] name failslab, interval 1, probability 0, space 0, times 0 [ 2023.047411] CPU: 0 PID: 11755 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2023.049009] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2023.050875] Call Trace: [ 2023.051490] dump_stack+0x107/0x167 [ 2023.052333] should_fail.cold+0x5/0xa [ 2023.053194] ? create_object.isra.0+0x3a/0xa20 [ 2023.054229] should_failslab+0x5/0x20 [ 2023.055103] kmem_cache_alloc+0x5b/0x310 [ 2023.056018] ? pcpu_alloc+0x12a/0x1240 [ 2023.056924] create_object.isra.0+0x3a/0xa20 [ 2023.057920] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2023.059068] kmem_cache_alloc_node+0x169/0x330 [ 2023.060103] __alloc_skb+0x6d/0x5b0 [ 2023.060947] inet6_rt_notify+0xed/0x2a0 [ 2023.061847] fib6_add+0x3223/0x45d0 [ 2023.062692] ? fib6_update_sernum_stub+0x80/0x80 [ 2023.063796] ? do_raw_spin_lock+0x121/0x260 [ 2023.064792] ? rwlock_bug.part.0+0x90/0x90 [ 2023.065747] ip6_route_add+0x8b/0x150 [ 2023.066600] addrconf_add_mroute+0x120/0x180 [ 2023.067577] ? ipv6_generate_eui64+0xa40/0xa40 [ 2023.068596] ? find_held_lock+0x2c/0x110 [ 2023.069525] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2023.070687] ? __local_bh_enable_ip+0x9d/0x100 [ 2023.071700] ? trace_hardirqs_on+0x5b/0x180 [ 2023.072691] ? ipv6_find_idev+0x174/0x220 [ 2023.073620] ? __local_bh_enable_ip+0x9d/0x100 [ 2023.074640] addrconf_add_dev+0x16a/0x1e0 [ 2023.075573] addrconf_dev_config+0x1f2/0x440 [ 2023.076567] addrconf_notify+0xc95/0x2410 [ 2023.077506] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2023.078653] ? inet6_ifinfo_notify+0x150/0x150 [ 2023.079677] ? failover_register+0x530/0x530 [ 2023.080665] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2023.081916] ? ipmr_device_event+0x18b/0x1f0 [ 2023.082889] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2023.084036] raw_notifier_call_chain+0xb3/0x110 [ 2023.085075] call_netdevice_notifiers_info+0xb5/0x130 [ 2023.086212] __dev_notify_flags+0x110/0x2c0 [ 2023.087158] ? dev_change_name+0x660/0x660 [ 2023.088087] ? __dev_change_flags+0x4cf/0x6e0 [ 2023.089111] ? dev_set_allmulti+0x30/0x30 [ 2023.090027] ? cap_capable+0x1d6/0x240 [ 2023.090897] ? full_name_hash+0xb5/0xf0 [ 2023.091778] dev_change_flags+0x100/0x160 [ 2023.092719] devinet_ioctl+0x14de/0x1db0 [ 2023.093626] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2023.094611] inet_ioctl+0x34f/0x390 [ 2023.095416] ? inet_dgram_connect+0x220/0x220 [ 2023.096434] ? __lock_acquire+0xbb1/0x5b00 [ 2023.097384] ? perf_trace_lock+0xac/0x490 [ 2023.098310] packet_ioctl+0xb3/0x260 [ 2023.099171] sock_do_ioctl+0xd3/0x300 [ 2023.100005] ? compat_ifr_data_ioctl+0x180/0x180 [ 2023.101064] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2023.102320] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2023.103452] ? do_vfs_ioctl+0x283/0x10d0 [ 2023.104517] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2023.105788] ? generic_block_fiemap+0x60/0x60 [ 2023.106873] sock_ioctl+0x3ea/0x700 [ 2023.107765] ? dlci_ioctl_set+0x30/0x30 [ 2023.108736] ? selinux_file_ioctl+0xb6/0x270 [ 2023.109795] ? dlci_ioctl_set+0x30/0x30 [ 2023.110749] __x64_sys_ioctl+0x19a/0x210 [ 2023.111727] do_syscall_64+0x33/0x40 [ 2023.112644] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2023.113710] RIP: 0033:0x7feded0d7b19 [ 2023.114479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2023.118200] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2023.119729] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2023.121169] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2023.122597] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2023.124024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2023.125459] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2023.150258] device veth0_vlan entered promiscuous mode [ 2023.153063] FAULT_INJECTION: forcing a failure. [ 2023.153063] name failslab, interval 1, probability 0, space 0, times 0 [ 2023.155448] CPU: 0 PID: 11749 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2023.156843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2023.158530] Call Trace: [ 2023.159070] dump_stack+0x107/0x167 [ 2023.159816] should_fail.cold+0x5/0xa [ 2023.160612] ? __alloc_skb+0x6d/0x5b0 [ 2023.161396] should_failslab+0x5/0x20 [ 2023.162172] kmem_cache_alloc_node+0x55/0x330 [ 2023.163103] __alloc_skb+0x6d/0x5b0 [ 2023.163846] inet6_rt_notify+0xed/0x2a0 [ 2023.164661] fib6_add+0x3223/0x45d0 [ 2023.165423] ? fib6_update_sernum_stub+0x80/0x80 [ 2023.166383] ? do_raw_spin_lock+0x121/0x260 [ 2023.167256] ? rwlock_bug.part.0+0x90/0x90 [ 2023.168131] ip6_route_add+0x8b/0x150 [ 2023.168937] addrconf_add_mroute+0x120/0x180 [ 2023.169833] ? ipv6_generate_eui64+0xa40/0xa40 [ 2023.170753] ? find_held_lock+0x2c/0x110 [ 2023.171641] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2023.172701] ? __local_bh_enable_ip+0x9d/0x100 [ 2023.173623] ? trace_hardirqs_on+0x5b/0x180 [ 2023.174489] ? ipv6_find_idev+0x174/0x220 [ 2023.175317] ? __local_bh_enable_ip+0x9d/0x100 [ 2023.176246] addrconf_add_dev+0x16a/0x1e0 [ 2023.177077] addrconf_dev_config+0x1f2/0x440 [ 2023.177961] addrconf_notify+0xc95/0x2410 [ 2023.178805] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2023.179842] ? inet6_ifinfo_notify+0x150/0x150 [ 2023.180777] ? failover_register+0x530/0x530 [ 2023.181663] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2023.182763] ? ipmr_device_event+0x18b/0x1f0 [ 2023.183643] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2023.184707] raw_notifier_call_chain+0xb3/0x110 02:30:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000008060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2023.185648] call_netdevice_notifiers_info+0xb5/0x130 [ 2023.186845] __dev_notify_flags+0x110/0x2c0 [ 2023.187715] ? dev_change_name+0x660/0x660 [ 2023.188581] ? __dev_change_flags+0x4cf/0x6e0 [ 2023.189483] ? dev_set_allmulti+0x30/0x30 [ 2023.190321] ? netdev_name_node_lookup+0xd5/0x150 [ 2023.191298] dev_change_flags+0x100/0x160 [ 2023.192207] devinet_ioctl+0x14de/0x1db0 [ 2023.193034] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2023.193936] inet_ioctl+0x34f/0x390 [ 2023.194672] ? inet_dgram_connect+0x220/0x220 [ 2023.195598] ? __lock_acquire+0xbb1/0x5b00 [ 2023.196483] ? perf_trace_lock+0xac/0x490 [ 2023.197324] packet_ioctl+0xb3/0x260 [ 2023.198077] sock_do_ioctl+0xd3/0x300 [ 2023.198846] ? compat_ifr_data_ioctl+0x180/0x180 [ 2023.199801] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2023.200974] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2023.202009] ? do_vfs_ioctl+0x283/0x10d0 [ 2023.202826] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2023.203877] ? generic_block_fiemap+0x60/0x60 [ 2023.204788] sock_ioctl+0x3ea/0x700 [ 2023.205521] ? dlci_ioctl_set+0x30/0x30 [ 2023.206335] ? selinux_file_ioctl+0xb6/0x270 [ 2023.207255] ? dlci_ioctl_set+0x30/0x30 [ 2023.208064] __x64_sys_ioctl+0x19a/0x210 [ 2023.208906] do_syscall_64+0x33/0x40 [ 2023.209665] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2023.210714] RIP: 0033:0x7f07a4a4eb19 [ 2023.211471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2023.215252] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2023.216842] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2023.218274] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2023.219705] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2023.221143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2023.222571] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 2023.229847] FAULT_INJECTION: forcing a failure. [ 2023.229847] name failslab, interval 1, probability 0, space 0, times 0 [ 2023.232115] CPU: 0 PID: 11774 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2023.233536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2023.235235] Call Trace: [ 2023.235771] dump_stack+0x107/0x167 [ 2023.236529] should_fail.cold+0x5/0xa [ 2023.237305] ? vm_area_dup+0x78/0x290 [ 2023.238086] should_failslab+0x5/0x20 [ 2023.238875] kmem_cache_alloc+0x5b/0x310 [ 2023.239716] vm_area_dup+0x78/0x290 [ 2023.240481] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 2023.241471] ? lock_downgrade+0x6d0/0x6d0 [ 2023.242312] ? copy_page_range+0x24e9/0x3810 [ 2023.243219] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 2023.244169] ? avc_has_extended_perms+0xf40/0xf40 [ 2023.245155] ? vm_area_alloc+0x110/0x110 [ 2023.245990] ? selinux_vm_enough_memory+0x114/0x180 [ 2023.246997] ? selinux_sb_statfs+0x250/0x250 [ 2023.247896] ? percpu_counter_add_batch+0x8b/0x140 [ 2023.248925] ? __vm_enough_memory+0x184/0x360 [ 2023.249835] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2023.250922] copy_process+0x291b/0x7800 [ 2023.251759] ? __cleanup_sighand+0xb0/0xb0 [ 2023.252650] ? find_held_lock+0x2c/0x110 [ 2023.253493] kernel_clone+0xe7/0x980 [ 2023.254253] ? lock_downgrade+0x6d0/0x6d0 [ 2023.255106] ? find_held_lock+0x2c/0x110 [ 2023.255923] ? create_io_thread+0xf0/0xf0 [ 2023.256778] ? ksys_write+0x12d/0x260 [ 2023.257559] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2023.258555] __do_sys_fork+0x8a/0xc0 [ 2023.259342] ? kernel_thread+0xf0/0xf0 [ 2023.260163] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2023.261220] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2023.262261] ? trace_hardirqs_on+0x5b/0x180 [ 2023.263131] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2023.264179] do_syscall_64+0x33/0x40 [ 2023.264938] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2023.265970] RIP: 0033:0x7fadf412db19 [ 2023.266722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2023.270417] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2023.271945] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2023.273400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2023.274832] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2023.276272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2023.277703] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:30:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000018060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:56 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x80108906, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:30:56 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x330, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:30:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000001c060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:30:56 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x80108907, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:10 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 31) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:10 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0xc0045878, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:10 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 29) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:10 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5452, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:10 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:31:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000067060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:31:10 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 64) 02:31:10 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x500, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2037.699499] audit: type=1326 audit(1693276270.691:133): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11794 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2037.764135] device veth0_vlan entered promiscuous mode [ 2037.769227] FAULT_INJECTION: forcing a failure. [ 2037.769227] name failslab, interval 1, probability 0, space 0, times 0 [ 2037.772000] CPU: 0 PID: 11800 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2037.773455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2037.775188] Call Trace: [ 2037.775750] dump_stack+0x107/0x167 [ 2037.776496] should_fail.cold+0x5/0xa [ 2037.777297] ? create_object.isra.0+0x3a/0xa20 [ 2037.778234] should_failslab+0x5/0x20 [ 2037.779035] kmem_cache_alloc+0x5b/0x310 [ 2037.779893] create_object.isra.0+0x3a/0xa20 [ 2037.780834] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2037.781923] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2037.782966] ? inet6_rt_notify+0xed/0x2a0 [ 2037.783806] __alloc_skb+0xb1/0x5b0 [ 2037.784542] inet6_rt_notify+0xed/0x2a0 [ 2037.785324] fib6_add+0x3223/0x45d0 [ 2037.786095] ? fib6_update_sernum_stub+0x80/0x80 [ 2037.787024] ? do_raw_spin_lock+0x121/0x260 [ 2037.787907] ? rwlock_bug.part.0+0x90/0x90 [ 2037.788769] ip6_route_add+0x8b/0x150 [ 2037.789559] addrconf_add_mroute+0x120/0x180 [ 2037.790422] ? ipv6_generate_eui64+0xa40/0xa40 [ 2037.791365] ? find_held_lock+0x2c/0x110 [ 2037.792189] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2037.793272] ? __local_bh_enable_ip+0x9d/0x100 [ 2037.794171] ? trace_hardirqs_on+0x5b/0x180 [ 2037.795032] ? ipv6_find_idev+0x174/0x220 [ 2037.795841] ? __local_bh_enable_ip+0x9d/0x100 [ 2037.796763] addrconf_add_dev+0x16a/0x1e0 [ 2037.797591] addrconf_dev_config+0x1f2/0x440 [ 2037.798457] addrconf_notify+0xc95/0x2410 [ 2037.799297] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2037.800307] ? inet6_ifinfo_notify+0x150/0x150 [ 2037.801230] ? failover_register+0x530/0x530 [ 2037.802094] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2037.803190] ? ipmr_device_event+0x18b/0x1f0 [ 2037.804059] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2037.805112] raw_notifier_call_chain+0xb3/0x110 [ 2037.806036] call_netdevice_notifiers_info+0xb5/0x130 [ 2037.807072] __dev_notify_flags+0x110/0x2c0 [ 2037.807912] ? dev_change_name+0x660/0x660 [ 2037.808766] ? __dev_change_flags+0x4cf/0x6e0 [ 2037.809654] ? dev_set_allmulti+0x30/0x30 [ 2037.810487] ? cap_capable+0x1d6/0x240 [ 2037.811272] ? full_name_hash+0xb5/0xf0 [ 2037.812070] dev_change_flags+0x100/0x160 [ 2037.812913] devinet_ioctl+0x14de/0x1db0 [ 2037.813740] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2037.814617] inet_ioctl+0x34f/0x390 [ 2037.815346] ? inet_dgram_connect+0x220/0x220 [ 2037.816262] ? __lock_acquire+0xbb1/0x5b00 [ 2037.817133] ? perf_trace_lock+0xac/0x490 [ 2037.817975] packet_ioctl+0xb3/0x260 [ 2037.818716] sock_do_ioctl+0xd3/0x300 [ 2037.819479] ? compat_ifr_data_ioctl+0x180/0x180 [ 2037.820432] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2037.821611] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2037.822638] ? do_vfs_ioctl+0x283/0x10d0 [ 2037.823474] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2037.824514] ? generic_block_fiemap+0x60/0x60 [ 2037.825445] sock_ioctl+0x3ea/0x700 [ 2037.826164] ? dlci_ioctl_set+0x30/0x30 [ 2037.826968] ? selinux_file_ioctl+0xb6/0x270 [ 2037.827832] ? dlci_ioctl_set+0x30/0x30 [ 2037.828650] __x64_sys_ioctl+0x19a/0x210 [ 2037.829466] do_syscall_64+0x33/0x40 [ 2037.830200] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2037.831228] RIP: 0033:0x7feded0d7b19 [ 2037.831975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2037.835656] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2037.837168] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2037.838591] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2037.840012] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2037.841481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2037.842852] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2037.858460] FAULT_INJECTION: forcing a failure. [ 2037.858460] name failslab, interval 1, probability 0, space 0, times 0 [ 2037.860890] CPU: 1 PID: 11813 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2037.862257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2037.863899] Call Trace: [ 2037.864448] dump_stack+0x107/0x167 [ 2037.865182] should_fail.cold+0x5/0xa [ 2037.865945] ? create_object.isra.0+0x3a/0xa20 [ 2037.866873] should_failslab+0x5/0x20 [ 2037.867628] kmem_cache_alloc+0x5b/0x310 [ 2037.868519] create_object.isra.0+0x3a/0xa20 [ 2037.869400] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2037.870440] kmem_cache_alloc+0x159/0x310 [ 2037.871273] vm_area_dup+0x78/0x290 [ 2037.872027] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 2037.872959] ? lock_downgrade+0x6d0/0x6d0 [ 2037.873805] ? copy_page_range+0x24e9/0x3810 [ 2037.874707] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 2037.875657] ? avc_has_extended_perms+0xf40/0xf40 [ 2037.876641] ? vm_area_alloc+0x110/0x110 [ 2037.877478] ? selinux_vm_enough_memory+0x114/0x180 [ 2037.878466] ? selinux_sb_statfs+0x250/0x250 [ 2037.879373] ? percpu_counter_add_batch+0x8b/0x140 [ 2037.880370] ? __vm_enough_memory+0x184/0x360 [ 2037.881291] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2037.882317] copy_process+0x291b/0x7800 [ 2037.883204] ? __cleanup_sighand+0xb0/0xb0 [ 2037.884068] ? find_held_lock+0x2c/0x110 [ 2037.884928] kernel_clone+0xe7/0x980 [ 2037.885681] ? lock_downgrade+0x6d0/0x6d0 [ 2037.886527] ? find_held_lock+0x2c/0x110 [ 2037.887377] ? create_io_thread+0xf0/0xf0 [ 2037.888244] ? ksys_write+0x12d/0x260 [ 2037.889064] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2037.890054] __do_sys_fork+0x8a/0xc0 [ 2037.890812] ? kernel_thread+0xf0/0xf0 [ 2037.891624] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2037.892702] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2037.893784] ? trace_hardirqs_on+0x5b/0x180 [ 2037.894663] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2037.895716] do_syscall_64+0x33/0x40 [ 2037.896485] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2037.897524] RIP: 0033:0x7fadf412db19 [ 2037.898285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2037.902032] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2037.903583] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2037.905083] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2037.906546] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2037.908016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2037.909493] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2037.912364] device veth0_vlan entered promiscuous mode [ 2037.915038] FAULT_INJECTION: forcing a failure. 02:31:10 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0xc0045878, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000830000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2037.915038] name failslab, interval 1, probability 0, space 0, times 0 [ 2037.917570] CPU: 1 PID: 11810 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2037.918988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2037.920717] Call Trace: [ 2037.921265] dump_stack+0x107/0x167 [ 2037.922022] should_fail.cold+0x5/0xa [ 2037.922810] ? create_object.isra.0+0x3a/0xa20 [ 2037.923757] should_failslab+0x5/0x20 [ 2037.924549] kmem_cache_alloc+0x5b/0x310 [ 2037.925390] ? pcpu_alloc+0x12a/0x1240 [ 2037.926194] create_object.isra.0+0x3a/0xa20 [ 2037.927107] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2037.928147] kmem_cache_alloc_node+0x169/0x330 [ 2037.929112] __alloc_skb+0x6d/0x5b0 [ 2037.929877] inet6_rt_notify+0xed/0x2a0 [ 2037.930702] fib6_add+0x3223/0x45d0 [ 2037.931476] ? fib6_update_sernum_stub+0x80/0x80 [ 2037.932457] ? do_raw_spin_lock+0x121/0x260 [ 2037.933354] ? rwlock_bug.part.0+0x90/0x90 [ 2037.934235] ip6_route_add+0x8b/0x150 [ 2037.935027] addrconf_add_mroute+0x120/0x180 [ 2037.935901] ? ipv6_generate_eui64+0xa40/0xa40 [ 2037.936847] ? find_held_lock+0x2c/0x110 [ 2037.937687] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2037.938773] ? __local_bh_enable_ip+0x9d/0x100 [ 2037.939679] ? trace_hardirqs_on+0x5b/0x180 [ 2037.940610] ? ipv6_find_idev+0x174/0x220 [ 2037.941425] ? __local_bh_enable_ip+0x9d/0x100 [ 2037.942352] addrconf_add_dev+0x16a/0x1e0 [ 2037.943200] addrconf_dev_config+0x1f2/0x440 [ 2037.944094] addrconf_notify+0xc95/0x2410 [ 2037.944956] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2037.946003] ? inet6_ifinfo_notify+0x150/0x150 [ 2037.946928] ? failover_register+0x530/0x530 [ 2037.947826] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2037.948950] ? ipmr_device_event+0x18b/0x1f0 [ 2037.949843] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2037.950893] raw_notifier_call_chain+0xb3/0x110 [ 2037.951844] call_netdevice_notifiers_info+0xb5/0x130 [ 2037.952908] __dev_notify_flags+0x110/0x2c0 [ 2037.953788] ? dev_change_name+0x660/0x660 [ 2037.954643] ? __dev_change_flags+0x4cf/0x6e0 [ 2037.955554] ? dev_set_allmulti+0x30/0x30 [ 2037.956406] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2037.957515] dev_change_flags+0x100/0x160 [ 2037.958368] devinet_ioctl+0x14de/0x1db0 [ 2037.959219] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2037.960124] inet_ioctl+0x34f/0x390 [ 2037.960874] ? inet_dgram_connect+0x220/0x220 [ 2037.961800] ? __lock_acquire+0xbb1/0x5b00 [ 2037.962687] ? perf_trace_lock+0xac/0x490 [ 2037.963538] packet_ioctl+0xb3/0x260 [ 2037.964299] sock_do_ioctl+0xd3/0x300 [ 2037.965094] ? compat_ifr_data_ioctl+0x180/0x180 [ 2037.966060] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2037.967223] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2037.968271] ? do_vfs_ioctl+0x283/0x10d0 [ 2037.969110] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2037.970172] ? generic_block_fiemap+0x60/0x60 [ 2037.971088] sock_ioctl+0x3ea/0x700 [ 2037.971825] ? dlci_ioctl_set+0x30/0x30 [ 2037.972646] ? selinux_file_ioctl+0xb6/0x270 [ 2037.973541] ? dlci_ioctl_set+0x30/0x30 [ 2037.974355] __x64_sys_ioctl+0x19a/0x210 [ 2037.975184] do_syscall_64+0x33/0x40 [ 2037.975941] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2037.976997] RIP: 0033:0x7f07a4a4eb19 [ 2037.977757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2037.981484] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2037.983027] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2037.984488] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2037.985932] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2037.987380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2037.988829] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:31:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000020000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:31:11 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0xc0189436, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:11 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x700, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:31:11 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 32) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:11 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0xc020660b, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000830000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:31:11 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:31:11 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5460, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:11 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 30) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:11 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x3003, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2038.313966] device veth0_vlan entered promiscuous mode [ 2038.337921] FAULT_INJECTION: forcing a failure. [ 2038.337921] name failslab, interval 1, probability 0, space 0, times 0 [ 2038.340372] CPU: 0 PID: 11839 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2038.341809] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2038.343513] Call Trace: [ 2038.344061] dump_stack+0x107/0x167 [ 2038.344844] should_fail.cold+0x5/0xa [ 2038.345620] ? ipv6_add_addr+0x332/0x1d00 [ 2038.346451] should_failslab+0x5/0x20 [ 2038.347213] kmem_cache_alloc_trace+0x55/0x320 [ 2038.348140] ? blocking_notifier_call_chain+0x13a/0x190 [ 2038.349206] ipv6_add_addr+0x332/0x1d00 [ 2038.350023] ? __lockdep_reset_lock+0x180/0x180 [ 2038.350956] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2038.352028] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2038.353116] ? inet6_dump_ifaddr+0x20/0x20 [ 2038.353997] ? ipv6_generate_stable_address+0x299/0x640 [ 2038.355079] addrconf_add_linklocal+0xd4/0x470 [ 2038.356012] ? ipv6_del_addr+0x8d0/0x8d0 [ 2038.356852] ? trace_hardirqs_on+0x5b/0x180 [ 2038.357762] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2038.358813] ? addrconf_add_linklocal+0x470/0x470 [ 2038.359773] ? __local_bh_enable_ip+0x9d/0x100 [ 2038.360700] addrconf_dev_config+0x262/0x440 [ 2038.361583] addrconf_notify+0xc95/0x2410 [ 2038.362423] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2038.363493] ? inet6_ifinfo_notify+0x150/0x150 [ 2038.364428] ? failover_register+0x530/0x530 [ 2038.365286] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2038.366405] ? ipmr_device_event+0x18b/0x1f0 [ 2038.367269] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2038.368324] raw_notifier_call_chain+0xb3/0x110 [ 2038.369288] call_netdevice_notifiers_info+0xb5/0x130 [ 2038.370324] __dev_notify_flags+0x110/0x2c0 [ 2038.371204] ? dev_change_name+0x660/0x660 [ 2038.372045] ? __dev_change_flags+0x4cf/0x6e0 [ 2038.372949] ? dev_set_allmulti+0x30/0x30 [ 2038.373780] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2038.374871] dev_change_flags+0x100/0x160 [ 2038.375725] devinet_ioctl+0x14de/0x1db0 [ 2038.376562] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2038.377476] inet_ioctl+0x34f/0x390 [ 2038.378214] ? inet_dgram_connect+0x220/0x220 [ 2038.379140] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2038.380045] ? finish_task_switch+0x126/0x5d0 [ 2038.380974] ? finish_task_switch+0xef/0x5d0 [ 2038.381867] ? __switch_to+0x572/0xf70 [ 2038.382647] ? __switch_to_asm+0x3a/0x60 [ 2038.383457] ? __switch_to_asm+0x34/0x60 [ 2038.384274] ? __schedule+0x82c/0x1ea0 [ 2038.385098] packet_ioctl+0xb3/0x260 [ 2038.385853] sock_do_ioctl+0xd3/0x300 [ 2038.386617] ? compat_ifr_data_ioctl+0x180/0x180 [ 2038.387574] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2038.388734] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2038.389771] ? do_vfs_ioctl+0x283/0x10d0 [ 2038.390617] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2038.391668] ? generic_block_fiemap+0x60/0x60 [ 2038.392610] sock_ioctl+0x3ea/0x700 [ 2038.393343] ? dlci_ioctl_set+0x30/0x30 [ 2038.394165] ? selinux_file_ioctl+0xb6/0x270 [ 2038.395052] ? dlci_ioctl_set+0x30/0x30 [ 2038.395861] __x64_sys_ioctl+0x19a/0x210 [ 2038.396692] do_syscall_64+0x33/0x40 [ 2038.397453] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2038.398482] RIP: 0033:0x7feded0d7b19 [ 2038.399228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2038.402957] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2038.404510] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2038.405955] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2038.407393] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2038.408853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2038.410304] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2038.501071] device veth0_vlan entered promiscuous mode [ 2038.516058] FAULT_INJECTION: forcing a failure. [ 2038.516058] name failslab, interval 1, probability 0, space 0, times 0 [ 2038.518452] CPU: 0 PID: 11855 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2038.519817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2038.521458] Call Trace: [ 2038.522002] dump_stack+0x107/0x167 [ 2038.522709] should_fail.cold+0x5/0xa [ 2038.523468] should_failslab+0x5/0x20 [ 2038.524221] __kmalloc_node_track_caller+0x74/0x3b0 [ 2038.525231] ? inet6_rt_notify+0xed/0x2a0 [ 2038.526066] __alloc_skb+0xb1/0x5b0 [ 2038.526804] inet6_rt_notify+0xed/0x2a0 [ 2038.527604] fib6_add+0x3223/0x45d0 [ 2038.528365] ? fib6_update_sernum_stub+0x80/0x80 [ 2038.529316] ? do_raw_spin_lock+0x121/0x260 [ 2038.530180] ? rwlock_bug.part.0+0x90/0x90 [ 2038.531043] ip6_route_add+0x8b/0x150 [ 2038.531807] addrconf_add_mroute+0x120/0x180 [ 2038.532699] ? ipv6_generate_eui64+0xa40/0xa40 [ 2038.533604] ? find_held_lock+0x2c/0x110 [ 2038.534445] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2038.535480] ? __local_bh_enable_ip+0x9d/0x100 [ 2038.536393] ? trace_hardirqs_on+0x5b/0x180 [ 2038.537248] ? ipv6_find_idev+0x174/0x220 [ 2038.538053] ? __local_bh_enable_ip+0x9d/0x100 [ 2038.538931] addrconf_add_dev+0x16a/0x1e0 [ 2038.539737] addrconf_dev_config+0x1f2/0x440 [ 2038.540645] addrconf_notify+0xc95/0x2410 [ 2038.541462] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2038.542507] ? inet6_ifinfo_notify+0x150/0x150 [ 2038.543395] ? failover_register+0x530/0x530 [ 2038.544276] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2038.545380] ? ipmr_device_event+0x18b/0x1f0 [ 2038.546231] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2038.547269] raw_notifier_call_chain+0xb3/0x110 [ 2038.548172] call_netdevice_notifiers_info+0xb5/0x130 [ 2038.549306] __dev_notify_flags+0x110/0x2c0 [ 2038.550194] ? dev_change_name+0x660/0x660 [ 2038.551022] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2038.552113] dev_change_flags+0x100/0x160 [ 2038.552945] devinet_ioctl+0x14de/0x1db0 [ 2038.553747] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2038.554649] inet_ioctl+0x34f/0x390 [ 2038.555356] ? inet_dgram_connect+0x220/0x220 [ 2038.556307] ? __lock_acquire+0xbb1/0x5b00 [ 2038.557158] ? perf_trace_lock+0xac/0x490 [ 2038.558025] packet_ioctl+0xb3/0x260 [ 2038.558748] sock_do_ioctl+0xd3/0x300 [ 2038.559487] ? compat_ifr_data_ioctl+0x180/0x180 [ 2038.560430] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2038.561537] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2038.562537] ? do_vfs_ioctl+0x283/0x10d0 [ 2038.563322] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2038.564350] ? generic_block_fiemap+0x60/0x60 [ 2038.565226] sock_ioctl+0x3ea/0x700 [ 2038.565931] ? dlci_ioctl_set+0x30/0x30 [ 2038.566719] ? selinux_file_ioctl+0xb6/0x270 [ 2038.567573] ? dlci_ioctl_set+0x30/0x30 [ 2038.568362] __x64_sys_ioctl+0x19a/0x210 [ 2038.569104] do_syscall_64+0x33/0x40 [ 2038.569830] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2038.570843] RIP: 0033:0x7f07a4a4eb19 [ 2038.571571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2038.575229] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2038.576727] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2038.578085] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2038.579451] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2038.580839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2038.582253] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:31:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060200006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:31:27 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 31) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:27 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 33) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:27 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8901, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:27 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x7, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:27 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:31:27 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x3f00, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:31:27 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 65) [ 2054.119109] audit: type=1326 audit(1693276287.111:134): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11874 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:31:27 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060300006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2054.179752] device veth0_vlan entered promiscuous mode [ 2054.183384] FAULT_INJECTION: forcing a failure. [ 2054.183384] name failslab, interval 1, probability 0, space 0, times 0 [ 2054.184819] CPU: 1 PID: 11867 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2054.185668] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2054.186657] Call Trace: [ 2054.186986] dump_stack+0x107/0x167 [ 2054.187426] should_fail.cold+0x5/0xa [ 2054.187894] ? create_object.isra.0+0x3a/0xa20 [ 2054.188463] should_failslab+0x5/0x20 [ 2054.188941] kmem_cache_alloc+0x5b/0x310 [ 2054.189446] create_object.isra.0+0x3a/0xa20 [ 2054.190008] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2054.190663] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2054.191293] ? inet6_rt_notify+0xed/0x2a0 [ 2054.191820] __alloc_skb+0xb1/0x5b0 [ 2054.192279] inet6_rt_notify+0xed/0x2a0 [ 2054.192807] fib6_add+0x3223/0x45d0 [ 2054.193289] ? fib6_update_sernum_stub+0x80/0x80 [ 2054.193891] ? do_raw_spin_lock+0x121/0x260 [ 2054.194443] ? rwlock_bug.part.0+0x90/0x90 [ 2054.194983] ip6_route_add+0x8b/0x150 [ 2054.195467] addrconf_add_mroute+0x120/0x180 [ 2054.196013] ? ipv6_generate_eui64+0xa40/0xa40 [ 2054.196597] ? find_held_lock+0x2c/0x110 [ 2054.197112] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2054.197754] ? __local_bh_enable_ip+0x9d/0x100 [ 2054.198315] ? trace_hardirqs_on+0x5b/0x180 [ 2054.198855] ? ipv6_find_idev+0x174/0x220 [ 2054.199362] ? __local_bh_enable_ip+0x9d/0x100 [ 2054.199927] addrconf_add_dev+0x16a/0x1e0 [ 2054.200430] addrconf_dev_config+0x1f2/0x440 [ 2054.200976] addrconf_notify+0xc95/0x2410 [ 2054.201486] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2054.202120] ? inet6_ifinfo_notify+0x150/0x150 [ 2054.202677] ? failover_register+0x530/0x530 [ 2054.203221] ? __sanitizer_cov_trace_pc+0xd/0x60 [ 2054.203802] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2054.204477] ? ipmr_device_event+0x18b/0x1f0 [ 2054.205037] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2054.205674] raw_notifier_call_chain+0xb3/0x110 [ 2054.206247] call_netdevice_notifiers_info+0xb5/0x130 [ 2054.206876] __dev_notify_flags+0x110/0x2c0 [ 2054.207411] ? dev_change_name+0x660/0x660 [ 2054.207927] ? __dev_change_flags+0x4cf/0x6e0 [ 2054.208478] ? dev_set_allmulti+0x30/0x30 [ 2054.208996] ? cap_capable+0x1d6/0x240 [ 2054.209479] ? full_name_hash+0xb5/0xf0 [ 2054.209969] dev_change_flags+0x100/0x160 [ 2054.210480] devinet_ioctl+0x14de/0x1db0 [ 2054.210988] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2054.211529] inet_ioctl+0x34f/0x390 [ 2054.211980] ? inet_dgram_connect+0x220/0x220 [ 2054.212555] ? __lock_acquire+0xbb1/0x5b00 [ 2054.213086] ? perf_trace_lock+0xac/0x490 [ 2054.213596] packet_ioctl+0xb3/0x260 [ 2054.214051] sock_do_ioctl+0xd3/0x300 [ 2054.214520] ? compat_ifr_data_ioctl+0x180/0x180 [ 2054.215109] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2054.215812] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2054.216438] ? do_vfs_ioctl+0x283/0x10d0 [ 2054.216951] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2054.217591] ? generic_block_fiemap+0x60/0x60 [ 2054.218144] sock_ioctl+0x3ea/0x700 [ 2054.218591] ? dlci_ioctl_set+0x30/0x30 [ 2054.219072] ? selinux_file_ioctl+0xb6/0x270 [ 2054.219611] ? dlci_ioctl_set+0x30/0x30 [ 2054.220092] __x64_sys_ioctl+0x19a/0x210 [ 2054.220601] do_syscall_64+0x33/0x40 [ 2054.221089] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2054.221721] RIP: 0033:0x7f07a4a4eb19 [ 2054.222177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2054.224425] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2054.225368] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2054.226238] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2054.227105] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2054.227962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2054.228843] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 2054.233966] FAULT_INJECTION: forcing a failure. [ 2054.233966] name failslab, interval 1, probability 0, space 0, times 0 [ 2054.236400] CPU: 0 PID: 11890 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2054.237817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2054.239515] Call Trace: [ 2054.240065] dump_stack+0x107/0x167 [ 2054.240841] should_fail.cold+0x5/0xa [ 2054.241621] ? anon_vma_clone+0xdc/0x590 [ 2054.242459] should_failslab+0x5/0x20 [ 2054.243234] kmem_cache_alloc+0x5b/0x310 [ 2054.244074] anon_vma_clone+0xdc/0x590 [ 2054.244892] anon_vma_fork+0x82/0x640 [ 2054.245675] ? __vm_enough_memory+0x184/0x360 [ 2054.246599] copy_process+0x7218/0x7800 [ 2054.247445] ? __cleanup_sighand+0xb0/0xb0 [ 2054.248332] ? find_held_lock+0x2c/0x110 [ 2054.249165] kernel_clone+0xe7/0x980 [ 2054.249927] ? lock_downgrade+0x6d0/0x6d0 [ 2054.250765] ? find_held_lock+0x2c/0x110 [ 2054.251598] ? create_io_thread+0xf0/0xf0 [ 2054.252447] ? ksys_write+0x12d/0x260 [ 2054.253260] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2054.254247] __do_sys_fork+0x8a/0xc0 [ 2054.254998] ? kernel_thread+0xf0/0xf0 [ 2054.255806] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2054.256870] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2054.257914] ? trace_hardirqs_on+0x5b/0x180 [ 2054.258782] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2054.259837] do_syscall_64+0x33/0x40 [ 2054.260605] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2054.261655] RIP: 0033:0x7fadf412db19 [ 2054.262424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2054.266196] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2054.267760] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2054.269231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2054.270691] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2054.271916] device veth0_vlan entered promiscuous mode [ 2054.272155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2054.272175] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2054.273964] FAULT_INJECTION: forcing a failure. [ 2054.273964] name failslab, interval 1, probability 0, space 0, times 0 [ 2054.276926] CPU: 1 PID: 11876 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2054.277762] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2054.278742] Call Trace: [ 2054.279073] dump_stack+0x107/0x167 [ 2054.279518] should_fail.cold+0x5/0xa [ 2054.279986] ? create_object.isra.0+0x3a/0xa20 [ 2054.280545] should_failslab+0x5/0x20 [ 2054.281006] kmem_cache_alloc+0x5b/0x310 [ 2054.281500] create_object.isra.0+0x3a/0xa20 [ 2054.282020] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2054.282624] kmem_cache_alloc_trace+0x151/0x320 [ 2054.283172] ? blocking_notifier_call_chain+0x13a/0x190 [ 2054.283792] ipv6_add_addr+0x332/0x1d00 [ 2054.284237] ? __lockdep_reset_lock+0x180/0x180 [ 2054.284767] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2054.285359] ? inet6_dump_ifaddr+0x20/0x20 [ 2054.285837] ? ipv6_generate_stable_address+0x299/0x640 [ 2054.286430] addrconf_add_linklocal+0xd4/0x470 [ 2054.286941] ? ipv6_del_addr+0x8d0/0x8d0 [ 2054.287389] ? trace_hardirqs_on+0x5b/0x180 [ 2054.287953] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2054.288649] ? addrconf_add_linklocal+0x470/0x470 [ 2054.289191] ? __local_bh_enable_ip+0x9d/0x100 [ 2054.289703] addrconf_dev_config+0x262/0x440 [ 2054.290194] addrconf_notify+0xc95/0x2410 [ 2054.290664] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2054.291248] ? inet6_ifinfo_notify+0x150/0x150 [ 2054.291752] ? failover_register+0x530/0x530 [ 2054.292261] raw_notifier_call_chain+0xb3/0x110 [ 2054.292791] call_netdevice_notifiers_info+0xb5/0x130 [ 2054.293405] __dev_notify_flags+0x110/0x2c0 [ 2054.293907] ? dev_change_name+0x660/0x660 [ 2054.294407] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2054.295050] dev_change_flags+0x100/0x160 [ 2054.295549] devinet_ioctl+0x14de/0x1db0 [ 2054.296032] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2054.296566] inet_ioctl+0x34f/0x390 [ 2054.296991] ? inet_dgram_connect+0x220/0x220 [ 2054.297518] ? __lock_acquire+0xbb1/0x5b00 [ 2054.298014] ? perf_trace_lock+0xac/0x490 [ 2054.298499] packet_ioctl+0xb3/0x260 [ 2054.298942] sock_do_ioctl+0xd3/0x300 [ 2054.299382] ? compat_ifr_data_ioctl+0x180/0x180 [ 2054.299943] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2054.300626] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2054.301226] ? do_vfs_ioctl+0x283/0x10d0 [ 2054.301688] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2054.302302] ? generic_block_fiemap+0x60/0x60 [ 2054.302833] sock_ioctl+0x3ea/0x700 [ 2054.303249] ? dlci_ioctl_set+0x30/0x30 [ 2054.303717] ? selinux_file_ioctl+0xb6/0x270 [ 2054.304233] ? dlci_ioctl_set+0x30/0x30 [ 2054.304711] __x64_sys_ioctl+0x19a/0x210 [ 2054.305177] do_syscall_64+0x33/0x40 [ 2054.305609] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2054.306187] RIP: 0033:0x7feded0d7b19 [ 2054.306608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2054.308705] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2054.309553] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2054.310373] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2054.311199] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2054.312023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2054.312841] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:31:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060400006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:31:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060500006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:31:27 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0xfeff3f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:31:27 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8902, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:27 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 32) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:27 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:27 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x1000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2054.539117] device veth0_vlan entered promiscuous mode [ 2054.552325] FAULT_INJECTION: forcing a failure. [ 2054.552325] name failslab, interval 1, probability 0, space 0, times 0 [ 2054.555099] CPU: 0 PID: 11906 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2054.556506] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2054.558168] Call Trace: [ 2054.558713] dump_stack+0x107/0x167 [ 2054.559453] should_fail.cold+0x5/0xa [ 2054.560229] ? ipv6_add_addr+0x332/0x1d00 [ 2054.561075] ? ipv6_add_addr+0x332/0x1d00 [ 2054.561952] should_failslab+0x5/0x20 [ 2054.562721] kmem_cache_alloc_trace+0x55/0x320 [ 2054.563664] ? blocking_notifier_call_chain+0x13a/0x190 [ 2054.564742] ipv6_add_addr+0x332/0x1d00 [ 2054.565560] ? __lockdep_reset_lock+0x180/0x180 [ 2054.566487] ? crng_make_state+0x2cd/0x6e0 [ 2054.567339] ? crng_make_state+0x496/0x6e0 [ 2054.568187] ? inet6_dump_ifaddr+0x20/0x20 [ 2054.569065] ? ipv6_generate_stable_address+0x299/0x640 [ 2054.570134] addrconf_add_linklocal+0xd4/0x470 [ 2054.571040] ? ipv6_del_addr+0x8d0/0x8d0 [ 2054.571870] ? trace_hardirqs_on+0x5b/0x180 [ 2054.572767] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2054.573826] ? addrconf_add_linklocal+0x470/0x470 [ 2054.574792] ? __local_bh_enable_ip+0x9d/0x100 [ 2054.575726] addrconf_dev_config+0x262/0x440 [ 2054.576615] addrconf_notify+0xc95/0x2410 [ 2054.577463] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2054.578494] ? inet6_ifinfo_notify+0x150/0x150 [ 2054.579416] ? failover_register+0x530/0x530 [ 2054.580298] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2054.581423] ? ipmr_device_event+0x18b/0x1f0 [ 2054.582303] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2054.583352] raw_notifier_call_chain+0xb3/0x110 [ 2054.584290] call_netdevice_notifiers_info+0xb5/0x130 [ 2054.585355] __dev_notify_flags+0x110/0x2c0 [ 2054.586219] ? dev_change_name+0x660/0x660 [ 2054.587069] ? __dev_change_flags+0x4cf/0x6e0 [ 2054.587970] ? dev_set_allmulti+0x30/0x30 [ 2054.588820] ? cap_capable+0x1d6/0x240 [ 2054.589603] ? full_name_hash+0xb5/0xf0 [ 2054.590411] dev_change_flags+0x100/0x160 [ 2054.591250] devinet_ioctl+0x14de/0x1db0 [ 2054.592091] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2054.593001] inet_ioctl+0x34f/0x390 [ 2054.593743] ? inet_dgram_connect+0x220/0x220 [ 2054.594653] ? __lock_acquire+0xbb1/0x5b00 [ 2054.595530] ? perf_trace_lock+0xac/0x490 [ 2054.596365] packet_ioctl+0xb3/0x260 [ 2054.597134] sock_do_ioctl+0xd3/0x300 [ 2054.597903] ? compat_ifr_data_ioctl+0x180/0x180 [ 2054.598855] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2054.600016] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2054.601071] ? do_vfs_ioctl+0x283/0x10d0 [ 2054.601895] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2054.602937] ? generic_block_fiemap+0x60/0x60 [ 2054.603853] sock_ioctl+0x3ea/0x700 [ 2054.604589] ? dlci_ioctl_set+0x30/0x30 [ 2054.605393] ? selinux_file_ioctl+0xb6/0x270 [ 2054.606275] ? dlci_ioctl_set+0x30/0x30 [ 2054.607071] __x64_sys_ioctl+0x19a/0x210 [ 2054.607887] do_syscall_64+0x33/0x40 [ 2054.608640] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2054.609660] RIP: 0033:0x7f07a4a4eb19 [ 2054.610402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2054.614056] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2054.615567] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2054.616992] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2054.618405] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2054.619816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2054.621245] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:31:42 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 66) 02:31:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060600006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:31:42 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x2000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:31:42 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8903, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:42 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8925, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:31:42 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 34) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:42 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local={0x0}}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:42 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 33) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2069.073203] device veth0_vlan entered promiscuous mode [ 2069.080123] audit: type=1326 audit(1693276302.072:135): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11928 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2069.081225] FAULT_INJECTION: forcing a failure. [ 2069.081225] name failslab, interval 1, probability 0, space 0, times 0 [ 2069.085861] CPU: 1 PID: 11923 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2069.086654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2069.087610] Call Trace: [ 2069.087916] dump_stack+0x107/0x167 [ 2069.088327] should_fail.cold+0x5/0xa [ 2069.088773] ? fib6_info_alloc+0x3c/0x110 [ 2069.089241] should_failslab+0x5/0x20 [ 2069.089669] __kmalloc+0x72/0x390 [ 2069.090062] fib6_info_alloc+0x3c/0x110 [ 2069.090513] ip6_route_info_create+0x37a/0x1a00 [ 2069.091044] ? fib6_nh_init+0x19e0/0x19e0 [ 2069.091512] ? call_netdevice_notifiers_info+0xb5/0x130 [ 2069.092112] ? __dev_notify_flags+0x110/0x2c0 [ 2069.092619] ? dev_change_flags+0x100/0x160 [ 2069.093112] ? devinet_ioctl+0x14de/0x1db0 [ 2069.093583] ? inet_ioctl+0x34f/0x390 [ 2069.094025] ? packet_ioctl+0xb3/0x260 [ 2069.094461] ? sock_do_ioctl+0xd3/0x300 [ 2069.094901] ? sock_ioctl+0x3ea/0x700 [ 2069.095333] addrconf_f6i_alloc+0x28f/0x440 [ 2069.095821] ? ipv6_route_ioctl+0x510/0x510 [ 2069.096321] ? trace_hardirqs_on+0x5b/0x180 [ 2069.096826] ? kasan_unpoison_shadow+0x33/0x50 [ 2069.097377] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2069.097984] ipv6_add_addr+0x375/0x1d00 [ 2069.098428] ? __lockdep_reset_lock+0x180/0x180 [ 2069.098976] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2069.099566] ? inet6_dump_ifaddr+0x20/0x20 [ 2069.100068] ? ipv6_generate_stable_address+0x299/0x640 [ 2069.100682] addrconf_add_linklocal+0xd4/0x470 [ 2069.101211] ? ipv6_del_addr+0x8d0/0x8d0 [ 2069.101677] ? trace_hardirqs_on+0x5b/0x180 [ 2069.102192] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2069.102793] ? addrconf_add_linklocal+0x470/0x470 [ 2069.103345] ? __local_bh_enable_ip+0x9d/0x100 [ 2069.103864] addrconf_dev_config+0x262/0x440 [ 2069.104366] addrconf_notify+0xc95/0x2410 [ 2069.104850] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2069.105463] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2069.106041] ? inet6_ifinfo_notify+0x150/0x150 [ 2069.106553] ? failover_register+0x530/0x530 [ 2069.107044] ? failover_register+0x530/0x530 [ 2069.107580] raw_notifier_call_chain+0xb3/0x110 [ 2069.108109] call_netdevice_notifiers_info+0xb5/0x130 [ 2069.108693] __dev_notify_flags+0x110/0x2c0 [ 2069.109206] ? dev_change_name+0x660/0x660 [ 2069.109712] ? __dev_change_flags+0x4cf/0x6e0 [ 2069.110215] ? dev_set_allmulti+0x30/0x30 [ 2069.110698] ? cap_capable+0x1d6/0x240 [ 2069.111138] ? full_name_hash+0xb5/0xf0 [ 2069.111585] dev_change_flags+0x100/0x160 [ 2069.112047] devinet_ioctl+0x14de/0x1db0 [ 2069.112506] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2069.113021] inet_ioctl+0x34f/0x390 [ 2069.113432] ? inet_dgram_connect+0x220/0x220 [ 2069.113948] ? __lock_acquire+0xbb1/0x5b00 [ 2069.114452] ? perf_trace_lock+0xac/0x490 [ 2069.114918] packet_ioctl+0xb3/0x260 [ 2069.115340] sock_do_ioctl+0xd3/0x300 [ 2069.115770] ? compat_ifr_data_ioctl+0x180/0x180 [ 2069.116323] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2069.116976] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2069.117588] ? do_vfs_ioctl+0x283/0x10d0 [ 2069.118042] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2069.118629] ? generic_block_fiemap+0x60/0x60 [ 2069.119163] sock_ioctl+0x3ea/0x700 [ 2069.119569] ? dlci_ioctl_set+0x30/0x30 [ 2069.120025] ? selinux_file_ioctl+0xb6/0x270 [ 2069.120522] ? dlci_ioctl_set+0x30/0x30 [ 2069.120995] __x64_sys_ioctl+0x19a/0x210 [ 2069.121456] do_syscall_64+0x33/0x40 [ 2069.121874] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2069.122458] RIP: 0033:0x7feded0d7b19 [ 2069.122883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2069.124975] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2069.125843] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2069.126648] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2069.127461] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2069.128263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2069.129073] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:31:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060700006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:31:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060800006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2069.170408] FAULT_INJECTION: forcing a failure. [ 2069.170408] name failslab, interval 1, probability 0, space 0, times 0 [ 2069.171746] CPU: 1 PID: 11941 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2069.172520] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2069.173439] Call Trace: [ 2069.173742] dump_stack+0x107/0x167 [ 2069.174146] should_fail.cold+0x5/0xa [ 2069.174568] ? create_object.isra.0+0x3a/0xa20 [ 2069.175075] should_failslab+0x5/0x20 [ 2069.175505] kmem_cache_alloc+0x5b/0x310 [ 2069.175956] create_object.isra.0+0x3a/0xa20 [ 2069.176445] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2069.177017] kmem_cache_alloc+0x159/0x310 [ 2069.177487] anon_vma_clone+0xdc/0x590 [ 2069.177916] anon_vma_fork+0x82/0x640 [ 2069.178346] ? __vm_enough_memory+0x184/0x360 [ 2069.178844] copy_process+0x7218/0x7800 [ 2069.179296] ? __cleanup_sighand+0xb0/0xb0 [ 2069.179776] ? find_held_lock+0x2c/0x110 [ 2069.180218] kernel_clone+0xe7/0x980 [ 2069.180625] ? lock_downgrade+0x6d0/0x6d0 [ 2069.181090] ? find_held_lock+0x2c/0x110 [ 2069.181547] ? create_io_thread+0xf0/0xf0 [ 2069.182005] ? ksys_write+0x12d/0x260 [ 2069.182443] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2069.182987] __do_sys_fork+0x8a/0xc0 [ 2069.183390] ? kernel_thread+0xf0/0xf0 [ 2069.183844] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2069.184421] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2069.184996] ? trace_hardirqs_on+0x5b/0x180 [ 2069.185492] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2069.186079] do_syscall_64+0x33/0x40 [ 2069.186506] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2069.187084] RIP: 0033:0x7fadf412db19 [ 2069.187525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2069.189461] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2069.190325] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2069.191050] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2069.191862] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2069.192605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2069.193413] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:31:42 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x3000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:31:42 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 35) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000061800006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2069.257289] device veth0_vlan entered promiscuous mode [ 2069.259875] FAULT_INJECTION: forcing a failure. [ 2069.259875] name failslab, interval 1, probability 0, space 0, times 0 [ 2069.262876] CPU: 0 PID: 11935 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2069.264280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2069.265983] Call Trace: [ 2069.266531] dump_stack+0x107/0x167 [ 2069.267261] should_fail.cold+0x5/0xa [ 2069.268034] ? create_object.isra.0+0x3a/0xa20 [ 2069.268982] should_failslab+0x5/0x20 [ 2069.269757] kmem_cache_alloc+0x5b/0x310 [ 2069.270572] create_object.isra.0+0x3a/0xa20 [ 2069.271465] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2069.272507] kmem_cache_alloc_trace+0x151/0x320 [ 2069.273482] ____ip_mc_inc_group+0x277/0xca0 [ 2069.274378] ? kfree_skbmem+0xef/0x1b0 [ 2069.275169] ? ip_mc_add_src+0xe00/0xe00 [ 2069.276006] ip_mc_up+0x14b/0x3a0 [ 2069.276738] inetdev_event+0xbe3/0x1610 [ 2069.277563] ? devinet_init_net+0x650/0x650 [ 2069.278436] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2069.279480] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2069.280518] ? nh_netdev_event+0x8c/0x370 [ 2069.281362] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2069.282416] raw_notifier_call_chain+0xb3/0x110 [ 2069.283367] call_netdevice_notifiers_info+0xb5/0x130 [ 2069.284426] __dev_notify_flags+0x110/0x2c0 [ 2069.285308] ? dev_change_name+0x660/0x660 [ 2069.286183] ? __dev_change_flags+0x4cf/0x6e0 [ 2069.287106] ? dev_set_allmulti+0x30/0x30 [ 2069.287927] ? cap_capable+0x1d6/0x240 [ 2069.288744] ? full_name_hash+0xb5/0xf0 [ 2069.289572] dev_change_flags+0x100/0x160 [ 2069.290420] devinet_ioctl+0x14de/0x1db0 [ 2069.291259] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2069.292148] inet_ioctl+0x34f/0x390 [ 2069.292899] ? inet_dgram_connect+0x220/0x220 [ 2069.293809] ? __schedule+0x16a4/0x1ea0 [ 2069.294621] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2069.295677] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2069.296567] ? trace_hardirqs_on+0x5b/0x180 [ 2069.297451] ? _raw_spin_unlock_irq+0x1f/0x30 [ 2069.298358] ? __schedule+0x16a4/0x1ea0 02:31:42 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2069.299179] packet_ioctl+0xb3/0x260 [ 2069.300042] sock_do_ioctl+0xd3/0x300 [ 2069.300813] ? compat_ifr_data_ioctl+0x180/0x180 [ 2069.301778] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2069.302913] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2069.303961] ? do_vfs_ioctl+0x283/0x10d0 [ 2069.304786] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2069.305852] ? generic_block_fiemap+0x60/0x60 [ 2069.306759] sock_ioctl+0x3ea/0x700 [ 2069.307484] ? dlci_ioctl_set+0x30/0x30 [ 2069.308277] ? selinux_file_ioctl+0xb6/0x270 [ 2069.309177] ? dlci_ioctl_set+0x30/0x30 [ 2069.309984] __x64_sys_ioctl+0x19a/0x210 [ 2069.310808] do_syscall_64+0x33/0x40 [ 2069.311563] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2069.312597] RIP: 0033:0x7f07a4a4eb19 [ 2069.313359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2069.317089] RSP: 002b:00007f07a1fa3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2069.318635] RAX: ffffffffffffffda RBX: 00007f07a4b62020 RCX: 00007f07a4a4eb19 [ 2069.320073] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2069.321492] RBP: 00007f07a1fa31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2069.322912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2069.324361] R13: 00007ffca8d8bf7f R14: 00007f07a1fa3300 R15: 0000000000022000 02:31:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000061c00006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:31:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000066700006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2069.430150] device veth0_vlan entered promiscuous mode [ 2069.435282] FAULT_INJECTION: forcing a failure. [ 2069.435282] name failslab, interval 1, probability 0, space 0, times 0 [ 2069.436849] CPU: 1 PID: 11953 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2069.437600] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2069.438532] Call Trace: [ 2069.438823] dump_stack+0x107/0x167 [ 2069.439224] should_fail.cold+0x5/0xa [ 2069.439633] ? create_object.isra.0+0x3a/0xa20 [ 2069.440126] should_failslab+0x5/0x20 [ 2069.440542] kmem_cache_alloc+0x5b/0x310 [ 2069.440994] create_object.isra.0+0x3a/0xa20 [ 2069.441475] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2069.442034] __kmalloc+0x16e/0x390 [ 2069.442420] fib6_info_alloc+0x3c/0x110 [ 2069.442856] ip6_route_info_create+0x37a/0x1a00 [ 2069.443371] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2069.443945] ? fib6_nh_init+0x19e0/0x19e0 [ 2069.444403] ? lock_chain_count+0x20/0x20 [ 2069.444872] ? perf_trace_lock+0xac/0x490 [ 2069.445341] ip6_route_add+0x24/0x150 [ 2069.445772] addrconf_add_mroute+0x120/0x180 [ 2069.446241] ? ipv6_generate_eui64+0xa40/0xa40 [ 2069.446732] ? find_held_lock+0x2c/0x110 [ 2069.447179] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2069.447742] ? __local_bh_enable_ip+0x9d/0x100 [ 2069.448240] ? trace_hardirqs_on+0x5b/0x180 [ 2069.448706] ? ipv6_find_idev+0x174/0x220 [ 2069.449159] ? __local_bh_enable_ip+0x9d/0x100 [ 2069.449659] addrconf_add_dev+0x16a/0x1e0 [ 2069.450110] addrconf_dev_config+0x1f2/0x440 [ 2069.450597] addrconf_notify+0xc95/0x2410 [ 2069.451066] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2069.451622] ? inet6_ifinfo_notify+0x150/0x150 [ 2069.452124] ? failover_register+0x530/0x530 [ 2069.452606] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2069.453201] ? ipmr_device_event+0x18b/0x1f0 [ 2069.453673] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2069.454249] raw_notifier_call_chain+0xb3/0x110 [ 2069.454762] call_netdevice_notifiers_info+0xb5/0x130 [ 2069.455312] __dev_notify_flags+0x110/0x2c0 [ 2069.455794] ? dev_change_name+0x660/0x660 [ 2069.456245] ? __dev_change_flags+0x4cf/0x6e0 [ 2069.456733] ? dev_set_allmulti+0x30/0x30 [ 2069.457198] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2069.457791] dev_change_flags+0x100/0x160 [ 2069.458257] devinet_ioctl+0x14de/0x1db0 [ 2069.458702] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2069.459194] inet_ioctl+0x34f/0x390 [ 2069.459591] ? inet_dgram_connect+0x220/0x220 [ 2069.460090] ? __lock_acquire+0xbb1/0x5b00 [ 2069.460561] ? perf_trace_lock+0xac/0x490 [ 2069.461012] packet_ioctl+0xb3/0x260 [ 2069.461416] sock_do_ioctl+0xd3/0x300 [ 2069.461828] ? compat_ifr_data_ioctl+0x180/0x180 [ 2069.462336] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2069.462944] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2069.463500] ? do_vfs_ioctl+0x283/0x10d0 [ 2069.463940] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2069.464499] ? generic_block_fiemap+0x60/0x60 [ 2069.464997] sock_ioctl+0x3ea/0x700 [ 2069.465392] ? dlci_ioctl_set+0x30/0x30 [ 2069.465838] ? selinux_file_ioctl+0xb6/0x270 [ 2069.466311] ? dlci_ioctl_set+0x30/0x30 [ 2069.466739] __x64_sys_ioctl+0x19a/0x210 [ 2069.467185] do_syscall_64+0x33/0x40 [ 2069.467596] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2069.468157] RIP: 0033:0x7feded0d7b19 [ 2069.468561] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2069.470583] RSP: 002b:00007fedea62c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2069.471409] RAX: ffffffffffffffda RBX: 00007feded1eb020 RCX: 00007feded0d7b19 [ 2069.472174] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2069.472952] RBP: 00007fedea62c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2069.473713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2069.474504] R13: 00007ffef51d5a1f R14: 00007fedea62c300 R15: 0000000000022000 02:31:56 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 36) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:56 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x3003eff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:31:56 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 67) 02:31:56 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8934, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:31:56 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:31:56 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8904, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:56 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 34) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:31:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000000006f000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2083.649815] audit: type=1326 audit(1693276316.642:136): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=11971 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:31:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060003006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2083.671294] device veth0_vlan entered promiscuous mode [ 2083.673372] FAULT_INJECTION: forcing a failure. [ 2083.673372] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.675951] CPU: 0 PID: 11978 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2083.677358] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2083.679036] Call Trace: [ 2083.679582] dump_stack+0x107/0x167 [ 2083.680326] should_fail.cold+0x5/0xa [ 2083.681112] ? create_object.isra.0+0x3a/0xa20 [ 2083.682043] should_failslab+0x5/0x20 [ 2083.682819] kmem_cache_alloc+0x5b/0x310 [ 2083.683650] create_object.isra.0+0x3a/0xa20 [ 2083.684539] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2083.685587] __kmalloc+0x16e/0x390 [ 2083.686320] fib6_info_alloc+0x3c/0x110 [ 2083.687127] ip6_route_info_create+0x37a/0x1a00 [ 2083.688079] ? fib6_nh_init+0x19e0/0x19e0 [ 2083.688927] ? call_netdevice_notifiers_info+0xb5/0x130 [ 2083.690007] ? __dev_notify_flags+0x110/0x2c0 [ 2083.690905] ? dev_change_flags+0x100/0x160 [ 2083.691777] ? devinet_ioctl+0x14de/0x1db0 [ 2083.692625] ? inet_ioctl+0x34f/0x390 [ 2083.693407] ? packet_ioctl+0xb3/0x260 [ 2083.694192] ? sock_do_ioctl+0xd3/0x300 [ 2083.694991] ? sock_ioctl+0x3ea/0x700 [ 2083.695768] addrconf_f6i_alloc+0x28f/0x440 [ 2083.696643] ? ipv6_route_ioctl+0x510/0x510 [ 2083.697589] ? trace_hardirqs_on+0x5b/0x180 [ 2083.698470] ? kasan_unpoison_shadow+0x33/0x50 [ 2083.699395] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2083.700425] ipv6_add_addr+0x375/0x1d00 [ 2083.701262] ? __lockdep_reset_lock+0x180/0x180 [ 2083.702212] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2083.703283] ? inet6_dump_ifaddr+0x20/0x20 [ 2083.704148] ? ipv6_generate_stable_address+0x299/0x640 [ 2083.705256] addrconf_add_linklocal+0xd4/0x470 [ 2083.706188] ? ipv6_del_addr+0x8d0/0x8d0 [ 2083.707015] ? trace_hardirqs_on+0x5b/0x180 [ 2083.707915] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2083.708992] ? addrconf_add_linklocal+0x470/0x470 [ 2083.709973] ? __local_bh_enable_ip+0x9d/0x100 [ 2083.710904] addrconf_dev_config+0x262/0x440 [ 2083.711809] addrconf_notify+0xc95/0x2410 [ 2083.712665] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2083.713738] ? inet6_ifinfo_notify+0x150/0x150 [ 2083.714665] ? failover_register+0x530/0x530 [ 2083.715567] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2083.716675] ? ipmr_device_event+0x18b/0x1f0 [ 2083.717569] ? __sanitizer_cov_trace_switch+0x45/0x80 02:31:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000068004006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2083.718629] raw_notifier_call_chain+0xb3/0x110 [ 2083.719715] call_netdevice_notifiers_info+0xb5/0x130 [ 2083.720762] __dev_notify_flags+0x110/0x2c0 [ 2083.721664] ? dev_change_name+0x660/0x660 [ 2083.722525] ? __dev_change_flags+0x4cf/0x6e0 [ 2083.723441] ? dev_set_allmulti+0x30/0x30 [ 2083.724284] ? cap_capable+0x1d6/0x240 [ 2083.725083] ? full_name_hash+0xb5/0xf0 [ 2083.725895] dev_change_flags+0x100/0x160 [ 2083.726755] devinet_ioctl+0x14de/0x1db0 [ 2083.727582] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2083.728478] inet_ioctl+0x34f/0x390 [ 2083.729242] ? inet_dgram_connect+0x220/0x220 [ 2083.730168] ? __lock_acquire+0xbb1/0x5b00 [ 2083.731045] ? perf_trace_lock+0xac/0x490 [ 2083.731886] packet_ioctl+0xb3/0x260 [ 2083.732646] sock_do_ioctl+0xd3/0x300 [ 2083.733435] ? compat_ifr_data_ioctl+0x180/0x180 [ 2083.734395] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2083.735553] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2083.736604] ? do_vfs_ioctl+0x283/0x10d0 [ 2083.737436] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2083.738490] ? generic_block_fiemap+0x60/0x60 [ 2083.739394] sock_ioctl+0x3ea/0x700 [ 2083.740132] ? dlci_ioctl_set+0x30/0x30 [ 2083.740962] ? selinux_file_ioctl+0xb6/0x270 [ 2083.741849] ? dlci_ioctl_set+0x30/0x30 [ 2083.742654] __x64_sys_ioctl+0x19a/0x210 [ 2083.743487] do_syscall_64+0x33/0x40 [ 2083.744243] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2083.745286] RIP: 0033:0x7feded0d7b19 [ 2083.746039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2083.749790] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2083.751339] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2083.752776] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2083.754210] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2083.755694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2083.757193] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:31:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060005006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2083.780271] device veth0_vlan entered promiscuous mode [ 2083.795252] FAULT_INJECTION: forcing a failure. [ 2083.795252] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.797844] CPU: 0 PID: 11981 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2083.799249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2083.800926] Call Trace: [ 2083.801465] dump_stack+0x107/0x167 [ 2083.802209] should_fail.cold+0x5/0xa [ 2083.802984] ? create_object.isra.0+0x3a/0xa20 [ 2083.803917] should_failslab+0x5/0x20 [ 2083.804681] kmem_cache_alloc+0x5b/0x310 [ 2083.805545] create_object.isra.0+0x3a/0xa20 [ 2083.806443] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2083.807499] kmem_cache_alloc_trace+0x151/0x320 [ 2083.808445] ? blocking_notifier_call_chain+0x13a/0x190 02:31:56 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2083.809531] ipv6_add_addr+0x332/0x1d00 [ 2083.810457] ? __lockdep_reset_lock+0x180/0x180 [ 2083.811409] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2083.812474] ? inet6_dump_ifaddr+0x20/0x20 [ 2083.813358] ? ipv6_generate_stable_address+0x299/0x640 [ 2083.814446] addrconf_add_linklocal+0xd4/0x470 [ 2083.815368] ? ipv6_del_addr+0x8d0/0x8d0 [ 2083.816200] ? trace_hardirqs_on+0x5b/0x180 [ 2083.817100] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2083.818275] ? addrconf_add_linklocal+0x470/0x470 [ 2083.819295] ? __local_bh_enable_ip+0x9d/0x100 [ 2083.820225] addrconf_dev_config+0x262/0x440 [ 2083.821143] addrconf_notify+0xc95/0x2410 [ 2083.821996] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2083.823045] ? inet6_ifinfo_notify+0x150/0x150 [ 2083.823970] ? failover_register+0x530/0x530 [ 2083.824863] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2083.825981] ? ipmr_device_event+0x18b/0x1f0 [ 2083.826872] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2083.827929] raw_notifier_call_chain+0xb3/0x110 [ 2083.828873] call_netdevice_notifiers_info+0xb5/0x130 [ 2083.829932] __dev_notify_flags+0x110/0x2c0 [ 2083.830811] ? dev_change_name+0x660/0x660 [ 2083.831665] ? __dev_change_flags+0x4cf/0x6e0 [ 2083.832576] ? dev_set_allmulti+0x30/0x30 [ 2083.833437] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2083.834548] dev_change_flags+0x100/0x160 [ 2083.835388] devinet_ioctl+0x14de/0x1db0 [ 2083.836223] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2083.837137] inet_ioctl+0x34f/0x390 [ 2083.837876] ? inet_dgram_connect+0x220/0x220 [ 2083.838796] ? __lock_acquire+0xbb1/0x5b00 [ 2083.839672] ? perf_trace_lock+0xac/0x490 [ 2083.840508] packet_ioctl+0xb3/0x260 [ 2083.841293] sock_do_ioctl+0xd3/0x300 [ 2083.842069] ? compat_ifr_data_ioctl+0x180/0x180 [ 2083.843044] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2083.844214] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2083.845269] ? do_vfs_ioctl+0x283/0x10d0 [ 2083.846087] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2083.847143] ? generic_block_fiemap+0x60/0x60 [ 2083.848050] sock_ioctl+0x3ea/0x700 [ 2083.848778] ? dlci_ioctl_set+0x30/0x30 [ 2083.849615] ? selinux_file_ioctl+0xb6/0x270 [ 2083.850514] ? dlci_ioctl_set+0x30/0x30 [ 2083.851319] __x64_sys_ioctl+0x19a/0x210 [ 2083.852158] do_syscall_64+0x33/0x40 [ 2083.852928] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2083.853965] RIP: 0033:0x7f07a4a4eb19 [ 2083.854721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2083.858435] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2083.859975] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2083.861429] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2083.862870] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2083.864315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2083.865751] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 2083.869891] FAULT_INJECTION: forcing a failure. [ 2083.869891] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.872200] CPU: 0 PID: 11998 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2083.873606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2083.875268] Call Trace: [ 2083.875809] dump_stack+0x107/0x167 [ 2083.876572] should_fail.cold+0x5/0xa [ 2083.877359] ? anon_vma_fork+0xf1/0x640 [ 2083.878179] should_failslab+0x5/0x20 [ 2083.878960] kmem_cache_alloc+0x5b/0x310 [ 2083.879806] anon_vma_fork+0xf1/0x640 [ 2083.880594] ? __vm_enough_memory+0x184/0x360 [ 2083.881533] copy_process+0x7218/0x7800 [ 2083.882390] ? __cleanup_sighand+0xb0/0xb0 [ 2083.883269] ? find_held_lock+0x2c/0x110 [ 2083.884105] kernel_clone+0xe7/0x980 [ 2083.884862] ? lock_downgrade+0x6d0/0x6d0 [ 2083.885714] ? find_held_lock+0x2c/0x110 [ 2083.886542] ? create_io_thread+0xf0/0xf0 [ 2083.887385] ? ksys_write+0x12d/0x260 [ 2083.888171] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2083.889172] __do_sys_fork+0x8a/0xc0 [ 2083.889932] ? kernel_thread+0xf0/0xf0 [ 2083.890747] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2083.891825] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2083.892873] ? trace_hardirqs_on+0x5b/0x180 [ 2083.893786] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2083.894831] do_syscall_64+0x33/0x40 [ 2083.895596] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2083.896633] RIP: 0033:0x7fadf412db19 [ 2083.897407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2083.901142] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2083.902695] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2083.904143] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2083.905609] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2083.907061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2083.908505] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:32:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060006006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:10 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 68) 02:32:10 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8935, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2097.499806] audit: type=1326 audit(1693276330.492:137): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12007 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:32:10 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:32:10 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x3300000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:32:10 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 37) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:10 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 35) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:10 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8905, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2097.547245] device veth0_vlan entered promiscuous mode [ 2097.561935] FAULT_INJECTION: forcing a failure. [ 2097.561935] name failslab, interval 1, probability 0, space 0, times 0 [ 2097.564860] CPU: 1 PID: 12014 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2097.566306] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2097.568010] Call Trace: [ 2097.568560] dump_stack+0x107/0x167 [ 2097.569329] should_fail.cold+0x5/0xa [ 2097.570113] ? create_object.isra.0+0x3a/0xa20 [ 2097.571048] should_failslab+0x5/0x20 [ 2097.571818] kmem_cache_alloc+0x5b/0x310 [ 2097.572655] create_object.isra.0+0x3a/0xa20 [ 2097.573567] kmemleak_alloc_percpu+0xa0/0x100 [ 2097.574487] pcpu_alloc+0x4e2/0x1240 [ 2097.575267] fib_nh_common_init+0x2d/0x160 [ 2097.576140] fib6_nh_init+0xa21/0x19e0 [ 2097.576946] ? icmp6_dst_alloc+0x650/0x650 [ 2097.577815] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2097.578749] ? gre_gro_complete+0x530/0x530 [ 2097.579635] ? kasan_unpoison_shadow+0x33/0x50 [ 2097.580572] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2097.581659] ip6_route_info_create+0x1185/0x1a00 [ 2097.582639] ? fib6_nh_init+0x19e0/0x19e0 [ 2097.583488] ? call_netdevice_notifiers_info+0xb5/0x130 [ 2097.584570] ? __dev_notify_flags+0x110/0x2c0 [ 2097.585489] ? dev_change_flags+0x100/0x160 [ 2097.586370] ? devinet_ioctl+0x14de/0x1db0 [ 2097.587233] ? inet_ioctl+0x34f/0x390 [ 2097.588011] ? packet_ioctl+0xb3/0x260 [ 2097.588805] ? sock_do_ioctl+0xd3/0x300 [ 2097.589620] ? sock_ioctl+0x3ea/0x700 [ 2097.590406] addrconf_f6i_alloc+0x28f/0x440 [ 2097.591301] ? ipv6_route_ioctl+0x510/0x510 [ 2097.592211] ? trace_hardirqs_on+0x5b/0x180 [ 2097.593107] ? kasan_unpoison_shadow+0x33/0x50 [ 2097.594045] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2097.595089] ipv6_add_addr+0x375/0x1d00 [ 2097.595908] ? __lockdep_reset_lock+0x180/0x180 [ 2097.596863] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2097.597977] ? inet6_dump_ifaddr+0x20/0x20 [ 2097.598854] ? ipv6_generate_stable_address+0x299/0x640 [ 2097.599971] addrconf_add_linklocal+0xd4/0x470 [ 2097.600911] ? ipv6_del_addr+0x8d0/0x8d0 [ 2097.601765] ? trace_hardirqs_on+0x5b/0x180 [ 2097.602678] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2097.603774] ? addrconf_add_linklocal+0x470/0x470 [ 2097.604772] ? __local_bh_enable_ip+0x9d/0x100 [ 2097.605734] addrconf_dev_config+0x262/0x440 [ 2097.606636] addrconf_notify+0xc95/0x2410 [ 2097.607496] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2097.608560] ? inet6_ifinfo_notify+0x150/0x150 [ 2097.609501] ? failover_register+0x530/0x530 [ 2097.610404] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2097.611527] ? ipmr_device_event+0x18b/0x1f0 [ 2097.612427] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2097.613499] raw_notifier_call_chain+0xb3/0x110 [ 2097.614457] call_netdevice_notifiers_info+0xb5/0x130 [ 2097.615516] __dev_notify_flags+0x110/0x2c0 [ 2097.616398] ? dev_change_name+0x660/0x660 [ 2097.617281] ? __dev_change_flags+0x4cf/0x6e0 [ 2097.618205] ? dev_set_allmulti+0x30/0x30 [ 2097.619065] dev_change_flags+0x100/0x160 [ 2097.619920] devinet_ioctl+0x14de/0x1db0 [ 2097.620036] FAULT_INJECTION: forcing a failure. [ 2097.620036] name failslab, interval 1, probability 0, space 0, times 0 [ 2097.620760] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2097.620792] inet_ioctl+0x34f/0x390 [ 2097.624680] ? inet_dgram_connect+0x220/0x220 [ 2097.625617] ? __lock_acquire+0xbb1/0x5b00 [ 2097.626517] ? perf_trace_lock+0xac/0x490 [ 2097.627369] packet_ioctl+0xb3/0x260 [ 2097.628129] sock_do_ioctl+0xd3/0x300 [ 2097.628907] ? compat_ifr_data_ioctl+0x180/0x180 [ 2097.629902] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2097.631080] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2097.632129] ? do_vfs_ioctl+0x283/0x10d0 [ 2097.632965] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2097.634040] ? generic_block_fiemap+0x60/0x60 [ 2097.634967] sock_ioctl+0x3ea/0x700 [ 2097.635708] ? dlci_ioctl_set+0x30/0x30 [ 2097.636526] ? selinux_file_ioctl+0xb6/0x270 [ 2097.637441] ? dlci_ioctl_set+0x30/0x30 [ 2097.638255] __x64_sys_ioctl+0x19a/0x210 [ 2097.639092] do_syscall_64+0x33/0x40 [ 2097.639855] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2097.640905] RIP: 0033:0x7feded0d7b19 [ 2097.641671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2097.645436] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2097.646989] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2097.648440] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2097.649915] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2097.651367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2097.652827] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2097.654319] CPU: 0 PID: 12027 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2097.655753] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2097.657466] Call Trace: [ 2097.658015] dump_stack+0x107/0x167 [ 2097.658772] should_fail.cold+0x5/0xa [ 2097.659560] ? create_object.isra.0+0x3a/0xa20 [ 2097.660500] should_failslab+0x5/0x20 [ 2097.661291] kmem_cache_alloc+0x5b/0x310 [ 2097.662133] create_object.isra.0+0x3a/0xa20 [ 2097.663039] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2097.664083] kmem_cache_alloc+0x159/0x310 [ 2097.664954] anon_vma_fork+0xf1/0x640 [ 2097.665771] ? __vm_enough_memory+0x184/0x360 [ 2097.666696] copy_process+0x7218/0x7800 [ 2097.667560] ? __cleanup_sighand+0xb0/0xb0 02:32:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060007006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:10 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x1000000, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2097.668551] ? find_held_lock+0x2c/0x110 [ 2097.669426] kernel_clone+0xe7/0x980 [ 2097.670200] ? lock_downgrade+0x6d0/0x6d0 [ 2097.671061] ? find_held_lock+0x2c/0x110 [ 2097.671901] ? create_io_thread+0xf0/0xf0 [ 2097.672772] ? ksys_write+0x12d/0x260 [ 2097.673592] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2097.674589] __do_sys_fork+0x8a/0xc0 [ 2097.675345] ? kernel_thread+0xf0/0xf0 [ 2097.676154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2097.677225] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2097.678279] ? trace_hardirqs_on+0x5b/0x180 [ 2097.679162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2097.679879] device veth0_vlan entered promiscuous mode [ 2097.680213] do_syscall_64+0x33/0x40 [ 2097.680241] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2097.683080] RIP: 0033:0x7fadf412db19 [ 2097.683843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2097.684099] FAULT_INJECTION: forcing a failure. [ 2097.684099] name failslab, interval 1, probability 0, space 0, times 0 [ 2097.687648] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2097.687671] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2097.687683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2097.687694] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2097.687706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2097.687718] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2097.700400] CPU: 1 PID: 12015 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2097.701812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2097.703492] Call Trace: [ 2097.704031] dump_stack+0x107/0x167 [ 2097.704777] should_fail.cold+0x5/0xa [ 2097.705587] ? create_object.isra.0+0x3a/0xa20 [ 2097.706519] should_failslab+0x5/0x20 [ 2097.707295] kmem_cache_alloc+0x5b/0x310 [ 2097.708139] create_object.isra.0+0x3a/0xa20 [ 2097.709037] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2097.710125] kmem_cache_alloc_trace+0x151/0x320 [ 2097.711107] ipv6_add_addr+0x332/0x1d00 [ 2097.711944] ? __lockdep_reset_lock+0x180/0x180 [ 2097.712929] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2097.714047] ? inet6_dump_ifaddr+0x20/0x20 [ 2097.714953] ? ipv6_generate_stable_address+0x299/0x640 [ 2097.716056] addrconf_add_linklocal+0xd4/0x470 [ 2097.716989] ? ipv6_del_addr+0x8d0/0x8d0 [ 2097.717835] ? trace_hardirqs_on+0x5b/0x180 [ 2097.718743] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2097.719811] ? addrconf_add_linklocal+0x470/0x470 [ 2097.720798] ? __local_bh_enable_ip+0x9d/0x100 [ 2097.721766] addrconf_dev_config+0x262/0x440 [ 2097.722679] addrconf_notify+0xc95/0x2410 [ 2097.723546] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2097.724605] ? inet6_ifinfo_notify+0x150/0x150 [ 2097.725560] ? failover_register+0x530/0x530 [ 2097.726463] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2097.727582] ? ipmr_device_event+0x18b/0x1f0 [ 2097.728480] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2097.729544] raw_notifier_call_chain+0xb3/0x110 [ 2097.730499] call_netdevice_notifiers_info+0xb5/0x130 [ 2097.731553] __dev_notify_flags+0x110/0x2c0 [ 2097.732434] ? dev_change_name+0x660/0x660 [ 2097.733300] ? __dev_change_flags+0x4cf/0x6e0 [ 2097.734216] ? dev_set_allmulti+0x30/0x30 [ 2097.735068] ? cap_capable+0x1d6/0x240 [ 2097.735865] ? full_name_hash+0xb5/0xf0 [ 2097.736678] dev_change_flags+0x100/0x160 [ 2097.737553] devinet_ioctl+0x14de/0x1db0 [ 2097.738397] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2097.739304] inet_ioctl+0x34f/0x390 [ 2097.740052] ? inet_dgram_connect+0x220/0x220 [ 2097.740982] ? __lock_acquire+0xbb1/0x5b00 [ 2097.741880] ? perf_trace_lock+0xac/0x490 [ 2097.742730] packet_ioctl+0xb3/0x260 [ 2097.743497] sock_do_ioctl+0xd3/0x300 [ 2097.744277] ? compat_ifr_data_ioctl+0x180/0x180 [ 2097.745272] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2097.746439] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2097.747492] ? do_vfs_ioctl+0x283/0x10d0 [ 2097.748318] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2097.749398] ? generic_block_fiemap+0x60/0x60 [ 2097.750337] sock_ioctl+0x3ea/0x700 [ 2097.751077] ? dlci_ioctl_set+0x30/0x30 [ 2097.751896] ? selinux_file_ioctl+0xb6/0x270 [ 2097.752796] ? dlci_ioctl_set+0x30/0x30 [ 2097.753618] __x64_sys_ioctl+0x19a/0x210 [ 2097.754456] do_syscall_64+0x33/0x40 [ 2097.755220] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2097.756268] RIP: 0033:0x7f07a4a4eb19 [ 2097.757028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2097.760808] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2097.762347] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2097.763799] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2097.765259] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2097.766719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2097.768168] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:32:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060018006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000000006001c006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060020006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:10 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x4000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:32:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000000006003f006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060067006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:25 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x893a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:32:25 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 36) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:25 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x7, 0x0, @local}, 'syzkaller0\x00'}) 02:32:25 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 38) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2112.140281] audit: type=1326 audit(1693276345.132:138): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12063 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:32:25 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x5000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:32:25 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 69) 02:32:25 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8906, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060480006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2112.181132] device veth0_vlan entered promiscuous mode [ 2112.184611] FAULT_INJECTION: forcing a failure. [ 2112.184611] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.186672] CPU: 1 PID: 12068 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2112.187525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2112.188566] Call Trace: [ 2112.188929] dump_stack+0x107/0x167 [ 2112.189421] should_fail.cold+0x5/0xa [ 2112.189917] ? create_object.isra.0+0x3a/0xa20 [ 2112.190466] should_failslab+0x5/0x20 [ 2112.190937] kmem_cache_alloc+0x5b/0x310 [ 2112.191426] create_object.isra.0+0x3a/0xa20 [ 2112.191949] kmemleak_alloc_percpu+0xa0/0x100 [ 2112.192464] pcpu_alloc+0x4e2/0x1240 [ 2112.192926] fib6_nh_init+0xa51/0x19e0 [ 2112.193383] ? icmp6_dst_alloc+0x650/0x650 [ 2112.193901] ? ip6_route_info_create+0x7d3/0x1a00 [ 2112.194443] ? check_memory_region+0x198/0x1f0 [ 2112.194991] ip6_route_info_create+0x1185/0x1a00 [ 2112.195555] ? fib6_nh_init+0x19e0/0x19e0 [ 2112.196027] ? call_netdevice_notifiers_info+0xb5/0x130 [ 2112.196642] ? __dev_notify_flags+0x110/0x2c0 [ 2112.197139] ? dev_change_flags+0x100/0x160 [ 2112.197642] ? devinet_ioctl+0x14de/0x1db0 [ 2112.198101] ? inet_ioctl+0x34f/0x390 [ 2112.198538] ? packet_ioctl+0xb3/0x260 [ 2112.198964] ? sock_do_ioctl+0xd3/0x300 [ 2112.199411] ? sock_ioctl+0x3ea/0x700 [ 2112.199832] addrconf_f6i_alloc+0x28f/0x440 [ 2112.200322] ? mark_held_locks+0x9e/0xe0 [ 2112.200770] ? ipv6_route_ioctl+0x510/0x510 [ 2112.201267] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2112.201877] ? kasan_unpoison_shadow+0x33/0x50 [ 2112.202402] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2112.202956] ipv6_add_addr+0x375/0x1d00 [ 2112.203416] ? __lockdep_reset_lock+0x180/0x180 [ 2112.203924] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 2112.204525] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2112.205150] ? inet6_dump_ifaddr+0x20/0x20 [ 2112.205653] ? ipv6_generate_stable_address+0x299/0x640 [ 2112.206260] addrconf_add_linklocal+0xd4/0x470 [ 2112.206779] ? ipv6_del_addr+0x8d0/0x8d0 [ 2112.207243] ? trace_hardirqs_on+0x5b/0x180 [ 2112.207749] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2112.208348] ? addrconf_add_linklocal+0x470/0x470 [ 2112.208907] ? __local_bh_enable_ip+0x9d/0x100 [ 2112.209439] addrconf_dev_config+0x262/0x440 [ 2112.209945] addrconf_notify+0xc95/0x2410 [ 2112.210427] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 2112.210967] ? inet6_ifinfo_notify+0x150/0x150 [ 2112.211494] ? failover_register+0x530/0x530 [ 2112.211996] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2112.212623] ? ipmr_device_event+0x18b/0x1f0 [ 2112.213127] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.213738] raw_notifier_call_chain+0xb3/0x110 [ 2112.214273] call_netdevice_notifiers_info+0xb5/0x130 [ 2112.214867] __dev_notify_flags+0x110/0x2c0 [ 2112.215365] ? dev_change_name+0x660/0x660 [ 2112.215840] ? __dev_change_flags+0x4cf/0x6e0 [ 2112.216358] ? dev_set_allmulti+0x30/0x30 [ 2112.216836] ? full_name_hash+0xb5/0xf0 [ 2112.217306] dev_change_flags+0x100/0x160 [ 2112.217779] devinet_ioctl+0x14de/0x1db0 [ 2112.218249] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2112.218758] inet_ioctl+0x34f/0x390 [ 2112.219179] ? inet_dgram_connect+0x220/0x220 [ 2112.219703] ? __lock_acquire+0xbb1/0x5b00 [ 2112.220195] ? perf_trace_lock+0xac/0x490 [ 2112.220673] packet_ioctl+0xb3/0x260 [ 2112.221104] sock_do_ioctl+0xd3/0x300 [ 2112.221548] ? compat_ifr_data_ioctl+0x180/0x180 [ 2112.222091] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2112.222748] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.223337] ? do_vfs_ioctl+0x283/0x10d0 [ 2112.223801] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2112.224397] ? generic_block_fiemap+0x60/0x60 [ 2112.224920] sock_ioctl+0x3ea/0x700 [ 2112.225342] ? dlci_ioctl_set+0x30/0x30 [ 2112.225802] ? selinux_file_ioctl+0xb6/0x270 [ 2112.226302] ? dlci_ioctl_set+0x30/0x30 [ 2112.226754] __x64_sys_ioctl+0x19a/0x210 [ 2112.227218] do_syscall_64+0x33/0x40 [ 2112.227645] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2112.228238] RIP: 0033:0x7feded0d7b19 [ 2112.228665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2112.230760] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2112.231638] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2112.232441] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2112.233256] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2112.234022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2112.234830] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2112.239947] FAULT_INJECTION: forcing a failure. [ 2112.239947] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.241224] CPU: 1 PID: 12075 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2112.242026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2112.242960] Call Trace: [ 2112.243260] dump_stack+0x107/0x167 [ 2112.243680] should_fail.cold+0x5/0xa [ 2112.244116] ? anon_vma_fork+0x1ff/0x640 [ 2112.244583] should_failslab+0x5/0x20 [ 2112.245012] kmem_cache_alloc+0x5b/0x310 [ 2112.245463] anon_vma_fork+0x1ff/0x640 [ 2112.245917] copy_process+0x7218/0x7800 [ 2112.246366] ? __cleanup_sighand+0xb0/0xb0 [ 2112.246858] ? find_held_lock+0x2c/0x110 [ 2112.247297] kernel_clone+0xe7/0x980 [ 2112.247722] ? lock_downgrade+0x6d0/0x6d0 [ 2112.248174] ? find_held_lock+0x2c/0x110 [ 2112.248633] ? create_io_thread+0xf0/0xf0 [ 2112.249108] ? ksys_write+0x12d/0x260 [ 2112.249549] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2112.250107] __do_sys_fork+0x8a/0xc0 [ 2112.250533] ? kernel_thread+0xf0/0xf0 [ 2112.250969] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2112.251561] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2112.252141] ? trace_hardirqs_on+0x5b/0x180 [ 2112.252629] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2112.253191] do_syscall_64+0x33/0x40 [ 2112.253639] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2112.254206] RIP: 0033:0x7fadf412db19 [ 2112.254628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2112.256698] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2112.257571] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2112.258378] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2112.259179] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2112.259993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2112.260801] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:32:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000000006fdef006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2112.269836] device veth0_vlan entered promiscuous mode [ 2112.271888] FAULT_INJECTION: forcing a failure. [ 2112.271888] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.273284] CPU: 1 PID: 12059 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2112.274071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2112.275009] Call Trace: [ 2112.275304] dump_stack+0x107/0x167 [ 2112.275718] should_fail.cold+0x5/0xa [ 2112.276144] ? create_object.isra.0+0x3a/0xa20 [ 2112.276661] should_failslab+0x5/0x20 [ 2112.277071] kmem_cache_alloc+0x5b/0x310 [ 2112.277533] create_object.isra.0+0x3a/0xa20 [ 2112.278005] kmemleak_alloc_percpu+0xa0/0x100 [ 2112.278507] pcpu_alloc+0x4e2/0x1240 [ 2112.278939] fib_nh_common_init+0x2d/0x160 [ 2112.279415] fib6_nh_init+0xa21/0x19e0 [ 2112.279841] ? icmp6_dst_alloc+0x650/0x650 [ 2112.280317] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2112.280828] ? gre_gro_complete+0x530/0x530 [ 2112.281308] ? kasan_unpoison_shadow+0x33/0x50 [ 2112.281814] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2112.282358] ip6_route_info_create+0x1185/0x1a00 [ 2112.282895] ? fib6_nh_init+0x19e0/0x19e0 [ 2112.283337] ? call_netdevice_notifiers_info+0xb5/0x130 [ 2112.283933] ? __dev_notify_flags+0x110/0x2c0 [ 2112.284410] ? dev_change_flags+0x100/0x160 [ 2112.284891] ? devinet_ioctl+0x14de/0x1db0 [ 2112.285338] ? inet_ioctl+0x34f/0x390 [ 2112.285763] ? packet_ioctl+0xb3/0x260 [ 2112.286181] ? sock_do_ioctl+0xd3/0x300 [ 2112.286624] ? sock_ioctl+0x3ea/0x700 [ 2112.287036] addrconf_f6i_alloc+0x28f/0x440 [ 2112.287516] ? ipv6_route_ioctl+0x510/0x510 [ 2112.287986] ? trace_hardirqs_on+0x5b/0x180 [ 2112.288469] ? kasan_unpoison_shadow+0x33/0x50 [ 2112.288946] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2112.289524] ipv6_add_addr+0x375/0x1d00 [ 2112.289941] ? __lockdep_reset_lock+0x180/0x180 [ 2112.290469] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2112.291053] ? inet6_dump_ifaddr+0x20/0x20 [ 2112.291533] ? ipv6_generate_stable_address+0x299/0x640 [ 2112.292153] addrconf_add_linklocal+0xd4/0x470 [ 2112.292664] ? ipv6_del_addr+0x8d0/0x8d0 [ 2112.293154] ? trace_hardirqs_on+0x5b/0x180 [ 2112.293647] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2112.294235] ? addrconf_add_linklocal+0x470/0x470 [ 2112.294772] ? __local_bh_enable_ip+0x9d/0x100 [ 2112.295287] addrconf_dev_config+0x262/0x440 [ 2112.295779] addrconf_notify+0xc95/0x2410 [ 2112.296242] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.296825] ? inet6_ifinfo_notify+0x150/0x150 [ 2112.297339] ? failover_register+0x530/0x530 [ 2112.297837] ? __sanitizer_cov_trace_switch+0xe/0x80 [ 2112.298419] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2112.299029] ? ipmr_device_event+0x18b/0x1f0 [ 2112.299522] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.300098] raw_notifier_call_chain+0xb3/0x110 [ 2112.300619] call_netdevice_notifiers_info+0xb5/0x130 [ 2112.301193] __dev_notify_flags+0x110/0x2c0 [ 2112.301693] ? dev_change_name+0x660/0x660 [ 2112.302159] ? __dev_change_flags+0x4cf/0x6e0 [ 2112.302661] ? dev_set_allmulti+0x30/0x30 [ 2112.303114] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2112.303724] dev_change_flags+0x100/0x160 [ 2112.304188] devinet_ioctl+0x14de/0x1db0 [ 2112.304646] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2112.305149] inet_ioctl+0x34f/0x390 [ 2112.305565] ? inet_dgram_connect+0x220/0x220 [ 2112.306073] ? __lock_acquire+0xbb1/0x5b00 [ 2112.306561] ? perf_trace_lock+0xac/0x490 [ 2112.307022] packet_ioctl+0xb3/0x260 [ 2112.307439] sock_do_ioctl+0xd3/0x300 [ 2112.307861] ? compat_ifr_data_ioctl+0x180/0x180 [ 2112.308393] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2112.309032] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.309615] ? do_vfs_ioctl+0x283/0x10d0 [ 2112.310057] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2112.310691] ? generic_block_fiemap+0x60/0x60 [ 2112.311239] sock_ioctl+0x3ea/0x700 [ 2112.311650] ? dlci_ioctl_set+0x30/0x30 [ 2112.312107] ? selinux_file_ioctl+0xb6/0x270 [ 2112.312610] ? dlci_ioctl_set+0x30/0x30 [ 2112.313065] __x64_sys_ioctl+0x19a/0x210 [ 2112.313527] do_syscall_64+0x33/0x40 [ 2112.313946] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2112.314525] RIP: 0033:0x7f07a4a4eb19 [ 2112.314941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2112.317004] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2112.317852] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2112.318654] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2112.319457] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2112.320246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2112.321046] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:32:25 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:32:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="20000000800000000600f0006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000000006effd006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:25 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x7000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:32:25 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 37) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:25 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8940, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:32:25 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800000000000000000000000000201000000000000000000000000000f79a095d6d6f5b90d1f611000000000000000000"], 0x58) r3 = dup3(r0, r0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet(0x2, 0x52cab5c1f1d8e137, 0xfffffff7) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) fcntl$setlease(r3, 0x400, 0x1) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$DVD_WRITE_STRUCT(r5, 0x5390, &(0x7f0000000400)=@copyright={0x1, 0x1, 0x6, 0x3f}) 02:32:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060002006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:25 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 39) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:25 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x8000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2112.534940] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2112.549938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:32:25 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8907, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2112.583805] device veth0_vlan entered promiscuous mode [ 2112.597142] FAULT_INJECTION: forcing a failure. [ 2112.597142] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.598477] CPU: 1 PID: 12102 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2112.599249] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2112.600193] Call Trace: [ 2112.600500] dump_stack+0x107/0x167 [ 2112.600923] should_fail.cold+0x5/0xa [ 2112.601366] ? create_object.isra.0+0x3a/0xa20 [ 2112.601887] should_failslab+0x5/0x20 [ 2112.602330] kmem_cache_alloc+0x5b/0x310 [ 2112.602795] ? mark_held_locks+0x9e/0xe0 [ 2112.603259] create_object.isra.0+0x3a/0xa20 [ 2112.603777] kmemleak_alloc_percpu+0xa0/0x100 [ 2112.604273] pcpu_alloc+0x4e2/0x1240 [ 2112.604714] fib_nh_common_init+0x2d/0x160 [ 2112.605201] fib6_nh_init+0xa21/0x19e0 [ 2112.605650] ? icmp6_dst_alloc+0x650/0x650 [ 2112.606118] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2112.606617] ? gre_gro_complete+0x530/0x530 [ 2112.607086] ? kasan_unpoison_shadow+0x33/0x50 [ 2112.607574] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2112.608115] ip6_route_info_create+0x1185/0x1a00 [ 2112.608624] ? fib6_nh_init+0x19e0/0x19e0 [ 2112.609079] ? call_netdevice_notifiers_info+0xb5/0x130 [ 2112.609665] ? __dev_notify_flags+0x110/0x2c0 [ 2112.610144] ? dev_change_flags+0x100/0x160 [ 2112.610607] ? devinet_ioctl+0x14de/0x1db0 [ 2112.611047] ? inet_ioctl+0x34f/0x390 [ 2112.611461] ? packet_ioctl+0xb3/0x260 [ 2112.611883] ? sock_do_ioctl+0xd3/0x300 [ 2112.612297] ? sock_ioctl+0x3ea/0x700 [ 2112.612708] addrconf_f6i_alloc+0x28f/0x440 [ 2112.613174] ? ipv6_route_ioctl+0x510/0x510 [ 2112.613672] ? trace_hardirqs_on+0x5b/0x180 [ 2112.614136] ? kasan_unpoison_shadow+0x33/0x50 [ 2112.614622] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2112.615159] ipv6_add_addr+0x375/0x1d00 [ 2112.615589] ? __lockdep_reset_lock+0x180/0x180 [ 2112.616088] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2112.616644] ? inet6_dump_ifaddr+0x20/0x20 [ 2112.617093] ? ipv6_generate_stable_address+0x299/0x640 [ 2112.617670] addrconf_add_linklocal+0xd4/0x470 [ 2112.618153] ? ipv6_del_addr+0x8d0/0x8d0 [ 2112.618586] ? trace_hardirqs_on+0x5b/0x180 [ 2112.619052] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2112.619608] ? addrconf_add_linklocal+0x470/0x470 [ 2112.620120] ? __local_bh_enable_ip+0x9d/0x100 [ 2112.620604] addrconf_dev_config+0x262/0x440 [ 2112.621073] addrconf_notify+0xc95/0x2410 [ 2112.621530] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.622091] ? inet6_ifinfo_notify+0x150/0x150 [ 2112.622577] ? failover_register+0x530/0x530 [ 2112.623047] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2112.623627] ? ipmr_device_event+0x18b/0x1f0 [ 2112.624090] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.624637] raw_notifier_call_chain+0xb3/0x110 [ 2112.625130] call_netdevice_notifiers_info+0xb5/0x130 [ 2112.625695] __dev_notify_flags+0x110/0x2c0 [ 2112.626147] ? dev_change_name+0x660/0x660 [ 2112.626598] ? __dev_change_flags+0x4cf/0x6e0 [ 2112.627072] ? dev_set_allmulti+0x30/0x30 [ 2112.627509] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2112.628086] dev_change_flags+0x100/0x160 [ 2112.628528] devinet_ioctl+0x14de/0x1db0 [ 2112.628961] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2112.629428] inet_ioctl+0x34f/0x390 [ 2112.629810] ? inet_dgram_connect+0x220/0x220 [ 2112.630290] ? __lock_acquire+0xbb1/0x5b00 [ 2112.630745] ? perf_trace_lock+0xac/0x490 [ 2112.631187] packet_ioctl+0xb3/0x260 [ 2112.631585] sock_do_ioctl+0xd3/0x300 [ 2112.631988] ? compat_ifr_data_ioctl+0x180/0x180 [ 2112.632492] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2112.633100] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.633652] ? do_vfs_ioctl+0x283/0x10d0 [ 2112.634083] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2112.634640] ? generic_block_fiemap+0x60/0x60 [ 2112.635134] sock_ioctl+0x3ea/0x700 [ 2112.635521] ? dlci_ioctl_set+0x30/0x30 [ 2112.635947] ? selinux_file_ioctl+0xb6/0x270 [ 2112.636418] ? dlci_ioctl_set+0x30/0x30 [ 2112.636850] __x64_sys_ioctl+0x19a/0x210 [ 2112.637283] do_syscall_64+0x33/0x40 [ 2112.637687] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2112.638257] RIP: 0033:0x7f07a4a4eb19 [ 2112.638663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2112.640662] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2112.641508] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2112.642301] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2112.643082] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2112.643843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2112.644593] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:32:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060003006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2112.732145] device veth0_vlan entered promiscuous mode [ 2112.742292] FAULT_INJECTION: forcing a failure. [ 2112.742292] name failslab, interval 1, probability 0, space 0, times 0 [ 2112.743989] CPU: 1 PID: 12115 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2112.744745] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2112.745629] Call Trace: [ 2112.745917] dump_stack+0x107/0x167 [ 2112.746308] should_fail.cold+0x5/0xa [ 2112.746709] ? create_object.isra.0+0x3a/0xa20 [ 2112.747192] should_failslab+0x5/0x20 [ 2112.747594] kmem_cache_alloc+0x5b/0x310 [ 2112.748031] ? mark_held_locks+0x9e/0xe0 [ 2112.748458] create_object.isra.0+0x3a/0xa20 [ 2112.748939] kmemleak_alloc_percpu+0xa0/0x100 [ 2112.749418] pcpu_alloc+0x4e2/0x1240 [ 2112.749834] fib6_nh_init+0xa51/0x19e0 [ 2112.750246] ? icmp6_dst_alloc+0x650/0x650 [ 2112.750695] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2112.751182] ? gre_gro_complete+0x530/0x530 [ 2112.751649] ? kasan_unpoison_shadow+0x33/0x50 [ 2112.752137] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2112.752680] ip6_route_info_create+0x1185/0x1a00 [ 2112.753188] ? fib6_nh_init+0x19e0/0x19e0 [ 2112.753639] ? lock_chain_count+0x20/0x20 [ 2112.754076] ? perf_trace_lock+0xac/0x490 [ 2112.754520] ip6_route_add+0x24/0x150 [ 2112.754927] addrconf_add_mroute+0x120/0x180 [ 2112.755397] ? ipv6_generate_eui64+0xa40/0xa40 [ 2112.755881] ? find_held_lock+0x2c/0x110 [ 2112.756328] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2112.756881] ? __local_bh_enable_ip+0x9d/0x100 [ 2112.757378] ? trace_hardirqs_on+0x5b/0x180 [ 2112.757833] ? ipv6_find_idev+0x174/0x220 [ 2112.758272] ? __local_bh_enable_ip+0x9d/0x100 [ 2112.758766] addrconf_add_dev+0x16a/0x1e0 [ 2112.759211] addrconf_dev_config+0x1f2/0x440 [ 2112.759690] addrconf_notify+0xc95/0x2410 [ 2112.760140] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2112.760719] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.761280] ? inet6_ifinfo_notify+0x150/0x150 [ 2112.761773] ? failover_register+0x530/0x530 [ 2112.762239] ? selinux_nlmsg_lookup+0x520/0x520 [ 2112.762742] raw_notifier_call_chain+0xb3/0x110 [ 2112.763235] call_netdevice_notifiers_info+0xb5/0x130 [ 2112.763789] __dev_notify_flags+0x110/0x2c0 [ 2112.764257] ? dev_change_name+0x660/0x660 [ 2112.764701] ? __dev_change_flags+0x4cf/0x6e0 [ 2112.765169] ? dev_set_allmulti+0x30/0x30 [ 2112.765624] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2112.766206] dev_change_flags+0x100/0x160 [ 2112.766654] devinet_ioctl+0x14de/0x1db0 [ 2112.767086] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2112.767558] inet_ioctl+0x34f/0x390 [ 2112.767944] ? inet_dgram_connect+0x220/0x220 [ 2112.768426] ? __lock_acquire+0xbb1/0x5b00 [ 2112.768889] ? perf_trace_lock+0xac/0x490 [ 2112.769339] packet_ioctl+0xb3/0x260 [ 2112.769743] sock_do_ioctl+0xd3/0x300 [ 2112.770147] ? compat_ifr_data_ioctl+0x180/0x180 [ 2112.770647] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2112.771251] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2112.771802] ? do_vfs_ioctl+0x283/0x10d0 [ 2112.772237] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2112.772787] ? generic_block_fiemap+0x60/0x60 [ 2112.773269] sock_ioctl+0x3ea/0x700 [ 2112.773660] ? dlci_ioctl_set+0x30/0x30 [ 2112.774090] ? selinux_file_ioctl+0xb6/0x270 [ 2112.774563] ? dlci_ioctl_set+0x30/0x30 [ 2112.774988] __x64_sys_ioctl+0x19a/0x210 [ 2112.775421] do_syscall_64+0x33/0x40 [ 2112.775819] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2112.776357] RIP: 0033:0x7feded0d7b19 [ 2112.776755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2112.778713] RSP: 002b:00007fedea62c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2112.779527] RAX: ffffffffffffffda RBX: 00007feded1eb020 RCX: 00007feded0d7b19 [ 2112.780281] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2112.781032] RBP: 00007fedea62c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2112.781797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2112.782555] R13: 00007ffef51d5a1f R14: 00007fedea62c300 R15: 0000000000022000 02:32:39 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8908, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:39 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8941, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:32:39 executing program 5: io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:32:39 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x3f000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:32:39 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 70) 02:32:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060004006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:39 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 40) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:39 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 38) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2127.001978] audit: type=1326 audit(1693276359.994:139): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12127 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2127.030925] device veth0_vlan entered promiscuous mode [ 2127.035777] FAULT_INJECTION: forcing a failure. [ 2127.035777] name failslab, interval 1, probability 0, space 0, times 0 [ 2127.037766] CPU: 1 PID: 12132 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2127.038549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2127.039488] Call Trace: [ 2127.039796] dump_stack+0x107/0x167 [ 2127.040214] should_fail.cold+0x5/0xa [ 2127.040647] ? create_object.isra.0+0x3a/0xa20 [ 2127.041171] should_failslab+0x5/0x20 [ 2127.041608] kmem_cache_alloc+0x5b/0x310 [ 2127.042069] create_object.isra.0+0x3a/0xa20 [ 2127.042587] kmemleak_alloc_percpu+0xa0/0x100 [ 2127.043106] pcpu_alloc+0x4e2/0x1240 [ 2127.043545] fib6_nh_init+0xa51/0x19e0 [ 2127.043997] ? icmp6_dst_alloc+0x650/0x650 [ 2127.044489] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2127.045019] ? gre_gro_complete+0x530/0x530 [ 2127.045532] ? kasan_unpoison_shadow+0x33/0x50 [ 2127.046046] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2127.046623] ip6_route_info_create+0x1185/0x1a00 [ 2127.047161] ? fib6_nh_init+0x19e0/0x19e0 [ 2127.047640] addrconf_f6i_alloc+0x28f/0x440 [ 2127.048126] ? mark_held_locks+0x9e/0xe0 [ 2127.048586] ? ipv6_route_ioctl+0x510/0x510 [ 2127.049076] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2127.049722] ? kasan_unpoison_shadow+0x33/0x50 [ 2127.050268] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2127.050860] ipv6_add_addr+0x375/0x1d00 [ 2127.051330] ? __lockdep_reset_lock+0x180/0x180 [ 2127.051890] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2127.052515] ? inet6_dump_ifaddr+0x20/0x20 [ 2127.053010] ? ipv6_generate_stable_address+0x299/0x640 [ 2127.053643] addrconf_add_linklocal+0xd4/0x470 [ 2127.054175] ? ipv6_del_addr+0x8d0/0x8d0 [ 2127.054677] ? trace_hardirqs_on+0x5b/0x180 [ 2127.055221] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2127.055866] ? addrconf_add_linklocal+0x470/0x470 [ 2127.056463] ? __local_bh_enable_ip+0x9d/0x100 [ 2127.057010] addrconf_dev_config+0x262/0x440 [ 2127.057568] addrconf_notify+0xc95/0x2410 [ 2127.058100] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2127.058785] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2127.059446] ? inet6_ifinfo_notify+0x150/0x150 [ 2127.060013] ? failover_register+0x530/0x530 [ 2127.060545] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2127.061213] ? ipmr_device_event+0x18b/0x1f0 [ 2127.061768] raw_notifier_call_chain+0xb3/0x110 [ 2127.062350] call_netdevice_notifiers_info+0xb5/0x130 [ 2127.063002] __dev_notify_flags+0x110/0x2c0 [ 2127.063551] ? dev_change_name+0x660/0x660 [ 2127.064066] ? __dev_change_flags+0x4cf/0x6e0 [ 2127.064622] ? dev_set_allmulti+0x30/0x30 [ 2127.065142] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2127.065844] dev_change_flags+0x100/0x160 [ 2127.066315] devinet_ioctl+0x14de/0x1db0 [ 2127.066825] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2127.067322] inet_ioctl+0x34f/0x390 [ 2127.067772] ? inet_dgram_connect+0x220/0x220 [ 2127.068284] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2127.068923] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2127.069603] ? trace_hardirqs_on+0x5b/0x180 [ 2127.070132] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2127.070822] packet_ioctl+0xb3/0x260 [ 2127.071292] sock_do_ioctl+0xd3/0x300 [ 2127.071766] ? compat_ifr_data_ioctl+0x180/0x180 [ 2127.072358] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2127.073054] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2127.073705] ? do_vfs_ioctl+0x283/0x10d0 [ 2127.074200] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2127.074841] ? generic_block_fiemap+0x60/0x60 [ 2127.075389] sock_ioctl+0x3ea/0x700 [ 2127.075836] ? dlci_ioctl_set+0x30/0x30 [ 2127.076316] ? selinux_file_ioctl+0xb6/0x270 [ 2127.076855] ? dlci_ioctl_set+0x30/0x30 [ 2127.077338] __x64_sys_ioctl+0x19a/0x210 [ 2127.077853] do_syscall_64+0x33/0x40 [ 2127.078326] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2127.078969] RIP: 0033:0x7feded0d7b19 [ 2127.079417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2127.081694] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2127.082627] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2127.083493] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2127.084360] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2127.085242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2127.086115] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2127.089354] FAULT_INJECTION: forcing a failure. [ 2127.089354] name failslab, interval 1, probability 0, space 0, times 0 [ 2127.090718] CPU: 1 PID: 12144 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2127.091551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2127.092558] Call Trace: [ 2127.092881] dump_stack+0x107/0x167 [ 2127.093331] should_fail.cold+0x5/0xa [ 2127.093797] ? create_object.isra.0+0x3a/0xa20 [ 2127.094364] should_failslab+0x5/0x20 [ 2127.094826] kmem_cache_alloc+0x5b/0x310 [ 2127.095337] create_object.isra.0+0x3a/0xa20 [ 2127.095876] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2127.096500] kmem_cache_alloc+0x159/0x310 [ 2127.096998] anon_vma_fork+0x1ff/0x640 [ 2127.097481] copy_process+0x7218/0x7800 [ 2127.097992] ? __cleanup_sighand+0xb0/0xb0 [ 2127.098518] ? find_held_lock+0x2c/0x110 [ 2127.099011] kernel_clone+0xe7/0x980 [ 2127.099429] ? lock_downgrade+0x6d0/0x6d0 [ 2127.099923] ? find_held_lock+0x2c/0x110 [ 2127.100411] ? create_io_thread+0xf0/0xf0 [ 2127.100918] ? ksys_write+0x12d/0x260 [ 2127.101386] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2127.101978] __do_sys_fork+0x8a/0xc0 [ 2127.102426] ? kernel_thread+0xf0/0xf0 [ 2127.102901] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2127.103521] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2127.104084] ? trace_hardirqs_on+0x5b/0x180 [ 2127.104599] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2127.105212] do_syscall_64+0x33/0x40 [ 2127.105645] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2127.106245] RIP: 0033:0x7fadf412db19 [ 2127.106656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2127.108889] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2127.109795] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2127.110607] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2127.111414] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2127.112233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2127.113045] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2127.115953] device veth0_vlan entered promiscuous mode [ 2127.121910] FAULT_INJECTION: forcing a failure. [ 2127.121910] name failslab, interval 1, probability 0, space 0, times 0 [ 2127.123717] CPU: 1 PID: 12134 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2127.124505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2127.125416] Call Trace: [ 2127.125715] dump_stack+0x107/0x167 [ 2127.126116] should_fail.cold+0x5/0xa [ 2127.126545] ? create_object.isra.0+0x3a/0xa20 [ 2127.127043] should_failslab+0x5/0x20 [ 2127.127457] kmem_cache_alloc+0x5b/0x310 [ 2127.127902] ? mark_held_locks+0x9e/0xe0 [ 2127.128346] create_object.isra.0+0x3a/0xa20 [ 2127.128835] kmemleak_alloc_percpu+0xa0/0x100 [ 2127.129334] pcpu_alloc+0x4e2/0x1240 [ 2127.129768] fib_nh_common_init+0x2d/0x160 [ 2127.130231] fib6_nh_init+0xa21/0x19e0 [ 2127.130671] ? icmp6_dst_alloc+0x650/0x650 [ 2127.131129] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2127.131623] ? gre_gro_complete+0x530/0x530 [ 2127.132100] ? kasan_unpoison_shadow+0x33/0x50 [ 2127.132605] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2127.133158] ip6_route_info_create+0x1185/0x1a00 [ 2127.133691] ? fib6_nh_init+0x19e0/0x19e0 [ 2127.134155] ? call_netdevice_notifiers_info+0xb5/0x130 [ 2127.134730] ? __dev_notify_flags+0x110/0x2c0 [ 2127.135220] ? dev_change_flags+0x100/0x160 [ 2127.135707] ? devinet_ioctl+0x14de/0x1db0 [ 2127.136160] ? inet_ioctl+0x34f/0x390 [ 2127.136581] ? packet_ioctl+0xb3/0x260 [ 2127.137008] ? sock_do_ioctl+0xd3/0x300 [ 2127.137459] ? sock_ioctl+0x3ea/0x700 [ 2127.137881] addrconf_f6i_alloc+0x28f/0x440 [ 2127.138362] ? ipv6_route_ioctl+0x510/0x510 [ 2127.138850] ? trace_hardirqs_on+0x5b/0x180 [ 2127.139325] ? kasan_unpoison_shadow+0x33/0x50 [ 2127.139839] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2127.140405] ipv6_add_addr+0x375/0x1d00 [ 2127.140846] ? __lockdep_reset_lock+0x180/0x180 [ 2127.141370] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2127.141962] ? inet6_dump_ifaddr+0x20/0x20 [ 2127.142442] ? ipv6_generate_stable_address+0x299/0x640 [ 2127.143039] addrconf_add_linklocal+0xd4/0x470 [ 2127.143526] ? ipv6_del_addr+0x8d0/0x8d0 [ 2127.143980] ? trace_hardirqs_on+0x5b/0x180 [ 2127.144451] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2127.145039] ? addrconf_add_linklocal+0x470/0x470 [ 2127.145565] ? __local_bh_enable_ip+0x9d/0x100 [ 2127.146083] addrconf_dev_config+0x262/0x440 [ 2127.146562] addrconf_notify+0xc95/0x2410 [ 2127.147033] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2127.147588] ? inet6_ifinfo_notify+0x150/0x150 [ 2127.148100] ? failover_register+0x530/0x530 [ 2127.148572] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2127.149188] ? ipmr_device_event+0x18b/0x1f0 [ 2127.149664] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2127.150250] raw_notifier_call_chain+0xb3/0x110 [ 2127.150771] call_netdevice_notifiers_info+0xb5/0x130 [ 2127.151343] __dev_notify_flags+0x110/0x2c0 [ 2127.151825] ? dev_change_name+0x660/0x660 [ 2127.152298] ? __dev_change_flags+0x4cf/0x6e0 [ 2127.152797] ? dev_set_allmulti+0x30/0x30 [ 2127.153234] ? __sanitizer_cov_trace_pc+0x4/0x60 [ 2127.153805] ? full_name_hash+0xb5/0xf0 [ 2127.154249] dev_change_flags+0x100/0x160 [ 2127.154714] devinet_ioctl+0x14de/0x1db0 [ 2127.155154] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2127.155653] inet_ioctl+0x34f/0x390 [ 2127.156046] ? inet_dgram_connect+0x220/0x220 [ 2127.156554] ? __lock_acquire+0xbb1/0x5b00 [ 2127.157046] ? perf_trace_lock+0xac/0x490 [ 2127.157528] packet_ioctl+0xb3/0x260 [ 2127.157941] sock_do_ioctl+0xd3/0x300 [ 2127.158363] ? compat_ifr_data_ioctl+0x180/0x180 [ 2127.158892] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2127.159528] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2127.160075] ? do_vfs_ioctl+0x283/0x10d0 [ 2127.160527] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2127.161085] ? generic_block_fiemap+0x60/0x60 [ 2127.161600] sock_ioctl+0x3ea/0x700 [ 2127.162003] ? dlci_ioctl_set+0x30/0x30 [ 2127.162446] ? selinux_file_ioctl+0xb6/0x270 [ 2127.162915] ? dlci_ioctl_set+0x30/0x30 [ 2127.163359] __x64_sys_ioctl+0x19a/0x210 [ 2127.163811] do_syscall_64+0x33/0x40 [ 2127.164226] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2127.164799] RIP: 0033:0x7f07a4a4eb19 [ 2127.165228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:32:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060005006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:40 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x3ffffe00, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:32:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060006006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060007006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2127.167337] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2127.168391] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2127.169192] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2127.169980] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2127.170760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2127.171560] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:32:40 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) socket$inet(0x2, 0xa, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @multicast1}, {0x6, @link_local}, 0x0, {0x2, 0x1, @remote}, 'syzkaller0\x00'}) 02:32:40 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 39) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2127.321873] device veth0_vlan entered promiscuous mode [ 2127.326347] FAULT_INJECTION: forcing a failure. [ 2127.326347] name failslab, interval 1, probability 0, space 0, times 0 [ 2127.327676] CPU: 1 PID: 12164 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2127.328419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2127.329353] Call Trace: [ 2127.329654] dump_stack+0x107/0x167 [ 2127.330046] should_fail.cold+0x5/0xa [ 2127.330468] ? create_object.isra.0+0x3a/0xa20 [ 2127.330975] should_failslab+0x5/0x20 [ 2127.331387] kmem_cache_alloc+0x5b/0x310 [ 2127.331842] create_object.isra.0+0x3a/0xa20 [ 2127.332322] kmemleak_alloc_percpu+0xa0/0x100 [ 2127.332814] pcpu_alloc+0x4e2/0x1240 [ 2127.333230] fib6_nh_init+0xa51/0x19e0 [ 2127.333692] ? icmp6_dst_alloc+0x650/0x650 [ 2127.334148] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2127.334654] ? gre_gro_complete+0x530/0x530 [ 2127.335115] ? kasan_unpoison_shadow+0x33/0x50 [ 2127.335615] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2127.336157] ip6_route_info_create+0x1185/0x1a00 [ 2127.336686] ? fib6_nh_init+0x19e0/0x19e0 [ 2127.337138] ? call_netdevice_notifiers_info+0xb5/0x130 [ 2127.337726] ? __dev_notify_flags+0x110/0x2c0 [ 2127.338198] ? dev_change_flags+0x100/0x160 [ 2127.338674] ? devinet_ioctl+0x14de/0x1db0 [ 2127.339138] ? inet_ioctl+0x34f/0x390 [ 2127.339549] ? packet_ioctl+0xb3/0x260 [ 2127.339985] ? sock_do_ioctl+0xd3/0x300 [ 2127.340402] ? sock_ioctl+0x3ea/0x700 [ 2127.340831] addrconf_f6i_alloc+0x28f/0x440 [ 2127.341289] ? ipv6_route_ioctl+0x510/0x510 [ 2127.341798] ? trace_hardirqs_on+0x5b/0x180 [ 2127.342279] ? kasan_unpoison_shadow+0x33/0x50 [ 2127.342787] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2127.343320] ipv6_add_addr+0x375/0x1d00 [ 2127.343772] ? __lockdep_reset_lock+0x180/0x180 [ 2127.344272] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2127.344856] ? inet6_dump_ifaddr+0x20/0x20 [ 2127.345306] ? ipv6_generate_stable_address+0x299/0x640 [ 2127.345904] addrconf_add_linklocal+0xd4/0x470 [ 2127.346390] ? ipv6_del_addr+0x8d0/0x8d0 [ 2127.346845] ? trace_hardirqs_on+0x5b/0x180 [ 2127.347332] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2127.347912] ? addrconf_add_linklocal+0x470/0x470 [ 2127.348425] ? __local_bh_enable_ip+0x9d/0x100 [ 2127.348937] addrconf_dev_config+0x262/0x440 [ 2127.349400] addrconf_notify+0xc95/0x2410 [ 2127.349876] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2127.350443] ? inet6_ifinfo_notify+0x150/0x150 [ 2127.350926] ? failover_register+0x530/0x530 [ 2127.351412] ? xfrm_dev_event+0xa6/0x160 [ 2127.351858] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2127.352439] ? __sanitizer_cov_trace_pc+0x52/0x60 [ 2127.352972] ? ipmr_device_event+0x18b/0x1f0 [ 2127.353456] raw_notifier_call_chain+0xb3/0x110 [ 2127.353979] call_netdevice_notifiers_info+0xb5/0x130 [ 2127.354534] __dev_notify_flags+0x110/0x2c0 [ 2127.355017] ? dev_change_name+0x660/0x660 [ 2127.355472] ? __dev_change_flags+0x4cf/0x6e0 [ 2127.355978] ? dev_set_allmulti+0x30/0x30 [ 2127.356417] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2127.357035] dev_change_flags+0x100/0x160 [ 2127.357486] devinet_ioctl+0x14de/0x1db0 [ 2127.357943] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2127.358420] inet_ioctl+0x34f/0x390 [ 2127.358832] ? inet_dgram_connect+0x220/0x220 [ 2127.359313] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2127.359903] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2127.360474] ? trace_hardirqs_on+0x5b/0x180 [ 2127.360955] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2127.361548] packet_ioctl+0xb3/0x260 [ 2127.361956] sock_do_ioctl+0xd3/0x300 [ 2127.362357] ? compat_ifr_data_ioctl+0x180/0x180 [ 2127.362893] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2127.363503] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2127.364077] ? do_vfs_ioctl+0x283/0x10d0 [ 2127.364510] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2127.365085] ? generic_block_fiemap+0x60/0x60 [ 2127.365587] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2127.366157] ? trace_hardirqs_on+0x5b/0x180 [ 2127.366639] sock_ioctl+0x3ea/0x700 [ 2127.367040] ? dlci_ioctl_set+0x30/0x30 [ 2127.367485] ? selinux_file_ioctl+0xb6/0x270 [ 2127.367949] ? dlci_ioctl_set+0x30/0x30 [ 2127.368395] __x64_sys_ioctl+0x19a/0x210 [ 2127.368850] do_syscall_64+0x33/0x40 [ 2127.369270] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2127.369823] RIP: 0033:0x7f07a4a4eb19 [ 2127.370241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2127.372263] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2127.373102] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2127.373891] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2127.374682] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2127.375463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2127.376242] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:32:55 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0xff3e0003, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:32:55 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 71) 02:32:55 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 40) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:55 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8909, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060008006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:55 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 41) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:32:55 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x894c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:32:55 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = syz_io_uring_setup(0x4d4b, &(0x7f0000000240)={0x0, 0x0, 0x8, 0xfffffffc}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r4 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) syz_io_uring_submit(r2, r6, &(0x7f0000000080)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x6000, @fd_index=0x9, 0x0, 0x8, 0x8, 0x16, 0x0, {0x1}}, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0xb4010, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRES16=r0, @ANYBLOB="2c7766645b3ca5", @ANYRESHEX=r3, @ANYBLOB="2c00f4bddb90a8020b6d4c9e8d40f0d21d16d5f953811dd697656df134f2bfd4086c854dffffffff4420694807eb22c6351a9798a9ba78a767425fec2bf3e60ad5fc5f978bf193568a1e68651186e566dbd30bfe5b9baae65da11288c1cdcafad7378cc87cfd4a6fd8feff84767086a984"]) write$binfmt_elf32(r7, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f00000000c0)=0x1) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x7ffd) syz_io_uring_submit(0x0, r3, &(0x7f0000000000)=@IORING_OP_CLOSE={0x13, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffff14) r8 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r8, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2142.640870] audit: type=1326 audit(1693276375.632:140): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12185 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:32:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060018006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2142.663257] device veth0_vlan entered promiscuous mode [ 2142.669184] FAULT_INJECTION: forcing a failure. [ 2142.669184] name failslab, interval 1, probability 0, space 0, times 0 [ 2142.671147] CPU: 1 PID: 12174 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2142.672039] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2142.673136] Call Trace: [ 2142.673488] dump_stack+0x107/0x167 [ 2142.673975] should_fail.cold+0x5/0xa [ 2142.674461] ? fib6_info_alloc+0x3c/0x110 [ 2142.674998] should_failslab+0x5/0x20 [ 2142.675486] __kmalloc+0x72/0x390 [ 2142.675944] fib6_info_alloc+0x3c/0x110 [ 2142.676454] ip6_route_info_create+0x37a/0x1a00 [ 2142.677052] ? fib6_nh_init+0x19e0/0x19e0 [ 2142.677575] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2142.678260] ? lock_downgrade+0x6d0/0x6d0 [ 2142.678790] ip6_route_add+0x24/0x150 [ 2142.679276] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2142.679934] ? ipv6_generate_stable_address+0x640/0x640 [ 2142.680638] ? ipv6_generate_stable_address+0x299/0x640 [ 2142.681321] addrconf_add_linklocal+0x1ab/0x470 [ 2142.681956] ? ipv6_del_addr+0x8d0/0x8d0 [ 2142.682518] ? trace_hardirqs_on+0x5b/0x180 [ 2142.683122] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2142.683833] ? addrconf_add_linklocal+0x470/0x470 [ 2142.684479] ? __local_bh_enable_ip+0x9d/0x100 [ 2142.685081] addrconf_dev_config+0x262/0x440 [ 2142.685682] addrconf_notify+0xc95/0x2410 [ 2142.686252] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2142.686937] ? inet6_ifinfo_notify+0x150/0x150 [ 2142.687550] ? failover_register+0x530/0x530 [ 2142.688148] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2142.688883] ? ipmr_device_event+0x18b/0x1f0 [ 2142.689470] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2142.690176] raw_notifier_call_chain+0xb3/0x110 [ 2142.690808] call_netdevice_notifiers_info+0xb5/0x130 [ 2142.691504] __dev_notify_flags+0x110/0x2c0 [ 2142.692083] ? dev_change_name+0x660/0x660 [ 2142.692650] ? __dev_change_flags+0x4cf/0x6e0 [ 2142.693252] ? dev_set_allmulti+0x30/0x30 [ 2142.693838] ? strcmp+0x3a/0xb0 [ 2142.694279] dev_change_flags+0x100/0x160 [ 2142.694839] devinet_ioctl+0x14de/0x1db0 [ 2142.695381] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2142.695964] inet_ioctl+0x34f/0x390 [ 2142.696451] ? inet_dgram_connect+0x220/0x220 [ 2142.697045] ? __lock_acquire+0xbb1/0x5b00 [ 2142.697633] ? perf_trace_lock+0xac/0x490 [ 2142.698185] packet_ioctl+0xb3/0x260 [ 2142.698683] sock_do_ioctl+0xd3/0x300 [ 2142.699181] ? compat_ifr_data_ioctl+0x180/0x180 [ 2142.699800] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2142.700561] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2142.701239] ? do_vfs_ioctl+0x283/0x10d0 [ 2142.701781] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2142.702465] ? generic_block_fiemap+0x60/0x60 [ 2142.703061] sock_ioctl+0x3ea/0x700 [ 2142.703542] ? dlci_ioctl_set+0x30/0x30 [ 2142.704066] ? selinux_file_ioctl+0xb6/0x270 [ 2142.704660] ? dlci_ioctl_set+0x30/0x30 [ 2142.705184] __x64_sys_ioctl+0x19a/0x210 [ 2142.705732] do_syscall_64+0x33/0x40 [ 2142.706228] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2142.706913] RIP: 0033:0x7feded0d7b19 [ 2142.707416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2142.709871] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2142.710873] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2142.711811] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2142.712754] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2142.713700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2142.714644] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2142.719136] device veth0_vlan entered promiscuous mode 02:32:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="200000008000000006001c006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2142.735713] FAULT_INJECTION: forcing a failure. [ 2142.735713] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2142.738594] CPU: 0 PID: 12198 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2142.739974] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2142.741647] Call Trace: [ 2142.742186] dump_stack+0x107/0x167 [ 2142.742929] should_fail.cold+0x5/0xa [ 2142.743711] __alloc_pages_nodemask+0x182/0x600 [ 2142.744646] ? __lockdep_reset_lock+0x180/0x180 [ 2142.745595] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2142.746834] ? copy_page_range+0x28e1/0x3810 [ 2142.747141] FAULT_INJECTION: forcing a failure. [ 2142.747141] name failslab, interval 1, probability 0, space 0, times 0 [ 2142.747725] alloc_pages_current+0x187/0x280 [ 2142.747752] get_zeroed_page+0x14/0xb0 [ 2142.747772] __pud_alloc+0x33/0x270 [ 2142.747796] copy_page_range+0x2ca1/0x3810 [ 2142.747815] ? perf_trace_lock+0xac/0x490 [ 2142.747834] ? lock_chain_count+0x20/0x20 [ 2142.747876] ? lock_downgrade+0x6d0/0x6d0 [ 2142.755058] ? up_write+0x191/0x550 [ 2142.755805] ? vm_iomap_memory+0x190/0x190 [ 2142.756661] ? downgrade_write+0x3a0/0x3a0 [ 2142.757515] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2142.758625] ? __vma_link_rb+0x540/0x700 [ 2142.759453] copy_process+0x759b/0x7800 [ 2142.760298] ? __cleanup_sighand+0xb0/0xb0 [ 2142.761171] ? find_held_lock+0x2c/0x110 [ 2142.762014] kernel_clone+0xe7/0x980 [ 2142.762767] ? lock_downgrade+0x6d0/0x6d0 [ 2142.763647] ? find_held_lock+0x2c/0x110 [ 2142.764473] ? create_io_thread+0xf0/0xf0 [ 2142.765324] ? ksys_write+0x12d/0x260 [ 2142.766111] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2142.767091] __do_sys_fork+0x8a/0xc0 [ 2142.767848] ? kernel_thread+0xf0/0xf0 [ 2142.768684] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2142.769762] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2142.770839] ? trace_hardirqs_on+0x5b/0x180 [ 2142.771711] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2142.772770] do_syscall_64+0x33/0x40 [ 2142.773521] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2142.774562] RIP: 0033:0x7fadf412db19 [ 2142.775331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2142.779097] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2142.780656] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2142.782122] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2142.783580] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2142.785035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2142.786495] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2142.787985] CPU: 1 PID: 12183 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2142.788937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2142.790081] Call Trace: [ 2142.790467] dump_stack+0x107/0x167 [ 2142.790975] should_fail.cold+0x5/0xa [ 2142.791499] ? create_object.isra.0+0x3a/0xa20 [ 2142.792092] should_failslab+0x5/0x20 [ 2142.792600] kmem_cache_alloc+0x5b/0x310 [ 2142.793124] ? mark_held_locks+0x9e/0xe0 [ 2142.793685] create_object.isra.0+0x3a/0xa20 [ 2142.794265] kmemleak_alloc_percpu+0xa0/0x100 [ 2142.794851] pcpu_alloc+0x4e2/0x1240 [ 2142.795346] fib6_nh_init+0xa51/0x19e0 [ 2142.795863] ? icmp6_dst_alloc+0x650/0x650 [ 2142.796409] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2142.797003] ? gre_gro_complete+0x530/0x530 [ 2142.797578] ? kasan_unpoison_shadow+0x33/0x50 [ 2142.798191] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2142.798878] ip6_route_info_create+0x1185/0x1a00 [ 2142.799524] ? fib6_nh_init+0x19e0/0x19e0 [ 2142.800066] ? call_netdevice_notifiers_info+0xb5/0x130 [ 2142.800785] ? __dev_notify_flags+0x110/0x2c0 [ 2142.801376] ? dev_change_flags+0x100/0x160 [ 2142.801947] ? devinet_ioctl+0x14de/0x1db0 [ 2142.802503] ? inet_ioctl+0x34f/0x390 [ 2142.802995] ? packet_ioctl+0xb3/0x260 [ 2142.803503] ? sock_do_ioctl+0xd3/0x300 [ 2142.804019] ? sock_ioctl+0x3ea/0x700 [ 2142.804539] addrconf_f6i_alloc+0x28f/0x440 [ 2142.805129] ? ipv6_route_ioctl+0x510/0x510 [ 2142.805730] ? trace_hardirqs_on+0x5b/0x180 [ 2142.806317] ? kasan_unpoison_shadow+0x33/0x50 [ 2142.806936] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2142.807623] ipv6_add_addr+0x375/0x1d00 [ 2142.808139] ? __lockdep_reset_lock+0x180/0x180 [ 2142.808729] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2142.809404] ? inet6_dump_ifaddr+0x20/0x20 [ 2142.809979] ? ipv6_generate_stable_address+0x299/0x640 [ 2142.810663] addrconf_add_linklocal+0xd4/0x470 [ 2142.811245] ? ipv6_del_addr+0x8d0/0x8d0 [ 2142.811763] ? trace_hardirqs_on+0x5b/0x180 [ 2142.812329] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2142.813012] ? addrconf_add_linklocal+0x470/0x470 [ 2142.813647] ? __local_bh_enable_ip+0x9d/0x100 [ 2142.814196] addrconf_dev_config+0x262/0x440 [ 2142.814763] addrconf_notify+0xc95/0x2410 [ 2142.815261] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2142.815879] ? inet6_ifinfo_notify+0x150/0x150 [ 2142.816419] ? failover_register+0x530/0x530 [ 2142.816945] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2142.817596] ? ipmr_device_event+0x18b/0x1f0 [ 2142.818127] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2142.818743] raw_notifier_call_chain+0xb3/0x110 [ 2142.819300] call_netdevice_notifiers_info+0xb5/0x130 [ 2142.819908] __dev_notify_flags+0x110/0x2c0 [ 2142.820439] ? dev_change_name+0x660/0x660 [ 2142.820937] ? __dev_change_flags+0x4cf/0x6e0 [ 2142.821475] ? dev_set_allmulti+0x30/0x30 [ 2142.821981] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2142.822638] dev_change_flags+0x100/0x160 [ 2142.823143] devinet_ioctl+0x14de/0x1db0 [ 2142.823653] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2142.824178] inet_ioctl+0x34f/0x390 [ 2142.824640] ? inet_dgram_connect+0x220/0x220 [ 2142.825182] ? __lock_acquire+0xbb1/0x5b00 [ 2142.825723] ? perf_trace_lock+0xac/0x490 [ 2142.826214] packet_ioctl+0xb3/0x260 [ 2142.826680] sock_do_ioctl+0xd3/0x300 [ 2142.827127] ? compat_ifr_data_ioctl+0x180/0x180 [ 2142.827716] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2142.828384] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2142.829013] ? do_vfs_ioctl+0x283/0x10d0 [ 2142.829488] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2142.830132] ? generic_block_fiemap+0x60/0x60 [ 2142.830663] sock_ioctl+0x3ea/0x700 [ 2142.831105] ? dlci_ioctl_set+0x30/0x30 [ 2142.831578] ? selinux_file_ioctl+0xb6/0x270 [ 2142.832118] ? dlci_ioctl_set+0x30/0x30 [ 2142.832603] __x64_sys_ioctl+0x19a/0x210 [ 2142.833104] do_syscall_64+0x33/0x40 [ 2142.833567] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2142.834203] RIP: 0033:0x7f07a4a4eb19 [ 2142.834662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2142.836878] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2142.837812] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2142.838684] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2142.839553] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2142.840416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2142.841277] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:32:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060067006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:55 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0x4, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000040)={'veth1_to_batadv\x00', {0x2, 0x0, @dev}}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:32:55 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8953, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:32:55 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:32:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="20000000800000000600f0006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:32:55 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 42) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2142.940689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=7642 comm=kworker/0:3 02:32:55 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2143.026353] device veth0_vlan entered promiscuous mode [ 2143.028865] FAULT_INJECTION: forcing a failure. [ 2143.028865] name failslab, interval 1, probability 0, space 0, times 0 [ 2143.030205] CPU: 1 PID: 12214 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2143.030967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2143.031885] Call Trace: [ 2143.032194] dump_stack+0x107/0x167 [ 2143.032614] should_fail.cold+0x5/0xa [ 2143.033051] ? find_held_lock+0x2c/0x110 [ 2143.033518] ? create_object.isra.0+0x3a/0xa20 [ 2143.034064] should_failslab+0x5/0x20 [ 2143.034506] kmem_cache_alloc+0x5b/0x310 [ 2143.034967] ? pcpu_alloc+0x341/0x1240 [ 2143.035420] create_object.isra.0+0x3a/0xa20 [ 2143.035947] kmemleak_alloc_percpu+0xa0/0x100 [ 2143.036458] pcpu_alloc+0x4e2/0x1240 [ 2143.036889] fib_nh_common_init+0x2d/0x160 [ 2143.037382] fib6_nh_init+0xa21/0x19e0 [ 2143.037824] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2143.038424] ? icmp6_dst_alloc+0x650/0x650 [ 2143.038891] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2143.039381] ? gre_gro_complete+0x530/0x530 [ 2143.039851] ? kasan_unpoison_shadow+0x33/0x50 [ 2143.040338] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2143.040883] ip6_route_info_create+0x1185/0x1a00 [ 2143.041390] ? fib6_nh_init+0x19e0/0x19e0 [ 2143.041845] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2143.042392] ? lock_downgrade+0x6d0/0x6d0 [ 2143.042841] ip6_route_add+0x24/0x150 [ 2143.043250] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2143.043804] ? ipv6_generate_stable_address+0x640/0x640 [ 2143.044382] ? ipv6_generate_stable_address+0x299/0x640 [ 2143.044949] addrconf_add_linklocal+0x1ab/0x470 [ 2143.045456] ? ipv6_del_addr+0x8d0/0x8d0 [ 2143.045896] ? trace_hardirqs_on+0x5b/0x180 [ 2143.046358] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2143.046908] ? addrconf_add_linklocal+0x470/0x470 [ 2143.047414] ? __local_bh_enable_ip+0x9d/0x100 [ 2143.047897] addrconf_dev_config+0x262/0x440 [ 2143.048366] addrconf_notify+0xc95/0x2410 [ 2143.048811] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2143.049400] ? inet6_ifinfo_notify+0x150/0x150 [ 2143.050320] ? raw_notifier_call_chain+0xc9/0x110 [ 2143.051495] raw_notifier_call_chain+0xb3/0x110 [ 2143.052622] call_netdevice_notifiers_info+0xb5/0x130 [ 2143.053883] __dev_notify_flags+0x110/0x2c0 [ 2143.054929] ? dev_change_name+0x660/0x660 [ 2143.055943] ? __dev_change_flags+0x4cf/0x6e0 [ 2143.057024] ? dev_set_allmulti+0x30/0x30 [ 2143.058061] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2143.059425] dev_change_flags+0x100/0x160 [ 2143.060466] devinet_ioctl+0x14de/0x1db0 [ 2143.061515] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2143.062559] inet_ioctl+0x34f/0x390 [ 2143.063359] ? inet_dgram_connect+0x220/0x220 [ 2143.064367] ? __lock_acquire+0xbb1/0x5b00 [ 2143.065253] ? perf_trace_lock+0xac/0x490 [ 2143.066180] packet_ioctl+0xb3/0x260 [ 2143.066995] sock_do_ioctl+0xd3/0x300 [ 2143.067823] ? compat_ifr_data_ioctl+0x180/0x180 [ 2143.068858] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2143.070112] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2143.071238] ? do_vfs_ioctl+0x283/0x10d0 [ 2143.072120] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2143.073268] ? generic_block_fiemap+0x60/0x60 [ 2143.074272] sock_ioctl+0x3ea/0x700 [ 2143.074917] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2143.075070] ? dlci_ioctl_set+0x30/0x30 [ 2143.078389] ? selinux_file_ioctl+0xb6/0x270 [ 2143.079356] ? dlci_ioctl_set+0x30/0x30 [ 2143.080234] __x64_sys_ioctl+0x19a/0x210 [ 2143.081129] do_syscall_64+0x33/0x40 [ 2143.081955] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2143.083075] RIP: 0033:0x7feded0d7b19 [ 2143.083892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2143.087902] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2143.089548] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2143.091126] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2143.092694] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2143.094271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2143.095848] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:33:10 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 72) 02:33:10 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000036a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:33:10 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 41) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:10 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:33:10 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8955, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:33:10 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 43) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:10 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) syz_io_uring_setup(0x50ee, &(0x7f0000000140)={0x0, 0x4852, 0x8, 0x0, 0x19a, 0x0, r1}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="00000004000000", @ANYRESHEX=r2, @ANYBLOB=',\x00']) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff6a41}]}, 0x58) write$tun(r1, &(0x7f0000000000)={@val={0x0, 0x6002}, @void, @eth={@broadcast, @remote, @void, {@can={0xc, {{0x1, 0x0, 0x0, 0x1}, 0x8, 0x2, 0x0, 0x0, "58f8cfce106517d0"}}}}}, 0x22) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000200)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 02:33:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060080046a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2157.619964] 9pnet: Insufficient options for proto=fd [ 2157.638051] audit: type=1326 audit(1693276390.626:141): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12230 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2157.648103] device veth0_vlan entered promiscuous mode [ 2157.653299] FAULT_INJECTION: forcing a failure. [ 2157.653299] name failslab, interval 1, probability 0, space 0, times 0 [ 2157.654132] 9pnet: Insufficient options for proto=fd [ 2157.656195] CPU: 0 PID: 12240 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2157.658133] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2157.659872] Call Trace: [ 2157.660435] dump_stack+0x107/0x167 [ 2157.661203] should_fail.cold+0x5/0xa [ 2157.662011] ? create_object.isra.0+0x3a/0xa20 [ 2157.662965] should_failslab+0x5/0x20 [ 2157.663767] kmem_cache_alloc+0x5b/0x310 [ 2157.664613] ? mark_held_locks+0x9e/0xe0 [ 2157.665462] create_object.isra.0+0x3a/0xa20 [ 2157.666393] kmemleak_alloc_percpu+0xa0/0x100 [ 2157.667316] pcpu_alloc+0x4e2/0x1240 [ 2157.668101] fib_nh_common_init+0x2d/0x160 [ 2157.668974] fib6_nh_init+0xa21/0x19e0 [ 2157.669777] ? icmp6_dst_alloc+0x650/0x650 [ 2157.670649] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2157.671576] ? gre_gro_complete+0x530/0x530 [ 2157.672459] ? kasan_unpoison_shadow+0x33/0x50 [ 2157.673384] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2157.674432] ip6_route_info_create+0x1185/0x1a00 [ 2157.675402] ? fib6_nh_init+0x19e0/0x19e0 [ 2157.676242] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2157.677288] ? lock_downgrade+0x6d0/0x6d0 [ 2157.678149] ip6_route_add+0x24/0x150 [ 2157.678928] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2157.679976] ? ipv6_generate_stable_address+0x640/0x640 [ 2157.681089] ? ipv6_generate_stable_address+0x299/0x640 [ 2157.682179] addrconf_add_linklocal+0x1ab/0x470 [ 2157.683125] ? ipv6_del_addr+0x8d0/0x8d0 [ 2157.683952] ? trace_hardirqs_on+0x5b/0x180 [ 2157.684848] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2157.685922] ? addrconf_add_linklocal+0x470/0x470 [ 2157.686903] ? __local_bh_enable_ip+0x9d/0x100 [ 2157.687845] addrconf_dev_config+0x262/0x440 [ 2157.688741] addrconf_notify+0xc95/0x2410 [ 2157.689598] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2157.690667] ? inet6_ifinfo_notify+0x150/0x150 [ 2157.691594] ? failover_register+0x530/0x530 [ 2157.692495] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2157.693615] ? ipmr_device_event+0x18b/0x1f0 [ 2157.694522] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2157.695572] raw_notifier_call_chain+0xb3/0x110 [ 2157.696519] call_netdevice_notifiers_info+0xb5/0x130 [ 2157.697568] __dev_notify_flags+0x110/0x2c0 [ 2157.698452] ? dev_change_name+0x660/0x660 [ 2157.699303] ? __dev_change_flags+0x4cf/0x6e0 [ 2157.700217] ? dev_set_allmulti+0x30/0x30 [ 2157.701070] ? cap_capable+0x1d6/0x240 [ 2157.701894] ? full_name_hash+0xb5/0xf0 [ 2157.702711] dev_change_flags+0x100/0x160 [ 2157.703570] devinet_ioctl+0x14de/0x1db0 [ 2157.704424] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2157.705332] inet_ioctl+0x34f/0x390 [ 2157.706117] ? inet_dgram_connect+0x220/0x220 [ 2157.707048] ? __lock_acquire+0xbb1/0x5b00 [ 2157.707935] ? perf_trace_lock+0xac/0x490 [ 2157.708796] packet_ioctl+0xb3/0x260 [ 2157.709555] sock_do_ioctl+0xd3/0x300 [ 2157.710346] ? compat_ifr_data_ioctl+0x180/0x180 [ 2157.711312] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2157.712476] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2157.713524] ? do_vfs_ioctl+0x283/0x10d0 [ 2157.714360] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2157.715418] ? generic_block_fiemap+0x60/0x60 [ 2157.716341] sock_ioctl+0x3ea/0x700 [ 2157.717077] ? dlci_ioctl_set+0x30/0x30 [ 2157.717898] ? selinux_file_ioctl+0xb6/0x270 [ 2157.718794] ? dlci_ioctl_set+0x30/0x30 [ 2157.719603] __x64_sys_ioctl+0x19a/0x210 [ 2157.720433] do_syscall_64+0x33/0x40 [ 2157.721204] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2157.722259] RIP: 0033:0x7feded0d7b19 [ 2157.723015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2157.726738] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2157.728281] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2157.729724] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2157.731181] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2157.732622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2157.733202] FAULT_INJECTION: forcing a failure. [ 2157.733202] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2157.734072] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2157.738161] CPU: 1 PID: 12250 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2157.739580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2157.741284] Call Trace: [ 2157.741847] dump_stack+0x107/0x167 02:33:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000056a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2157.742615] should_fail.cold+0x5/0xa [ 2157.743561] __alloc_pages_nodemask+0x182/0x600 [ 2157.744562] ? lock_acquire+0x197/0x470 [ 2157.745392] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2157.746668] ? lock_downgrade+0x6d0/0x6d0 [ 2157.747529] ? do_raw_spin_lock+0x121/0x260 [ 2157.748435] alloc_pages_current+0x187/0x280 [ 2157.749365] __pmd_alloc+0x37/0x5e0 [ 2157.750127] copy_page_range+0x2bd8/0x3810 [ 2157.751006] ? perf_trace_lock+0xac/0x490 [ 2157.751863] ? lock_chain_count+0x20/0x20 [ 2157.752762] ? up_write+0x191/0x550 [ 2157.753504] ? vm_iomap_memory+0x190/0x190 [ 2157.754371] ? downgrade_write+0x3a0/0x3a0 [ 2157.755234] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2157.756345] ? __vma_link_rb+0x540/0x700 [ 2157.757188] copy_process+0x759b/0x7800 [ 2157.758062] ? __cleanup_sighand+0xb0/0xb0 [ 2157.758943] ? find_held_lock+0x2c/0x110 [ 2157.759773] kernel_clone+0xe7/0x980 [ 2157.760534] ? lock_downgrade+0x6d0/0x6d0 [ 2157.761372] ? find_held_lock+0x2c/0x110 [ 2157.762207] ? create_io_thread+0xf0/0xf0 [ 2157.763057] ? ksys_write+0x12d/0x260 [ 2157.763849] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2157.764854] __do_sys_fork+0x8a/0xc0 [ 2157.765612] ? kernel_thread+0xf0/0xf0 [ 2157.766441] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2157.767506] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2157.768557] ? trace_hardirqs_on+0x5b/0x180 [ 2157.769435] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2157.770492] do_syscall_64+0x33/0x40 [ 2157.771252] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2157.772291] RIP: 0033:0x7fadf412db19 [ 2157.773049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2157.776793] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2157.778349] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2157.779797] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2157.781255] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2157.782705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2157.784155] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2157.809888] device veth0_vlan entered promiscuous mode [ 2157.819947] FAULT_INJECTION: forcing a failure. [ 2157.819947] name failslab, interval 1, probability 0, space 0, times 0 [ 2157.822448] CPU: 0 PID: 12242 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2157.823871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2157.825558] Call Trace: [ 2157.826108] dump_stack+0x107/0x167 [ 2157.826851] should_fail.cold+0x5/0xa [ 2157.827646] ? fib6_info_alloc+0x3c/0x110 [ 2157.828497] should_failslab+0x5/0x20 [ 2157.829282] __kmalloc+0x72/0x390 [ 2157.830010] fib6_info_alloc+0x3c/0x110 [ 2157.830822] ip6_route_info_create+0x37a/0x1a00 [ 2157.831791] ? fib6_nh_init+0x19e0/0x19e0 [ 2157.832645] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2157.833710] ? lock_downgrade+0x6d0/0x6d0 [ 2157.834597] ip6_route_add+0x24/0x150 [ 2157.835371] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2157.836422] ? ipv6_generate_stable_address+0x640/0x640 [ 2157.837532] ? ipv6_generate_stable_address+0x299/0x640 [ 2157.838628] addrconf_add_linklocal+0x1ab/0x470 [ 2157.839570] ? ipv6_del_addr+0x8d0/0x8d0 [ 2157.840393] ? trace_hardirqs_on+0x5b/0x180 [ 2157.841284] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2157.842366] ? addrconf_add_linklocal+0x470/0x470 [ 2157.843342] ? __local_bh_enable_ip+0x9d/0x100 [ 2157.844290] addrconf_dev_config+0x262/0x440 [ 2157.845210] addrconf_notify+0xc95/0x2410 [ 2157.846085] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2157.847137] ? inet6_ifinfo_notify+0x150/0x150 [ 2157.848083] ? failover_register+0x530/0x530 [ 2157.848974] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2157.850105] ? ipmr_device_event+0x18b/0x1f0 [ 2157.851004] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2157.852068] raw_notifier_call_chain+0xb3/0x110 [ 2157.853031] call_netdevice_notifiers_info+0xb5/0x130 [ 2157.854102] __dev_notify_flags+0x110/0x2c0 [ 2157.854984] ? dev_change_name+0x660/0x660 [ 2157.855847] ? __dev_change_flags+0x4cf/0x6e0 [ 2157.856754] ? dev_set_allmulti+0x30/0x30 [ 2157.857614] ? cap_capable+0x1d6/0x240 [ 2157.858414] ? full_name_hash+0xb5/0xf0 [ 2157.859239] dev_change_flags+0x100/0x160 [ 2157.860090] devinet_ioctl+0x14de/0x1db0 [ 2157.860940] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2157.861861] inet_ioctl+0x34f/0x390 [ 2157.862616] ? inet_dgram_connect+0x220/0x220 [ 2157.863538] ? __lock_acquire+0xbb1/0x5b00 [ 2157.864417] ? perf_trace_lock+0xac/0x490 [ 2157.865283] packet_ioctl+0xb3/0x260 [ 2157.866051] sock_do_ioctl+0xd3/0x300 [ 2157.866831] ? compat_ifr_data_ioctl+0x180/0x180 [ 2157.867794] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2157.868979] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2157.870033] ? do_vfs_ioctl+0x283/0x10d0 [ 2157.870866] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2157.871927] ? generic_block_fiemap+0x60/0x60 [ 2157.872871] sock_ioctl+0x3ea/0x700 [ 2157.873608] ? dlci_ioctl_set+0x30/0x30 [ 2157.874448] ? selinux_file_ioctl+0xb6/0x270 [ 2157.875379] ? dlci_ioctl_set+0x30/0x30 [ 2157.876193] __x64_sys_ioctl+0x19a/0x210 [ 2157.877033] do_syscall_64+0x33/0x40 [ 2157.877814] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2157.878859] RIP: 0033:0x7f07a4a4eb19 [ 2157.879622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2157.883417] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2157.884954] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2157.886451] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2157.887921] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2157.889383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2157.890857] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:33:10 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:33:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000066a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:33:10 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000000c0)={'caif0\x00', {0x2, 0x0, @initdev}}) syncfs(r0) io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:33:10 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 44) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000076a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:33:11 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8980, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2158.090417] device veth0_vlan entered promiscuous mode [ 2158.110933] FAULT_INJECTION: forcing a failure. [ 2158.110933] name failslab, interval 1, probability 0, space 0, times 0 [ 2158.113374] CPU: 1 PID: 12270 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2158.114805] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2158.116487] Call Trace: [ 2158.117031] dump_stack+0x107/0x167 [ 2158.117787] should_fail.cold+0x5/0xa [ 2158.118569] ? find_held_lock+0x2c/0x110 [ 2158.119392] ? create_object.isra.0+0x3a/0xa20 [ 2158.120319] should_failslab+0x5/0x20 [ 2158.121091] kmem_cache_alloc+0x5b/0x310 [ 2158.121915] ? pcpu_alloc+0x341/0x1240 [ 2158.122709] create_object.isra.0+0x3a/0xa20 [ 2158.123609] kmemleak_alloc_percpu+0xa0/0x100 [ 2158.124526] pcpu_alloc+0x4e2/0x1240 [ 2158.125301] fib6_nh_init+0xa51/0x19e0 [ 2158.126127] ? icmp6_dst_alloc+0x650/0x650 [ 2158.126987] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2158.127913] ? gre_gro_complete+0x530/0x530 [ 2158.128812] ? kasan_unpoison_shadow+0x33/0x50 [ 2158.129735] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2158.130782] ip6_route_info_create+0x1185/0x1a00 [ 2158.131743] ? fib6_nh_init+0x19e0/0x19e0 [ 2158.132578] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2158.133614] ? lock_downgrade+0x6d0/0x6d0 [ 2158.134473] ip6_route_add+0x24/0x150 [ 2158.135289] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2158.136348] ? ipv6_generate_stable_address+0x640/0x640 [ 2158.137531] ? ipv6_generate_stable_address+0x299/0x640 [ 2158.138670] addrconf_add_linklocal+0x1ab/0x470 [ 2158.139626] ? ipv6_del_addr+0x8d0/0x8d0 [ 2158.140442] ? trace_hardirqs_on+0x5b/0x180 [ 2158.141355] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2158.142414] ? addrconf_add_linklocal+0x470/0x470 [ 2158.143382] ? __local_bh_enable_ip+0x9d/0x100 [ 2158.144306] addrconf_dev_config+0x262/0x440 [ 2158.145194] addrconf_notify+0xc95/0x2410 [ 2158.146063] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2158.147102] ? inet6_ifinfo_notify+0x150/0x150 [ 2158.148020] ? failover_register+0x530/0x530 [ 2158.148907] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2158.150035] ? ipmr_device_event+0x18b/0x1f0 [ 2158.150932] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2158.151994] raw_notifier_call_chain+0xb3/0x110 [ 2158.152938] call_netdevice_notifiers_info+0xb5/0x130 [ 2158.154015] __dev_notify_flags+0x110/0x2c0 [ 2158.154891] ? dev_change_name+0x660/0x660 [ 2158.155754] ? __dev_change_flags+0x4cf/0x6e0 [ 2158.156673] ? dev_set_allmulti+0x30/0x30 [ 2158.157522] ? cap_capable+0x1d6/0x240 [ 2158.158331] ? full_name_hash+0xb5/0xf0 [ 2158.159149] dev_change_flags+0x100/0x160 [ 2158.160003] devinet_ioctl+0x14de/0x1db0 [ 2158.160846] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2158.161753] inet_ioctl+0x34f/0x390 [ 2158.162501] ? inet_dgram_connect+0x220/0x220 [ 2158.163437] ? __lock_acquire+0xbb1/0x5b00 [ 2158.164314] ? perf_trace_lock+0xac/0x490 [ 2158.165162] packet_ioctl+0xb3/0x260 [ 2158.165940] sock_do_ioctl+0xd3/0x300 [ 2158.166713] ? compat_ifr_data_ioctl+0x180/0x180 [ 2158.167679] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2158.168845] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2158.169900] ? do_vfs_ioctl+0x283/0x10d0 [ 2158.170723] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2158.171789] ? generic_block_fiemap+0x60/0x60 [ 2158.172710] sock_ioctl+0x3ea/0x700 [ 2158.173446] ? dlci_ioctl_set+0x30/0x30 [ 2158.174278] ? selinux_file_ioctl+0xb6/0x270 [ 2158.175170] ? dlci_ioctl_set+0x30/0x30 [ 2158.175979] __x64_sys_ioctl+0x19a/0x210 [ 2158.176809] do_syscall_64+0x33/0x40 [ 2158.177570] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2158.178623] RIP: 0033:0x7feded0d7b19 [ 2158.179379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2158.183122] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2158.184667] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2158.186116] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2158.187560] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2158.189008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2158.190453] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:33:26 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 73) 02:33:26 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8981, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:33:26 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:26 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}}) write$binfmt_elf32(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000000140)={0xffffffff, 0x0, &(0x7f0000000000)=[0xffffffffffffffff, r5, r6, r1, r0, r8, r0, r0]}, 0x8) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) dup3(r1, r1, 0x0) io_uring_setup(0x4f3f, &(0x7f00000000c0)={0x0, 0xa02c, 0x4, 0x3, 0x2bd, 0x0, r0}) 02:33:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000186a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:33:26 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 42) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:26 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 45) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:26 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2173.572919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2173.578018] audit: type=1326 audit(1693276406.570:142): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12283 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2173.591382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2173.597264] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2173.632408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2173.639087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:33:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="20000000800000000600001c6a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2173.646198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=7642 comm=kworker/0:3 [ 2173.652126] device veth0_vlan entered promiscuous mode [ 2173.662222] FAULT_INJECTION: forcing a failure. [ 2173.662222] name failslab, interval 1, probability 0, space 0, times 0 [ 2173.664970] CPU: 0 PID: 12292 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2173.666410] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2173.668112] Call Trace: [ 2173.668671] dump_stack+0x107/0x167 [ 2173.669447] should_fail.cold+0x5/0xa [ 2173.670256] ? create_object.isra.0+0x3a/0xa20 [ 2173.671217] should_failslab+0x5/0x20 [ 2173.672016] kmem_cache_alloc+0x5b/0x310 [ 2173.672341] FAULT_INJECTION: forcing a failure. [ 2173.672341] name failslab, interval 1, probability 0, space 0, times 0 [ 2173.672845] ? mark_held_locks+0x9e/0xe0 [ 2173.672879] create_object.isra.0+0x3a/0xa20 [ 2173.672916] kmemleak_alloc_percpu+0xa0/0x100 [ 2173.677692] pcpu_alloc+0x4e2/0x1240 [ 2173.678487] fib6_nh_init+0xa51/0x19e0 [ 2173.679285] ? icmp6_dst_alloc+0x650/0x650 [ 2173.680141] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2173.681073] ? gre_gro_complete+0x530/0x530 [ 2173.681956] ? kasan_unpoison_shadow+0x33/0x50 [ 2173.682899] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2173.683941] ip6_route_info_create+0x1185/0x1a00 [ 2173.684924] ? fib6_nh_init+0x19e0/0x19e0 [ 2173.685768] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2173.686830] ? lock_downgrade+0x6d0/0x6d0 [ 2173.687682] ip6_route_add+0x24/0x150 [ 2173.688472] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2173.689533] ? ipv6_generate_stable_address+0x640/0x640 [ 2173.690660] ? ipv6_generate_stable_address+0x299/0x640 [ 2173.691741] addrconf_add_linklocal+0x1ab/0x470 [ 2173.692672] ? ipv6_del_addr+0x8d0/0x8d0 [ 2173.693498] ? trace_hardirqs_on+0x5b/0x180 [ 2173.694416] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2173.695479] ? addrconf_add_linklocal+0x470/0x470 [ 2173.696458] ? __local_bh_enable_ip+0x9d/0x100 [ 2173.697386] addrconf_dev_config+0x262/0x440 [ 2173.698288] addrconf_notify+0xc95/0x2410 [ 2173.699138] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2173.700186] ? inet6_ifinfo_notify+0x150/0x150 [ 2173.701108] ? failover_register+0x530/0x530 [ 2173.702027] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2173.703142] ? ipmr_device_event+0x18b/0x1f0 [ 2173.704036] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2173.705083] raw_notifier_call_chain+0xb3/0x110 [ 2173.706063] call_netdevice_notifiers_info+0xb5/0x130 [ 2173.707117] __dev_notify_flags+0x110/0x2c0 [ 2173.707996] ? dev_change_name+0x660/0x660 [ 2173.708851] ? __dev_change_flags+0x4cf/0x6e0 [ 2173.709763] ? dev_set_allmulti+0x30/0x30 [ 2173.710656] ? strcmp+0x4c/0xb0 [ 2173.711332] dev_change_flags+0x100/0x160 [ 2173.712203] devinet_ioctl+0x14de/0x1db0 [ 2173.713031] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2173.713949] inet_ioctl+0x34f/0x390 [ 2173.714706] ? inet_dgram_connect+0x220/0x220 [ 2173.715630] ? __lock_acquire+0xbb1/0x5b00 [ 2173.716518] ? perf_trace_lock+0xac/0x490 [ 2173.717372] packet_ioctl+0xb3/0x260 [ 2173.718138] sock_do_ioctl+0xd3/0x300 [ 2173.718909] ? compat_ifr_data_ioctl+0x180/0x180 [ 2173.719874] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2173.721047] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2173.722108] ? do_vfs_ioctl+0x283/0x10d0 [ 2173.722946] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2173.724007] ? generic_block_fiemap+0x60/0x60 [ 2173.724929] sock_ioctl+0x3ea/0x700 [ 2173.725663] ? dlci_ioctl_set+0x30/0x30 [ 2173.726487] ? selinux_file_ioctl+0xb6/0x270 [ 2173.727381] ? dlci_ioctl_set+0x30/0x30 [ 2173.728196] __x64_sys_ioctl+0x19a/0x210 [ 2173.729030] do_syscall_64+0x33/0x40 [ 2173.729800] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2173.730857] RIP: 0033:0x7feded0d7b19 [ 2173.731621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2173.735351] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2173.736904] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2173.738360] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2173.739816] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2173.741271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2173.742749] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2173.744247] CPU: 1 PID: 12301 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2173.745612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2173.747269] Call Trace: [ 2173.747811] dump_stack+0x107/0x167 [ 2173.748528] should_fail.cold+0x5/0xa [ 2173.749297] ? __pmd_alloc+0x94/0x5e0 [ 2173.750063] should_failslab+0x5/0x20 [ 2173.750809] kmem_cache_alloc+0x5b/0x310 [ 2173.751349] device veth0_vlan entered promiscuous mode [ 2173.751609] __pmd_alloc+0x94/0x5e0 [ 2173.751633] copy_page_range+0x2bd8/0x3810 [ 2173.751660] ? perf_trace_lock+0xac/0x490 [ 2173.755022] ? lock_chain_count+0x20/0x20 [ 2173.755886] ? up_write+0x191/0x550 [ 2173.756602] ? vm_iomap_memory+0x190/0x190 [ 2173.757483] ? downgrade_write+0x3a0/0x3a0 [ 2173.758331] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2173.759434] ? __vma_link_rb+0x540/0x700 [ 2173.760255] copy_process+0x759b/0x7800 [ 2173.761096] ? __cleanup_sighand+0xb0/0xb0 [ 2173.761960] ? find_held_lock+0x2c/0x110 [ 2173.762800] kernel_clone+0xe7/0x980 [ 2173.763172] FAULT_INJECTION: forcing a failure. [ 2173.763172] name failslab, interval 1, probability 0, space 0, times 0 [ 2173.763539] ? lock_downgrade+0x6d0/0x6d0 [ 2173.763556] ? find_held_lock+0x2c/0x110 [ 2173.763574] ? create_io_thread+0xf0/0xf0 [ 2173.763608] ? ksys_write+0x12d/0x260 [ 2173.769052] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2173.770015] __do_sys_fork+0x8a/0xc0 [ 2173.770765] ? kernel_thread+0xf0/0xf0 [ 2173.771566] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2173.772596] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2173.773613] ? trace_hardirqs_on+0x5b/0x180 [ 2173.774475] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2173.775499] do_syscall_64+0x33/0x40 [ 2173.776234] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2173.777243] RIP: 0033:0x7fadf412db19 [ 2173.777979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2173.781613] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2173.783116] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2173.784522] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2173.785936] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2173.787339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2173.788751] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2173.790893] CPU: 0 PID: 12295 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2173.792332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2173.794045] Call Trace: [ 2173.794588] dump_stack+0x107/0x167 [ 2173.795337] should_fail.cold+0x5/0xa [ 2173.796115] ? ___slab_alloc+0x155/0x700 [ 2173.796947] ? create_object.isra.0+0x3a/0xa20 [ 2173.797890] should_failslab+0x5/0x20 [ 2173.798672] kmem_cache_alloc+0x5b/0x310 [ 2173.799510] create_object.isra.0+0x3a/0xa20 [ 2173.800416] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2173.801461] __kmalloc+0x16e/0x390 [ 2173.802216] fib6_info_alloc+0x3c/0x110 [ 2173.803035] ip6_route_info_create+0x37a/0x1a00 [ 2173.804001] ? fib6_nh_init+0x19e0/0x19e0 [ 2173.804847] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2173.805901] ? lock_downgrade+0x6d0/0x6d0 [ 2173.806777] ip6_route_add+0x24/0x150 [ 2173.807560] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2173.808625] ? ipv6_generate_stable_address+0x640/0x640 [ 2173.809745] ? ipv6_generate_stable_address+0x299/0x640 [ 2173.810848] addrconf_add_linklocal+0x1ab/0x470 [ 2173.811806] ? ipv6_del_addr+0x8d0/0x8d0 [ 2173.812640] ? trace_hardirqs_on+0x5b/0x180 [ 2173.813539] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2173.814623] ? addrconf_add_linklocal+0x470/0x470 [ 2173.815610] ? __local_bh_enable_ip+0x9d/0x100 [ 2173.816554] addrconf_dev_config+0x262/0x440 [ 2173.817453] addrconf_notify+0xc95/0x2410 [ 2173.818341] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2173.819398] ? inet6_ifinfo_notify+0x150/0x150 [ 2173.820329] ? failover_register+0x530/0x530 [ 2173.821228] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2173.822361] ? ipmr_device_event+0x18b/0x1f0 [ 2173.823264] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2173.824339] raw_notifier_call_chain+0xb3/0x110 [ 2173.825296] call_netdevice_notifiers_info+0xb5/0x130 [ 2173.826383] __dev_notify_flags+0x110/0x2c0 [ 2173.827275] ? dev_change_name+0x660/0x660 [ 2173.828134] ? __dev_change_flags+0x4cf/0x6e0 [ 2173.829052] ? dev_set_allmulti+0x30/0x30 [ 2173.829906] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2173.831024] dev_change_flags+0x100/0x160 [ 2173.831888] devinet_ioctl+0x14de/0x1db0 [ 2173.832733] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2173.833653] inet_ioctl+0x34f/0x390 [ 2173.834443] ? inet_dgram_connect+0x220/0x220 [ 2173.835375] ? __lock_acquire+0xbb1/0x5b00 [ 2173.836256] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2173.837330] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2173.838443] ? trace_hardirqs_on+0x5b/0x180 [ 2173.839328] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2173.840444] packet_ioctl+0xb3/0x260 [ 2173.841206] sock_do_ioctl+0xd3/0x300 [ 2173.841989] ? compat_ifr_data_ioctl+0x180/0x180 [ 2173.842968] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2173.844078] ? trace_hardirqs_on+0x5b/0x180 [ 2173.844970] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2173.846126] sock_ioctl+0x3ea/0x700 [ 2173.846869] ? dlci_ioctl_set+0x30/0x30 [ 2173.847684] ? selinux_file_ioctl+0xb6/0x270 [ 2173.848584] ? dlci_ioctl_set+0x30/0x30 [ 2173.849400] __x64_sys_ioctl+0x19a/0x210 [ 2173.850240] do_syscall_64+0x33/0x40 [ 2173.851002] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2173.852045] RIP: 0033:0x7f07a4a4eb19 [ 2173.852812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2173.856571] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2173.858158] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2173.859617] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2173.861073] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2173.862539] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2173.863996] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:33:26 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:33:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000206a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:33:26 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) io_uring_setup(0x1c24, &(0x7f00000000c0)={0x0, 0xa8b5, 0x1, 0x1, 0x2d4}) 02:33:26 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890d, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:26 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 46) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:26 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8982, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:33:27 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 43) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2174.101070] device veth0_vlan entered promiscuous mode [ 2174.107917] FAULT_INJECTION: forcing a failure. [ 2174.107917] name failslab, interval 1, probability 0, space 0, times 0 [ 2174.110094] CPU: 1 PID: 12320 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2174.111188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2174.112504] Call Trace: [ 2174.112936] dump_stack+0x107/0x167 [ 2174.113512] should_fail.cold+0x5/0xa [ 2174.114131] ? __alloc_skb+0x6d/0x5b0 [ 2174.114745] should_failslab+0x5/0x20 [ 2174.115356] kmem_cache_alloc_node+0x55/0x330 [ 2174.116065] __alloc_skb+0x6d/0x5b0 [ 2174.116656] inet6_rt_notify+0xed/0x2a0 [ 2174.117282] fib6_add+0x3223/0x45d0 [ 2174.117899] ? fib6_update_sernum_stub+0x80/0x80 [ 2174.118691] ? do_raw_spin_lock+0x121/0x260 [ 2174.119419] ? rwlock_bug.part.0+0x90/0x90 [ 2174.120126] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2174.120984] ? lock_downgrade+0x6d0/0x6d0 [ 2174.121669] ip6_route_add+0x8b/0x150 [ 2174.122318] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2174.123170] ? ipv6_generate_stable_address+0x640/0x640 [ 2174.124090] ? ipv6_generate_stable_address+0x299/0x640 [ 2174.124960] addrconf_add_linklocal+0x1ab/0x470 [ 2174.125744] ? ipv6_del_addr+0x8d0/0x8d0 [ 2174.126432] ? trace_hardirqs_on+0x5b/0x180 [ 2174.127170] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2174.128025] ? addrconf_add_linklocal+0x470/0x470 [ 2174.128834] ? __local_bh_enable_ip+0x9d/0x100 [ 2174.129596] addrconf_dev_config+0x262/0x440 [ 2174.130341] addrconf_notify+0xc95/0x2410 [ 2174.131012] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2174.131860] ? inet6_ifinfo_notify+0x150/0x150 [ 2174.132603] ? failover_register+0x530/0x530 [ 2174.133334] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2174.134245] ? ipmr_device_event+0x18b/0x1f0 [ 2174.134958] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2174.135816] raw_notifier_call_chain+0xb3/0x110 [ 2174.136575] call_netdevice_notifiers_info+0xb5/0x130 [ 2174.137433] __dev_notify_flags+0x110/0x2c0 [ 2174.138139] ? dev_change_name+0x660/0x660 [ 2174.138823] ? __dev_change_flags+0x4cf/0x6e0 [ 2174.139568] ? dev_set_allmulti+0x30/0x30 [ 2174.140255] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2174.141163] dev_change_flags+0x100/0x160 [ 2174.141849] devinet_ioctl+0x14de/0x1db0 [ 2174.142542] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2174.143264] inet_ioctl+0x34f/0x390 [ 2174.143859] ? inet_dgram_connect+0x220/0x220 [ 2174.144595] ? __lock_acquire+0xbb1/0x5b00 [ 2174.145286] ? perf_trace_lock+0xac/0x490 [ 2174.145960] packet_ioctl+0xb3/0x260 [ 2174.146565] sock_do_ioctl+0xd3/0x300 [ 2174.147163] ? compat_ifr_data_ioctl+0x180/0x180 [ 2174.147912] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2174.148822] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2174.149653] ? do_vfs_ioctl+0x283/0x10d0 [ 2174.150297] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2174.151147] ? generic_block_fiemap+0x60/0x60 [ 2174.151896] sock_ioctl+0x3ea/0x700 [ 2174.152487] ? dlci_ioctl_set+0x30/0x30 [ 2174.153129] ? selinux_file_ioctl+0xb6/0x270 [ 2174.153841] ? dlci_ioctl_set+0x30/0x30 [ 2174.154504] __x64_sys_ioctl+0x19a/0x210 [ 2174.155169] do_syscall_64+0x33/0x40 [ 2174.155789] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2174.156636] RIP: 0033:0x7feded0d7b19 [ 2174.157239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2174.160258] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2174.161504] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2174.162683] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2174.163859] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2174.165019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2174.166203] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2174.169233] device veth0_vlan entered promiscuous mode [ 2174.186284] FAULT_INJECTION: forcing a failure. [ 2174.186284] name failslab, interval 1, probability 0, space 0, times 0 [ 2174.189109] CPU: 0 PID: 12325 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2174.190584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2174.192308] Call Trace: [ 2174.192869] dump_stack+0x107/0x167 [ 2174.193640] should_fail.cold+0x5/0xa [ 2174.194447] ? create_object.isra.0+0x3a/0xa20 [ 2174.195395] should_failslab+0x5/0x20 [ 2174.196180] kmem_cache_alloc+0x5b/0x310 [ 2174.197033] ? mark_held_locks+0x9e/0xe0 [ 2174.197874] create_object.isra.0+0x3a/0xa20 [ 2174.198805] kmemleak_alloc_percpu+0xa0/0x100 [ 2174.199735] pcpu_alloc+0x4e2/0x1240 [ 2174.200546] fib_nh_common_init+0x2d/0x160 [ 2174.201423] fib6_nh_init+0xa21/0x19e0 [ 2174.202269] ? icmp6_dst_alloc+0x650/0x650 [ 2174.203151] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2174.204098] ? gre_gro_complete+0x530/0x530 [ 2174.205017] ? kasan_unpoison_shadow+0x33/0x50 [ 2174.205963] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2174.207003] ip6_route_info_create+0x1185/0x1a00 [ 2174.207980] ? fib6_nh_init+0x19e0/0x19e0 [ 2174.208821] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2174.209875] ? lock_downgrade+0x6d0/0x6d0 [ 2174.210739] ip6_route_add+0x24/0x150 [ 2174.211520] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2174.212585] ? ipv6_generate_stable_address+0x640/0x640 [ 2174.213704] ? ipv6_generate_stable_address+0x299/0x640 [ 2174.214796] addrconf_add_linklocal+0x1ab/0x470 [ 2174.215748] ? ipv6_del_addr+0x8d0/0x8d0 [ 2174.216573] ? trace_hardirqs_on+0x5b/0x180 [ 2174.217477] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2174.218552] ? addrconf_add_linklocal+0x470/0x470 [ 2174.219536] ? __local_bh_enable_ip+0x9d/0x100 [ 2174.220467] addrconf_dev_config+0x262/0x440 [ 2174.221366] addrconf_notify+0xc95/0x2410 [ 2174.222221] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2174.223271] ? inet6_ifinfo_notify+0x150/0x150 [ 2174.224193] ? failover_register+0x530/0x530 [ 2174.225090] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2174.226207] ? ipmr_device_event+0x18b/0x1f0 [ 2174.227098] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2174.228151] raw_notifier_call_chain+0xb3/0x110 [ 2174.229106] call_netdevice_notifiers_info+0xb5/0x130 [ 2174.230174] __dev_notify_flags+0x110/0x2c0 [ 2174.231055] ? dev_change_name+0x660/0x660 [ 2174.231907] ? __dev_change_flags+0x4cf/0x6e0 [ 2174.232822] ? dev_set_allmulti+0x30/0x30 [ 2174.233673] dev_change_flags+0x100/0x160 [ 2174.234541] devinet_ioctl+0x14de/0x1db0 [ 2174.235376] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2174.236284] inet_ioctl+0x34f/0x390 [ 2174.237025] ? inet_dgram_connect+0x220/0x220 [ 2174.237954] ? __lock_acquire+0xbb1/0x5b00 [ 2174.238862] ? perf_trace_lock+0xac/0x490 [ 2174.239714] packet_ioctl+0xb3/0x260 [ 2174.240474] sock_do_ioctl+0xd3/0x300 [ 2174.241246] ? compat_ifr_data_ioctl+0x180/0x180 [ 2174.242233] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2174.243396] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2174.244439] ? do_vfs_ioctl+0x283/0x10d0 [ 2174.245266] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2174.246332] ? generic_block_fiemap+0x60/0x60 [ 2174.247248] sock_ioctl+0x3ea/0x700 [ 2174.247985] ? dlci_ioctl_set+0x30/0x30 [ 2174.248809] ? selinux_file_ioctl+0xb6/0x270 [ 2174.249705] ? dlci_ioctl_set+0x30/0x30 [ 2174.250536] __x64_sys_ioctl+0x19a/0x210 [ 2174.251363] do_syscall_64+0x33/0x40 [ 2174.252129] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2174.253165] RIP: 0033:0x7f07a4a4eb19 [ 2174.253933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2174.257655] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2174.259219] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2174.260665] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2174.262113] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2174.263552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2174.264990] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:33:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="20000000800000000600003f6a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:33:41 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 74) 02:33:41 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 44) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:41 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 47) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:41 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0xfffffffd) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7, 0x9}}, './file0\x00'}) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="00717e1384d340d9544167d23842a36246f78b572628717796dd33d87dd41ede2682bdbcd966cdf1a5ab26c63559d34e47a08bca5b9761573e27a6ca31a0b5", @ANYRESHEX=r3, @ANYBLOB=',\x00']) fstatfs(r3, &(0x7f0000000100)=""/144) 02:33:41 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:33:41 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890e, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:41 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8983, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2188.275860] 9pnet: Insufficient options for proto=fd [ 2188.285495] 9pnet: Insufficient options for proto=fd [ 2188.295915] device veth0_vlan entered promiscuous mode [ 2188.295982] audit: type=1326 audit(1693276421.288:143): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12342 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2188.298102] FAULT_INJECTION: forcing a failure. [ 2188.298102] name failslab, interval 1, probability 0, space 0, times 0 [ 2188.303283] CPU: 0 PID: 12346 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2188.304073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2188.305042] Call Trace: [ 2188.305360] dump_stack+0x107/0x167 [ 2188.305785] should_fail.cold+0x5/0xa [ 2188.306237] ? create_object.isra.0+0x3a/0xa20 [ 2188.306775] should_failslab+0x5/0x20 [ 2188.307220] kmem_cache_alloc+0x5b/0x310 [ 2188.307695] ? mark_held_locks+0x9e/0xe0 [ 2188.308172] create_object.isra.0+0x3a/0xa20 [ 2188.308686] kmemleak_alloc_percpu+0xa0/0x100 [ 2188.309209] pcpu_alloc+0x4e2/0x1240 [ 2188.309656] fib_nh_common_init+0x2d/0x160 [ 2188.310153] fib6_nh_init+0xa21/0x19e0 [ 2188.310649] ? icmp6_dst_alloc+0x650/0x650 [ 2188.311148] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2188.311680] ? gre_gro_complete+0x530/0x530 [ 2188.312190] ? kasan_unpoison_shadow+0x33/0x50 [ 2188.312695] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2188.313289] ip6_route_info_create+0x1185/0x1a00 [ 2188.313845] ? fib6_nh_init+0x19e0/0x19e0 [ 2188.314322] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2188.314921] ? lock_downgrade+0x6d0/0x6d0 [ 2188.315392] ip6_route_add+0x24/0x150 [ 2188.315833] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2188.316429] ? ipv6_generate_stable_address+0x640/0x640 [ 2188.317063] ? ipv6_generate_stable_address+0x299/0x640 [ 2188.317680] addrconf_add_linklocal+0x1ab/0x470 [ 2188.318240] ? ipv6_del_addr+0x8d0/0x8d0 [ 2188.318716] ? trace_hardirqs_on+0x5b/0x180 [ 2188.319233] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2188.319844] ? addrconf_add_linklocal+0x470/0x470 [ 2188.320385] ? __local_bh_enable_ip+0x9d/0x100 [ 2188.320921] addrconf_dev_config+0x262/0x440 [ 2188.321424] addrconf_notify+0xc95/0x2410 [ 2188.321915] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2188.322519] ? inet6_ifinfo_notify+0x150/0x150 [ 2188.323047] ? failover_register+0x530/0x530 [ 2188.323553] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2188.324200] ? ipmr_device_event+0x18b/0x1f0 [ 2188.324704] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2188.325282] raw_notifier_call_chain+0xb3/0x110 [ 2188.325821] call_netdevice_notifiers_info+0xb5/0x130 [ 2188.326442] __dev_notify_flags+0x110/0x2c0 [ 2188.326935] ? dev_change_name+0x660/0x660 [ 2188.327421] ? __dev_change_flags+0x4cf/0x6e0 [ 2188.327920] ? dev_set_allmulti+0x30/0x30 [ 2188.328398] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2188.329001] dev_change_flags+0x100/0x160 [ 2188.329466] devinet_ioctl+0x14de/0x1db0 [ 2188.329919] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2188.330435] inet_ioctl+0x34f/0x390 [ 2188.330837] ? inet_dgram_connect+0x220/0x220 [ 2188.331350] ? __lock_acquire+0xbb1/0x5b00 [ 2188.331830] ? perf_trace_lock+0xac/0x490 [ 2188.332300] packet_ioctl+0xb3/0x260 [ 2188.332714] sock_do_ioctl+0xd3/0x300 [ 2188.333132] ? compat_ifr_data_ioctl+0x180/0x180 [ 2188.333662] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2188.334302] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2188.334883] ? do_vfs_ioctl+0x283/0x10d0 [ 2188.335334] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2188.335911] ? generic_block_fiemap+0x60/0x60 [ 2188.336424] sock_ioctl+0x3ea/0x700 [ 2188.336844] ? dlci_ioctl_set+0x30/0x30 [ 2188.337313] ? selinux_file_ioctl+0xb6/0x270 [ 2188.337828] ? dlci_ioctl_set+0x30/0x30 [ 2188.338290] __x64_sys_ioctl+0x19a/0x210 [ 2188.338778] do_syscall_64+0x33/0x40 [ 2188.339204] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2188.339792] RIP: 0033:0x7f07a4a4eb19 [ 2188.340217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2188.342323] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2188.343159] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2188.343934] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2188.344712] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2188.345508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2188.346298] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:33:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000676a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:33:41 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000200), 0x8000, 0x400) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) r1 = io_uring_setup(0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r3 = dup(r2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) write$binfmt_elf32(r5, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendmsg$nl_generic(r5, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x38, 0x2, 0x70bd25, 0x25dfdbfc, {0xc}, [@typed={0x8, 0x70, 0x0, 0x0, @uid=0xffffffffffffffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4040) r7 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r7}}) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000000)=[r2, r1, r1, r1, r1, r7], 0x6) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x6, @link_local}, 0x0, {0x2, 0xffff, @private=0xa010102}, 'syzkaller0\x00'}) 02:33:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060004806a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2188.406954] FAULT_INJECTION: forcing a failure. [ 2188.406954] name failslab, interval 1, probability 0, space 0, times 0 [ 2188.408281] CPU: 0 PID: 12364 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2188.408967] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2188.409863] Call Trace: [ 2188.410154] dump_stack+0x107/0x167 [ 2188.410539] should_fail.cold+0x5/0xa [ 2188.410922] ? create_object.isra.0+0x3a/0xa20 [ 2188.411418] should_failslab+0x5/0x20 [ 2188.411805] kmem_cache_alloc+0x5b/0x310 [ 2188.412250] create_object.isra.0+0x3a/0xa20 [ 2188.412699] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2188.413207] kmem_cache_alloc+0x159/0x310 [ 2188.413627] __pmd_alloc+0x94/0x5e0 [ 2188.413997] copy_page_range+0x2bd8/0x3810 [ 2188.414467] ? perf_trace_lock+0xac/0x490 [ 2188.414888] ? lock_chain_count+0x20/0x20 [ 2188.415328] ? up_write+0x191/0x550 [ 2188.415697] ? vm_iomap_memory+0x190/0x190 [ 2188.416116] ? downgrade_write+0x3a0/0x3a0 [ 2188.416542] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2188.417127] ? __vma_link_rb+0x540/0x700 [ 2188.417547] copy_process+0x759b/0x7800 [ 2188.417984] ? __cleanup_sighand+0xb0/0xb0 [ 2188.418445] ? find_held_lock+0x2c/0x110 [ 2188.418882] kernel_clone+0xe7/0x980 [ 2188.419271] ? lock_downgrade+0x6d0/0x6d0 [ 2188.419697] ? find_held_lock+0x2c/0x110 [ 2188.420141] ? create_io_thread+0xf0/0xf0 [ 2188.420581] ? ksys_write+0x12d/0x260 [ 2188.420997] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2188.421509] __do_sys_fork+0x8a/0xc0 [ 2188.421898] ? kernel_thread+0xf0/0xf0 [ 2188.422351] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2188.422902] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2188.423460] ? trace_hardirqs_on+0x5b/0x180 [ 2188.423916] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2188.424477] do_syscall_64+0x33/0x40 [ 2188.424882] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2188.425411] RIP: 0033:0x7fadf412db19 [ 2188.425794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2188.427696] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2188.428533] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2188.429322] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2188.430117] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2188.430929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2188.431726] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2188.443835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2188.446493] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2188.467946] device veth0_vlan entered promiscuous mode [ 2188.470030] FAULT_INJECTION: forcing a failure. [ 2188.470030] name failslab, interval 1, probability 0, space 0, times 0 [ 2188.471312] CPU: 0 PID: 12357 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2188.472051] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2188.472949] Call Trace: [ 2188.473234] dump_stack+0x107/0x167 [ 2188.473624] should_fail.cold+0x5/0xa [ 2188.474029] ? create_object.isra.0+0x3a/0xa20 [ 2188.474527] should_failslab+0x5/0x20 [ 2188.474949] kmem_cache_alloc+0x5b/0x310 [ 2188.475383] ? pcpu_alloc+0x12a/0x1240 [ 2188.475818] create_object.isra.0+0x3a/0xa20 [ 2188.476291] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2188.476844] kmem_cache_alloc_node+0x169/0x330 [ 2188.477361] __alloc_skb+0x6d/0x5b0 [ 2188.477768] inet6_rt_notify+0xed/0x2a0 [ 2188.478220] fib6_add+0x3223/0x45d0 [ 2188.478635] ? fib6_update_sernum_stub+0x80/0x80 [ 2188.479158] ? do_raw_spin_lock+0x121/0x260 [ 2188.479637] ? rwlock_bug.part.0+0x90/0x90 [ 2188.480106] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2188.480683] ? lock_downgrade+0x6d0/0x6d0 [ 2188.481134] ip6_route_add+0x8b/0x150 [ 2188.481565] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2188.482115] ? ipv6_generate_stable_address+0x640/0x640 [ 2188.482729] ? ipv6_generate_stable_address+0x299/0x640 [ 2188.483318] addrconf_add_linklocal+0x1ab/0x470 [ 2188.483956] ? ipv6_del_addr+0x8d0/0x8d0 [ 2188.484451] ? trace_hardirqs_on+0x5b/0x180 [ 2188.484942] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2188.485533] ? addrconf_add_linklocal+0x470/0x470 [ 2188.486064] ? addrconf_add_dev+0xd5/0x1e0 [ 2188.486556] addrconf_dev_config+0x262/0x440 [ 2188.487042] addrconf_notify+0xc95/0x2410 [ 2188.487503] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2188.488056] ? inet6_ifinfo_notify+0x150/0x150 [ 2188.488567] ? failover_register+0x530/0x530 [ 2188.489055] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2188.489662] ? ipmr_device_event+0x18b/0x1f0 [ 2188.490144] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2188.490713] raw_notifier_call_chain+0xb3/0x110 [ 2188.491233] call_netdevice_notifiers_info+0xb5/0x130 [ 2188.491799] __dev_notify_flags+0x110/0x2c0 [ 2188.492279] ? dev_change_name+0x660/0x660 [ 2188.492741] ? __dev_change_flags+0x4cf/0x6e0 [ 2188.493243] ? dev_set_allmulti+0x30/0x30 [ 2188.493711] dev_change_flags+0x100/0x160 [ 2188.494176] devinet_ioctl+0x14de/0x1db0 [ 2188.494636] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2188.495126] inet_ioctl+0x34f/0x390 [ 2188.495530] ? inet_dgram_connect+0x220/0x220 [ 2188.496035] ? __lock_acquire+0xbb1/0x5b00 [ 2188.496517] ? perf_trace_lock+0xac/0x490 [ 2188.496980] packet_ioctl+0xb3/0x260 [ 2188.497398] sock_do_ioctl+0xd3/0x300 [ 2188.497817] ? compat_ifr_data_ioctl+0x180/0x180 [ 2188.498359] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2188.498995] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2188.499559] ? do_vfs_ioctl+0x283/0x10d0 [ 2188.500011] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2188.500583] ? generic_block_fiemap+0x60/0x60 [ 2188.501081] sock_ioctl+0x3ea/0x700 [ 2188.501483] ? dlci_ioctl_set+0x30/0x30 [ 2188.501929] ? selinux_file_ioctl+0xb6/0x270 [ 2188.502413] ? dlci_ioctl_set+0x30/0x30 [ 2188.502852] __x64_sys_ioctl+0x19a/0x210 [ 2188.503306] do_syscall_64+0x33/0x40 [ 2188.503722] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2188.504289] RIP: 0033:0x7feded0d7b19 [ 2188.504711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2188.506739] RSP: 002b:00007fedea62c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2188.507577] RAX: ffffffffffffffda RBX: 00007feded1eb020 RCX: 00007feded0d7b19 [ 2188.508310] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2188.509094] RBP: 00007fedea62c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2188.509889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2188.510610] R13: 00007ffef51d5a1f R14: 00007fedea62c300 R15: 0000000000022000 02:33:41 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890f, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2188.532739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2188.534366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:33:55 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 75) 02:33:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="20000000800000000600fdef6a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:33:55 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x89a0, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:33:55 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x8, {0x2, 0x0, @local}, 'syzkaller0\x00'}) connect$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000000c0)="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") 02:33:55 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:33:55 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 45) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:55 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 48) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:55 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8910, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2202.047140] audit: type=1326 audit(1693276435.039:144): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12381 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:33:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000f06a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2202.067816] device veth0_vlan entered promiscuous mode [ 2202.071994] FAULT_INJECTION: forcing a failure. [ 2202.071994] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.073311] CPU: 1 PID: 12389 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2202.074094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.075110] Call Trace: [ 2202.075417] dump_stack+0x107/0x167 [ 2202.075831] should_fail.cold+0x5/0xa [ 2202.076268] ? ___slab_alloc+0x155/0x700 [ 2202.076726] ? create_object.isra.0+0x3a/0xa20 [ 2202.077241] should_failslab+0x5/0x20 [ 2202.077674] kmem_cache_alloc+0x5b/0x310 [ 2202.078129] create_object.isra.0+0x3a/0xa20 [ 2202.078647] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2202.079231] kmem_cache_alloc_node+0x169/0x330 [ 2202.079763] __alloc_skb+0x6d/0x5b0 [ 2202.080188] inet6_rt_notify+0xed/0x2a0 [ 2202.080657] fib6_add+0x3223/0x45d0 [ 2202.081095] ? fib6_update_sernum_stub+0x80/0x80 [ 2202.081642] ? do_raw_spin_lock+0x121/0x260 [ 2202.082129] ? rwlock_bug.part.0+0x90/0x90 [ 2202.082630] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2202.083230] ? lock_downgrade+0x6d0/0x6d0 [ 2202.083720] ip6_route_add+0x8b/0x150 [ 2202.084182] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2202.084794] ? ipv6_generate_stable_address+0x640/0x640 [ 2202.085428] ? ipv6_generate_stable_address+0x299/0x640 [ 2202.086052] addrconf_add_linklocal+0x1ab/0x470 [ 2202.086601] ? ipv6_del_addr+0x8d0/0x8d0 [ 2202.087075] ? trace_hardirqs_on+0x5b/0x180 [ 2202.087595] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2202.088205] ? addrconf_add_linklocal+0x470/0x470 [ 2202.088778] ? __local_bh_enable_ip+0x9d/0x100 [ 2202.089324] addrconf_dev_config+0x262/0x440 [ 2202.089840] addrconf_notify+0xc95/0x2410 [ 2202.090323] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2202.090950] ? inet6_ifinfo_notify+0x150/0x150 [ 2202.091479] ? failover_register+0x530/0x530 [ 2202.091991] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2202.092627] ? ipmr_device_event+0x18b/0x1f0 [ 2202.093140] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2202.093751] raw_notifier_call_chain+0xb3/0x110 [ 2202.094275] call_netdevice_notifiers_info+0xb5/0x130 [ 2202.094882] __dev_notify_flags+0x110/0x2c0 [ 2202.095385] ? dev_change_name+0x660/0x660 [ 2202.095875] ? __dev_change_flags+0x4cf/0x6e0 [ 2202.096405] ? dev_set_allmulti+0x30/0x30 [ 2202.096884] ? cap_capable+0x1d6/0x240 [ 2202.097344] ? full_name_hash+0xb5/0xf0 [ 2202.097801] dev_change_flags+0x100/0x160 [ 2202.098274] devinet_ioctl+0x14de/0x1db0 [ 2202.098763] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2202.099276] inet_ioctl+0x34f/0x390 [ 2202.099695] ? inet_dgram_connect+0x220/0x220 [ 2202.100219] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2202.100824] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2202.101455] ? trace_hardirqs_on+0x5b/0x180 [ 2202.101956] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2202.102601] packet_ioctl+0xb3/0x260 [ 2202.103033] sock_do_ioctl+0xd3/0x300 [ 2202.103481] ? compat_ifr_data_ioctl+0x180/0x180 [ 2202.104027] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2202.104697] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2202.105287] ? do_vfs_ioctl+0x283/0x10d0 [ 2202.105757] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2202.106356] ? generic_block_fiemap+0x60/0x60 [ 2202.106867] sock_ioctl+0x3ea/0x700 [ 2202.107289] ? dlci_ioctl_set+0x30/0x30 [ 2202.107738] ? selinux_file_ioctl+0xb6/0x270 [ 2202.108256] ? dlci_ioctl_set+0x30/0x30 [ 2202.108714] __x64_sys_ioctl+0x19a/0x210 [ 2202.109184] do_syscall_64+0x33/0x40 [ 2202.109615] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2202.110210] RIP: 0033:0x7feded0d7b19 [ 2202.110630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2202.112668] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2202.113540] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2202.114363] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2202.115179] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2202.115994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2202.116811] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:33:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="20000000800000000600effd6a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2202.162866] device veth0_vlan entered promiscuous mode [ 2202.168240] FAULT_INJECTION: forcing a failure. [ 2202.168240] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.170662] FAULT_INJECTION: forcing a failure. [ 2202.170662] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2202.170677] CPU: 1 PID: 12404 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2202.170684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.170688] Call Trace: [ 2202.170704] dump_stack+0x107/0x167 [ 2202.170718] should_fail.cold+0x5/0xa [ 2202.170736] __alloc_pages_nodemask+0x182/0x600 [ 2202.170753] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2202.170763] ? find_held_lock+0x2c/0x110 [ 2202.170779] ? __pmd_alloc+0x2db/0x5e0 [ 2202.170791] ? lock_downgrade+0x6d0/0x6d0 [ 2202.170803] ? do_raw_spin_lock+0x121/0x260 [ 2202.170818] alloc_pages_current+0x187/0x280 [ 2202.170833] pte_alloc_one+0x16/0x1a0 [ 2202.170853] __pte_alloc+0x1d/0x330 [ 2202.180329] copy_page_range+0x1b62/0x3810 [ 2202.180803] ? perf_trace_lock+0xac/0x490 [ 2202.181272] ? lock_chain_count+0x20/0x20 [ 2202.181754] ? up_write+0x191/0x550 [ 2202.182167] ? vm_iomap_memory+0x190/0x190 [ 2202.182663] ? downgrade_write+0x3a0/0x3a0 [ 2202.183140] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2202.183754] ? __vma_link_rb+0x540/0x700 [ 2202.184207] copy_process+0x759b/0x7800 [ 2202.184680] ? __cleanup_sighand+0xb0/0xb0 [ 2202.185164] ? find_held_lock+0x2c/0x110 [ 2202.185616] kernel_clone+0xe7/0x980 [ 2202.186034] ? lock_downgrade+0x6d0/0x6d0 [ 2202.186499] ? find_held_lock+0x2c/0x110 [ 2202.186966] ? create_io_thread+0xf0/0xf0 [ 2202.187419] ? ksys_write+0x12d/0x260 [ 2202.187866] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2202.188398] __do_sys_fork+0x8a/0xc0 [ 2202.188837] ? kernel_thread+0xf0/0xf0 [ 2202.189273] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2202.189867] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2202.190431] ? trace_hardirqs_on+0x5b/0x180 [ 2202.190929] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2202.191497] do_syscall_64+0x33/0x40 [ 2202.191937] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2202.192499] RIP: 0033:0x7fadf412db19 [ 2202.192936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2202.194979] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2202.195840] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2202.196627] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2202.197412] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2202.198221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2202.199035] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2202.199879] CPU: 0 PID: 12392 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2202.201290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.202969] Call Trace: [ 2202.203514] dump_stack+0x107/0x167 [ 2202.204255] should_fail.cold+0x5/0xa [ 2202.205028] ? create_object.isra.0+0x3a/0xa20 [ 2202.205957] should_failslab+0x5/0x20 [ 2202.206748] kmem_cache_alloc+0x5b/0x310 [ 2202.207571] ? mark_held_locks+0x9e/0xe0 [ 2202.208395] create_object.isra.0+0x3a/0xa20 [ 2202.209291] kmemleak_alloc_percpu+0xa0/0x100 [ 2202.210192] pcpu_alloc+0x4e2/0x1240 [ 2202.210991] fib6_nh_init+0xa51/0x19e0 [ 2202.211777] ? icmp6_dst_alloc+0x650/0x650 [ 2202.212642] ? ip_fib_metrics_init+0x3ca/0x7d0 [ 2202.213558] ? gre_gro_complete+0x530/0x530 [ 2202.214456] ? kasan_unpoison_shadow+0x33/0x50 [ 2202.215375] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2202.216433] ip6_route_info_create+0x1185/0x1a00 [ 2202.217413] ? fib6_nh_init+0x19e0/0x19e0 [ 2202.218242] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2202.219325] ? lock_downgrade+0x6d0/0x6d0 [ 2202.220168] ip6_route_add+0x24/0x150 [ 2202.220959] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2202.222000] ? ipv6_generate_stable_address+0x640/0x640 [ 2202.223139] ? ipv6_generate_stable_address+0x299/0x640 [ 2202.224212] addrconf_add_linklocal+0x1ab/0x470 [ 2202.225170] ? ipv6_del_addr+0x8d0/0x8d0 [ 2202.226012] ? trace_hardirqs_on+0x5b/0x180 [ 2202.226918] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2202.228005] ? addrconf_add_linklocal+0x470/0x470 [ 2202.228973] ? __local_bh_enable_ip+0x9d/0x100 [ 2202.229926] addrconf_dev_config+0x262/0x440 [ 2202.230825] addrconf_notify+0xc95/0x2410 [ 2202.231687] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2202.232719] ? inet6_ifinfo_notify+0x150/0x150 [ 2202.233657] ? failover_register+0x530/0x530 [ 2202.234578] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2202.235673] ? ipmr_device_event+0x18b/0x1f0 [ 2202.236580] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2202.237614] raw_notifier_call_chain+0xb3/0x110 [ 2202.238587] call_netdevice_notifiers_info+0xb5/0x130 [ 2202.239622] __dev_notify_flags+0x110/0x2c0 [ 2202.240501] ? dev_change_name+0x660/0x660 [ 2202.241353] ? __dev_change_flags+0x4cf/0x6e0 [ 2202.242276] ? dev_set_allmulti+0x30/0x30 [ 2202.243147] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2202.244243] dev_change_flags+0x100/0x160 [ 2202.245096] devinet_ioctl+0x14de/0x1db0 [ 2202.245924] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2202.246859] inet_ioctl+0x34f/0x390 [ 2202.247591] ? inet_dgram_connect+0x220/0x220 [ 2202.248538] ? __lock_acquire+0xbb1/0x5b00 [ 2202.249406] ? perf_trace_lock+0xac/0x490 [ 2202.250264] packet_ioctl+0xb3/0x260 [ 2202.251039] sock_do_ioctl+0xd3/0x300 [ 2202.251810] ? compat_ifr_data_ioctl+0x180/0x180 [ 2202.252765] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2202.253927] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2202.254968] ? do_vfs_ioctl+0x283/0x10d0 [ 2202.255790] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2202.256838] ? generic_block_fiemap+0x60/0x60 [ 2202.257739] sock_ioctl+0x3ea/0x700 [ 2202.258496] ? dlci_ioctl_set+0x30/0x30 [ 2202.259305] ? selinux_file_ioctl+0xb6/0x270 [ 2202.260184] ? dlci_ioctl_set+0x30/0x30 [ 2202.260990] __x64_sys_ioctl+0x19a/0x210 [ 2202.261807] do_syscall_64+0x33/0x40 [ 2202.262571] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2202.263586] RIP: 0033:0x7f07a4a4eb19 [ 2202.264343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2202.267987] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2202.269491] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2202.270920] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2202.272329] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2202.273736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2202.275149] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:33:55 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 49) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:33:55 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x300, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:33:55 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000010c0)='ns/time\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) write$binfmt_elf32(r5, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000001100)=[0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff, r1, r0, r0, r2, r4, r5], 0xa) r7 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r7, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r8 = syz_open_dev$vcsu(&(0x7f0000000000), 0x7, 0x492400) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_TREE_SEARCH(r8, 0xd0009411, &(0x7f00000000c0)={{r9, 0x400, 0x7, 0x2, 0x7, 0x5, 0x4800000000000000, 0x1f, 0x785bc1b3, 0x49, 0x83e, 0x0, 0x3, 0x3, 0xcd3}}) 02:33:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000026a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:33:55 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x89a1, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2202.391652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:33:55 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8911, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2202.398086] device veth0_vlan entered promiscuous mode [ 2202.400789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2202.402052] FAULT_INJECTION: forcing a failure. [ 2202.402052] name failslab, interval 1, probability 0, space 0, times 0 [ 2202.404501] CPU: 1 PID: 12417 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2202.405252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2202.406145] Call Trace: [ 2202.406438] dump_stack+0x107/0x167 [ 2202.406832] should_fail.cold+0x5/0xa [ 2202.407258] ? create_object.isra.0+0x3a/0xa20 [ 2202.407759] should_failslab+0x5/0x20 [ 2202.408170] kmem_cache_alloc+0x5b/0x310 [ 2202.408610] create_object.isra.0+0x3a/0xa20 [ 2202.409083] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2202.409639] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2202.410185] ? inet6_rt_notify+0xed/0x2a0 [ 2202.410655] __alloc_skb+0xb1/0x5b0 [ 2202.411050] inet6_rt_notify+0xed/0x2a0 [ 2202.411497] fib6_add+0x3223/0x45d0 [ 2202.411904] ? fib6_update_sernum_stub+0x80/0x80 [ 2202.412440] ? do_raw_spin_lock+0x121/0x260 [ 2202.412910] ? rwlock_bug.part.0+0x90/0x90 [ 2202.413390] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2202.413963] ? lock_downgrade+0x6d0/0x6d0 [ 2202.414440] ip6_route_add+0x8b/0x150 [ 2202.414869] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2202.415442] ? ipv6_generate_stable_address+0x640/0x640 [ 2202.416046] ? ipv6_generate_stable_address+0x299/0x640 [ 2202.416648] addrconf_add_linklocal+0x1ab/0x470 [ 2202.417151] ? ipv6_del_addr+0x8d0/0x8d0 [ 2202.417599] ? trace_hardirqs_on+0x5b/0x180 [ 2202.418075] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2202.418660] ? addrconf_add_linklocal+0x470/0x470 [ 2202.419211] addrconf_dev_config+0x262/0x440 [ 2202.419708] addrconf_notify+0xc95/0x2410 [ 2202.420178] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2202.420785] ? inet6_ifinfo_notify+0x150/0x150 [ 2202.421299] ? raw_notifier_call_chain+0x67/0x110 [ 2202.421839] raw_notifier_call_chain+0xb3/0x110 [ 2202.422386] call_netdevice_notifiers_info+0xb5/0x130 [ 2202.422966] __dev_notify_flags+0x110/0x2c0 [ 2202.423447] ? dev_change_name+0x660/0x660 [ 2202.423917] ? __dev_change_flags+0x4cf/0x6e0 [ 2202.424414] ? dev_set_allmulti+0x30/0x30 [ 2202.424879] ? cap_capable+0x1d6/0x240 [ 2202.425324] ? full_name_hash+0xb5/0xf0 [ 2202.425769] dev_change_flags+0x100/0x160 [ 2202.426232] devinet_ioctl+0x14de/0x1db0 [ 2202.426695] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2202.427189] inet_ioctl+0x34f/0x390 [ 2202.427596] ? inet_dgram_connect+0x220/0x220 [ 2202.428109] ? __lock_acquire+0xbb1/0x5b00 [ 2202.428595] ? perf_trace_lock+0xac/0x490 [ 2202.429070] packet_ioctl+0xb3/0x260 [ 2202.429479] sock_do_ioctl+0xd3/0x300 [ 2202.429901] ? compat_ifr_data_ioctl+0x180/0x180 [ 2202.430432] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2202.431071] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2202.431646] ? do_vfs_ioctl+0x283/0x10d0 [ 2202.432095] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2202.432674] ? generic_block_fiemap+0x60/0x60 [ 2202.433178] sock_ioctl+0x3ea/0x700 [ 2202.433582] ? dlci_ioctl_set+0x30/0x30 [ 2202.434036] ? selinux_file_ioctl+0xb6/0x270 [ 2202.434531] ? dlci_ioctl_set+0x30/0x30 [ 2202.434980] __x64_sys_ioctl+0x19a/0x210 [ 2202.435422] do_syscall_64+0x33/0x40 [ 2202.435844] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2202.436408] RIP: 0033:0x7feded0d7b19 [ 2202.436824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2202.438866] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2202.439715] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2202.440516] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2202.441303] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2202.442098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2202.442901] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2202.447155] 9pnet: Insufficient options for proto=fd [ 2202.466278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2202.475620] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2215.247688] device veth0_vlan entered promiscuous mode [ 2215.251035] FAULT_INJECTION: forcing a failure. [ 2215.251035] name failslab, interval 1, probability 0, space 0, times 0 [ 2215.252464] CPU: 0 PID: 12439 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2215.253283] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2215.254273] Call Trace: [ 2215.254613] dump_stack+0x107/0x167 [ 2215.255047] should_fail.cold+0x5/0xa [ 2215.255514] ? __alloc_skb+0x6d/0x5b0 [ 2215.255973] should_failslab+0x5/0x20 [ 2215.256437] kmem_cache_alloc_node+0x55/0x330 [ 2215.256974] __alloc_skb+0x6d/0x5b0 [ 2215.257422] inet6_rt_notify+0xed/0x2a0 [ 2215.257900] fib6_add+0x3223/0x45d0 [ 2215.258350] ? fib6_update_sernum_stub+0x80/0x80 [ 2215.258910] ? do_raw_spin_lock+0x121/0x260 [ 2215.259428] ? rwlock_bug.part.0+0x90/0x90 [ 2215.259937] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2215.260549] ? lock_downgrade+0x6d0/0x6d0 [ 2215.261049] ip6_route_add+0x8b/0x150 [ 2215.261504] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2215.262123] ? ipv6_generate_stable_address+0x640/0x640 [ 2215.262789] ? ipv6_generate_stable_address+0x299/0x640 [ 2215.263432] addrconf_add_linklocal+0x1ab/0x470 [ 2215.263988] ? ipv6_del_addr+0x8d0/0x8d0 [ 2215.264476] ? trace_hardirqs_on+0x5b/0x180 [ 2215.264999] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2215.265631] ? addrconf_add_linklocal+0x470/0x470 [ 2215.266221] addrconf_dev_config+0x262/0x440 [ 2215.266757] addrconf_notify+0xc95/0x2410 [ 2215.267256] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.267868] ? inet6_ifinfo_notify+0x150/0x150 [ 2215.268388] ? failover_register+0x530/0x530 [ 2215.268900] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2215.269524] ? ipmr_device_event+0x18b/0x1f0 [ 2215.270023] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.270618] raw_notifier_call_chain+0xb3/0x110 [ 2215.271153] call_netdevice_notifiers_info+0xb5/0x130 [ 2215.271760] __dev_notify_flags+0x110/0x2c0 [ 2215.272277] ? dev_change_name+0x660/0x660 [ 2215.272773] ? __dev_change_flags+0x4cf/0x6e0 [ 2215.273502] ? dev_set_allmulti+0x30/0x30 [ 2215.273987] ? cap_capable+0x1d6/0x240 [ 2215.274458] ? full_name_hash+0xb5/0xf0 [ 2215.274937] dev_change_flags+0x100/0x160 [ 2215.275423] devinet_ioctl+0x14de/0x1db0 [ 2215.275905] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2215.276432] inet_ioctl+0x34f/0x390 [ 2215.276862] ? inet_dgram_connect+0x220/0x220 [ 2215.277404] ? __lock_acquire+0xbb1/0x5b00 [ 2215.277922] ? perf_trace_lock+0xac/0x490 [ 2215.278419] packet_ioctl+0xb3/0x260 [ 2215.278850] sock_do_ioctl+0xd3/0x300 [ 2215.279302] ? compat_ifr_data_ioctl+0x180/0x180 [ 2215.279874] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2215.280519] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.281122] ? do_vfs_ioctl+0x283/0x10d0 [ 2215.281584] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2215.282206] ? generic_block_fiemap+0x60/0x60 [ 2215.282739] sock_ioctl+0x3ea/0x700 [ 2215.283176] ? dlci_ioctl_set+0x30/0x30 [ 2215.283628] ? selinux_file_ioctl+0xb6/0x270 [ 2215.284156] ? dlci_ioctl_set+0x30/0x30 [ 2215.284608] __x64_sys_ioctl+0x19a/0x210 [ 2215.285108] do_syscall_64+0x33/0x40 [ 2215.285533] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2215.286134] RIP: 0033:0x7f07a4a4eb19 [ 2215.286583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2215.288752] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2215.289611] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2215.290449] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2215.291319] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2215.292162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2215.293008] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:34:08 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 76) 02:34:08 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8912, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:08 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x40049409, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:34:08 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'vlan1\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xff, 0x81, 0x81, 0x3f, 0x0, 0x6, 0x0, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffff7f, 0x2, @perf_config_ext={0x9, 0x91}, 0x40008, 0xfff, 0x7, 0x0, 0x8, 0xfffffff7, 0x7, 0x0, 0x1, 0x0, 0x6}, 0xffffffffffffffff, 0xb, r1, 0x2) 02:34:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000036a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:08 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x330, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:34:08 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 50) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:08 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 46) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2215.297264] audit: type=1326 audit(1693276448.289:145): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12436 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:34:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000046a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2215.321299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2215.329888] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2215.357714] FAULT_INJECTION: forcing a failure. [ 2215.357714] name failslab, interval 1, probability 0, space 0, times 0 [ 2215.359000] CPU: 0 PID: 12458 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2215.359777] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2215.360696] Call Trace: [ 2215.361001] dump_stack+0x107/0x167 [ 2215.361402] should_fail.cold+0x5/0xa [ 2215.361834] ? ptlock_alloc+0x1d/0x70 [ 2215.362264] should_failslab+0x5/0x20 [ 2215.362701] kmem_cache_alloc+0x5b/0x310 [ 2215.363151] ptlock_alloc+0x1d/0x70 [ 2215.363554] pte_alloc_one+0x68/0x1a0 [ 2215.363971] __pte_alloc+0x1d/0x330 [ 2215.364377] copy_page_range+0x1b62/0x3810 [ 2215.364861] ? perf_trace_lock+0xac/0x490 [ 2215.365320] ? lock_chain_count+0x20/0x20 [ 2215.365810] ? up_write+0x191/0x550 [ 2215.366207] ? vm_iomap_memory+0x190/0x190 [ 2215.366687] ? downgrade_write+0x3a0/0x3a0 [ 2215.367151] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2215.367765] ? __vma_link_rb+0x540/0x700 [ 2215.368239] copy_process+0x759b/0x7800 [ 2215.368710] ? __cleanup_sighand+0xb0/0xb0 [ 2215.369196] ? find_held_lock+0x2c/0x110 [ 2215.369664] kernel_clone+0xe7/0x980 [ 2215.370187] ? lock_downgrade+0x6d0/0x6d0 [ 2215.370716] ? find_held_lock+0x2c/0x110 [ 2215.371185] ? create_io_thread+0xf0/0xf0 [ 2215.371661] ? ksys_write+0x12d/0x260 [ 2215.372102] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2215.372656] __do_sys_fork+0x8a/0xc0 [ 2215.373081] ? kernel_thread+0xf0/0xf0 [ 2215.373536] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2215.374133] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2215.374816] ? trace_hardirqs_on+0x5b/0x180 [ 2215.375295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2215.375882] do_syscall_64+0x33/0x40 [ 2215.376300] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2215.376888] RIP: 0033:0x7fadf412db19 [ 2215.377315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2215.379419] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2215.380258] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2215.381055] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2215.381851] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2215.382677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2215.383489] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:34:08 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) syz_io_uring_setup(0x170f, &(0x7f00000000c0)={0x0, 0x40f0, 0x1, 0x3, 0x16c, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r4 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) syz_io_uring_submit(r7, r6, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(r2, r6, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x5, 0x4001, @fd_index=0x1, 0x8, &(0x7f0000001500)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000001c0)="5d2deff6426da33de2de18bbf6cd2020745d68ad0103d74a8dcdc782563d9d0a8d10e2a044181eadd0fc0946", 0x2c}, {&(0x7f00000012c0)}, {&(0x7f0000001300)="3de936aa8952b31a7c2d95e066113efd16467f9e9da63a317ff59b25cd54dd95828199568d1a9e8cce268364c86ad2c46cfbacaca16b2471604990fd43586b4dc8b67decbe8eab37a5c4220f29df3278752d92275476feb3d7f8845bdbb7d1f8c7a71c7d1e6b66001f4bb01d1f8451bf99bdcaacc7926649bcf1664c68642ce02fb0e47eee95685b240a800aead64d1881cbd818bda53059b4b6", 0x9a}, {&(0x7f00000013c0)}, {&(0x7f0000001400)="51ce4e2622fc879d394f627a44ab696208e42b7870791f45c8dcb5427eec2a9cb6f9f45a2d71de781a28efe4b4", 0x2d}, {&(0x7f0000001580)="4e7efefd12580569ddf7d4cf25f5aba3ced190c2e0675c265e924329d8f7c93db3a3be5ba2f1f59008ff4b9a065b6fbd3d2b0e53c34b63e4950b89119b0e9a31068c406679186c5e5efbe7d547239cc90a6182d50233e9c7bf72da1b9de3c10f8cb583e173d671153729e2ada8be", 0x6e}, {&(0x7f00000014c0)="7da6b2ec4324f000714445b66a7f04", 0xf}], 0x8, 0x17, 0x0, {0x0, r3}}, 0x1) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2215.386079] device veth0_vlan entered promiscuous mode [ 2215.401212] FAULT_INJECTION: forcing a failure. [ 2215.401212] name failslab, interval 1, probability 0, space 0, times 0 [ 2215.403920] CPU: 1 PID: 12448 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2215.405334] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2215.407046] Call Trace: [ 2215.407601] dump_stack+0x107/0x167 [ 2215.408341] should_fail.cold+0x5/0xa [ 2215.409110] ? create_object.isra.0+0x3a/0xa20 [ 2215.410064] should_failslab+0x5/0x20 [ 2215.410839] kmem_cache_alloc+0x5b/0x310 [ 2215.411660] create_object.isra.0+0x3a/0xa20 [ 2215.412549] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2215.413581] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2215.414614] ? inet6_rt_notify+0xed/0x2a0 [ 2215.415451] __alloc_skb+0xb1/0x5b0 [ 2215.416192] inet6_rt_notify+0xed/0x2a0 [ 2215.416998] fib6_add+0x3223/0x45d0 [ 2215.417755] ? fib6_update_sernum_stub+0x80/0x80 [ 2215.418725] ? do_raw_spin_lock+0x121/0x260 [ 2215.419590] ? rwlock_bug.part.0+0x90/0x90 [ 2215.420431] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2215.421468] ? lock_downgrade+0x6d0/0x6d0 [ 2215.422306] ip6_route_add+0x8b/0x150 [ 2215.423083] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2215.424116] ? ipv6_generate_stable_address+0x640/0x640 [ 2215.425212] ? trace_hardirqs_on+0x5b/0x180 [ 2215.426079] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2215.427171] addrconf_add_linklocal+0x1ab/0x470 [ 2215.428098] ? ipv6_del_addr+0x8d0/0x8d0 [ 2215.428917] ? __sanitizer_cov_trace_pc+0x45/0x60 [ 2215.429898] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2215.430965] ? addrconf_add_linklocal+0x470/0x470 [ 2215.431930] ? __local_bh_enable_ip+0x9d/0x100 [ 2215.432860] addrconf_dev_config+0x262/0x440 [ 2215.433741] addrconf_notify+0xc95/0x2410 [ 2215.434594] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.435624] ? inet6_ifinfo_notify+0x150/0x150 [ 2215.436546] ? failover_register+0x530/0x530 [ 2215.437443] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2215.438551] ? ipmr_device_event+0x18b/0x1f0 [ 2215.439436] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.440483] raw_notifier_call_chain+0xb3/0x110 [ 2215.441423] call_netdevice_notifiers_info+0xb5/0x130 [ 2215.442464] __dev_notify_flags+0x110/0x2c0 [ 2215.443346] ? dev_change_name+0x660/0x660 [ 2215.444191] ? __dev_change_flags+0x4cf/0x6e0 [ 2215.445092] ? dev_set_allmulti+0x30/0x30 [ 2215.445926] ? cap_capable+0x1d6/0x240 [ 2215.446723] ? full_name_hash+0xb5/0xf0 [ 2215.447523] dev_change_flags+0x100/0x160 [ 2215.448362] devinet_ioctl+0x14de/0x1db0 [ 2215.449186] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2215.450078] inet_ioctl+0x34f/0x390 [ 2215.450825] ? inet_dgram_connect+0x220/0x220 [ 2215.451736] ? __lock_acquire+0xbb1/0x5b00 [ 2215.452599] ? perf_trace_lock+0xac/0x490 [ 2215.453438] packet_ioctl+0xb3/0x260 [ 2215.454187] sock_do_ioctl+0xd3/0x300 [ 2215.454958] ? compat_ifr_data_ioctl+0x180/0x180 [ 2215.455914] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2215.457062] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.458091] ? do_vfs_ioctl+0x283/0x10d0 [ 2215.458923] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2215.459973] ? generic_block_fiemap+0x60/0x60 [ 2215.460881] sock_ioctl+0x3ea/0x700 [ 2215.461614] ? dlci_ioctl_set+0x30/0x30 [ 2215.462425] ? selinux_file_ioctl+0xb6/0x270 [ 2215.463313] ? dlci_ioctl_set+0x30/0x30 [ 2215.464125] __x64_sys_ioctl+0x19a/0x210 [ 2215.464943] do_syscall_64+0x33/0x40 [ 2215.465702] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2215.466736] RIP: 0033:0x7feded0d7b19 [ 2215.467490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2215.471174] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2215.472705] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2215.474122] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2215.475561] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2215.476980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2215.478413] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 02:34:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000056a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:08 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x500, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:34:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000066a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:08 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 47) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:08 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x40086602, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:34:08 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 51) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2215.616127] device veth0_vlan entered promiscuous mode [ 2215.629044] FAULT_INJECTION: forcing a failure. [ 2215.629044] name failslab, interval 1, probability 0, space 0, times 0 [ 2215.631492] CPU: 1 PID: 12475 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2215.632900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2215.634596] Call Trace: [ 2215.635140] dump_stack+0x107/0x167 [ 2215.635892] should_fail.cold+0x5/0xa [ 2215.636667] ? create_object.isra.0+0x3a/0xa20 [ 2215.637599] should_failslab+0x5/0x20 [ 2215.638375] kmem_cache_alloc+0x5b/0x310 [ 2215.639204] ? pcpu_alloc+0x12a/0x1240 [ 2215.639997] create_object.isra.0+0x3a/0xa20 [ 2215.640885] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2215.641915] kmem_cache_alloc_node+0x169/0x330 [ 2215.642884] __alloc_skb+0x6d/0x5b0 [ 2215.643637] inet6_rt_notify+0xed/0x2a0 [ 2215.644464] fib6_add+0x3223/0x45d0 [ 2215.645231] ? fib6_update_sernum_stub+0x80/0x80 [ 2215.646204] ? do_raw_spin_lock+0x121/0x260 [ 2215.647090] ? rwlock_bug.part.0+0x90/0x90 [ 2215.647942] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2215.648986] ? lock_downgrade+0x6d0/0x6d0 [ 2215.649831] ip6_route_add+0x8b/0x150 [ 2215.650620] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2215.651660] ? ipv6_generate_stable_address+0x640/0x640 [ 2215.652768] ? ipv6_generate_stable_address+0x299/0x640 [ 2215.653846] addrconf_add_linklocal+0x1ab/0x470 [ 2215.654787] ? ipv6_del_addr+0x8d0/0x8d0 [ 2215.655617] ? trace_hardirqs_on+0x5b/0x180 [ 2215.656503] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2215.657547] ? addrconf_add_linklocal+0x470/0x470 [ 2215.658535] ? __local_bh_enable_ip+0x9d/0x100 [ 2215.659465] addrconf_dev_config+0x262/0x440 [ 2215.660351] addrconf_notify+0xc95/0x2410 [ 2215.661198] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.662254] ? inet6_ifinfo_notify+0x150/0x150 [ 2215.663178] ? failover_register+0x530/0x530 [ 2215.664075] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2215.665188] ? ipmr_device_event+0x18b/0x1f0 [ 2215.666071] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.667116] raw_notifier_call_chain+0xb3/0x110 [ 2215.668056] call_netdevice_notifiers_info+0xb5/0x130 [ 2215.669093] __dev_notify_flags+0x110/0x2c0 [ 2215.669979] ? dev_change_name+0x660/0x660 [ 2215.670842] ? __dev_change_flags+0x4cf/0x6e0 [ 2215.671742] ? dev_set_allmulti+0x30/0x30 [ 2215.672577] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2215.673670] dev_change_flags+0x100/0x160 [ 2215.674518] devinet_ioctl+0x14de/0x1db0 [ 2215.675344] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2215.676238] inet_ioctl+0x34f/0x390 [ 2215.676970] ? inet_dgram_connect+0x220/0x220 [ 2215.677885] ? __lock_acquire+0xbb1/0x5b00 [ 2215.678772] ? perf_trace_lock+0xac/0x490 [ 2215.679609] packet_ioctl+0xb3/0x260 [ 2215.680356] sock_do_ioctl+0xd3/0x300 [ 2215.681121] ? compat_ifr_data_ioctl+0x180/0x180 [ 2215.682098] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2215.683289] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.684332] ? do_vfs_ioctl+0x283/0x10d0 [ 2215.685147] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2215.686200] ? generic_block_fiemap+0x60/0x60 [ 2215.687114] sock_ioctl+0x3ea/0x700 [ 2215.687852] ? dlci_ioctl_set+0x30/0x30 [ 2215.688659] ? selinux_file_ioctl+0xb6/0x270 [ 2215.689559] ? dlci_ioctl_set+0x30/0x30 [ 2215.690365] __x64_sys_ioctl+0x19a/0x210 [ 2215.691210] do_syscall_64+0x33/0x40 [ 2215.691970] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2215.693001] RIP: 0033:0x7f07a4a4eb19 [ 2215.693757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2215.697468] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2215.699018] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2215.700451] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2215.701903] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2215.703398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2215.704856] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 2215.724201] device veth0_vlan entered promiscuous mode [ 2215.727046] FAULT_INJECTION: forcing a failure. [ 2215.727046] name failslab, interval 1, probability 0, space 0, times 0 [ 2215.730079] CPU: 1 PID: 12482 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2215.731500] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2215.733152] Call Trace: [ 2215.733681] dump_stack+0x107/0x167 [ 2215.734461] should_fail.cold+0x5/0xa [ 2215.735232] ? create_object.isra.0+0x3a/0xa20 [ 2215.736147] should_failslab+0x5/0x20 [ 2215.736910] kmem_cache_alloc+0x5b/0x310 [ 2215.737730] create_object.isra.0+0x3a/0xa20 [ 2215.738614] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2215.739637] kmem_cache_alloc_node+0x169/0x330 [ 2215.740565] __alloc_skb+0x6d/0x5b0 [ 2215.741301] inet6_ifinfo_notify+0x72/0x150 [ 2215.742188] addrconf_notify+0xdee/0x2410 [ 2215.743063] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.744100] ? inet6_ifinfo_notify+0x150/0x150 [ 2215.745021] ? failover_register+0x530/0x530 [ 2215.745931] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2215.747040] ? ipmr_device_event+0x18b/0x1f0 [ 2215.747940] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.749005] raw_notifier_call_chain+0xb3/0x110 [ 2215.749957] call_netdevice_notifiers_info+0xb5/0x130 [ 2215.751030] __dev_notify_flags+0x110/0x2c0 [ 2215.751910] ? dev_change_name+0x660/0x660 [ 2215.752756] ? __dev_change_flags+0x4cf/0x6e0 [ 2215.753668] ? dev_set_allmulti+0x30/0x30 [ 2215.754521] ? full_name_hash+0xb5/0xf0 [ 2215.755343] dev_change_flags+0x100/0x160 [ 2215.756212] devinet_ioctl+0x14de/0x1db0 [ 2215.757043] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2215.757944] inet_ioctl+0x34f/0x390 [ 2215.758708] ? inet_dgram_connect+0x220/0x220 [ 2215.759626] ? __lock_acquire+0xbb1/0x5b00 [ 2215.760499] ? perf_trace_lock+0xac/0x490 [ 2215.761345] packet_ioctl+0xb3/0x260 [ 2215.762100] sock_do_ioctl+0xd3/0x300 [ 2215.762880] ? compat_ifr_data_ioctl+0x180/0x180 [ 2215.763837] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2215.764998] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2215.766030] ? do_vfs_ioctl+0x283/0x10d0 [ 2215.766849] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2215.767899] ? generic_block_fiemap+0x60/0x60 [ 2215.768810] sock_ioctl+0x3ea/0x700 [ 2215.769541] ? dlci_ioctl_set+0x30/0x30 [ 2215.770346] ? selinux_file_ioctl+0xb6/0x270 [ 2215.771253] ? dlci_ioctl_set+0x30/0x30 [ 2215.772064] __x64_sys_ioctl+0x19a/0x210 [ 2215.772891] do_syscall_64+0x33/0x40 [ 2215.773655] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2215.774700] RIP: 0033:0x7feded0d7b19 [ 2215.775464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2215.779186] RSP: 002b:00007fedea62c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2215.780711] RAX: ffffffffffffffda RBX: 00007feded1eb020 RCX: 00007feded0d7b19 [ 2215.782134] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2215.783577] RBP: 00007fedea62c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2215.785000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2215.786484] R13: 00007ffef51d5a1f R14: 00007fedea62c300 R15: 0000000000022000 02:34:23 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 77) 02:34:23 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x40087602, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:34:23 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x700, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:34:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000076a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:23 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="ffff0000000003002e2f66696c653000098cef02ae9bb65ca9b28e70e534132627d70da7e221e2d08e0902a5508cbf4ccf472605c1ff6c8ee29b1c37e03db034ec9e09ffa8e21f3a1b8a33e4fadeb7ee8723224af441efd579cf7a52245ec2e300606a5d0fa424ff5bef00feb02bad819e8d32e34300d5b6b5528b10422de7d88aa46f02e11989eabad271011e7fb72d592786b25965546e8abbe2681141e2933b3499ca5493d6e57b04a6e9fc6104757184d0e17b11f37bb83e293e5adb987294a4f2e3b16c5310062324e123647febb6"]) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @loopback}, {0x0, @multicast}, 0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x41}}, 'syzkaller0\x00'}) [ 2230.109008] audit: type=1326 audit(1693276463.101:146): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12486 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:34:23 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 48) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:23 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8915, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:23 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 52) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2230.166075] device veth0_vlan entered promiscuous mode 02:34:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000086a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:23 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'veth1_to_batadv\x00'}) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000140)="06", 0x1, r1}, 0x68) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) setsockopt$inet_int(r3, 0x0, 0x18, &(0x7f00000000c0)=0xadd, 0x4) dup3(r0, r2, 0x0) [ 2230.194176] FAULT_INJECTION: forcing a failure. [ 2230.194176] name failslab, interval 1, probability 0, space 0, times 0 [ 2230.196666] CPU: 1 PID: 12502 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2230.198073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2230.199867] Call Trace: [ 2230.200413] dump_stack+0x107/0x167 [ 2230.201156] should_fail.cold+0x5/0xa [ 2230.201931] ? create_object.isra.0+0x3a/0xa20 [ 2230.202884] should_failslab+0x5/0x20 [ 2230.203660] kmem_cache_alloc+0x5b/0x310 [ 2230.204482] ? __fib6_clean_all+0x138/0x2a0 [ 2230.205354] create_object.isra.0+0x3a/0xa20 [ 2230.206244] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2230.207304] kmem_cache_alloc_node+0x169/0x330 [ 2230.208244] __alloc_skb+0x6d/0x5b0 [ 2230.208990] inet6_ifinfo_notify+0x72/0x150 [ 2230.209865] addrconf_notify+0xdee/0x2410 [ 2230.210375] FAULT_INJECTION: forcing a failure. [ 2230.210375] name failslab, interval 1, probability 0, space 0, times 0 [ 2230.210721] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2230.210747] ? inet6_ifinfo_notify+0x150/0x150 [ 2230.214939] ? failover_register+0x530/0x530 [ 2230.215832] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2230.216945] ? ipmr_device_event+0x18b/0x1f0 [ 2230.217830] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2230.218897] raw_notifier_call_chain+0xb3/0x110 [ 2230.219838] call_netdevice_notifiers_info+0xb5/0x130 [ 2230.220880] __dev_notify_flags+0x110/0x2c0 [ 2230.221749] ? dev_change_name+0x660/0x660 [ 2230.222596] ? __dev_change_flags+0x4cf/0x6e0 [ 2230.223518] ? dev_set_allmulti+0x30/0x30 [ 2230.224353] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2230.225450] dev_change_flags+0x100/0x160 [ 2230.226301] devinet_ioctl+0x14de/0x1db0 [ 2230.227141] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2230.228037] inet_ioctl+0x34f/0x390 [ 2230.228781] ? inet_dgram_connect+0x220/0x220 [ 2230.229698] ? __lock_acquire+0xbb1/0x5b00 [ 2230.230567] ? perf_trace_lock+0xac/0x490 [ 2230.231416] packet_ioctl+0xb3/0x260 [ 2230.232171] sock_do_ioctl+0xd3/0x300 [ 2230.232936] ? compat_ifr_data_ioctl+0x180/0x180 [ 2230.233892] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2230.235072] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2230.236111] ? do_vfs_ioctl+0x283/0x10d0 [ 2230.236927] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2230.237991] ? generic_block_fiemap+0x60/0x60 [ 2230.238927] sock_ioctl+0x3ea/0x700 [ 2230.239664] ? dlci_ioctl_set+0x30/0x30 [ 2230.240484] ? selinux_file_ioctl+0xb6/0x270 [ 2230.241381] ? dlci_ioctl_set+0x30/0x30 [ 2230.242205] __x64_sys_ioctl+0x19a/0x210 [ 2230.243056] do_syscall_64+0x33/0x40 [ 2230.243821] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2230.244872] RIP: 0033:0x7feded0d7b19 [ 2230.245632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2230.249354] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2230.250916] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2230.252359] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2230.253796] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2230.255259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2230.256694] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2230.258165] CPU: 0 PID: 12505 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2230.259601] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2230.261332] Call Trace: [ 2230.261884] dump_stack+0x107/0x167 [ 2230.262634] should_fail.cold+0x5/0xa [ 2230.263421] ? create_object.isra.0+0x3a/0xa20 [ 2230.264350] should_failslab+0x5/0x20 [ 2230.265123] kmem_cache_alloc+0x5b/0x310 [ 2230.265951] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2230.267177] create_object.isra.0+0x3a/0xa20 [ 2230.268070] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2230.269103] kmem_cache_alloc+0x159/0x310 [ 2230.269951] ptlock_alloc+0x1d/0x70 [ 2230.270709] pte_alloc_one+0x68/0x1a0 [ 2230.271486] __pte_alloc+0x1d/0x330 [ 2230.272232] copy_page_range+0x1b62/0x3810 [ 2230.273088] ? perf_trace_lock+0xac/0x490 [ 2230.273942] ? lock_chain_count+0x20/0x20 [ 2230.274800] ? up_write+0x191/0x550 [ 2230.275538] ? vm_iomap_memory+0x190/0x190 [ 2230.276390] ? downgrade_write+0x3a0/0x3a0 [ 2230.277248] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2230.278343] ? __vma_link_rb+0x540/0x700 [ 2230.279197] copy_process+0x759b/0x7800 [ 2230.280047] ? __cleanup_sighand+0xb0/0xb0 [ 2230.280920] ? find_held_lock+0x2c/0x110 [ 2230.281910] kernel_clone+0xe7/0x980 [ 2230.282886] ? lock_downgrade+0x6d0/0x6d0 [ 2230.283881] ? find_held_lock+0x2c/0x110 [ 2230.284857] ? create_io_thread+0xf0/0xf0 [ 2230.285854] ? ksys_write+0x12d/0x260 [ 2230.286277] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2230.286800] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2230.286837] __do_sys_fork+0x8a/0xc0 [ 2230.290893] ? kernel_thread+0xf0/0xf0 [ 2230.291702] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2230.292763] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2230.293812] ? trace_hardirqs_on+0x5b/0x180 [ 2230.294706] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2230.295756] do_syscall_64+0x33/0x40 [ 2230.296510] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2230.297546] RIP: 0033:0x7fadf412db19 [ 2230.298298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2230.302028] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2230.303575] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2230.305016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2230.306456] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2230.307909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2230.309351] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:34:23 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x3003, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2230.343061] device veth0_vlan entered promiscuous mode [ 2230.347298] FAULT_INJECTION: forcing a failure. [ 2230.347298] name failslab, interval 1, probability 0, space 0, times 0 [ 2230.350038] CPU: 1 PID: 12498 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2230.351473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2230.353147] Call Trace: [ 2230.353692] dump_stack+0x107/0x167 [ 2230.354432] should_fail.cold+0x5/0xa [ 2230.355210] ? create_object.isra.0+0x3a/0xa20 [ 2230.356135] should_failslab+0x5/0x20 [ 2230.356905] kmem_cache_alloc+0x5b/0x310 [ 2230.357721] ? pcpu_alloc+0x12a/0x1240 [ 2230.358512] create_object.isra.0+0x3a/0xa20 [ 2230.359416] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2230.360505] kmem_cache_alloc_node+0x169/0x330 [ 2230.361433] __alloc_skb+0x6d/0x5b0 [ 2230.362176] inet6_rt_notify+0xed/0x2a0 [ 2230.362993] fib6_add+0x3223/0x45d0 [ 2230.363749] ? fib6_update_sernum_stub+0x80/0x80 [ 2230.364705] ? do_raw_spin_lock+0x121/0x260 [ 2230.365578] ? rwlock_bug.part.0+0x90/0x90 [ 2230.366432] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2230.367480] ? lock_downgrade+0x6d0/0x6d0 [ 2230.368326] ip6_route_add+0x8b/0x150 [ 2230.369108] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2230.370152] ? ipv6_generate_stable_address+0x640/0x640 [ 2230.371287] ? ipv6_generate_stable_address+0x299/0x640 [ 2230.372367] addrconf_add_linklocal+0x1ab/0x470 [ 2230.373307] ? ipv6_del_addr+0x8d0/0x8d0 [ 2230.374129] ? trace_hardirqs_on+0x5b/0x180 [ 2230.375030] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2230.376095] ? addrconf_add_linklocal+0x470/0x470 [ 2230.377068] ? __local_bh_enable_ip+0x9d/0x100 [ 2230.377998] addrconf_dev_config+0x262/0x440 [ 2230.378904] addrconf_notify+0xc95/0x2410 [ 2230.379750] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2230.380796] ? inet6_ifinfo_notify+0x150/0x150 [ 2230.381729] ? failover_register+0x530/0x530 [ 2230.382633] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2230.383763] ? ipmr_device_event+0x18b/0x1f0 [ 2230.384647] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2230.385694] raw_notifier_call_chain+0xb3/0x110 [ 2230.386641] call_netdevice_notifiers_info+0xb5/0x130 [ 2230.387709] __dev_notify_flags+0x110/0x2c0 [ 2230.388582] ? dev_change_name+0x660/0x660 [ 2230.389437] ? __dev_change_flags+0x4cf/0x6e0 [ 2230.390344] ? dev_set_allmulti+0x30/0x30 [ 2230.391195] ? netdev_name_node_lookup+0xd5/0x150 [ 2230.392172] dev_change_flags+0x100/0x160 [ 2230.393022] devinet_ioctl+0x14de/0x1db0 [ 2230.393853] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2230.394775] inet_ioctl+0x34f/0x390 [ 2230.395516] ? inet_dgram_connect+0x220/0x220 [ 2230.396434] ? __lock_acquire+0xbb1/0x5b00 [ 2230.397304] ? perf_trace_lock+0xac/0x490 [ 2230.398145] packet_ioctl+0xb3/0x260 [ 2230.399115] sock_do_ioctl+0xd3/0x300 [ 2230.400045] ? compat_ifr_data_ioctl+0x180/0x180 02:34:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000186a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2230.401190] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2230.402726] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2230.403973] ? do_vfs_ioctl+0x283/0x10d0 [ 2230.404969] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2230.406240] ? generic_block_fiemap+0x60/0x60 [ 2230.407346] sock_ioctl+0x3ea/0x700 [ 2230.408228] ? dlci_ioctl_set+0x30/0x30 [ 2230.409204] ? selinux_file_ioctl+0xb6/0x270 [ 2230.410276] ? dlci_ioctl_set+0x30/0x30 [ 2230.411271] __x64_sys_ioctl+0x19a/0x210 [ 2230.412192] do_syscall_64+0x33/0x40 [ 2230.412955] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2230.414014] RIP: 0033:0x7f07a4a4eb19 [ 2230.414786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2230.418521] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2230.420071] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2230.421519] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2230.422983] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2230.424425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2230.425874] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:34:23 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 53) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:23 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e0101", @ANYRESHEX=r2, @ANYBLOB=',\x00']) r3 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f00000000c0)={"8d71d8cf3fc84e03f16dce6251da9a45", 0x0, 0x0, {0x0, 0x2}, {0x293, 0x9839}, 0x9, [0x1, 0x9, 0x401, 0x3, 0x800, 0x3, 0xe7, 0xc2, 0x9, 0xc8, 0x9, 0x101, 0x7fffffff, 0x2, 0x40, 0x40]}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f00000001c0)={{r3}, r4, 0x12, @unused=[0x100000001, 0x10001, 0x1672a9b2, 0x8], @name="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"}) r5 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r5, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:34:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="20000000800000000600001c6a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2230.537010] 9pnet: Insufficient options for proto=fd 02:34:23 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x3f00, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2230.567022] 9pnet: Insufficient options for proto=fd [ 2230.590323] device veth0_vlan entered promiscuous mode [ 2230.604162] FAULT_INJECTION: forcing a failure. [ 2230.604162] name failslab, interval 1, probability 0, space 0, times 0 [ 2230.606744] CPU: 0 PID: 12525 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2230.608150] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2230.609853] Call Trace: [ 2230.610416] dump_stack+0x107/0x167 [ 2230.611195] should_fail.cold+0x5/0xa [ 2230.611996] ? ___slab_alloc+0x360/0x700 [ 2230.612836] ? create_object.isra.0+0x3a/0xa20 [ 2230.613789] should_failslab+0x5/0x20 [ 2230.614578] kmem_cache_alloc+0x5b/0x310 [ 2230.615443] create_object.isra.0+0x3a/0xa20 [ 2230.616344] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2230.617398] __kmalloc_node_track_caller+0x1a6/0x3b0 [ 2230.618451] ? inet6_ifinfo_notify+0x72/0x150 [ 2230.619406] __alloc_skb+0xb1/0x5b0 [ 2230.620167] inet6_ifinfo_notify+0x72/0x150 [ 2230.621056] addrconf_notify+0xdee/0x2410 [ 2230.621918] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2230.623010] ? inet6_ifinfo_notify+0x150/0x150 [ 2230.623944] ? failover_register+0x530/0x530 [ 2230.624857] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2230.625981] ? ipmr_device_event+0x18b/0x1f0 [ 2230.626897] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2230.627964] raw_notifier_call_chain+0xb3/0x110 [ 2230.628930] call_netdevice_notifiers_info+0xb5/0x130 [ 2230.629991] __dev_notify_flags+0x110/0x2c0 [ 2230.630895] ? dev_change_name+0x660/0x660 [ 2230.631766] ? __dev_change_flags+0x4cf/0x6e0 [ 2230.632694] ? dev_set_allmulti+0x30/0x30 [ 2230.633547] ? cap_capable+0x1d6/0x240 [ 2230.634357] ? full_name_hash+0xb5/0xf0 [ 2230.635206] dev_change_flags+0x100/0x160 [ 2230.636076] devinet_ioctl+0x14de/0x1db0 [ 2230.636914] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2230.637824] inet_ioctl+0x34f/0x390 [ 2230.638570] ? inet_dgram_connect+0x220/0x220 [ 2230.639527] ? __lock_acquire+0xbb1/0x5b00 [ 2230.640421] ? perf_trace_lock+0xac/0x490 [ 2230.641281] packet_ioctl+0xb3/0x260 [ 2230.642055] sock_do_ioctl+0xd3/0x300 [ 2230.642849] ? compat_ifr_data_ioctl+0x180/0x180 [ 2230.643828] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2230.645010] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2230.646078] ? do_vfs_ioctl+0x283/0x10d0 [ 2230.646928] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2230.648010] ? generic_block_fiemap+0x60/0x60 [ 2230.648938] sock_ioctl+0x3ea/0x700 [ 2230.649687] ? dlci_ioctl_set+0x30/0x30 [ 2230.650509] ? selinux_file_ioctl+0xb6/0x270 [ 2230.651434] ? dlci_ioctl_set+0x30/0x30 [ 2230.652261] __x64_sys_ioctl+0x19a/0x210 [ 2230.653106] do_syscall_64+0x33/0x40 [ 2230.653880] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2230.654947] RIP: 0033:0x7feded0d7b19 [ 2230.655722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2230.659443] RSP: 002b:00007fedea64d188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2230.661010] RAX: ffffffffffffffda RBX: 00007feded1eaf60 RCX: 00007feded0d7b19 [ 2230.662445] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2230.663930] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2230.665367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2230.666813] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2245.183876] audit: type=1326 audit(1693276478.176:147): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12538 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:34:38 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0xfeff3f, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:34:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000676a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:38 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 78) 02:34:38 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 49) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:38 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x4020940d, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:34:38 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x4) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) sendto$packet(r2, &(0x7f0000000000)="f2", 0x1, 0x10, &(0x7f0000000200)={0x11, 0x19, r4, 0x1, 0x5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0), 0x4002, 0x0) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0xe4, 0x0, 0xc1, 0x1f, 0x0, 0x4, 0x4000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe79, 0x1, @perf_config_ext={0x1, 0xfffffffffffffffd}, 0x10000, 0xff, 0x8, 0x6, 0x0, 0x7c0, 0x2, 0x0, 0x3, 0x0, 0x8000000000000}, 0x0, 0xf, r5, 0x2) [ 2245.190372] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10749 comm=kworker/1:1 [ 2245.195255] device veth0_vlan entered promiscuous mode 02:34:38 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8916, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2245.203490] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10749 comm=kworker/1:1 [ 2245.207993] FAULT_INJECTION: forcing a failure. [ 2245.207993] name failslab, interval 1, probability 0, space 0, times 0 [ 2245.209302] CPU: 1 PID: 12542 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2245.210120] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2245.211082] Call Trace: [ 2245.211405] dump_stack+0x107/0x167 [ 2245.211836] should_fail.cold+0x5/0xa [ 2245.212295] should_failslab+0x5/0x20 [ 2245.212750] __kmalloc_node_track_caller+0x74/0x3b0 [ 2245.213343] ? inet6_rt_notify+0xed/0x2a0 [ 2245.213838] __alloc_skb+0xb1/0x5b0 [ 2245.214275] inet6_rt_notify+0xed/0x2a0 [ 2245.214749] fib6_add+0x3223/0x45d0 [ 2245.215203] ? fib6_update_sernum_stub+0x80/0x80 [ 2245.215768] ? do_raw_spin_lock+0x121/0x260 [ 2245.216282] ? rwlock_bug.part.0+0x90/0x90 [ 2245.216775] ? atomic_notifier_call_chain+0x146/0x2b0 [ 2245.217466] ? lock_downgrade+0x6d0/0x6d0 02:34:38 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 54) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2245.217967] ip6_route_add+0x8b/0x150 [ 2245.218476] addrconf_prefix_route.isra.0+0x1c8/0x2a0 [ 2245.219128] ? ipv6_generate_stable_address+0x640/0x640 [ 2245.219785] ? ipv6_generate_stable_address+0x299/0x640 [ 2245.220428] addrconf_add_linklocal+0x1ab/0x470 [ 2245.220983] ? ipv6_del_addr+0x8d0/0x8d0 [ 2245.221469] ? trace_hardirqs_on+0x5b/0x180 [ 2245.222005] addrconf_addr_gen.constprop.0+0x28b/0x330 [ 2245.222624] ? addrconf_add_linklocal+0x470/0x470 [ 2245.223163] addrconf_dev_config+0x262/0x440 [ 2245.223674] addrconf_notify+0xc95/0x2410 [ 2245.224169] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2245.224778] ? inet6_ifinfo_notify+0x150/0x150 [ 2245.225324] ? failover_register+0x530/0x530 [ 2245.225845] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2245.226496] ? ipmr_device_event+0x18b/0x1f0 [ 2245.227038] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2245.227647] raw_notifier_call_chain+0xb3/0x110 [ 2245.228206] call_netdevice_notifiers_info+0xb5/0x130 [ 2245.228771] __dev_notify_flags+0x110/0x2c0 [ 2245.229278] ? dev_change_name+0x660/0x660 [ 2245.229778] ? __dev_change_flags+0x4cf/0x6e0 [ 2245.230314] ? dev_set_allmulti+0x30/0x30 [ 2245.230812] ? cap_capable+0x1d6/0x240 [ 2245.231281] ? full_name_hash+0xb5/0xf0 [ 2245.231764] dev_change_flags+0x100/0x160 [ 2245.232266] devinet_ioctl+0x14de/0x1db0 [ 2245.232743] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2245.233258] inet_ioctl+0x34f/0x390 [ 2245.233660] ? inet_dgram_connect+0x220/0x220 [ 2245.234196] ? __lock_acquire+0xbb1/0x5b00 [ 2245.234700] ? perf_trace_lock+0xac/0x490 [ 2245.235204] packet_ioctl+0xb3/0x260 [ 2245.235639] sock_do_ioctl+0xd3/0x300 [ 2245.236083] ? compat_ifr_data_ioctl+0x180/0x180 [ 2245.236653] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2245.237331] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2245.237952] ? do_vfs_ioctl+0x283/0x10d0 [ 2245.238437] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2245.239022] ? generic_block_fiemap+0x60/0x60 [ 2245.239548] sock_ioctl+0x3ea/0x700 [ 2245.239972] ? dlci_ioctl_set+0x30/0x30 [ 2245.240443] ? selinux_file_ioctl+0xb6/0x270 [ 2245.240961] ? dlci_ioctl_set+0x30/0x30 [ 2245.241428] __x64_sys_ioctl+0x19a/0x210 [ 2245.241915] do_syscall_64+0x33/0x40 [ 2245.242356] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2245.242972] RIP: 0033:0x7f07a4a4eb19 02:34:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a00000001000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2245.243417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2245.245689] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2245.246584] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2245.247417] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2245.248268] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2245.249089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2245.249931] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 2245.276714] FAULT_INJECTION: forcing a failure. [ 2245.276714] name failslab, interval 1, probability 0, space 0, times 0 [ 2245.279291] CPU: 0 PID: 12557 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2245.280947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2245.282930] Call Trace: [ 2245.283572] dump_stack+0x107/0x167 [ 2245.284462] should_fail.cold+0x5/0xa [ 2245.285382] ? vm_area_dup+0x78/0x290 [ 2245.286304] should_failslab+0x5/0x20 [ 2245.287245] kmem_cache_alloc+0x5b/0x310 [ 2245.288153] ? lock_downgrade+0x6d0/0x6d0 [ 2245.289007] vm_area_dup+0x78/0x290 [ 2245.289751] ? _cond_resched+0x12/0x80 [ 2245.290535] ? copy_page_range+0x24e9/0x3810 [ 2245.291473] ? vm_area_alloc+0x110/0x110 [ 2245.292295] ? up_write+0x191/0x550 [ 2245.293030] ? vm_iomap_memory+0x190/0x190 [ 2245.293881] ? downgrade_write+0x3a0/0x3a0 [ 2245.294736] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2245.295846] ? __vma_link_rb+0x540/0x700 [ 2245.296675] copy_process+0x291b/0x7800 [ 2245.297514] ? __cleanup_sighand+0xb0/0xb0 [ 2245.298384] ? find_held_lock+0x2c/0x110 [ 2245.299249] kernel_clone+0xe7/0x980 [ 2245.300008] ? lock_downgrade+0x6d0/0x6d0 [ 2245.300838] ? find_held_lock+0x2c/0x110 [ 2245.301657] ? create_io_thread+0xf0/0xf0 [ 2245.302493] ? ksys_write+0x12d/0x260 [ 2245.303282] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2245.304266] __do_sys_fork+0x8a/0xc0 [ 2245.305017] ? kernel_thread+0xf0/0xf0 [ 2245.305819] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2245.306885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2245.307927] ? trace_hardirqs_on+0x5b/0x180 [ 2245.308798] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2245.309837] do_syscall_64+0x33/0x40 [ 2245.310588] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2245.311696] RIP: 0033:0x7fadf412db19 [ 2245.312450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2245.316128] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2245.317649] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2245.319090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2245.320509] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2245.321929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2245.323356] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:34:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0200000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:38 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x8004e9c, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r3, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r4, {0x7}}, './file1\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2245.357955] device veth0_vlan entered promiscuous mode [ 2245.361182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:34:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0300000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2245.379229] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2245.392188] FAULT_INJECTION: forcing a failure. [ 2245.392188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2245.395040] CPU: 0 PID: 12555 Comm: syz-executor.0 Not tainted 5.10.192 #1 [ 2245.396444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2245.398117] Call Trace: [ 2245.398660] dump_stack+0x107/0x167 [ 2245.399425] should_fail.cold+0x5/0xa [ 2245.400204] _copy_to_user+0x2e/0x180 [ 2245.400991] simple_read_from_buffer+0xcc/0x160 [ 2245.401942] proc_fail_nth_read+0x198/0x230 [ 2245.402820] ? proc_sessionid_read+0x230/0x230 [ 2245.403765] ? security_file_permission+0x24e/0x570 [ 2245.404776] ? perf_trace_initcall_start+0x101/0x380 [ 2245.405810] ? proc_sessionid_read+0x230/0x230 [ 2245.406733] vfs_read+0x228/0x580 [ 2245.407458] ksys_read+0x12d/0x260 [ 2245.408181] ? vfs_write+0xa70/0xa70 [ 2245.408941] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2245.409993] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2245.411052] do_syscall_64+0x33/0x40 [ 2245.411804] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2245.412833] RIP: 0033:0x7feded08a69c [ 2245.413583] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2245.417306] RSP: 002b:00007fedea64d170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2245.418833] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007feded08a69c [ 2245.420284] RDX: 000000000000000f RSI: 00007fedea64d1e0 RDI: 0000000000000006 [ 2245.421718] RBP: 00007fedea64d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2245.423162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2245.424593] R13: 00007ffef51d5a1f R14: 00007fedea64d300 R15: 0000000000022000 [ 2245.446980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:34:38 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x80086601, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:34:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0400000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:38 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 50) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2245.454637] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:34:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0500000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:38 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x1000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2245.509934] device veth0_vlan entered promiscuous mode 02:34:38 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000003800fcff00000000000080000000200d00000000100000000050e92a85579eb66200000000000000000000efffffffffffffff000000000000ca8f87"], 0x58) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@private2, 0x40, 0x1, 0x3, 0x6, 0x9}, 0x20) io_uring_setup(0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2245.552306] FAULT_INJECTION: forcing a failure. [ 2245.552306] name failslab, interval 1, probability 0, space 0, times 0 [ 2245.553602] CPU: 1 PID: 12581 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2245.554342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2245.555240] Call Trace: [ 2245.555536] dump_stack+0x107/0x167 [ 2245.555944] should_fail.cold+0x5/0xa [ 2245.556362] ? __alloc_skb+0x6d/0x5b0 [ 2245.556778] should_failslab+0x5/0x20 [ 2245.557184] kmem_cache_alloc_node+0x55/0x330 [ 2245.557678] __alloc_skb+0x6d/0x5b0 [ 2245.558098] inet6_ifinfo_notify+0x72/0x150 [ 2245.558561] addrconf_notify+0xdee/0x2410 [ 2245.559024] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2245.559585] ? inet6_ifinfo_notify+0x150/0x150 [ 2245.560088] ? failover_register+0x530/0x530 [ 2245.560557] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2245.561161] ? ipmr_device_event+0x18b/0x1f0 [ 2245.561632] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2245.562183] raw_notifier_call_chain+0xb3/0x110 [ 2245.562688] call_netdevice_notifiers_info+0xb5/0x130 [ 2245.563250] __dev_notify_flags+0x110/0x2c0 [ 2245.563715] ? dev_change_name+0x660/0x660 [ 2245.564172] ? __dev_change_flags+0x4cf/0x6e0 [ 2245.564653] ? dev_set_allmulti+0x30/0x30 [ 2245.565101] ? full_name_hash+0xb5/0xf0 [ 2245.565533] dev_change_flags+0x100/0x160 [ 2245.566002] devinet_ioctl+0x14de/0x1db0 [ 2245.566440] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2245.566924] inet_ioctl+0x34f/0x390 [ 2245.567316] ? inet_dgram_connect+0x220/0x220 [ 2245.567554] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=7642 comm=kworker/0:3 [ 2245.567812] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2245.570784] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2245.571382] ? trace_hardirqs_on+0x5b/0x180 [ 2245.571849] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2245.572425] ? inet_dgram_connect+0x220/0x220 [ 2245.572908] packet_ioctl+0xb3/0x260 [ 2245.573309] sock_do_ioctl+0xd3/0x300 [ 2245.573720] ? compat_ifr_data_ioctl+0x180/0x180 [ 2245.574241] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2245.574871] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2245.575439] ? do_vfs_ioctl+0x283/0x10d0 [ 2245.575873] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2245.576450] ? generic_block_fiemap+0x60/0x60 [ 2245.576953] sock_ioctl+0x3ea/0x700 [ 2245.577347] ? dlci_ioctl_set+0x30/0x30 [ 2245.577793] ? selinux_file_ioctl+0xb6/0x270 [ 2245.578265] ? dlci_ioctl_set+0x30/0x30 [ 2245.578691] __x64_sys_ioctl+0x19a/0x210 [ 2245.579132] do_syscall_64+0x33/0x40 [ 2245.579535] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2245.580107] RIP: 0033:0x7f07a4a4eb19 [ 2245.580512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2245.582485] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2245.583320] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2245.584103] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2245.584889] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2245.585669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2245.586433] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 [ 2245.595492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2261.747546] audit: type=1326 audit(1693276494.739:148): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12602 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:34:54 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 51) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:54 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 79) 02:34:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0600000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:54 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8917, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:54 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x80087601, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:34:54 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0x80000, 0x5) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e20, @remote}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xb}}, 'syzkaller0\x00'}) 02:34:54 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x2000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2261.771909] device veth0_vlan entered promiscuous mode [ 2261.774144] FAULT_INJECTION: forcing a failure. [ 2261.774144] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.775437] CPU: 1 PID: 12601 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2261.776215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2261.777131] Call Trace: [ 2261.777433] dump_stack+0x107/0x167 [ 2261.777837] should_fail.cold+0x5/0xa [ 2261.778259] ? create_object.isra.0+0x3a/0xa20 [ 2261.778766] should_failslab+0x5/0x20 [ 2261.779195] kmem_cache_alloc+0x5b/0x310 [ 2261.779648] ? __fib6_clean_all+0x138/0x2a0 [ 2261.780161] create_object.isra.0+0x3a/0xa20 [ 2261.780685] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2261.781289] kmem_cache_alloc_node+0x169/0x330 [ 2261.781837] __alloc_skb+0x6d/0x5b0 [ 2261.782263] inet6_ifinfo_notify+0x72/0x150 [ 2261.782770] addrconf_notify+0xdee/0x2410 [ 2261.783271] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2261.783879] ? inet6_ifinfo_notify+0x150/0x150 [ 2261.784413] ? failover_register+0x530/0x530 [ 2261.784952] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2261.785602] ? ipmr_device_event+0x18b/0x1f0 [ 2261.786123] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2261.786738] raw_notifier_call_chain+0xb3/0x110 [ 2261.787303] call_netdevice_notifiers_info+0xb5/0x130 [ 2261.787877] __dev_notify_flags+0x110/0x2c0 [ 2261.788391] ? dev_change_name+0x660/0x660 [ 2261.788899] ? __dev_change_flags+0x4cf/0x6e0 [ 2261.789439] ? dev_set_allmulti+0x30/0x30 [ 2261.789945] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2261.790607] dev_change_flags+0x100/0x160 [ 2261.791107] devinet_ioctl+0x14de/0x1db0 [ 2261.791598] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2261.792130] inet_ioctl+0x34f/0x390 [ 2261.792572] ? inet_dgram_connect+0x220/0x220 [ 2261.793116] ? __lock_acquire+0xbb1/0x5b00 [ 2261.793590] ? perf_trace_lock+0xac/0x490 [ 2261.794089] packet_ioctl+0xb3/0x260 [ 2261.794532] sock_do_ioctl+0xd3/0x300 [ 2261.794984] ? compat_ifr_data_ioctl+0x180/0x180 [ 2261.795569] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2261.796248] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2261.796867] ? do_vfs_ioctl+0x283/0x10d0 [ 2261.797339] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2261.797956] ? generic_block_fiemap+0x60/0x60 [ 2261.798493] sock_ioctl+0x3ea/0x700 [ 2261.798925] ? dlci_ioctl_set+0x30/0x30 [ 2261.799373] ? selinux_file_ioctl+0xb6/0x270 [ 2261.799888] ? dlci_ioctl_set+0x30/0x30 [ 2261.800364] __x64_sys_ioctl+0x19a/0x210 [ 2261.800856] do_syscall_64+0x33/0x40 [ 2261.801300] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2261.801918] RIP: 0033:0x7f07a4a4eb19 [ 2261.802360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2261.804554] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2261.805468] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2261.806319] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2261.807174] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2261.808037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2261.808877] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:34:54 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0700000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2261.862845] FAULT_INJECTION: forcing a failure. [ 2261.862845] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.864156] CPU: 1 PID: 12624 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2261.865002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2261.865994] Call Trace: [ 2261.866291] dump_stack+0x107/0x167 [ 2261.866729] should_fail.cold+0x5/0xa [ 2261.867201] ? create_object.isra.0+0x3a/0xa20 [ 2261.867773] should_failslab+0x5/0x20 [ 2261.868229] kmem_cache_alloc+0x5b/0x310 [ 2261.868719] create_object.isra.0+0x3a/0xa20 [ 2261.869260] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2261.869876] kmem_cache_alloc+0x159/0x310 [ 2261.870389] vm_area_dup+0x78/0x290 [ 2261.870781] ? _cond_resched+0x12/0x80 [ 2261.871255] ? copy_page_range+0x24e9/0x3810 [ 2261.871804] ? vm_area_alloc+0x110/0x110 [ 2261.872293] ? up_write+0x191/0x550 [ 2261.872719] ? vm_iomap_memory+0x190/0x190 [ 2261.873231] ? downgrade_write+0x3a0/0x3a0 [ 2261.873731] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2261.874374] ? __vma_link_rb+0x540/0x700 [ 2261.874856] copy_process+0x291b/0x7800 [ 2261.875360] ? __cleanup_sighand+0xb0/0xb0 [ 2261.875869] ? find_held_lock+0x2c/0x110 [ 2261.876356] kernel_clone+0xe7/0x980 [ 2261.876802] ? lock_downgrade+0x6d0/0x6d0 [ 2261.877300] ? find_held_lock+0x2c/0x110 [ 2261.877789] ? create_io_thread+0xf0/0xf0 [ 2261.878284] ? ksys_write+0x12d/0x260 [ 2261.878742] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2261.879333] __do_sys_fork+0x8a/0xc0 [ 2261.879772] ? kernel_thread+0xf0/0xf0 [ 2261.880246] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2261.880807] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2261.881424] ? trace_hardirqs_on+0x5b/0x180 [ 2261.881926] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2261.882544] do_syscall_64+0x33/0x40 [ 2261.882993] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2261.883612] RIP: 0033:0x7fadf412db19 [ 2261.884059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2261.886249] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2261.887166] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2261.888023] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2261.888866] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2261.889708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2261.890543] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:34:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0800000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2261.910407] device veth0_vlan entered promiscuous mode 02:34:54 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x349e, 0x0) r0 = socket$inet(0x2, 0x5, 0x3) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e22, @broadcast}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'bridge0\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000000c0)={'wg1\x00', {0x2, 0x0, @initdev}}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:34:54 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x3000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:34:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a1800000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:34:55 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 52) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:55 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x80108906, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:34:55 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8918, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:34:55 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x2, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2262.124179] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2262.166990] device veth0_vlan entered promiscuous mode [ 2262.193263] FAULT_INJECTION: forcing a failure. [ 2262.193263] name failslab, interval 1, probability 0, space 0, times 0 [ 2262.196029] CPU: 1 PID: 12644 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2262.197447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2262.199163] Call Trace: [ 2262.199719] dump_stack+0x107/0x167 [ 2262.200486] should_fail.cold+0x5/0xa [ 2262.201294] should_failslab+0x5/0x20 [ 2262.202100] __kmalloc_node_track_caller+0x74/0x3b0 [ 2262.203152] ? inet6_ifinfo_notify+0x72/0x150 [ 2262.204098] __alloc_skb+0xb1/0x5b0 [ 2262.204865] inet6_ifinfo_notify+0x72/0x150 [ 2262.205781] addrconf_notify+0xdee/0x2410 [ 2262.206668] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2262.207767] ? inet6_ifinfo_notify+0x150/0x150 [ 2262.208725] ? failover_register+0x530/0x530 [ 2262.209652] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2262.210807] ? ipmr_device_event+0x18b/0x1f0 [ 2262.211735] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2262.212826] raw_notifier_call_chain+0xb3/0x110 [ 2262.213798] call_netdevice_notifiers_info+0xb5/0x130 [ 2262.214872] __dev_notify_flags+0x110/0x2c0 [ 2262.215771] ? dev_change_name+0x660/0x660 [ 2262.216638] ? __dev_change_flags+0x4cf/0x6e0 [ 2262.217560] ? dev_set_allmulti+0x30/0x30 [ 2262.218404] ? strcmp+0x3a/0xb0 [ 2262.219106] dev_change_flags+0x100/0x160 [ 2262.219972] devinet_ioctl+0x14de/0x1db0 [ 2262.220817] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2262.221740] inet_ioctl+0x34f/0x390 [ 2262.222487] ? inet_dgram_connect+0x220/0x220 [ 2262.223448] ? __lock_acquire+0xbb1/0x5b00 [ 2262.224351] ? perf_trace_lock+0xac/0x490 [ 2262.225227] packet_ioctl+0xb3/0x260 [ 2262.226012] sock_do_ioctl+0xd3/0x300 [ 2262.226813] ? compat_ifr_data_ioctl+0x180/0x180 [ 2262.227803] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2262.228953] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2262.229996] ? do_vfs_ioctl+0x283/0x10d0 [ 2262.230816] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2262.231889] ? generic_block_fiemap+0x60/0x60 [ 2262.232802] sock_ioctl+0x3ea/0x700 [ 2262.233538] ? dlci_ioctl_set+0x30/0x30 [ 2262.234349] ? selinux_file_ioctl+0xb6/0x270 [ 2262.235253] ? dlci_ioctl_set+0x30/0x30 [ 2262.236061] __x64_sys_ioctl+0x19a/0x210 [ 2262.236895] do_syscall_64+0x33/0x40 [ 2262.237651] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2262.238693] RIP: 0033:0x7f07a4a4eb19 [ 2262.239465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2262.243183] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2262.244721] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2262.246159] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2262.247612] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2262.249055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2262.250491] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:35:08 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 80) 02:35:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a1c00000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:08 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 53) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:08 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x3003eff, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:35:08 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x80108907, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:35:08 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) setsockopt$inet_buf(r1, 0x0, 0x0, &(0x7f0000000000)="83af0c349fd82552e936c714d817935221778b6177ae7c4a2ad7ae6537e4d04fd64a6703f7b9b6", 0x27) 02:35:08 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x4b47, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:08 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8919, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2275.278163] audit: type=1326 audit(1693276508.270:149): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12668 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:35:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a6700000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2275.332151] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2275.347909] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2275.367118] device veth0_vlan entered promiscuous mode [ 2275.378187] FAULT_INJECTION: forcing a failure. [ 2275.378187] name failslab, interval 1, probability 0, space 0, times 0 [ 2275.380536] CPU: 0 PID: 12690 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2275.381932] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2275.383603] Call Trace: [ 2275.384144] dump_stack+0x107/0x167 [ 2275.384889] should_fail.cold+0x5/0xa [ 2275.385662] ? vm_area_dup+0x78/0x290 [ 2275.386436] should_failslab+0x5/0x20 [ 2275.387205] kmem_cache_alloc+0x5b/0x310 [ 2275.388057] vm_area_dup+0x78/0x290 [ 2275.388805] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 2275.389753] ? lock_downgrade+0x6d0/0x6d0 [ 2275.390588] ? copy_page_range+0x24e9/0x3810 [ 2275.391499] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 2275.392443] ? avc_has_extended_perms+0xf40/0xf40 [ 2275.393423] ? vm_area_alloc+0x110/0x110 [ 2275.394251] ? selinux_vm_enough_memory+0x114/0x180 [ 2275.395275] ? selinux_sb_statfs+0x250/0x250 [ 2275.396171] ? percpu_counter_add_batch+0x8b/0x140 [ 2275.397169] ? __vm_enough_memory+0x184/0x360 [ 2275.398076] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2275.399115] copy_process+0x291b/0x7800 [ 2275.399963] ? __cleanup_sighand+0xb0/0xb0 [ 2275.400842] ? find_held_lock+0x2c/0x110 [ 2275.401667] kernel_clone+0xe7/0x980 [ 2275.402421] ? lock_downgrade+0x6d0/0x6d0 [ 2275.403261] ? find_held_lock+0x2c/0x110 [ 2275.404095] ? create_io_thread+0xf0/0xf0 [ 2275.404935] ? ksys_write+0x12d/0x260 [ 2275.405714] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2275.406694] __do_sys_fork+0x8a/0xc0 [ 2275.407461] ? kernel_thread+0xf0/0xf0 [ 2275.408262] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2275.409314] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2275.410351] ? trace_hardirqs_on+0x5b/0x180 [ 2275.411222] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2275.412265] do_syscall_64+0x33/0x40 [ 2275.413017] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2275.414050] RIP: 0033:0x7fadf412db19 [ 2275.414801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2275.418533] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2275.420090] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2275.421528] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2275.422986] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2275.424430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2275.425879] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:35:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006af000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2275.453179] FAULT_INJECTION: forcing a failure. [ 2275.453179] name failslab, interval 1, probability 0, space 0, times 0 [ 2275.455892] CPU: 0 PID: 12683 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2275.457303] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2275.458984] Call Trace: [ 2275.459541] dump_stack+0x107/0x167 [ 2275.460300] should_fail.cold+0x5/0xa [ 2275.461078] ? create_object.isra.0+0x3a/0xa20 [ 2275.462001] should_failslab+0x5/0x20 [ 2275.462782] kmem_cache_alloc+0x5b/0x310 [ 2275.463619] create_object.isra.0+0x3a/0xa20 [ 2275.464511] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2275.465544] kmem_cache_alloc_node+0x169/0x330 [ 2275.466476] __alloc_skb+0x6d/0x5b0 [ 2275.467225] inet6_ifinfo_notify+0x72/0x150 [ 2275.468115] addrconf_notify+0xdee/0x2410 [ 2275.468964] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2275.470006] ? inet6_ifinfo_notify+0x150/0x150 [ 2275.470928] ? failover_register+0x530/0x530 [ 2275.471838] ? cfg80211_netdev_notifier_call+0x298/0x10c0 [ 2275.472960] ? ipmr_device_event+0x18b/0x1f0 [ 2275.473851] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2275.474910] raw_notifier_call_chain+0xb3/0x110 [ 2275.475876] call_netdevice_notifiers_info+0xb5/0x130 [ 2275.476936] __dev_notify_flags+0x110/0x2c0 [ 2275.477818] ? dev_change_name+0x660/0x660 [ 2275.478683] ? __dev_change_flags+0x4cf/0x6e0 [ 2275.479597] ? dev_set_allmulti+0x30/0x30 [ 2275.480438] ? cap_capable+0x1d6/0x240 [ 2275.481229] ? full_name_hash+0xb5/0xf0 [ 2275.482040] dev_change_flags+0x100/0x160 [ 2275.482892] devinet_ioctl+0x14de/0x1db0 [ 2275.483730] ? inet_ifa_byprefix+0x2e0/0x2e0 [ 2275.484632] inet_ioctl+0x34f/0x390 [ 2275.485370] ? inet_dgram_connect+0x220/0x220 [ 2275.486291] ? __lock_acquire+0xbb1/0x5b00 [ 2275.487167] ? perf_trace_lock+0xac/0x490 [ 2275.488037] packet_ioctl+0xb3/0x260 [ 2275.488794] sock_do_ioctl+0xd3/0x300 [ 2275.489566] ? compat_ifr_data_ioctl+0x180/0x180 [ 2275.490528] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 2275.491698] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 2275.492752] ? do_vfs_ioctl+0x283/0x10d0 [ 2275.493577] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 2275.494649] ? generic_block_fiemap+0x60/0x60 [ 2275.495583] sock_ioctl+0x3ea/0x700 [ 2275.496317] ? dlci_ioctl_set+0x30/0x30 [ 2275.497131] ? selinux_file_ioctl+0xb6/0x270 [ 2275.498040] ? dlci_ioctl_set+0x30/0x30 [ 2275.498862] __x64_sys_ioctl+0x19a/0x210 [ 2275.499707] do_syscall_64+0x33/0x40 [ 2275.500467] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2275.501503] RIP: 0033:0x7f07a4a4eb19 [ 2275.502277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2275.506010] RSP: 002b:00007f07a1fc4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2275.507558] RAX: ffffffffffffffda RBX: 00007f07a4b61f60 RCX: 00007f07a4a4eb19 [ 2275.509006] RDX: 00000000200001c0 RSI: 0000000000008914 RDI: 0000000000000004 [ 2275.510448] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2275.511901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2275.513344] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:35:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0003000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:08 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffe, 0xff27}, [{0x0, 0x0, 0x8}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x958) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) write$binfmt_elf32(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x100}]}, 0x58) r6 = io_uring_setup(0x32c8, &(0x7f00000000c0)={0x0, 0x8af2, 0x36, 0x1, 0x3c4}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) write$binfmt_elf32(r7, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x58) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r0, r3, r0, 0xffffffffffffffff, r4, r0, r6, r7], 0x8) r9 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r9, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @rand_addr=0x64010101}, {0x0, @random="812187376cca"}, 0x20, {0x2, 0x0, @loopback}, 'ip6gre0\x00'}) 02:35:08 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x3300000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2275.587036] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10749 comm=kworker/1:1 02:35:08 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0xc0045878, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2275.626350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2275.643213] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10749 comm=kworker/1:1 [ 2275.664775] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2275.674748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:35:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a8004000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:08 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) (fail_nth: 54) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2275.806052] device veth0_vlan entered promiscuous mode [ 2275.817882] FAULT_INJECTION: forcing a failure. [ 2275.817882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2275.820899] CPU: 1 PID: 12712 Comm: syz-executor.3 Not tainted 5.10.192 #1 [ 2275.822273] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2275.823952] Call Trace: [ 2275.824491] dump_stack+0x107/0x167 [ 2275.825226] should_fail.cold+0x5/0xa [ 2275.825993] _copy_to_user+0x2e/0x180 [ 2275.826776] simple_read_from_buffer+0xcc/0x160 [ 2275.827737] proc_fail_nth_read+0x198/0x230 [ 2275.828607] ? proc_sessionid_read+0x230/0x230 [ 2275.829525] ? proc_sessionid_read+0x230/0x230 [ 2275.830443] vfs_read+0x228/0x580 [ 2275.831136] ksys_read+0x12d/0x260 [ 2275.831865] ? vfs_write+0xa70/0xa70 [ 2275.832604] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2275.833656] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2275.834682] do_syscall_64+0x33/0x40 [ 2275.835444] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2275.836450] RIP: 0033:0x7f07a4a0169c [ 2275.837202] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2275.840810] RSP: 002b:00007f07a1fc4170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2275.842349] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f07a4a0169c [ 2275.843794] RDX: 000000000000000f RSI: 00007f07a1fc41e0 RDI: 0000000000000006 [ 2275.845216] RBP: 00007f07a1fc41d0 R08: 0000000000000000 R09: 0000000000000000 [ 2275.846650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2275.848098] R13: 00007ffca8d8bf7f R14: 00007f07a1fc4300 R15: 0000000000022000 02:35:25 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 81) 02:35:25 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:35:25 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:25 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x4b49, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2292.713001] audit: type=1326 audit(1693276525.704:150): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12718 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:35:25 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:25 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x4000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:35:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0005000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:25 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0xc0045878, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:35:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0006000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2292.775137] device veth0_vlan entered promiscuous mode [ 2292.808012] FAULT_INJECTION: forcing a failure. [ 2292.808012] name failslab, interval 1, probability 0, space 0, times 0 [ 2292.810333] CPU: 1 PID: 12737 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2292.811747] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2292.813432] Call Trace: [ 2292.813976] dump_stack+0x107/0x167 [ 2292.814718] should_fail.cold+0x5/0xa [ 2292.815503] ? create_object.isra.0+0x3a/0xa20 [ 2292.816428] should_failslab+0x5/0x20 [ 2292.817193] kmem_cache_alloc+0x5b/0x310 [ 2292.818021] create_object.isra.0+0x3a/0xa20 [ 2292.818902] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2292.819936] kmem_cache_alloc+0x159/0x310 [ 2292.820773] vm_area_dup+0x78/0x290 [ 2292.821517] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 2292.822448] ? lock_downgrade+0x6d0/0x6d0 [ 2292.823275] ? copy_page_range+0x24e9/0x3810 02:35:25 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x48040, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r1, @ANYBLOB=',\x00']) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000000)={'team_slave_1\x00', {0x2, 0x0, @local}}) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2292.824182] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 2292.825266] ? avc_has_extended_perms+0xf40/0xf40 [ 2292.826233] ? vm_area_alloc+0x110/0x110 [ 2292.827046] ? selinux_vm_enough_memory+0x114/0x180 [ 2292.828053] ? selinux_sb_statfs+0x250/0x250 [ 2292.828932] ? percpu_counter_add_batch+0x8b/0x140 [ 2292.829913] ? __vm_enough_memory+0x184/0x360 [ 2292.830798] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2292.831829] copy_process+0x291b/0x7800 [ 2292.832654] ? __cleanup_sighand+0xb0/0xb0 [ 2292.833510] ? find_held_lock+0x2c/0x110 [ 2292.834317] kernel_clone+0xe7/0x980 [ 2292.835061] ? lock_downgrade+0x6d0/0x6d0 [ 2292.835886] ? find_held_lock+0x2c/0x110 [ 2292.836690] ? create_io_thread+0xf0/0xf0 [ 2292.837518] ? ksys_write+0x12d/0x260 [ 2292.838282] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2292.839240] __do_sys_fork+0x8a/0xc0 [ 2292.839995] ? kernel_thread+0xf0/0xf0 [ 2292.840784] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2292.841820] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2292.842839] ? trace_hardirqs_on+0x5b/0x180 [ 2292.843700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2292.844715] do_syscall_64+0x33/0x40 [ 2292.845456] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2292.846469] RIP: 0033:0x7fadf412db19 [ 2292.847208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2292.850843] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2292.852354] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2292.853760] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2292.855172] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2292.856603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2292.858014] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2292.859760] 9pnet: Insufficient options for proto=fd [ 2292.890188] 9pnet: Insufficient options for proto=fd 02:35:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0007000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:25 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x5000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:35:25 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0xc0189436, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:35:26 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) 02:35:26 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x2, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0018000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:41 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x4b47, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2308.729617] audit: type=1326 audit(1693276541.721:151): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12769 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:35:41 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x7000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:35:41 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:41 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 82) 02:35:41 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5411, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:41 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x3348, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r5 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) r6 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000100)=[r0, r3, r0, r5, r6], 0x5) r7 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r7, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:35:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a001c000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:41 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0xc020660b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2308.753043] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2308.764259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:35:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0020000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2308.800413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2308.806610] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2308.826388] FAULT_INJECTION: forcing a failure. [ 2308.826388] name failslab, interval 1, probability 0, space 0, times 0 [ 2308.828977] CPU: 0 PID: 12788 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2308.830540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2308.832514] Call Trace: [ 2308.833153] dump_stack+0x107/0x167 [ 2308.834033] should_fail.cold+0x5/0xa [ 2308.834839] ? anon_vma_clone+0xdc/0x590 [ 2308.835668] should_failslab+0x5/0x20 [ 2308.836490] kmem_cache_alloc+0x5b/0x310 [ 2308.837474] anon_vma_clone+0xdc/0x590 [ 2308.838408] anon_vma_fork+0x82/0x640 [ 2308.839292] ? __vm_enough_memory+0x184/0x360 [ 2308.840305] copy_process+0x7218/0x7800 [ 2308.841203] ? __cleanup_sighand+0xb0/0xb0 [ 2308.842091] ? find_held_lock+0x2c/0x110 [ 2308.843034] kernel_clone+0xe7/0x980 [ 2308.843797] ? lock_downgrade+0x6d0/0x6d0 [ 2308.844633] ? find_held_lock+0x2c/0x110 [ 2308.845463] ? create_io_thread+0xf0/0xf0 [ 2308.846464] ? ksys_write+0x12d/0x260 [ 2308.847255] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2308.848247] __do_sys_fork+0x8a/0xc0 [ 2308.849029] ? kernel_thread+0xf0/0xf0 [ 2308.849914] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2308.851025] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2308.852111] ? trace_hardirqs_on+0x5b/0x180 [ 2308.852989] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2308.854096] do_syscall_64+0x33/0x40 [ 2308.854884] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2308.855984] RIP: 0033:0x7fadf412db19 [ 2308.856739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2308.860805] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2308.862418] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2308.864031] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2308.865735] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2308.867308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2308.868957] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:35:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a003f000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:41 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x8000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:35:41 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = syz_io_uring_complete(0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@empty, 0x7}) io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:35:42 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:42 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[], 0x14}}, 0xd1) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0xda) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'wg2\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000340)={'veth1\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4c020000", @ANYRES16=0x0, @ANYBLOB="000127bd7000fedbdf25130000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b00020000000600110006000000"], 0x4c}, 0x1, 0x0, 0x0, 0xc040004}, 0x2404c040) r4 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:35:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0067000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:42 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x541b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:42 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x4b49, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:42 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x3f000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) [ 2309.123188] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2309.280158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:35:57 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 83) [ 2324.406598] audit: type=1326 audit(1693276557.398:152): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12834 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:35:57 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8925, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:57 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5411, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0480000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:35:57 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x3ffffe00, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:35:57 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5421, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:57 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/firmware/acpi', 0x81, 0x0) sendmsg$NL80211_CMD_NOTIFY_RADAR(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x50, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0xfff, 0x74}}}}, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x6}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_CHANNEL_WIDTH={0x7, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2c}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}]}, 0x50}}, 0x8804) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) r3 = fork() perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x4a, 0x6, 0x80, 0x40, 0x0, 0x50ac, 0x6000, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, @perf_config_ext={0x7fffffff, 0x8}, 0x98, 0x10001, 0x831, 0x2, 0x9, 0x0, 0x3, 0x0, 0x1, 0x0, 0xbbc}, r3, 0x2, r0, 0x6) r4 = syz_io_uring_setup(0x4d4f, &(0x7f0000000240)={0x0, 0xfffffffc, 0x0, 0x0, 0x18e}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index}, 0x8) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r4, 0x0) syz_io_uring_submit(r7, r6, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, r6, &(0x7f00000003c0)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r0, 0x80, &(0x7f0000000340)=@ethernet={0x0, @random="57583153e782"}}, 0x3) 02:35:57 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)={0x14}, 0x14}}, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') readv(r3, &(0x7f0000001940)=[{&(0x7f0000000500)=""/232, 0xe8}], 0x1) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000002d00)) r4 = socket$inet(0x2, 0xa, 0xfffffffe) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @multicast2}, {0x0, @local}, 0x0, {0x2, 0x4e23, @local}, 'syzkaller0\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) recvmmsg(r6, &(0x7f0000003000)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/230, 0xe6}, {&(0x7f00000001c0)=""/171, 0xab}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/85, 0x55}, {&(0x7f00000003c0)=""/210, 0xd2}, {&(0x7f00000004c0)=""/36, 0x24}], 0x6}, 0x11b4760}, {{&(0x7f0000000580)=@rc, 0x80, &(0x7f0000002b00)=[{&(0x7f0000000600)=""/107, 0x6b}, {&(0x7f0000000680)=""/46, 0x2e}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/234, 0xea}, {&(0x7f00000017c0)=""/186, 0xba}, {&(0x7f0000001880)=""/235, 0xeb}, {&(0x7f0000001980)=""/71, 0x47}, {&(0x7f0000001a00)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/246, 0xf6}], 0x9}, 0x5159afa0}, {{&(0x7f0000002bc0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002c40)=""/74, 0x4a}, {&(0x7f0000002cc0)=""/24, 0x18}, {&(0x7f0000002d00)}, {&(0x7f0000002d40)=""/158, 0x9e}, {&(0x7f0000002e00)=""/179, 0xb3}, {&(0x7f0000002ec0)=""/164, 0xa4}], 0x6}, 0x3f}], 0x3, 0x20000, &(0x7f00000030c0)={0x77359400}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'geneve0\x00'}) [ 2324.442328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2324.449884] device veth0_vlan entered promiscuous mode [ 2324.454040] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12849 comm=syz-executor.5 [ 2324.480323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2324.489061] FAULT_INJECTION: forcing a failure. [ 2324.489061] name failslab, interval 1, probability 0, space 0, times 0 [ 2324.490787] CPU: 1 PID: 12855 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2324.491827] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2324.492878] Call Trace: [ 2324.493186] dump_stack+0x107/0x167 [ 2324.493603] should_fail.cold+0x5/0xa [ 2324.494046] ? create_object.isra.0+0x3a/0xa20 [ 2324.494576] should_failslab+0x5/0x20 [ 2324.495013] kmem_cache_alloc+0x5b/0x310 [ 2324.495482] create_object.isra.0+0x3a/0xa20 [ 2324.495994] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2324.496573] kmem_cache_alloc+0x159/0x310 [ 2324.497047] anon_vma_clone+0xdc/0x590 [ 2324.497503] anon_vma_fork+0x82/0x640 [ 2324.497946] ? __vm_enough_memory+0x184/0x360 [ 2324.498463] copy_process+0x7218/0x7800 [ 2324.498939] ? __cleanup_sighand+0xb0/0xb0 [ 2324.499447] ? find_held_lock+0x2c/0x110 [ 2324.499920] kernel_clone+0xe7/0x980 [ 2324.500357] ? lock_downgrade+0x6d0/0x6d0 [ 2324.500828] ? find_held_lock+0x2c/0x110 [ 2324.501296] ? create_io_thread+0xf0/0xf0 [ 2324.501779] ? ksys_write+0x12d/0x260 [ 2324.502227] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2324.502788] __do_sys_fork+0x8a/0xc0 [ 2324.503234] ? kernel_thread+0xf0/0xf0 [ 2324.503691] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2324.504294] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2324.504879] ? trace_hardirqs_on+0x5b/0x180 [ 2324.505364] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2324.505953] do_syscall_64+0x33/0x40 [ 2324.506387] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2324.506969] RIP: 0033:0x7fadf412db19 [ 2324.507399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2324.509508] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2324.510384] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2324.511193] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2324.512022] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2324.512832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2324.513651] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:35:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006afdef000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2324.525175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2324.530046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12849 comm=syz-executor.5 02:35:57 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0xff3e0003, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:35:57 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x541b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2324.569421] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:35:57 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8934, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:35:57 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5450, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:14 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:36:14 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 84) 02:36:14 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) recvmmsg(r4, &(0x7f0000001980)=[{{&(0x7f00000002c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000400)=""/144, 0x90}, {&(0x7f00000004c0)=""/196, 0xc4}, {&(0x7f00000005c0)=""/242, 0xf2}, {&(0x7f0000000740)=""/167, 0xa7}, {&(0x7f0000000080)=""/41, 0x29}], 0x5, &(0x7f0000000140)=""/15, 0xf}}, {{&(0x7f0000000880)=@tipc=@name, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)=""/60, 0x3c}, {&(0x7f0000000900)=""/205, 0xcd}], 0x2, &(0x7f0000000a00)=""/252, 0xfc}, 0x200}, {{&(0x7f0000000b00)=@x25={0x9, @remote}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000b80)=""/114, 0x72}, {&(0x7f0000000c00)=""/145, 0x91}, {&(0x7f0000000cc0)=""/228, 0xe4}, {&(0x7f0000000dc0)=""/112, 0x70}], 0x4, &(0x7f0000000e40)=""/55, 0x37}, 0x9}, {{&(0x7f0000000e80)=@sco, 0x80, &(0x7f0000001080)=[{&(0x7f0000002cc0)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/46, 0x2e}, {&(0x7f0000000f40)=""/197, 0xc5}, {&(0x7f0000001040)=""/31, 0x1f}], 0x4, &(0x7f00000010c0)=""/42, 0x2a}, 0x5}, {{&(0x7f0000001100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000001180)=""/187, 0xbb}, {&(0x7f0000001240)=""/103, 0x67}, {&(0x7f0000003cc0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/55, 0x37}, {&(0x7f0000001300)=""/87, 0x57}], 0x5}}, {{&(0x7f0000001400)=@nl=@unspec, 0x80, &(0x7f0000001900)=[{&(0x7f0000001480)=""/131, 0x83}, {&(0x7f0000001540)=""/104, 0x68}, {&(0x7f00000015c0)=""/225, 0xe1}, {&(0x7f00000016c0)=""/175, 0xaf}, {&(0x7f0000001780)=""/73, 0x49}, {&(0x7f0000001800)=""/211, 0xd3}], 0x6}, 0x70b}], 0x6, 0x2021, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000001b00)=ANY=[@ANYBLOB="7472616efc47522b5d63bec9f237545f91907fad37e1136c41966b586adccee8e47afc40daea540cf2666030a781af748d2030769e9fbd8c4d254f5556c47b7f4ff8c1f8d98be57af25dd993cf9f0da931b6cf44f9e753046c873e6faef4", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x7f}}, './file0\x00'}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r5 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:36:14 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5451, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:14 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x165e, &(0x7f0000001580)={0x0, 0x1cee, 0x0, 0x2, 0x24f}) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000000000)=""/57, 0x39}, {&(0x7f0000001140)=""/93, 0x5d}, {&(0x7f00000011c0)=""/254, 0xfe}, {&(0x7f00000012c0)=""/25, 0x19}, {&(0x7f0000001300)=""/209, 0xd1}, {&(0x7f0000001400)=""/37, 0x25}], 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="280200010000000100bb99000000000082004fae411dc557a87d1a5e89ef1af229599a4f6750d0fb9ac44b857a9834bfb86d8157680dd429ec7a364ab0fb0ea7d75cf9dbaea24b21315901965c45f46292e9af24a9af5cecb68a6537a2ccb23c04be45f1eaf127dc0ee064da5013fea56dfdcf2a17fca48d360923ff2079967053c50bb2154c4ab8ae6ec45e02c5fc9d92deccb88b7ef8ca0bd756c2410a73bf3b73b774d0", @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x28}, 0x100) r2 = socket$inet(0x2, 0x3, 0xff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000040)={@empty, @rand_addr, r4}, 0xc) r5 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) syz_open_procfs(r6, &(0x7f0000000200)='net/route\x00') perf_event_open(&(0x7f00000016c0)={0x3, 0x80, 0x8, 0x9, 0x1f, 0x0, 0x0, 0x7, 0xd18c0, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7edc14df18290049, @perf_bp={&(0x7f00000014c0), 0xa}, 0x810, 0x0, 0x7, 0x0, 0x1ff, 0x5, 0x9, 0x0, 0x3f, 0x0, 0xca6c}, r6, 0x10, 0xffffffffffffffff, 0x8) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001540)={@empty, @remote, r4}, 0xc) r7 = eventfd(0x5) dup3(r7, r3, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:36:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a00f0000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:36:14 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5421, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:14 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8935, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2341.149908] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10749 comm=kworker/1:1 [ 2341.174642] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:36:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006aeffd000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2341.182587] audit: type=1326 audit(1693276574.174:153): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12892 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:36:14 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5452, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:14 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x4000000) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x810, r1, 0x10000000) syz_io_uring_submit(0x0, r3, &(0x7f0000000580)=@IORING_OP_MADVISE={0x19, 0x2, 0x0, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x20) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x13, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000340), 0x6e, &(0x7f0000000140)=[{&(0x7f00000003c0)=""/101, 0x65}], 0x1, &(0x7f0000000440)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xf8}, 0x2000) r6 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) kcmp(r5, 0xffffffffffffffff, 0x2, r1, r6) syz_io_uring_submit(r4, 0x0, 0x0, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB=',wfdno=', @ANYRESHEX=r8, @ANYBLOB="650d2c1a2c00"]) syz_io_uring_submit(r4, 0x0, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x5, 0x0, r8, &(0x7f0000000040)=0x80, &(0x7f00000002c0)=@x25={0x9, @remote}, 0x0, 0x80000, 0x1}, 0xb2b) 02:36:14 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x4e20, @private=0xa010100}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e24, @multicast1}, 0x9, 0x0, 0x0, 0x0, 0x7d, &(0x7f0000000000)='netdevsim0\x00', 0xa4, 0x3, 0x1}) 02:36:14 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0}]) 02:36:14 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x893a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2341.282569] FAULT_INJECTION: forcing a failure. [ 2341.282569] name failslab, interval 1, probability 0, space 0, times 0 [ 2341.285127] CPU: 0 PID: 12913 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2341.286651] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2341.288481] Call Trace: [ 2341.289074] dump_stack+0x107/0x167 [ 2341.289883] should_fail.cold+0x5/0xa [ 2341.290726] ? anon_vma_fork+0xf1/0x640 [ 2341.291616] should_failslab+0x5/0x20 [ 2341.292477] kmem_cache_alloc+0x5b/0x310 [ 2341.293382] anon_vma_fork+0xf1/0x640 [ 2341.294228] ? __vm_enough_memory+0x184/0x360 [ 2341.295221] copy_process+0x7218/0x7800 [ 2341.296151] ? __cleanup_sighand+0xb0/0xb0 [ 2341.297107] ? find_held_lock+0x2c/0x110 [ 2341.298001] kernel_clone+0xe7/0x980 [ 2341.298821] ? lock_downgrade+0x6d0/0x6d0 [ 2341.299718] ? find_held_lock+0x2c/0x110 [ 2341.300618] ? create_io_thread+0xf0/0xf0 [ 2341.301533] ? ksys_write+0x12d/0x260 [ 2341.302378] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2341.303430] __do_sys_fork+0x8a/0xc0 [ 2341.304253] ? kernel_thread+0xf0/0xf0 [ 2341.305116] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2341.306257] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2341.307374] ? trace_hardirqs_on+0x5b/0x180 [ 2341.308335] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2341.309452] do_syscall_64+0x33/0x40 [ 2341.310274] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2341.311390] RIP: 0033:0x7fadf412db19 [ 2341.312217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2341.316233] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2341.317897] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2341.319442] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2341.320988] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2341.322531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2341.324077] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:36:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000001f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2341.412199] 9pnet: Insufficient options for proto=fd [ 2341.450883] 9pnet: Insufficient options for proto=fd 02:36:31 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 85) 02:36:31 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="14e7ff00d8ba7394ca1bc3950000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$BTRFS_IOC_RM_DEV_V2(r1, 0x5000943a, &(0x7f0000001e00)={{r0}, 0x0, 0x14, @inherit={0x70, &(0x7f00000003c0)={0x1, 0x5, 0x0, 0xfffffffffffffe00, {0x15, 0x600000, 0x5bb, 0x80000000, 0xa07d00000000}, [0x80, 0x3, 0x3f, 0x4, 0x4]}}, @name="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"}) r3 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="a6a45a11abde88d1296fb64b8eb84bd05e2c08ead320202a6d23f931a4b52320414c56be45abb4f969c154d5f71aa1922e530d52159567793366a25bb662c547fc4b9433e5d49c736f06c4d9317b861fc5eafdbaf9646e004a15659661fc54283e12049d90", 0x65}], 0x1, &(0x7f0000000240)=[@rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xee01}}}], 0x38, 0x80}, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0xc0709411, &(0x7f00000002c0)={{r4, 0x61, 0x80000001, 0x9, 0xb6, 0x1, 0x4, 0xfffffff7, 0x4, 0x9, 0x4, 0x0, 0x6, 0x0, 0x7fffffff}, 0x30, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:36:31 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0}]) 02:36:31 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5450, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:31 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)={'wg1\x00'}) io_uring_setup(0x63c0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'syzkaller0\x00'}) 02:36:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0002000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:36:31 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5460, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:31 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8940, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2358.195723] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2358.201530] audit: type=1326 audit(1693276591.193:154): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12934 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2358.214515] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:36:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0003000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:36:31 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) close_range(r4, r4, 0x0) write$binfmt_elf32(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)=ANY=[@ANYBLOB="7472616e733d6664f5f88ea2006f3d", @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',\x00']) write$binfmt_elf32(r6, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r8 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000140)=[0xffffffffffffffff, r3, r1, r4, r0, r6, r8, r1], 0x8) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2358.280222] FAULT_INJECTION: forcing a failure. [ 2358.280222] name failslab, interval 1, probability 0, space 0, times 0 [ 2358.282185] CPU: 0 PID: 12954 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2358.283385] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2358.284861] Call Trace: [ 2358.285323] dump_stack+0x107/0x167 [ 2358.285957] should_fail.cold+0x5/0xa [ 2358.286623] ? create_object.isra.0+0x3a/0xa20 [ 2358.287429] should_failslab+0x5/0x20 [ 2358.288093] kmem_cache_alloc+0x5b/0x310 [ 2358.288811] create_object.isra.0+0x3a/0xa20 [ 2358.289556] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2358.290445] kmem_cache_alloc+0x159/0x310 [ 2358.291168] anon_vma_fork+0xf1/0x640 [ 2358.291835] ? __vm_enough_memory+0x184/0x360 [ 2358.292628] copy_process+0x7218/0x7800 [ 2358.293352] ? __cleanup_sighand+0xb0/0xb0 [ 2358.294105] ? find_held_lock+0x2c/0x110 [ 2358.294813] kernel_clone+0xe7/0x980 [ 2358.295459] ? lock_downgrade+0x6d0/0x6d0 [ 2358.296164] ? find_held_lock+0x2c/0x110 [ 2358.296875] ? create_io_thread+0xf0/0xf0 [ 2358.297583] ? ksys_write+0x12d/0x260 [ 2358.298245] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2358.299083] __do_sys_fork+0x8a/0xc0 [ 2358.299724] ? kernel_thread+0xf0/0xf0 [ 2358.300425] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2358.301327] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2358.302211] ? trace_hardirqs_on+0x5b/0x180 [ 2358.302953] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2358.303835] do_syscall_64+0x33/0x40 [ 2358.304479] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2358.305362] RIP: 0033:0x7fadf412db19 [ 2358.306003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2358.309157] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2358.310456] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2358.311674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2358.312899] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2358.314106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2358.315316] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2358.348021] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2358.359094] 9pnet: Could not find request transport: fdõøŽ¢ 02:36:31 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="14001d0000ffff0000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x22040, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) ioctl$AUTOFS_IOC_FAIL(r3, 0x9361, 0xfffffffffffffffe) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2358.375112] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2358.379256] 9pnet: Could not find request transport: fdõøŽ¢ 02:36:31 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0}]) [ 2358.452985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:36:31 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='coredump_filter\x00') ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2358.490362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:36:31 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8901, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0004000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:36:31 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8941, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:45 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 86) 02:36:45 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8902, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0005000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:36:45 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5451, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:36:45 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x121}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:36:45 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="2c77664c6efa4a92e0e6dd07ed30f471d36f3d", @ANYRESHEX=r3, @ANYBLOB=',\x00']) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) io_uring_enter(r2, 0x51df, 0x60a8, 0x2, &(0x7f0000000180)={[0xf9]}, 0x8) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e23, @loopback}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e24, @rand_addr=0x64010101}, 0x12, 0x0, 0x0, 0x0, 0x80, &(0x7f00000000c0)='xfrm0\x00', 0xffffffff, 0x4, 0x800}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x22}}, {0x6, @link_local}, 0x0, {0x2, 0x0, @rand_addr=0x64010101}, 'syzkaller0\x00'}) 02:36:45 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 02:36:45 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x894c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2372.801153] audit: type=1326 audit(1693276605.793:155): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=12991 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2372.814782] 9pnet: Insufficient options for proto=fd 02:36:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0006000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2372.841789] 9pnet: Insufficient options for proto=fd 02:36:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0007000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:36:45 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00030000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, r2, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2372.895761] FAULT_INJECTION: forcing a failure. [ 2372.895761] name failslab, interval 1, probability 0, space 0, times 0 02:36:45 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8903, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2372.898116] CPU: 1 PID: 13014 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2372.899655] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2372.901361] Call Trace: [ 2372.901929] dump_stack+0x107/0x167 [ 2372.902692] should_fail.cold+0x5/0xa [ 2372.903473] ? anon_vma_fork+0x1ff/0x640 [ 2372.904296] should_failslab+0x5/0x20 [ 2372.905086] kmem_cache_alloc+0x5b/0x310 [ 2372.905917] anon_vma_fork+0x1ff/0x640 [ 2372.906725] copy_process+0x7218/0x7800 [ 2372.907579] ? __cleanup_sighand+0xb0/0xb0 [ 2372.908486] ? find_held_lock+0x2c/0x110 [ 2372.909313] kernel_clone+0xe7/0x980 [ 2372.910074] ? lock_downgrade+0x6d0/0x6d0 [ 2372.910909] ? find_held_lock+0x2c/0x110 [ 2372.911740] ? create_io_thread+0xf0/0xf0 [ 2372.912588] ? ksys_write+0x12d/0x260 [ 2372.913370] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2372.914368] __do_sys_fork+0x8a/0xc0 [ 2372.915120] ? kernel_thread+0xf0/0xf0 [ 2372.915923] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2372.917002] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2372.918041] ? trace_hardirqs_on+0x5b/0x180 [ 2372.918915] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2372.919951] do_syscall_64+0x33/0x40 [ 2372.920720] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2372.921755] RIP: 0033:0x7fadf412db19 [ 2372.922511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2372.926190] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2372.927724] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2372.929149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2372.930568] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2372.931985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 02:36:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0008000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2372.933460] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:36:45 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0}]) 02:36:45 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000240)=@generic={0x2, 0x2, 0x64}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x8}}, './file1\x00'}) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c, 0x40800) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000340)=ANY=[@ANYBLOB="010007000108000018000000a605cf3b87c13ca95c9c51974aa5", @ANYRES32=r4, @ANYBLOB="01000000000000002e2f66696c653100"]) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)=ANY=[@ANYBLOB='truns=nd(o=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',\x00']) write$binfmt_elf32(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cb35742ba2bcc67b8cc75ce39e4945e5ca2b56a150ec8bd90578e0c9d86b68d74e73c83ff19509f0339d2cc0b251bddfd729e9be5c3a59d54e291dfef97ff4780bb0bc3754a1406a40e4addfa2d7f1abe3b2d607a2e4"], 0x58) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 2372.974090] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:36:46 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8953, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:00 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 87) 02:37:00 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0}]) 02:37:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'veth1_to_hsr\x00'}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000100)={{0x2, 0x0, @multicast1}, {0x0, @link_local}, 0x0, {0x2, 0x2, @local}, 'syzkaller0\x00'}) 02:37:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0018000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:37:00 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x4, &(0x7f0000000040)={0x0, 0x0, 0x2, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2387.272015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:37:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5452, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:00 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8904, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:00 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8955, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2387.304045] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2387.316014] device veth0_vlan left promiscuous mode [ 2387.317669] audit: type=1326 audit(1693276620.309:156): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13057 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:37:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a001c000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:37:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) fcntl$notify(r1, 0x402, 0x4) [ 2387.411940] FAULT_INJECTION: forcing a failure. [ 2387.411940] name failslab, interval 1, probability 0, space 0, times 0 [ 2387.414453] CPU: 1 PID: 13072 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2387.415956] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2387.417769] Call Trace: [ 2387.418353] dump_stack+0x107/0x167 [ 2387.419160] should_fail.cold+0x5/0xa [ 2387.419998] ? create_object.isra.0+0x3a/0xa20 [ 2387.421013] should_failslab+0x5/0x20 [ 2387.421838] kmem_cache_alloc+0x5b/0x310 [ 2387.422735] create_object.isra.0+0x3a/0xa20 [ 2387.423690] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2387.424810] kmem_cache_alloc+0x159/0x310 [ 2387.425722] anon_vma_fork+0x1ff/0x640 [ 2387.426578] copy_process+0x7218/0x7800 [ 2387.427488] ? __cleanup_sighand+0xb0/0xb0 [ 2387.428430] ? find_held_lock+0x2c/0x110 [ 2387.429343] kernel_clone+0xe7/0x980 [ 2387.430158] ? lock_downgrade+0x6d0/0x6d0 [ 2387.431050] ? find_held_lock+0x2c/0x110 [ 2387.431930] ? create_io_thread+0xf0/0xf0 [ 2387.432895] ? ksys_write+0x12d/0x260 [ 2387.433732] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2387.434788] __do_sys_fork+0x8a/0xc0 [ 2387.435600] ? kernel_thread+0xf0/0xf0 [ 2387.436462] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2387.437619] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2387.438741] ? trace_hardirqs_on+0x5b/0x180 [ 2387.439685] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2387.440815] do_syscall_64+0x33/0x40 [ 2387.441632] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2387.442742] RIP: 0033:0x7fadf412db19 [ 2387.443553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2387.447527] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2387.449196] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2387.450736] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2387.452275] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2387.453835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2387.455373] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:37:00 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x300, 0x0, 0xffffffffffffffff, 0x0}]) 02:37:00 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000040)=0x1) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000080)=0x80) syncfs(r1) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) getsockname$unix(r1, &(0x7f0000000340)=@abs, &(0x7f0000000140)=0x6e) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:37:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x5460, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0067000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:37:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) dup(0xffffffffffffffff) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2387.618505] device veth0_vlan entered promiscuous mode 02:37:00 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8980, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:16 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 88) 02:37:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a00f0000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:37:16 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8981, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:16 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8905, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2403.206771] audit: type=1326 audit(1693276636.199:157): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13109 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:37:16 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x330, 0x0, 0xffffffffffffffff, 0x0}]) 02:37:16 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r2 = fcntl$dupfd(r0, 0x0, r0) getpeername$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) 02:37:16 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400000000ffff000000000000000000075615c391b94f1ad620edb1ec9d00"/45], 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x404c081) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0xffffffffffffffff}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000140)={{0x1, 0x1, 0x18, r4, {0x1}}, './file0\x00'}) 02:37:16 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8901, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000030f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2403.277039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:37:16 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="931c9efcab8d134da2a0ea2dd0650d8b900b5ee35c4ca135068c11be53c960b2", 0x20}], 0x1) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2403.302988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2403.308808] FAULT_INJECTION: forcing a failure. [ 2403.308808] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.311369] CPU: 0 PID: 13132 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2403.312963] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.314830] Call Trace: [ 2403.315433] dump_stack+0x107/0x167 [ 2403.316262] should_fail.cold+0x5/0xa [ 2403.317136] ? vm_area_dup+0x78/0x290 [ 2403.318002] should_failslab+0x5/0x20 [ 2403.318863] kmem_cache_alloc+0x5b/0x310 [ 2403.319781] ? lock_downgrade+0x6d0/0x6d0 [ 2403.320715] vm_area_dup+0x78/0x290 [ 2403.321564] ? _cond_resched+0x12/0x80 [ 2403.322441] ? copy_page_range+0x24e9/0x3810 [ 2403.323475] ? vm_area_alloc+0x110/0x110 [ 2403.324386] ? up_write+0x191/0x550 [ 2403.325212] ? vm_iomap_memory+0x190/0x190 [ 2403.326157] ? downgrade_write+0x3a0/0x3a0 [ 2403.327113] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2403.328329] ? __vma_link_rb+0x540/0x700 [ 2403.329261] copy_process+0x291b/0x7800 [ 2403.330194] ? __cleanup_sighand+0xb0/0xb0 [ 2403.331164] ? find_held_lock+0x2c/0x110 [ 2403.332080] kernel_clone+0xe7/0x980 [ 2403.332932] ? lock_downgrade+0x6d0/0x6d0 [ 2403.333868] ? find_held_lock+0x2c/0x110 [ 2403.334768] ? create_io_thread+0xf0/0xf0 [ 2403.335700] ? ksys_write+0x12d/0x260 [ 2403.336554] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2403.337641] __do_sys_fork+0x8a/0xc0 [ 2403.338468] ? kernel_thread+0xf0/0xf0 [ 2403.339366] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2403.340527] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2403.341687] ? trace_hardirqs_on+0x5b/0x180 [ 2403.342639] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2403.343781] do_syscall_64+0x33/0x40 [ 2403.344606] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2403.345749] RIP: 0033:0x7fadf412db19 [ 2403.346578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.350618] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2403.352283] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2403.353982] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2403.355541] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2403.357111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.358670] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:37:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0080040f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:37:16 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x500, 0x0, 0xffffffffffffffff, 0x0}]) 02:37:16 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8906, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:16 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8902, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:16 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x9, 0x2, 0xced, 0x9, 0x800}) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) clock_gettime(0x0, &(0x7f0000004840)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000004680)=[{{&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000004a00)=[{&(0x7f0000000140)=""/205, 0xcd}, {&(0x7f0000000240)}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/51, 0x33}, {&(0x7f0000001300)=""/251, 0xfb}, {&(0x7f0000001400)=""/90, 0x5a}, {&(0x7f0000001480)=""/129, 0x81}, {&(0x7f0000001540)=""/50, 0x32}, {&(0x7f0000004900)=""/248, 0xf8}], 0xa, &(0x7f0000001640)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000001680)=@abs, 0x6e, &(0x7f0000001780)=[{&(0x7f0000001700)=""/124, 0x7c}], 0x1, &(0x7f00000017c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f0000001800)=@abs, 0x6e, &(0x7f0000001900)=[{&(0x7f0000001880)=""/112, 0x70}], 0x1}}, {{&(0x7f0000001940)=@abs, 0x6e, &(0x7f0000003e00)=[{&(0x7f00000019c0)=""/233, 0xe9}, {&(0x7f0000001ac0)=""/109, 0x6d}, {&(0x7f0000001b40)}, {&(0x7f0000001b80)=""/209, 0xd1}, {&(0x7f0000001c80)=""/14, 0xe}, {&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/198, 0xc6}, {&(0x7f0000002dc0)}, {&(0x7f0000002e00)=""/4096, 0x1000}], 0x9, &(0x7f0000003ec0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa8}}, {{&(0x7f0000003f80)=@abs, 0x6e, &(0x7f0000004080)=[{&(0x7f0000004000)=""/32, 0x20}, {&(0x7f0000004040)=""/14, 0xe}], 0x2}}, {{&(0x7f00000040c0)=@abs, 0x6e, &(0x7f0000004140)}}, {{&(0x7f0000004180)=@abs, 0x6e, &(0x7f0000004580)=[{&(0x7f0000004200)=""/5, 0x5}, {&(0x7f0000004240)=""/27, 0x1b}, {&(0x7f0000004280)=""/92, 0x5c}, {&(0x7f0000004300)=""/248, 0xf8}, {&(0x7f0000004400)=""/180, 0xb4}, {&(0x7f00000044c0)=""/162, 0xa2}], 0x6, &(0x7f0000004600)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x60}}], 0x7, 0x40, &(0x7f0000004880)={r2, r3+10000000}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) write$binfmt_elf32(r7, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) setsockopt$inet_opts(r7, 0x0, 0xf, &(0x7f0000000240)="953ffb10c8b8e87300d0795488114138dd840eeeb92bca2006ce9b395c17d0ea5e3fedce01370bc95de7721b8ed23cac9bb870eaddeb1a72d3c20e27b7811c8aaa42d28ef44e95bee39bd0bcd762ae9e469ef6b38ce3a9", 0x57) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f00000048c0)=[r1, r6, r0], 0x3) dup3(0xffffffffffffffff, r0, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:37:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000050f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2403.512276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2403.524385] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2403.553016] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2403.556253] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:37:30 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 89) 02:37:30 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8903, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:30 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x700, 0x0, 0xffffffffffffffff, 0x0}]) 02:37:30 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) copy_file_range(r4, 0x0, r0, &(0x7f0000000140)=0x8e, 0x9, 0x0) io_uring_setup(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x161, 0x0, r1}) r5 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2417.190760] audit: type=1326 audit(1693276650.182:158): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13165 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:37:30 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8982, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:30 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x4) io_uring_enter(r0, 0x853, 0x2f31, 0x3, &(0x7f00000000c0)={[0x4]}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r1}}, './file0\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r4, 0x3, 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:37:30 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8907, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000060f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2417.231286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2417.248747] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=7642 comm=kworker/0:3 [ 2417.255187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=7642 comm=kworker/0:3 [ 2417.269866] device veth0_vlan left promiscuous mode 02:37:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000070f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2417.279968] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2417.292489] FAULT_INJECTION: forcing a failure. [ 2417.292489] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.294850] CPU: 0 PID: 13184 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2417.296262] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2417.297975] Call Trace: [ 2417.298522] dump_stack+0x107/0x167 [ 2417.299269] should_fail.cold+0x5/0xa [ 2417.300048] ? create_object.isra.0+0x3a/0xa20 [ 2417.300992] should_failslab+0x5/0x20 [ 2417.301770] kmem_cache_alloc+0x5b/0x310 [ 2417.302612] create_object.isra.0+0x3a/0xa20 [ 2417.303510] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.304566] kmem_cache_alloc+0x159/0x310 [ 2417.305443] vm_area_dup+0x78/0x290 [ 2417.306193] ? _cond_resched+0x12/0x80 [ 2417.306991] ? copy_page_range+0x24e9/0x3810 [ 2417.307936] ? vm_area_alloc+0x110/0x110 [ 2417.308772] ? up_write+0x191/0x550 [ 2417.309525] ? vm_iomap_memory+0x190/0x190 [ 2417.310387] ? downgrade_write+0x3a0/0x3a0 [ 2417.311255] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2417.312366] ? __vma_link_rb+0x540/0x700 [ 2417.313209] copy_process+0x291b/0x7800 [ 2417.314058] ? __cleanup_sighand+0xb0/0xb0 [ 2417.314941] ? find_held_lock+0x2c/0x110 [ 2417.315778] kernel_clone+0xe7/0x980 [ 2417.316538] ? lock_downgrade+0x6d0/0x6d0 [ 2417.317399] ? find_held_lock+0x2c/0x110 [ 2417.318219] ? create_io_thread+0xf0/0xf0 [ 2417.319075] ? ksys_write+0x12d/0x260 [ 2417.319854] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2417.320855] __do_sys_fork+0x8a/0xc0 [ 2417.321622] ? kernel_thread+0xf0/0xf0 [ 2417.322438] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2417.323497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2417.324559] ? trace_hardirqs_on+0x5b/0x180 [ 2417.325451] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2417.326506] do_syscall_64+0x33/0x40 [ 2417.327270] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2417.328316] RIP: 0033:0x7fadf412db19 [ 2417.329081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2417.332785] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2417.334345] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2417.335786] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2417.337234] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2417.338676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2417.340116] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:37:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000180f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2417.368482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2417.376797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:37:30 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3003, 0x0, 0xffffffffffffffff, 0x0}]) 02:37:30 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:37:30 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8904, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:30 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000084000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) fcntl$dupfd(r0, 0x0, r0) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:37:30 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8983, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a00001c0f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2417.531897] device veth0_vlan entered promiscuous mode 02:37:44 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x89a0, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:44 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 90) 02:37:44 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="c89dad030000681b05"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:37:44 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x38}, [{}]}, 0x58) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1a) io_uring_setup(0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r4 = syz_open_dev$mouse(&(0x7f00000000c0), 0x1f, 0x400000) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'wg1\x00'}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:37:44 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8908, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:44 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x3f00, 0x0, 0xffffffffffffffff, 0x0}]) 02:37:44 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8905, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000200f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2431.402226] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=7642 comm=kworker/0:3 [ 2431.422859] audit: type=1326 audit(1693276664.415:159): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13226 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:37:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a00003f0f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:37:44 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="060628bd7000fedbdf253200000008000300", @ANYRES32=0x0, @ANYBLOB="7bda82a6e0f92a11f782e9bdcb30cf8bca0a53a6c5d81995bb70f7e6480a95c697740460fdbc3f60536bdb611c3b405955daa1ae2dfe1e3336d51e662bd43d1a0ae0cf6ebd5a54b009bad081212dc5a29d30c562c0e85ccd5ac955ab637cf3935f193dbd03daf517db086fc807fdcea2abb9de17c59a43a84baee9d9b5c2e2e42299bb214ea428dc1af5a2b7a381a8c34b94738eb872671baa5b6cbc915aac4673c30b14990726862f96d83e74b91a603402e90bd4ac7d97c90f603786aaa7236233908fd5c812cfeed1329e3c8799f1cd013833d4f38a5776d5bf036ecb1fb760fd1db53955a297c45f6481a34acf65553672740fcae9fec99e2d21b62d683b5c459319d7c4b4a2257111b006ead7c8f9f1646113cd3c2dd905de528143037b84d53f26ce1d748379400e80cea1978e904565a993d60827351f7ccdff00be60bd7dc17c242c4db57e1f3418940eb6d2ad21c262f8ed7673012af7c4c93662c6cc43488f4b4310f349f721191ccaa87fe162a59ea66017d8ec6688258416443ccc3a12ee38d11286721c"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40001) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x14, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2431.515305] FAULT_INJECTION: forcing a failure. [ 2431.515305] name failslab, interval 1, probability 0, space 0, times 0 [ 2431.517681] CPU: 0 PID: 13244 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2431.519109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2431.520796] Call Trace: [ 2431.521355] dump_stack+0x107/0x167 [ 2431.522107] should_fail.cold+0x5/0xa [ 2431.522905] ? vm_area_dup+0x78/0x290 [ 2431.523700] should_failslab+0x5/0x20 [ 2431.524487] kmem_cache_alloc+0x5b/0x310 [ 2431.525356] vm_area_dup+0x78/0x290 [ 2431.526116] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 2431.527109] ? lock_downgrade+0x6d0/0x6d0 [ 2431.527950] ? copy_page_range+0x24e9/0x3810 [ 2431.528888] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 2431.529855] ? avc_has_extended_perms+0xf40/0xf40 [ 2431.530865] ? vm_area_alloc+0x110/0x110 [ 2431.531735] ? selinux_vm_enough_memory+0x114/0x180 [ 2431.532793] ? selinux_sb_statfs+0x250/0x250 [ 2431.533751] ? percpu_counter_add_batch+0x8b/0x140 [ 2431.534787] ? __vm_enough_memory+0x184/0x360 [ 2431.535731] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2431.536816] copy_process+0x291b/0x7800 [ 2431.537690] ? __cleanup_sighand+0xb0/0xb0 [ 2431.538608] ? find_held_lock+0x2c/0x110 [ 2431.539486] kernel_clone+0xe7/0x980 [ 2431.540288] ? lock_downgrade+0x6d0/0x6d0 [ 2431.541217] ? find_held_lock+0x2c/0x110 [ 2431.542088] ? create_io_thread+0xf0/0xf0 [ 2431.542978] ? ksys_write+0x12d/0x260 [ 2431.543809] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2431.544854] __do_sys_fork+0x8a/0xc0 [ 2431.545684] ? kernel_thread+0xf0/0xf0 [ 2431.546547] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2431.547670] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2431.548747] ? trace_hardirqs_on+0x5b/0x180 [ 2431.549686] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2431.550788] do_syscall_64+0x33/0x40 [ 2431.551570] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2431.552645] RIP: 0033:0x7fadf412db19 [ 2431.553458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2431.557441] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2431.559099] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2431.560669] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2431.562219] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2431.563779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2431.565282] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:37:44 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:37:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000670f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:37:44 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 02:37:44 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8906, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:44 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000080)={'ipvlan0\x00'}) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xffffffffffffffff}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffff7fffffffff, r2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'ip6gre0\x00'}) 02:37:44 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x89a1, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:37:44 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8909, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2431.776617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2431.803141] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:38:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8907, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x54ba01, 0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x0, r2) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f00000000c0), 0x414880, 0x0) io_uring_enter(r3, 0x4cd0, 0xfcba, 0x0, &(0x7f0000000100)={[0x7]}, 0x8) r4 = socket$inet(0x2, 0x800, 0x7ff) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @private=0xa010101}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @rand_addr=0x64010102}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:38:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0004800f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2447.542212] audit: type=1326 audit(1693276680.534:160): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13287 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2447.546606] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2447.561541] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:38:00 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0}]) 02:38:00 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 91) 02:38:00 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x40049409, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:00 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:38:00 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:00 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0xff66, 0x7, 0xcc, 0x7fffffff}, {0x2, 0x6, 0x6, 0x9}]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) ioctl$FAT_IOCTL_GET_VOLUME_ID(r4, 0x80047213, &(0x7f0000000140)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r5 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r5, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:38:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a00fdef0f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:38:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022cbd7000fedbdf25010000000000000008410000ce11000000000fff7564700000000000000000000000000000000000000000000000000000000000000000000000000000000000f50000000000000000000000060000000000ca05167a1d8b"], 0x68}, 0x1, 0x0, 0x0, 0x8010}, 0x4008090) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2447.628303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2447.639671] FAULT_INJECTION: forcing a failure. [ 2447.639671] name failslab, interval 1, probability 0, space 0, times 0 [ 2447.640878] CPU: 1 PID: 13304 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2447.641626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2447.642598] Call Trace: [ 2447.642915] dump_stack+0x107/0x167 [ 2447.643305] should_fail.cold+0x5/0xa [ 2447.643716] ? create_object.isra.0+0x3a/0xa20 [ 2447.644209] should_failslab+0x5/0x20 [ 2447.644621] kmem_cache_alloc+0x5b/0x310 [ 2447.645062] create_object.isra.0+0x3a/0xa20 [ 2447.645545] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2447.646084] kmem_cache_alloc+0x159/0x310 [ 2447.646532] vm_area_dup+0x78/0x290 [ 2447.646927] ? avc_has_perm_noaudit+0x1c9/0x3e0 [ 2447.647425] ? lock_downgrade+0x6d0/0x6d0 [ 2447.647874] ? copy_page_range+0x24e9/0x3810 [ 2447.648360] ? avc_has_perm_noaudit+0x1f7/0x3e0 [ 2447.648865] ? avc_has_extended_perms+0xf40/0xf40 [ 2447.649404] ? vm_area_alloc+0x110/0x110 [ 2447.649859] ? selinux_vm_enough_memory+0x114/0x180 [ 2447.650388] ? selinux_sb_statfs+0x250/0x250 [ 2447.650860] ? percpu_counter_add_batch+0x8b/0x140 [ 2447.651398] ? __vm_enough_memory+0x184/0x360 [ 2447.651887] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 2447.652447] copy_process+0x291b/0x7800 [ 2447.652888] ? __cleanup_sighand+0xb0/0xb0 [ 2447.653358] ? find_held_lock+0x2c/0x110 [ 2447.653801] kernel_clone+0xe7/0x980 [ 2447.654202] ? lock_downgrade+0x6d0/0x6d0 [ 2447.654647] ? find_held_lock+0x2c/0x110 [ 2447.655088] ? create_io_thread+0xf0/0xf0 [ 2447.655531] ? ksys_write+0x12d/0x260 [ 2447.655948] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2447.656472] __do_sys_fork+0x8a/0xc0 [ 2447.656868] ? kernel_thread+0xf0/0xf0 [ 2447.657291] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2447.657851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2447.658400] ? trace_hardirqs_on+0x5b/0x180 [ 2447.658860] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2447.659411] do_syscall_64+0x33/0x40 [ 2447.659836] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2447.660426] RIP: 0033:0x7fadf412db19 [ 2447.660826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2447.662841] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2447.663655] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2447.664407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2447.665160] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2447.665935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2447.666691] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2447.671355] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2447.688687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2447.692345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:38:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8908, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:00 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:00 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0}]) 02:38:00 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/schedstat\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x38}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}], "f226b00d2bb1a2e23d93e076b258193cc7d74e962180d7bf"}, 0x70) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000140), r0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r5, 0x8, 0x70bd2c, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040080}, 0x80) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r6, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r7 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r7, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2447.743052] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2447.746590] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:38:00 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x8) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) [ 2447.764573] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 [ 2447.768996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:38:00 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x40086602, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000f00f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:38:00 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8909, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:00 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x3028, 0x4) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:38:14 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:14 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 92) 02:38:14 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:14 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0}]) 02:38:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a00effd0f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:38:14 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x40087602, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:14 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3}, 0x40200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) io_uring_setup(0x5f0b, &(0x7f0000000040)={0x0, 0x93d2, 0x2, 0x1, 0x256, 0x0, r1}) 02:38:14 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) clock_gettime(0x0, &(0x7f0000001b40)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)=""/55, 0x37}, {&(0x7f00000000c0)=""/115, 0x73}], 0x2, &(0x7f0000000180)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}, {{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000280)=""/83, 0x53}], 0x1, &(0x7f0000000340)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x148}}, {{&(0x7f00000004c0)=@abs, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000540)=""/124, 0x7c}], 0x1, &(0x7f0000000600)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}, {{&(0x7f0000000640)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f00000006c0)=""/125, 0x7d}, {&(0x7f0000000740)=""/41, 0x29}, {&(0x7f0000000780)=""/53, 0x35}], 0x3}}, {{&(0x7f0000000800)=@abs, 0x6e, &(0x7f0000001940)=[{&(0x7f0000000880)=""/23, 0x17}, {&(0x7f00000008c0)=""/4096, 0x1000}, {&(0x7f00000018c0)=""/97, 0x61}], 0x3, &(0x7f0000001980)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x68}}], 0x5, 0x2002, &(0x7f0000001b80)={r1, r2+60000000}) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000001c00)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e20, @private=0xa010101}, {0x2, 0x4e23, @private=0xa010102}, 0x40c, 0x0, 0x0, 0x0, 0x6, &(0x7f0000001bc0)='macvlan0\x00', 0x7, 0x0, 0x4}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @loopback}, {0x0, @link_local}, 0x0, {0x2, 0x0, @broadcast}, 'syzkaller0\x00'}) [ 2461.766039] audit: type=1326 audit(1693276694.758:161): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13353 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:38:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000020f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:38:14 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = syz_io_uring_complete(0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0xfffe, @remote}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x0, {0x2, 0x4e20, @empty}, 'ip6erspan0\x00'}) [ 2461.857266] FAULT_INJECTION: forcing a failure. [ 2461.857266] name failslab, interval 1, probability 0, space 0, times 0 [ 2461.859869] CPU: 0 PID: 13381 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2461.861259] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2461.862962] Call Trace: [ 2461.863504] dump_stack+0x107/0x167 [ 2461.864250] should_fail.cold+0x5/0xa [ 2461.865019] ? anon_vma_clone+0xdc/0x590 [ 2461.865842] should_failslab+0x5/0x20 [ 2461.866614] kmem_cache_alloc+0x5b/0x310 [ 2461.867437] anon_vma_clone+0xdc/0x590 [ 2461.868230] anon_vma_fork+0x82/0x640 [ 2461.869002] ? __vm_enough_memory+0x184/0x360 [ 2461.869959] copy_process+0x7218/0x7800 [ 2461.870792] ? __cleanup_sighand+0xb0/0xb0 [ 2461.871656] ? find_held_lock+0x2c/0x110 [ 2461.872479] kernel_clone+0xe7/0x980 [ 2461.873231] ? lock_downgrade+0x6d0/0x6d0 [ 2461.874070] ? find_held_lock+0x2c/0x110 [ 2461.874882] ? create_io_thread+0xf0/0xf0 [ 2461.875716] ? ksys_write+0x12d/0x260 [ 2461.876495] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2461.877548] __do_sys_fork+0x8a/0xc0 [ 2461.878397] ? kernel_thread+0xf0/0xf0 [ 2461.879244] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2461.880295] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2461.881328] ? trace_hardirqs_on+0x5b/0x180 [ 2461.882207] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2461.883237] do_syscall_64+0x33/0x40 [ 2461.883986] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2461.885024] RIP: 0033:0x7fadf412db19 [ 2461.885789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2461.889460] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2461.890999] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2461.892424] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2461.893851] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2461.895262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2461.896675] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:38:14 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0}]) 02:38:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000030f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:38:30 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x2) fchown(0xffffffffffffffff, 0xee00, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x2, 0x0, &(0x7f0000000000)) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @private1}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000040)=0x2342, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000300)={{0x1, 0x1, 0x18, r0, {0x6, 0x8}}, './file0/file1\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x8, &(0x7f00000000c0), &(0x7f0000000100)=0x14) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0/file0\x00'}) renameat(r1, &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00') r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:38:30 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 93) 02:38:30 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0}]) 02:38:30 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:30 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000000700000000000000000000000035627d85c826ed36304845dbbe0f4bcff92be7beefc3903c1a9e"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7db2) ioctl$LOOP_SET_FD(r1, 0x4c00, r3) r4 = socket$inet(0x2, 0xa, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) write$binfmt_elf32(r5, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000080)={'macvtap0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:38:30 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890d, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:30 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x4020940d, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2477.438467] audit: type=1326 audit(1693276710.430:162): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13397 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2477.460425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2477.471548] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2477.527668] FAULT_INJECTION: forcing a failure. [ 2477.527668] name failslab, interval 1, probability 0, space 0, times 0 [ 2477.530012] CPU: 0 PID: 13417 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2477.531429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2477.533127] Call Trace: [ 2477.533677] dump_stack+0x107/0x167 [ 2477.534451] should_fail.cold+0x5/0xa [ 2477.535240] ? create_object.isra.0+0x3a/0xa20 [ 2477.536180] should_failslab+0x5/0x20 [ 2477.536967] kmem_cache_alloc+0x5b/0x310 [ 2477.537813] create_object.isra.0+0x3a/0xa20 [ 2477.538718] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2477.539766] kmem_cache_alloc+0x159/0x310 [ 2477.540629] anon_vma_clone+0xdc/0x590 [ 2477.541446] anon_vma_fork+0x82/0x640 [ 2477.542239] ? __vm_enough_memory+0x184/0x360 [ 2477.543169] copy_process+0x7218/0x7800 [ 2477.544031] ? __cleanup_sighand+0xb0/0xb0 02:38:30 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890e, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2477.544910] ? find_held_lock+0x2c/0x110 [ 2477.545954] kernel_clone+0xe7/0x980 [ 2477.546713] ? lock_downgrade+0x6d0/0x6d0 [ 2477.547561] ? find_held_lock+0x2c/0x110 [ 2477.548389] ? create_io_thread+0xf0/0xf0 [ 2477.549237] ? ksys_write+0x12d/0x260 [ 2477.550035] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2477.551029] __do_sys_fork+0x8a/0xc0 [ 2477.551790] ? kernel_thread+0xf0/0xf0 [ 2477.552602] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2477.553670] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2477.554733] ? trace_hardirqs_on+0x5b/0x180 [ 2477.555610] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2477.556661] do_syscall_64+0x33/0x40 [ 2477.557420] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2477.558478] RIP: 0033:0x7fadf412db19 [ 2477.559235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2477.562982] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2477.564525] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2477.565977] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2477.567414] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2477.568855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2477.570299] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2477.576095] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2477.578883] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:38:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000040f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:38:30 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0}]) 02:38:30 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000000ffff0000000000000000000748713cc8d4c83bc4060a4008388ca61cad53993e1849a345aef4b9f6cbe64993ae02277bad28c3c7f814e482408956f9c4626fc53c7ee493bc309f7b04ccf0d635030000000000000055b37b1d60828160af5645b039fe4c00ab8eeb93689fbf246ba77d174a895f61"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r2 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r3 = fcntl$dupfd(0xffffffffffffffff, 0xff9ec390b054939c, r2) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000040)) r4 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=r1]) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000fe0000000000000038000000000000000000000000002000"/88], 0x58) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'wlan1\x00'}) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) write$binfmt_elf32(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000038000000000000000000000000002000000000000000000000000000601100000000000000000000050000000100"/88], 0x58) fcntl$setpipe(r5, 0x407, 0x40) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:38:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000050f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:38:30 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x80086601, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2477.781278] 9pnet: Insufficient options for proto=fd 02:38:30 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890f, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:30 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:30 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x300, 0xffffffffffffffff, 0x0}]) [ 2477.840352] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:38:30 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) statx(r3, &(0x7f0000000180)='./file1\x00', 0x0, 0x20, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x110a020, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c6f626a5f747970653d7472616e733d66642c2c6673757569643d30393131366634302d335437052d306439352d633063632d35613934653802362c61707072616973652c666f776e65723e", @ANYRESDEC=r5, @ANYRESOCT]) write$binfmt_elf32(r3, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x3, 0x0, 0x38, 0x184, 0x0, 0x0, 0x20, 0x2}, [{0x0, 0x0, 0x0, 0x0, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa58) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x44100, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYBLOB="010022713bd2a3ea838e0000", @ANYRESDEC=r1, @ANYRESHEX]) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000300)=[0xffffffffffffffff, r6, r8, r0, r0, r0, 0xffffffffffffffff, r2], 0x8) accept4$inet(r1, &(0x7f0000000000), &(0x7f00000000c0)=0x10, 0x400) [ 2477.881310] 9pnet: Insufficient options for proto=fd [ 2477.896164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2477.909383] 9pnet: Insufficient options for proto=fd [ 2477.910114] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2477.913945] 9pnet: Insufficient options for proto=fd 02:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000060f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:38:45 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x80087601, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:45 executing program 5: ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @private=0xa010101}, 'syzkaller0\x00'}) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000000)={0x1, 0x3, 0x3f}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000000c0)={0x29, @loopback, 0x4e22, 0x4, 'none\x00', 0x21, 0xfffffffa, 0x20}, 0x2c) 02:38:45 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x330, 0xffffffffffffffff, 0x0}]) 02:38:45 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) write$tun(r0, &(0x7f0000000040)={@val={0x0, 0x6007}, @void, @llc={@snap={0xaa, 0x0, "8e", "c20f3d", 0xf0, "d370a1400e0934d0627be648abcaef5ad3641fa103be8edde48950372c2b2d9983bc5500733ef8475fb5b6dd6fb13d36dc10958c96e5d42adcea19ba11429d44cc"}}}, 0x4d) r1 = socket$inet(0x2, 0xa, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000140)={'veth0_to_batadv\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:38:45 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890d, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:45 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 94) 02:38:45 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8910, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2492.550225] audit: type=1326 audit(1693276725.542:163): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13468 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2492.569969] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:38:45 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @empty}, {0x0, @broadcast}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000070f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2492.647253] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2492.651753] FAULT_INJECTION: forcing a failure. [ 2492.651753] name failslab, interval 1, probability 0, space 0, times 0 [ 2492.654187] CPU: 0 PID: 13492 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2492.655588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2492.657267] Call Trace: [ 2492.657814] dump_stack+0x107/0x167 [ 2492.658568] should_fail.cold+0x5/0xa [ 2492.659338] ? down_write+0xe0/0x160 [ 2492.660093] ? anon_vma_clone+0xdc/0x590 [ 2492.660918] should_failslab+0x5/0x20 [ 2492.661688] kmem_cache_alloc+0x5b/0x310 [ 2492.662538] anon_vma_clone+0xdc/0x590 [ 2492.663338] anon_vma_fork+0x82/0x640 [ 2492.664111] ? __vm_enough_memory+0x184/0x360 [ 2492.665034] copy_process+0x7218/0x7800 [ 2492.665893] ? __cleanup_sighand+0xb0/0xb0 [ 2492.666772] ? find_held_lock+0x2c/0x110 [ 2492.667602] kernel_clone+0xe7/0x980 [ 2492.668357] ? lock_downgrade+0x6d0/0x6d0 [ 2492.669192] ? find_held_lock+0x2c/0x110 [ 2492.670030] ? create_io_thread+0xf0/0xf0 [ 2492.670871] ? ksys_write+0x12d/0x260 [ 2492.671651] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2492.672635] __do_sys_fork+0x8a/0xc0 [ 2492.673391] ? kernel_thread+0xf0/0xf0 [ 2492.674207] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2492.675281] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2492.676329] ? trace_hardirqs_on+0x5b/0x180 [ 2492.677206] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2492.678268] do_syscall_64+0x33/0x40 [ 2492.679033] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2492.680074] RIP: 0033:0x7fadf412db19 02:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000080f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2492.680834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2492.684697] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2492.686263] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2492.687718] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2492.689167] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2492.690628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2492.692075] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:38:45 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x500, 0xffffffffffffffff, 0x0}]) 02:38:45 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x323, 0x80) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) pidfd_getfd(r1, r2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:38:45 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890e, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:45 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8911, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:45 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x9, 0x0, 0x3f, 0x2}, {0xfffc, 0xff, 0x2, 0x1}, {0x656, 0xf3, 0x81, 0x1}, {0x0, 0x5c, 0x4, 0x52}]}) 02:38:45 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x80108906, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000180f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2492.876170] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:38:45 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)=ANY=[@ANYBLOB="01f8ff0001008000180000002b943dd11514e1acdd2db5a9cfb367b83d5ac339b256d10a7df58aa77b", @ANYRES32=0xffffffffffffffff, @ANYBLOB="01000000000000002e2f66696c653000"]) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x400080, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$FIOCLEX(r2, 0x5451) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x7, &(0x7f00000000c0)=[{0x3, 0x80, 0x5, 0x2}, {0x3, 0xe2, 0x7, 0xab70}, {0x9, 0x7, 0xfc, 0x8d400000}, {0x944, 0x1f, 0x3, 0x4}, {0x2, 0xff, 0x0, 0x3}, {0x3ff, 0xe7, 0x5, 0xffffff39}, {0x8000, 0x40, 0x8, 0x298}]}) io_uring_setup(0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'veth0_to_team\x00', &(0x7f00000001c0)=@ethtool_eeprom={0xc, 0xfb0, 0xffffffff, 0xef, "7e3f361fef9ec2804ef98eb7e23a02873769cda834ded2df5e3f397862a8f06ceadad86fb9f37157c1477dbf377bfa4b0ee30519cf0338329acf1ff07a14a0aacd7465f69ce2394ca3101cfd733561ca6e32bb5e0fb03ab32e95e84702c9e709de67eb757eca2dbff7a49f4dffa33f2c2fbda759a9230285831737050ca789a2fef2b93441853a463818781c2ec8fc28b4ad55a9ebd46d1f9ce3736afd7e89a6d553211ce69cbe3b472cef33392131e3b67235d1b73eeeb3d6e2708abcb758695d6b9771a1c91890f61caaf8746ab7617c09316e52de320e00fee444177aedc895084048bcfa551b5a55e1082c809e"}}) [ 2492.978847] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2492.994690] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:38:59 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 95) 02:38:59 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x700, 0xffffffffffffffff, 0x0}]) 02:38:59 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x80108907, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:59 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000000740)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x2, "9c442621afcffd"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000001e00)={r1, r2, "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", "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"}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r3 = socket$inet(0x2, 0xa, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x8, 0xb4, 0x1, 0x9, 0x0, 0x1, 0x20, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000040), 0x15}, 0x10a, 0x1a, 0x7, 0x5, 0x9, 0x5, 0x0, 0x0, 0x72, 0x0, 0x4}, 0xffffffffffffffff, 0x10, r4, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:38:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a00001c0f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:38:59 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f00000000c0)=0x1) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r5, 0xa, 0x0, r2) 02:38:59 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x890f, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:38:59 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8912, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2506.457126] audit: type=1326 audit(1693276739.449:164): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13527 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2506.475542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:38:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000670f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2506.495240] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2506.557893] FAULT_INJECTION: forcing a failure. [ 2506.557893] name failslab, interval 1, probability 0, space 0, times 0 [ 2506.559243] CPU: 0 PID: 13551 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2506.560004] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2506.560921] Call Trace: [ 2506.561221] dump_stack+0x107/0x167 [ 2506.561630] should_fail.cold+0x5/0xa [ 2506.562059] ? create_object.isra.0+0x3a/0xa20 [ 2506.562571] should_failslab+0x5/0x20 [ 2506.562994] kmem_cache_alloc+0x5b/0x310 [ 2506.563447] create_object.isra.0+0x3a/0xa20 [ 2506.563934] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2506.564501] kmem_cache_alloc+0x159/0x310 [ 2506.564970] anon_vma_clone+0xdc/0x590 [ 2506.565410] anon_vma_fork+0x82/0x640 [ 2506.565836] ? __vm_enough_memory+0x184/0x360 [ 2506.566367] copy_process+0x7218/0x7800 [ 2506.566844] ? __cleanup_sighand+0xb0/0xb0 [ 2506.567332] ? find_held_lock+0x2c/0x110 [ 2506.567796] kernel_clone+0xe7/0x980 [ 2506.568228] ? lock_downgrade+0x6d0/0x6d0 [ 2506.568692] ? find_held_lock+0x2c/0x110 [ 2506.569163] ? create_io_thread+0xf0/0xf0 [ 2506.569646] ? ksys_write+0x12d/0x260 [ 2506.570099] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2506.570676] __do_sys_fork+0x8a/0xc0 [ 2506.571112] ? kernel_thread+0xf0/0xf0 [ 2506.571573] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2506.572175] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2506.572773] ? trace_hardirqs_on+0x5b/0x180 [ 2506.573281] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2506.573882] do_syscall_64+0x33/0x40 [ 2506.574329] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2506.574923] RIP: 0033:0x7fadf412db19 [ 2506.575361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2506.577491] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2506.578382] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2506.579212] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2506.580001] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2506.580827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2506.581610] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2520.418814] audit: type=1326 audit(1693276753.410:165): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13556 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:39:13 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 96) 02:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000001f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:39:13 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8915, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:13 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:39:13 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'veth1\x00'}) 02:39:13 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x3003, 0xffffffffffffffff, 0x0}]) 02:39:13 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0xc0045878, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:13 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8910, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a000000ffffffffffffffff0100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f020000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2520.511084] FAULT_INJECTION: forcing a failure. [ 2520.511084] name failslab, interval 1, probability 0, space 0, times 0 [ 2520.513459] CPU: 1 PID: 13579 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2520.514890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2520.516555] Call Trace: [ 2520.517098] dump_stack+0x107/0x167 [ 2520.517842] should_fail.cold+0x5/0xa [ 2520.518626] ? anon_vma_fork+0xf1/0x640 [ 2520.519438] should_failslab+0x5/0x20 [ 2520.520211] kmem_cache_alloc+0x5b/0x310 [ 2520.521046] anon_vma_fork+0xf1/0x640 [ 2520.521827] ? __vm_enough_memory+0x184/0x360 [ 2520.522769] copy_process+0x7218/0x7800 [ 2520.523622] ? __cleanup_sighand+0xb0/0xb0 [ 2520.524509] ? find_held_lock+0x2c/0x110 [ 2520.525348] kernel_clone+0xe7/0x980 [ 2520.526113] ? lock_downgrade+0x6d0/0x6d0 [ 2520.526966] ? find_held_lock+0x2c/0x110 [ 2520.527799] ? create_io_thread+0xf0/0xf0 [ 2520.528653] ? ksys_write+0x12d/0x260 [ 2520.529441] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2520.530444] __do_sys_fork+0x8a/0xc0 [ 2520.531207] ? kernel_thread+0xf0/0xf0 [ 2520.532023] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2520.533094] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2520.534148] ? trace_hardirqs_on+0x5b/0x180 [ 2520.535040] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2520.536092] do_syscall_64+0x33/0x40 [ 2520.536864] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2520.537912] RIP: 0033:0x7fadf412db19 [ 2520.538673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2520.542411] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2520.543956] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2520.545420] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2520.546883] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2520.548318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2520.549752] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:39:13 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x3f00, 0xffffffffffffffff, 0x0}]) 02:39:13 executing program 5: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000000)={0x0, 0x900000, 0x6, 0x3, 0xff}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e6f3d0b6454c84a634f31a422e6b0854b4ffa99849435e18fb60ca0da8189a22f22e856a961d9dd194b144c751c8755c4e92dcd17e2c655a80f844b360c2a09f6124d6538a95e7c2df26aa554a96d8be8afc5e11c88ef9440e2b228010f20407c02c510fd549030477dbe1076f18aae2fd693fea914b52fc58d8d42645c8a04428aa8fda40e76c1f5e6b24773056bd8fc92f868a52d345bbd3080df9cada75ae2a7ae741ea1396c301320479189ca78eff6c81d66d653382d8c7445c16e365cbf707e1ec2a47a2bca011e385b464d236622ff684b16c1f182fc005fbdfa0f120a64409bc880f645eee636f8d043841658c3f1cae10e8056f6c2901b57a0e4dbb9219b29fe29ead72cc74c0082e6448091f74a3ecadf2504522b26149c57a6692dd932ae7452a1ff07ef4c78be29eb", @ANYRESHEX=r2, @ANYBLOB="2c02"]) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x40, 0x1ff, 0x2, 0x0, 0x800, 0x0, 0x38, 0x2, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2}, [{0x0, 0x20000000, 0x0, 0x2}]}, 0x58) close_range(r0, r1, 0x2) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') clone3(&(0x7f0000002780)={0x200, &(0x7f00000015c0), &(0x7f0000001600), &(0x7f0000001640), {0x3}, &(0x7f0000001680)=""/171, 0xab, &(0x7f0000001740)=""/4096, &(0x7f0000002740)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x5}, 0x58) clone3(&(0x7f0000000440)={0x100080000, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340), {0x1f}, &(0x7f00000014c0)=""/175, 0xaf, &(0x7f0000001580)=""/39, &(0x7f0000002800)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x5, {r1}}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) write$tun(r3, &(0x7f0000000400)={@void, @void, @eth={@multicast, @broadcast, @val={@val={0x9100, 0x5, 0x0, 0x1}, {0x8100, 0x5, 0x0, 0x3}}, {@can={0xc, {{0x1, 0x0, 0x1}, 0x8, 0x2, 0x0, 0x0, "7fcce2882bf047d1"}}}}}, 0x26) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e20, @empty}, {0x6}, 0x28, {0x2, 0x4e22, @empty}, 'syzkaller1\x00'}) 02:39:13 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8916, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2520.609092] 9pnet: Insufficient options for proto=fd 02:39:13 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8911, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:13 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KDFONTOP_COPY(r0, 0x4b72, &(0x7f0000000080)={0x3, 0x1, 0x1c, 0x4, 0x60, &(0x7f00000002c0)}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000840)=ANY=[@ANYRES16, @ANYRESOCT=r0], 0x14}}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r2, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r3 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000180)=0x1) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000280)={'veth0_to_bridge\x00', {0x2, 0x0, @multicast2}}) [ 2520.676088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2520.689636] 9pnet: Insufficient options for proto=fd 02:39:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f030000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2520.794260] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:39:28 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8912, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:28 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 97) 02:39:28 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2}]) 02:39:28 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0xc0045878, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:28 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8917, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:28 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) io_uring_register$IORING_UNREGISTER_FILES(r1, 0x3, 0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:39:28 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000b1d3ae3ee6fe938cf1a7c2be0b46b9ebda893bb5fa9136cbda65de9cbfd4fa385ea2d2b45e1efc0a0b98b586ade9d48ffd70b71f4c5fc31ca02833f4cb981d90737529b70ed39f6097a92381b8d8f396f0b3872d433f7d190678e7aad648ceee20627ff9d47a44a6f7f99166f31ff438d7a0ee95110204bc25f8c0f2dd1d0e3469dfc0d789f12dbad0b63be3831c9b1deaeefdb5614779e47862b2d2024d2c6560accdc61b74934e55954745821eea97de091dfcd773d015fed93c00000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) sendfile(r2, r4, &(0x7f00000000c0)=0x5, 0x101) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:39:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f040000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2535.573643] audit: type=1326 audit(1693276768.565:166): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13612 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2535.590927] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2535.612254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:39:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f050000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:39:28 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, r2, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2535.675731] FAULT_INJECTION: forcing a failure. [ 2535.675731] name failslab, interval 1, probability 0, space 0, times 0 [ 2535.678102] CPU: 1 PID: 13630 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2535.679518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2535.681174] Call Trace: [ 2535.681712] dump_stack+0x107/0x167 [ 2535.682457] should_fail.cold+0x5/0xa [ 2535.683225] ? anon_vma_fork+0xf1/0x640 [ 2535.684025] should_failslab+0x5/0x20 [ 2535.684800] kmem_cache_alloc+0x5b/0x310 [ 2535.685630] anon_vma_fork+0xf1/0x640 [ 2535.686399] ? __vm_enough_memory+0x184/0x360 [ 2535.687368] copy_process+0x7218/0x7800 [ 2535.688212] ? __cleanup_sighand+0xb0/0xb0 [ 2535.689095] ? find_held_lock+0x2c/0x110 [ 2535.689918] kernel_clone+0xe7/0x980 [ 2535.690696] ? lock_downgrade+0x6d0/0x6d0 [ 2535.691528] ? find_held_lock+0x2c/0x110 [ 2535.692342] ? create_io_thread+0xf0/0xf0 [ 2535.693179] ? ksys_write+0x12d/0x260 [ 2535.693954] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2535.694953] __do_sys_fork+0x8a/0xc0 [ 2535.695699] ? kernel_thread+0xf0/0xf0 [ 2535.696499] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2535.697547] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2535.698587] ? trace_hardirqs_on+0x5b/0x180 [ 2535.699457] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2535.700491] do_syscall_64+0x33/0x40 [ 2535.701238] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2535.702262] RIP: 0033:0x7fadf412db19 [ 2535.703030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2535.706716] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2535.708237] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2535.709671] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2535.711112] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2535.712540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2535.713998] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 02:39:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f060000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:39:28 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = epoll_create(0x4) flistxattr(r3, &(0x7f0000000000)=""/9, 0x9) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000000020143a4599000000000000000000000000000000001100000000000088846eda71c09f00"/87], 0x58) io_uring_setup(0x32f1, &(0x7f00000000c0)={0x0, 0xefc4, 0x20, 0x3, 0x198, 0x0, r1}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:39:28 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3}]) [ 2535.812694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:39:28 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8915, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2535.832325] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:39:28 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0xc0189436, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:28 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.kill\x00', 0x0, 0x0) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x20, 0x2, 0x15e, 0x0, r1}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:39:28 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8918, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f070000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:39:42 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8919, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:42 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 98) 02:39:42 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="87dc5fbe446b12950100000000008000000080916ad66a805008120c17d7609e23834552eba696eb12489b1e7b3f0000000074b3839a24437e67fb4eace3421f5bf419d7675ac513c3"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = syz_open_dev$vcsa(&(0x7f0000000040), 0x1f, 0x22000) ioctl$TUNSETLINK(r2, 0x400454cd, 0x306) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:39:42 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r1 = socket$netlink(0x10, 0x3, 0x5) getsockopt$IP_SET_OP_GET_BYINDEX(r1, 0x1, 0x53, &(0x7f00000000c0)={0x7, 0x7, 0x3}, &(0x7f0000000100)=0x28) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @multicast1}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r4 = socket$inet(0x2, 0x3, 0xff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(r4, 0x0, 0x20, &(0x7f0000000040)={@empty, @rand_addr, r6}, 0xc) [ 2550.042927] audit: type=1326 audit(1693276783.035:167): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13678 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 sendmmsg$inet6(r2, &(0x7f0000002c40)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x3, @loopback, 0x9}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000180)="48b757ea46cb4747e3ea026b1dc6d98d30bb56f21770e4ccec548456e7e49dda058098f89938b5c6e687065b899476dfdf804e45d16c61fb9dad261a06d6a942ede970308ffa4277ad7456befc72c65fbd231672b7e50f9426bf24db513b9ff5305e269d4969", 0x6c}, {&(0x7f0000000200)="b7df848529694c6af3fc35ed9ab470f1663c90374b536cbd", 0x18}, {&(0x7f0000000240)="72a6ecbea1e241f9337de4", 0xb}], 0x3, &(0x7f00000002c0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0xa15a}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x29, 0xc, 0x0, 0x6, 0x0, [@remote, @private0, @private1, @dev={0xfe, 0x80, '\x00', 0x3c}, @local, @local]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r6}}}], 0xb8}}, {{&(0x7f0000000380)={0xa, 0xc9, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6}, 0x1c, &(0x7f0000000700)=[{&(0x7f00000003c0)="90a816d96f07804913c58efb1dadd37a4b24ff2d551677f966e44c", 0x1b}, {&(0x7f0000000400)="fb9a0a1cf9553db4b890601022aa147024a660028fd6ef18ba513a00f1fc2ca75522efbb6ec08455b472b797a03616c462ba70c9edc03efdbddcab9a035d23239919b5b3c84e4ea7f6a46f1641878619311b5f3242f9128fe7e181ef5a4ccb72c417cb43e62111eb808e861aca68a778b35a6840abb3c267dcd2a15ba0982bf93e6ae4cca5fb8f18eff0c275a4697349b224870c427878914931d75fbb9fe8084ff2c895f69af33886351677d1bed8720b73703bb3af335d8b9ad3283f09602beffe03b8b5023ccab3c6d52ce3ca5e3bea06b91348c20e", 0xd7}, {&(0x7f0000000500)="20ff5b35418f20ed6305d4f1bdf926759f478c7202957eb12fe190769b28c9d830bfaac06740a39f", 0x28}, {&(0x7f0000000540)="7c7168f56076636803c82ce94b480266faab803a95eaef5e408854cddab78c3be6c5ca32a242650946703351f3c97221a9ace9aa02005999089273d8bcbda11e67b98bc068f4ef859b148a5fd08726862ead8ee9142c0a42a776e8eb079d18a3081bc98960373b706ac6beeb84b7ce83f28de6e5d69bb4bc1c8ca1c01b275b759771d267874b81209657e8d7a8bc537f02c406b2a894e90b82358e19a62ad9973516a7441cf6d7f76dcf7b6170c3fa7ce7417f78ca7229cce49b187176a93875f8af6bf69378235f8b5af9bd423b6c8a220cedf508a2a55fb823de30492b00a9b671af043b8676e6b33a0a293c57", 0xee}, {&(0x7f0000000640)="5a9c21d86a9e8bc39cd63d667a742ce66e86c02ddcdfbcb668b9f406d2c9fcb987d94961fa365b08492c4751571090ee2a2c013c9e1fc36fe966a9e82d61ffd9330bf5e970d5fa46d3a84ee29cdf4c91b02c33bec78f55b6b665ed23e0bcce737d3184264d40bffc720f2569ed807cc4e3651f4a254fb457179b8f4c0a2cee9320d61bc46029389c111ce1da3f258f074841589c6e3bebd2e1ef5c31e5141bb3942eaf13224fde", 0xa7}], 0x5}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000780)}], 0x1, &(0x7f0000000800)=[@hoplimit={{0x14, 0x29, 0x34, 0x8}}, @rthdrdstopts={{0x1030, 0x29, 0x37, {0x87, 0x202, '\x00', [@jumbo={0xc2, 0x4, 0x4}, @generic={0x3, 0x1000, "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"}, @ra={0x5, 0x2, 0x5}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x5e, 0x1, '\x00', [@generic={0xfb, 0xd, "1d0a1670ffe5ed110c81c9930d"}]}}}], 0x1070}}, {{&(0x7f0000001880)={0xa, 0x4e22, 0x93, @empty, 0x244}, 0x1c, &(0x7f0000001900)=[{&(0x7f00000018c0)="848479e2eb3724178622f83291ef83b0466835c28de29e236fe1e8bf85547766141fa891dee0f056fda0fbb6c870", 0x2e}], 0x1, &(0x7f0000002d40)=ANY=[@ANYBLOB="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"], 0x12c8}}], 0x4, 0x20000060) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x18, {0x2, 0x0, @local}, 'batadv_slave_0\x00'}) 02:39:42 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4}]) 02:39:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f080000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:39:43 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8916, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:43 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0xc020660b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2550.081900] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:39:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f180000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2550.143981] FAULT_INJECTION: forcing a failure. [ 2550.143981] name failslab, interval 1, probability 0, space 0, times 0 [ 2550.146441] CPU: 1 PID: 13696 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2550.147879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2550.149572] Call Trace: [ 2550.150122] dump_stack+0x107/0x167 [ 2550.150887] should_fail.cold+0x5/0xa [ 2550.151670] ? anon_vma_fork+0x1ff/0x640 [ 2550.152511] should_failslab+0x5/0x20 [ 2550.153291] kmem_cache_alloc+0x5b/0x310 [ 2550.154127] anon_vma_fork+0x1ff/0x640 [ 2550.154933] copy_process+0x7218/0x7800 [ 2550.155791] ? __cleanup_sighand+0xb0/0xb0 [ 2550.156677] ? find_held_lock+0x2c/0x110 [ 2550.157519] kernel_clone+0xe7/0x980 [ 2550.158289] ? lock_downgrade+0x6d0/0x6d0 [ 2550.159215] ? find_held_lock+0x2c/0x110 [ 2550.160041] ? create_io_thread+0xf0/0xf0 [ 2550.160912] ? ksys_write+0x12d/0x260 [ 2550.161719] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2550.162722] __do_sys_fork+0x8a/0xc0 [ 2550.163475] ? kernel_thread+0xf0/0xf0 [ 2550.164287] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2550.165345] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2550.166417] ? trace_hardirqs_on+0x5b/0x180 [ 2550.167297] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2550.168341] do_syscall_64+0x33/0x40 [ 2550.169099] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2550.170136] RIP: 0033:0x7fadf412db19 [ 2550.170907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2550.174626] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2550.176164] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2550.177606] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2550.179063] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2550.180504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2550.181943] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2550.186009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11937 comm=kworker/1:0 02:39:43 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5}]) 02:39:43 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007fff73c4dc079d4228bb865a0cf0d2dbe493737c0062f2a0531b52c8596d4710c27ffc80bb6f8291912c1c42532e34356c6b30602d9308745a471b9e354e6a21965c18c2180eed2cc9ccf9b0894a671dfa69eacb3a73d687fa9cb30bc4f174f92a8ed439b953553a9"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) dup3(r2, r1, 0x80000) 02:39:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f1c0000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:39:43 executing program 5: r0 = fsmount(0xffffffffffffffff, 0x0, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000000c0)={0xffffffff, 0x0, &(0x7f0000000000)=[0xffffffffffffffff, r1, r2, 0xffffffffffffffff]}, 0x4) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:39:43 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8917, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:43 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:43 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x6c, 0x0, 0x310, 0x70bd26, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x7f}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x3f}, {0x6, 0x11, 0x57a0}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20004095}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r2, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r3 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:39:43 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00'}) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES16=r2, @ANYBLOB="010000000000000000000100000004010180"], 0x18}}, 0x0) r4 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2550.372151] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2550.408372] device veth0_vlan entered promiscuous mode [ 2550.461029] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2550.499357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2550.511116] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2550.536035] device veth0_vlan entered promiscuous mode [ 2570.888200] audit: type=1326 audit(1693276803.880:168): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13732 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:40:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f670000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:40:03 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 99) 02:40:03 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYRES64=0x0], 0x14}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r2, @ANYBLOB="0900000800270004000000"], 0x2c}}, 0x0) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000740)={0xa58, r1, 0x800, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x74}}}}, [@NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x18, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x5, 0x0, 0x401, 0x200, 0x3, 0x1, 0x1ff, 0x6ca3]}}]}]}, @NL80211_ATTR_TX_RATES={0x110, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x44, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x1, 0x36, 0x3, 0x6, 0x1, 0xb, 0x6, 0x36, 0x6, 0x2, 0x12, 0x48, 0x30, 0x36, 0x16, 0x5, 0xc, 0x6, 0x4, 0x36, 0x1b]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xd6f5, 0x4, 0x5, 0x7, 0x3, 0x3f, 0x8, 0xb6]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_6GHZ={0x70, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x30, 0x2, [{0x5, 0x9}, {0x0, 0x7}, {0x2, 0x5}, {0x5}, {0x3, 0x8}, {0x3, 0x1}, {0x0, 0x9}, {0x1, 0x8}, {0x1, 0xa}, {0x3, 0x2}, {0x7, 0x6}, {0x7}, {0x7, 0x7}, {0x0, 0x3}, {0x6, 0x1}, {0x4}, {0x5, 0x1}, {0x4}, {0x0, 0x5}, {0x5}, {0x1, 0x5}, {0x1, 0x6}, {0x6, 0x5}, {0x2, 0x3}, {0x3, 0x3}, {0x6}, {0x3, 0x5}, {0x2, 0x4}, {0x0, 0x5}, {0x0, 0x2}, {0x6, 0x8}, {0x6, 0x6}, {0x7, 0x4}, {0x2, 0x9}, {0x4, 0x3}, {0x4, 0x7}, {0x0, 0xa}, {0x0, 0x4}, {0x3, 0x6}, {0x3, 0x7}, {0x1, 0x5}, {0x2, 0x3}, {0x0, 0xa}, {0x0, 0x6}]}, @NL80211_TXRATE_HT={0x24, 0x2, [{0x1, 0x1}, {0x4, 0x2}, {0x2, 0x9}, {0x0, 0x7}, {0x5, 0x6}, {0x3, 0xa}, {0x3, 0x7}, {0x0, 0x5}, {0x7, 0x4}, {0x4, 0x3}, {0x3, 0x9}, {}, {0x0, 0x5}, {0x7, 0x2}, {0x3, 0x6}, {0x1, 0x8}, {0x7, 0x9}, {0x0, 0x9}, {0x7, 0x8}, {0x1, 0x7}, {0x4, 0x8}, {0x7, 0x5}, {0x1, 0x6}, {0x5, 0x1}, {0x0, 0x12}, {0x3, 0x8}, {0x0, 0x7}, {0x3, 0x7}, {0x1, 0x5}, {0x7, 0x6}, {0x7, 0x6}, {0x5, 0x9}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0x58, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x400, 0x4, 0x5, 0x7, 0x401, 0x6, 0x47d7]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x7ff, 0xffff, 0x1, 0x29f, 0x20, 0x200, 0x84]}}, @NL80211_TXRATE_HT={0x1c, 0x2, [{0x4, 0x7}, {0x4, 0x2}, {0x7, 0x9}, {0x0, 0xa}, {0x0, 0x7}, {0x2, 0x5}, {0x6, 0x9}, {0x5, 0x1}, {0x1, 0x4}, {0x3}, {0x3, 0x9}, {0x5, 0x4}, {0x0, 0x7}, {0x6, 0x5}, {0x1}, {0x7, 0x6}, {0x1, 0x6}, {0x5, 0x1}, {0x5, 0x6}, {0x6, 0x2}, {0x5, 0x5}, {0x7, 0x7}, {0x5, 0x1}, {0x0, 0x2}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}]}, @NL80211_ATTR_TX_RATES={0x1a0, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x40, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x9, 0x0, 0x800, 0x8, 0x6, 0x7, 0x8]}}, @NL80211_TXRATE_LEGACY={0x6, 0x1, [0xc, 0x6c]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_5GHZ={0x6c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x3df3e2c634c8b759}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x261, 0x7, 0x94b, 0x6, 0x4, 0x4, 0x1f]}}, @NL80211_TXRATE_HT={0x19, 0x2, [{0x1}, {0x2, 0x1}, {0x6, 0x6}, {0x3, 0x3}, {0x7, 0xa}, {0x1, 0x7}, {0x4, 0x6}, {0x6, 0xa}, {0x1, 0x7}, {0x6, 0x2}, {0x4, 0x2}, {0x3, 0x1}, {0x7, 0x6}, {0x0, 0x8}, {0x7, 0x5}, {0x0, 0x3}, {0x1, 0x1}, {0x1, 0x9}, {0x1, 0x6}, {0x1, 0x7}, {0x3, 0x5}]}, @NL80211_TXRATE_LEGACY={0x8, 0x1, [0x4, 0x1b, 0x36, 0xad841423ba59d2fc]}, @NL80211_TXRATE_HT={0x8, 0x2, [{0x7, 0x4}, {0x7, 0xa}, {0x7, 0x3}, {0x6, 0x2}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x34, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x5, 0x18, 0x1b, 0xc, 0x12, 0x3, 0x60, 0x12, 0x30, 0x1, 0x1, 0x1, 0x60, 0x18, 0x16, 0x7e, 0x16]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xff81, 0x0, 0x6, 0x8, 0x17a8, 0x100, 0x1, 0x1]}}, @NL80211_TXRATE_HT={0x4}]}, @NL80211_BAND_60GHZ={0xbc, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x48, 0x2, [{0x0, 0x9}, {0x2, 0x2}, {0x2, 0x3}, {0x7, 0x3}, {0x2, 0xa}, {0x1, 0x8}, {0x4, 0x8}, {0x1, 0x6}, {0x0, 0x6}, {0x2, 0x8}, {0x1, 0x9}, {0x3, 0x8}, {0x7, 0x5}, {0x0, 0x8}, {0x7, 0x8}, {0x7, 0x1}, {0x6, 0x9}, {0x0, 0x5}, {0x6, 0x4}, {0x4, 0x9}, {0x4, 0x1}, {0x7, 0x7}, {0x3, 0xa}, {0x6}, {0x3, 0x4}, {0x3, 0x6}, {0x6, 0x3}, {0x1, 0x6}, {0x4, 0x4}, {0x2, 0x6}, {0x2, 0x6}, {0x1, 0x5}, {0x6, 0x3}, {0x3, 0x6}, {0x6, 0x8}, {0x7, 0x4}, {0x0, 0x7}, {0x4, 0x6}, {}, {0x2, 0x6}, {0x6, 0x8}, {0x3, 0x9}, {0x6, 0x4}, {0x7}, {0x3, 0x8}, {0x6, 0x2}, {0x7, 0x7}, {0x4}, {0x1, 0x7}, {0x3, 0x9}, {0x1}, {0x2, 0x1}, {0x1, 0x2}, {0x7}, {0x2, 0x4}, {0x5, 0x3}, {0x1, 0x3}, {0x5, 0xa}, {0x5, 0x1}, {0x7, 0x2}, {0x0, 0x7}, {0x7}, {0x1, 0x9}, {0x6, 0x7}, {0x1, 0x4}, {0x0, 0x9}, {0x0, 0x2}, {0x6, 0x9}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x98, 0x0, 0x8c6, 0x3, 0x8, 0x6, 0xeb7]}}, @NL80211_TXRATE_HT={0x3a, 0x2, [{0x3, 0x3}, {0x3, 0x5}, {0x3, 0x6}, {0x2, 0x4}, {0x2, 0x3}, {0x2, 0x1}, {0x0, 0x6}, {0x0, 0xa}, {0x6, 0x8}, {0x5, 0x6}, {0x3, 0xa}, {}, {0x5, 0x3}, {0x0, 0x1}, {0x5, 0xa}, {0x5, 0x1}, {0x4, 0x3}, {0x0, 0x1}, {0x0, 0x8}, {0x6, 0x8}, {0x1, 0x7}, {0x6, 0x2}, {0x6, 0x3}, {}, {0x4}, {0x1, 0x2}, {0x4, 0x2}, {0x1}, {0x3, 0x8}, {0x7, 0x8}, {0x7, 0x2}, {0x4, 0x8}, {0x3, 0x7}, {0x6, 0x6}, {0x0, 0x2}, {0x0, 0x5}, {0x4, 0x6}, {0x1, 0x5}, {0x3, 0x6}, {}, {0x5, 0x6}, {0x2, 0x8}, {0x7, 0x3}, {0x1}, {0x5, 0x6}, {0x1}, {0x4, 0x4}, {0x1, 0x1}, {0x0, 0x7}, {0x5, 0x9}, {0x6, 0xa}, {0x0, 0xa}, {0x6, 0x3}, {0x6, 0xa}]}, @NL80211_TXRATE_LEGACY={0x17, 0x1, [0x4, 0x24, 0x18, 0x3, 0x9, 0xb, 0x0, 0x28, 0x6, 0x1b, 0x5, 0x48, 0x30, 0x36, 0x18, 0x16, 0x1, 0x13, 0x6c]}]}]}, @NL80211_ATTR_TX_RATES={0x26c, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x54, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x800, 0x1a, 0x3, 0x6e48, 0x5, 0xcb4, 0x4, 0x9]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x81, 0x8001, 0x1, 0x0, 0xee, 0x5, 0x6]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x81, 0x2, 0x8, 0x9, 0x80, 0xfff, 0x3460, 0x200]}}, @NL80211_TXRATE_HT={0x14, 0x2, [{0x0, 0x4}, {0x7, 0x2}, {0x2, 0x1}, {0x0, 0x2}, {0x1}, {0x6, 0xa}, {0x0, 0x5}, {0x5, 0x2}, {0x6, 0x9}, {0x7, 0x9}, {0x6, 0xa}, {0x4, 0xa}, {0x3, 0x5}, {0x1}, {0x4, 0x2}, {0x1, 0x5}]}]}, @NL80211_BAND_60GHZ={0x12c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x12, 0x1, [0x42, 0x1, 0x6, 0x48, 0xb, 0x5, 0x1, 0x4, 0x18, 0x36, 0x6, 0xb, 0x48, 0x18]}, @NL80211_TXRATE_HT={0x1a, 0x2, [{0x4, 0x4}, {0x2, 0x4}, {0x4, 0x1}, {0x0, 0x4}, {0x2, 0x2}, {0x1, 0x6}, {0x1}, {0x2, 0x5}, {0x7, 0x1}, {0x3}, {0x0, 0x7}, {0x3, 0x1}, {0x3, 0x4}, {0x4, 0x3}, {0x1, 0x9}, {0x6, 0x3}, {0x1, 0x5}, {0x4, 0x5}, {0x1, 0x8}, {0x4, 0x7}, {0x1, 0x4}, {0x2, 0x8}]}, @NL80211_TXRATE_HT={0x41, 0x2, [{0x5}, {0x7, 0x6}, {0x2, 0x8}, {0x1, 0x8}, {0x4, 0x7}, {0x1, 0x6}, {0x1, 0x1}, {0x6, 0x9}, {0x3}, {0x1, 0x2}, {0x7, 0x5}, {0x1, 0x2}, {0x5, 0x2}, {0x1, 0x2}, {0x1, 0x6}, {0x1, 0x6}, {0x1, 0x3}, {0x5, 0x6}, {0x5, 0x2}, {0x1, 0x8}, {0x2, 0x1}, {0x1}, {0x5}, {0x3, 0x5}, {0x0, 0xa}, {0x2, 0x2}, {0x1, 0x1}, {0x2, 0x1}, {0x5, 0x6}, {0x2, 0x8}, {0x7, 0x9}, {0x2}, {0x0, 0x9}, {0x2, 0x9}, {0x1, 0x3}, {0x5, 0x2}, {0x6, 0xa}, {0x4, 0x2}, {0x6, 0x3}, {0x5, 0x3}, {0x1, 0x7}, {0x0, 0x8}, {0x3, 0x5}, {0x6, 0x3}, {}, {0x2, 0x5}, {0x2, 0x1}, {0x7, 0x8}, {0x0, 0x6}, {0x4, 0x5}, {0x0, 0x2}, {0x6, 0x8}, {0x7, 0x6}, {0x1, 0x8}, {0x6, 0x4}, {0x2, 0x5}, {0x4, 0x6}, {0x2, 0x2}, {0x1}, {0x7, 0x4}, {0x5, 0x2}]}, @NL80211_TXRATE_HT={0x4e, 0x2, [{0x1, 0x3}, {0x0, 0xa}, {0x0, 0xa}, {0x3, 0x4}, {0x7, 0x8}, {0x2, 0x5}, {0x3, 0x7}, {0x7}, {0x4, 0x7}, {0x0, 0x3}, {0x0, 0x4}, {0x7, 0x1}, {0x4, 0x3}, {0x4, 0x6}, {0x4, 0x1}, {0x7, 0x7}, {0x2, 0xa}, {0x2, 0x6}, {0x3, 0x7}, {0x1, 0xa}, {0x0, 0x2}, {0x4, 0x8}, {0x5, 0x2}, {0x0, 0x6}, {}, {0x1, 0x9}, {0x6, 0x4}, {0x5, 0x8}, {0x4, 0x7}, {0x6, 0x7}, {0x2, 0x3}, {0x2, 0x8}, {0x7, 0x2}, {0x6, 0x6}, {0x4, 0x8}, {}, {0x1, 0x2}, {0x0, 0x9}, {0x5}, {0x0, 0xa}, {0x6, 0xa}, {0x3, 0x6}, {0x4, 0x6}, {0x4, 0x6}, {0x6, 0xa}, {0x4, 0x7}, {0x2, 0xa}, {0x1, 0x7}, {0x6, 0x3}, {0x3, 0x1}, {0x2, 0x8}, {0x4, 0x2}, {0x4}, {0x0, 0x4}, {0x1, 0x7}, {0x2, 0x1}, {0x7, 0x3}, {0x3, 0x4}, {0x4, 0x5}, {0x4, 0x1}, {0x6, 0xa}, {0x3, 0x6}, {0x7, 0xa}, {0x0, 0x9}, {0x5, 0xe}, {0x5, 0x1}, {0x6, 0x9}, {0x6}, {0x7, 0x8}, {0x0, 0x9}, {0x0, 0x7}, {0x7, 0x3}, {0x2, 0x1}, {0x4, 0x4}]}, @NL80211_TXRATE_HT={0x2c, 0x2, [{0x4, 0xa}, {0x0, 0x9}, {0x6, 0x8}, {0x0, 0x4}, {0x3, 0x8}, {0x1, 0x5}, {0x3, 0x9}, {0x4, 0x1}, {0x1, 0x2}, {0x0, 0x1}, {0x1, 0x5}, {0x2, 0x7}, {0x7, 0x6}, {0x0, 0x5}, {0x0, 0x8}, {0x4, 0x1}, {0x0, 0xa}, {0x6, 0xa}, {0x5, 0x2}, {0x0, 0xa}, {0x0, 0x9}, {0x0, 0x7}, {0x4, 0xa}, {0x6, 0x5}, {0x5}, {0x3, 0x5}, {0x7, 0xa}, {0x2}, {0x7, 0x3}, {0x4, 0x1}, {0x5, 0x1}, {0x6, 0x9}, {0x5, 0x8}, {0x4, 0x8}, {0x5, 0x1}, {0x7, 0x8}, {0x6, 0x6}, {0x5, 0x6}, {0x0, 0x1}, {0x2, 0x2}]}, @NL80211_TXRATE_LEGACY={0xe, 0x1, [0x30, 0xb, 0x60, 0x36, 0x3, 0x4, 0x18, 0x3, 0x12, 0x36]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x15, 0x1, [0x4, 0x12, 0x24, 0x6, 0x2, 0x4, 0x6c, 0x6, 0x5, 0x60, 0x5, 0x48, 0xc, 0x6c, 0x1, 0x48a57b91f7b9fb52, 0x1]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_2GHZ={0xc8, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x36, 0x2, [{0x2}, {0x6, 0xa}, {0x0, 0x7}, {0x1, 0x9}, {0x5, 0xa}, {0x4, 0x6}, {0x7, 0x9}, {0x4}, {0x3, 0x5}, {0x5, 0x9}, {0x7}, {0x0, 0x2}, {0x1, 0xa}, {0x0, 0x2}, {0x4, 0xa}, {0x6, 0x7}, {0x4}, {0x2, 0x7}, {0x1}, {0x1, 0x7}, {0x2, 0x6}, {0x3, 0x1}, {0x6}, {0x7, 0x3}, {0x0, 0x3}, {0x3, 0x6}, {0x0, 0x3}, {0x0, 0x9}, {0x0, 0x1}, {0x6, 0x7}, {0x0, 0x9}, {0x7, 0x9}, {0x2}, {0x5, 0x8}, {0x0, 0x3}, {0x6}, {0x4, 0xa}, {0x4, 0x3}, {0x0, 0x2}, {0x2, 0x5}, {0x6, 0x5}, {0x6, 0x2}, {0x0, 0x5}, {0x3, 0x3}, {0x4, 0x7}, {0x6, 0x5}, {0x1, 0x8}, {0x5, 0x9}, {0x3, 0x2}, {0x3}]}, @NL80211_TXRATE_HT={0x23, 0x2, [{0x1, 0x9}, {0x5, 0x2}, {0x4, 0x6}, {0x6, 0x1}, {0x1, 0x9}, {0x5, 0x9}, {0x0, 0x9}, {0x7, 0x6}, {0x5, 0x9}, {0x3, 0x9}, {0x7, 0x1}, {0x1, 0x3}, {0x6}, {0x0, 0x4}, {0x7, 0x6}, {0x6, 0x6}, {0x0, 0xa}, {0x0, 0x9}, {0x1, 0xa}, {0x7, 0x6}, {0x0, 0xa}, {0x1, 0x3}, {0x7, 0x4}, {0x5, 0x5}, {0x0, 0x9}, {0x7, 0x2}, {0x0, 0x3}, {}, {0x2, 0x5}, {0x6, 0x5}, {0x1, 0x3}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1f, 0x3, 0x4, 0x6f, 0x0, 0x81, 0x3, 0x4]}}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x36, 0x18, 0x1b, 0x6c, 0x2c, 0x24, 0x2, 0x4, 0x12, 0x3, 0x1b, 0xb, 0x4, 0x9, 0x60, 0x4, 0x36, 0x6c, 0x30, 0x2, 0x1b]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x1, 0x101, 0x3f, 0x8, 0x4, 0x8, 0xffff]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x1b, 0x6c, 0x6c, 0x48, 0x4, 0x1, 0x6, 0x2, 0x6c, 0x2, 0x4, 0x30, 0x18, 0x30, 0x48, 0x12, 0x48, 0x36, 0x2, 0x18, 0x48]}]}, @NL80211_BAND_2GHZ={0x20, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x12, 0x2, [{0x5, 0xa}, {0x4, 0x6}, {0x4, 0x5}, {0x0, 0x9}, {0x5, 0x8}, {0x4, 0x9}, {0x1}, {0x0, 0xa}, {0x2, 0x4}, {0x5}, {0x2, 0x7}, {0x2, 0x6}, {0x0, 0xa}, {0x0, 0x2}]}]}]}, @NL80211_ATTR_TX_RATES={0x78, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x14, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x18, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6f87, 0x8001, 0x8000, 0xb59, 0x28, 0x8, 0x8001, 0xfc8]}}]}, @NL80211_BAND_5GHZ={0x48, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x13, 0x1, [0x6c, 0x36d95b70df53ac12, 0x1, 0x5, 0x30, 0x16, 0x30, 0x1, 0x30, 0x0, 0xc, 0x1b, 0x30, 0x6c, 0x60]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x1000, 0x7eee, 0x8, 0x9, 0x1f, 0x8, 0x5]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9a1f, 0x7, 0x7, 0x9, 0x4, 0x3, 0x90, 0x1ff]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}]}, @NL80211_ATTR_TX_RATES={0x480, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0xf, 0x2, [{0x0, 0x3}, {0x0, 0x8}, {0x3, 0x3}, {}, {0x5, 0x3}, {0x1, 0x4}, {0x1, 0x6}, {0x1, 0xa}, {0x0, 0x6}, {0x3, 0x6}, {0x4, 0x8}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x800, 0x100, 0x4, 0x80, 0x7fff, 0xd9, 0xf0]}}]}, @NL80211_BAND_5GHZ={0x104, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x23, 0x1, [0x12, 0x9, 0x16, 0x3, 0x2, 0x36, 0x14, 0x2, 0xb, 0x1b, 0x60, 0x1, 0x60, 0xc, 0xc, 0x12, 0x24, 0x60, 0xc, 0x16, 0xc, 0x6, 0x16, 0x6c, 0xc, 0x2, 0x6, 0x1, 0x22, 0x60, 0x30]}, @NL80211_TXRATE_LEGACY={0x12, 0x1, [0x1b, 0x6c, 0x1b, 0x19, 0x48, 0x48, 0xc, 0x12, 0x2, 0x30, 0x30, 0x24, 0x5, 0x5]}, @NL80211_TXRATE_HT={0x22, 0x2, [{0x2, 0x6}, {0x7, 0x1}, {0x0, 0x4}, {0x5, 0x7}, {0x1, 0x2}, {0x5, 0x3}, {0x1, 0x9}, {0x4, 0x2}, {0x2, 0x3}, {0x1, 0xa}, {0x2, 0x9}, {0x7, 0x6}, {0x2, 0x5}, {0x5}, {0x3, 0x3}, {0x2}, {0x0, 0x2}, {0x3, 0x8}, {0x2, 0x3}, {0x3, 0x9}, {0x3, 0xa}, {0x0, 0x5}, {0x6, 0x4}, {0x6, 0x8}, {0x7, 0x3}, {0x7, 0x3}, {0x2, 0x7}, {0x4, 0x1}, {0x2, 0x2}, {0x7, 0x2}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xbb2d, 0x0, 0x76, 0xfffc, 0x1, 0x401, 0x7, 0x1]}}, @NL80211_TXRATE_LEGACY={0x1a, 0x1, [0x30, 0x30, 0x16, 0x12, 0x12, 0x2, 0x18, 0x6c, 0x4, 0x4, 0x1b, 0x12, 0x3d, 0x18, 0x1b, 0x6c, 0x36, 0x2, 0xb, 0x30, 0x1b, 0x60]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x3, 0x7, 0x80, 0x6, 0x0, 0x7, 0x1e]}}, @NL80211_TXRATE_HT={0x42, 0x2, [{0x5, 0x8}, {0x2, 0x2}, {0x0, 0x2}, {0x3, 0x2}, {0x4, 0xa}, {0x2}, {0x5, 0x3}, {0x5, 0x2}, {0x4, 0x1}, {0x3, 0x7}, {0x7, 0x1}, {0x7, 0x3}, {0x5, 0x9}, {0x6, 0x6}, {0x1, 0x9}, {0x3, 0x5}, {0x3, 0x5}, {0x4, 0x8}, {0x6, 0x7}, {0x1, 0x1}, {0x1, 0x3}, {0x0, 0x9}, {0x5}, {0x2, 0x6}, {0x6, 0x4}, {0x4, 0x8}, {0x6, 0xa}, {0x7}, {0x7, 0x4}, {0x4}, {0x4}, {0x6, 0x2}, {0x7}, {0x1, 0x9}, {0x1, 0x7}, {0x5, 0x1}, {0x1, 0xa}, {0x5, 0x1}, {0x4, 0x5}, {0x1, 0x3}, {0x1, 0x7}, {0x0, 0x3}, {0x4, 0x8}, {0x1, 0x7}, {0x2, 0x4}, {0x5}, {0x6, 0x9}, {0x1, 0x6}, {0x6, 0x3}, {0x0, 0x3}, {0x7, 0xa}, {0x0, 0x5}, {0x2, 0x6}, {0x6, 0x6}, {0x2, 0x5}, {0x0, 0x3}, {0x0, 0x7}, {0x4, 0xa}, {0x3, 0x2}, {0x5, 0x9}, {0x5, 0x1}, {0x5, 0x9}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x6, 0x6, 0x40, 0xfff, 0x8, 0x3d, 0x200]}}]}, @NL80211_BAND_5GHZ={0x168, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x81, 0x6, 0x200, 0x2, 0x7d5f, 0x3f, 0x11, 0x2]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x0, 0x1, 0x40, 0xb574, 0x1000, 0x101, 0x8]}}, @NL80211_TXRATE_HT={0x30, 0x2, [{0x4, 0x7}, {0x6, 0x6}, {0x7, 0x6}, {0x0, 0x7}, {0x7, 0x3}, {0x2, 0xa}, {0x5, 0x4}, {0x7, 0x4}, {0x7, 0x2}, {0x1}, {0x6, 0x6}, {0x6, 0x3}, {0x4, 0x4}, {0x3, 0x6}, {0x1, 0x9}, {0x1, 0xa}, {0x3, 0x8}, {0x0, 0x6}, {0x6, 0x6}, {0x0, 0x2}, {0x3, 0x6}, {0x1, 0x2}, {0x1, 0xa}, {0x0, 0x3}, {0x2, 0x6}, {0x5, 0x6}, {0x5, 0xa}, {0x0, 0x2}, {0x6, 0x7}, {0x5, 0x1}, {0x2, 0x5}, {0x1, 0x5}, {0x5, 0x9}, {0x0, 0x1}, {0x5, 0x4}, {0x3, 0xb}, {0x6, 0x7}, {0x2, 0x4}, {0x6, 0x5}, {0x1, 0x2}, {0x6, 0x5}, {0x1, 0x9}, {0x7, 0x7}, {0x1, 0x2}]}, @NL80211_TXRATE_HT={0x42, 0x2, [{0x7, 0x6}, {0x1, 0x1}, {0x5, 0x7}, {0x4, 0x9}, {0x6, 0x5}, {0x1, 0xa}, {0x3, 0x4}, {0x7, 0x6}, {0x7, 0x7}, {0x3, 0x5}, {0x0, 0x2}, {0x3, 0x8}, {0x3, 0x2}, {0x6, 0x3}, {0x5, 0x1}, {0x2, 0x4}, {0x6, 0x7}, {0x6, 0x7}, {0x6, 0x8}, {0x4, 0x3}, {0x7, 0x2}, {0x7, 0x1}, {0x5, 0x6}, {0x0, 0x6}, {0x1, 0x2}, {0x2, 0x4}, {0x3, 0x6}, {0x4, 0xa}, {0x4, 0x7}, {0x3, 0x7}, {0x1, 0x2}, {0x0, 0x3}, {0x7, 0x3}, {0x5, 0x3}, {0x5, 0x6}, {0x3, 0x2}, {0x0, 0x7}, {0x1, 0xa}, {0x3, 0x2}, {0x2, 0x7}, {0x5, 0x7}, {0x2, 0x5}, {0x3, 0x1}, {0x4, 0x5}, {0x3, 0x1}, {0x3, 0x1}, {0x5, 0x7}, {0x4, 0x1}, {0x0, 0x3}, {0x0, 0x4}, {0x0, 0x7}, {0x5, 0x7}, {0x2, 0x4}, {0x1, 0x1}, {0x1, 0x3}, {0x4, 0x8}, {0x1, 0x1}, {0x0, 0x6}, {0x2, 0x1}, {0x0, 0x9}, {0x6, 0x1}, {0x2, 0x5}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9218, 0x1, 0x1, 0xffff, 0x0, 0x9, 0x9, 0x7]}}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x12, 0x12, 0x16, 0x24, 0x12, 0x5, 0x16, 0x24, 0x1, 0x60, 0x1, 0x9, 0x48, 0x12, 0x12, 0x3, 0xd, 0x12, 0x3c, 0x4, 0x48, 0x4, 0x1b, 0x16]}, @NL80211_TXRATE_LEGACY={0x10, 0x1, [0x12, 0x9, 0x5, 0x12, 0x5, 0x4, 0x5, 0x16, 0x1, 0x12, 0x1, 0x24]}, @NL80211_TXRATE_HT={0x35, 0x2, [{0x2, 0xa}, {0x3, 0x8}, {0x4, 0x5}, {0x2, 0x3}, {0x4, 0x1}, {0x2, 0x3}, {0x4, 0x2}, {0x3, 0x2}, {0x3}, {0x5}, {0x0, 0x5}, {0x5, 0x7}, {0x0, 0xa}, {0x6, 0x7}, {0x0, 0x7}, {0x2, 0x9}, {0x7, 0x1}, {0x3}, {0x7, 0x7}, {0x1}, {0x7, 0x2}, {0x0, 0x7}, {0x0, 0x5}, {0x5, 0x5}, {0x0, 0x3}, {0x2, 0x9}, {0x6, 0x7}, {0x5, 0x7}, {0x1, 0x1}, {0x3, 0x3}, {0x3, 0x1}, {0x0, 0x3}, {}, {}, {0x6, 0x2}, {0x7, 0x5}, {0x0, 0xa}, {0x3, 0x8}, {0x3, 0x1}, {0x3, 0x3}, {0x0, 0x3}, {0x2, 0x3}, {0x1, 0x3}, {0x4, 0x5}, {0x6, 0x5}, {0x1, 0xa}, {0x0, 0x8}, {0x0, 0x7}, {0x6, 0x5}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x47, 0x2, [{0x4, 0x4}, {0x2, 0x2}, {0x0, 0x6}, {0x2, 0x8}, {0x4, 0x3}, {0x0, 0x4}, {0x0, 0x3}, {0x0, 0x4}, {0x1, 0x3}, {0x6, 0x4}, {}, {}, {0x7, 0x1}, {0x0, 0x5}, {0x4}, {0x4, 0x3}, {0x7}, {0x4, 0x8}, {0x3, 0x5}, {0x4, 0x5}, {0x0, 0x9}, {0x7, 0x9}, {0x1, 0x3}, {0x3, 0x6}, {0x5, 0x6}, {0x0, 0x3}, {0x5, 0x2}, {0x4, 0x4}, {0x4, 0x4}, {0x0, 0x5}, {0x4, 0x8}, {0x5, 0x1}, {0x3}, {0x7, 0x6}, {0x5, 0x4}, {0x1, 0x4}, {0x1, 0x3}, {0x3}, {0x5, 0x1}, {0x5}, {0x5, 0x3}, {0x0, 0x1}, {}, {0x5, 0xf}, {0x0, 0x2}, {0x1, 0x5}, {0x7, 0x9}, {0x6}, {0x0, 0x8}, {0x0, 0x9}, {0x1, 0x7}, {0x0, 0x8}, {0x3, 0x7}, {0x7, 0x9}, {}, {0x2, 0x6}, {0x0, 0x4}, {0x1, 0x2}, {0x6}, {0x4, 0x7}, {0x4, 0x3}, {0x7, 0x2}, {0x5, 0x6}, {0x2, 0x4}, {0x4, 0x1}, {0x1, 0xa}, {0x5, 0x5}]}]}, @NL80211_BAND_5GHZ={0xec, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x10, 0x1, [0x3, 0x5, 0xc, 0x60, 0x9, 0x36, 0x60, 0x18, 0x3, 0x2, 0x2, 0x60]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xf56e, 0x3f, 0x5c6, 0x9, 0x7, 0x9, 0x2, 0x151]}}, @NL80211_TXRATE_HT={0x3e, 0x2, [{0x1, 0x9}, {0x0, 0x1}, {0x6, 0x7}, {0x3, 0x6}, {0x7, 0x7}, {0x6, 0xa}, {0x3, 0x6}, {0x4, 0x7}, {0x2, 0x9}, {0x1, 0x4}, {0x6, 0xa}, {0x0, 0x3}, {}, {0x3, 0x6}, {0x6, 0x3}, {0x2, 0xa}, {0x7, 0x9}, {0x2, 0x4}, {0x4, 0x4}, {0x0, 0xa}, {0x0, 0x5}, {0x2, 0x2}, {0x7, 0x6}, {0x1, 0x8}, {0x5, 0x9}, {0x4, 0x4}, {0x0, 0xa}, {0x5, 0x1}, {0x6, 0xa}, {0x1, 0x7}, {0x0, 0x6}, {0x7, 0x7}, {0x5, 0x4}, {0x5, 0x1}, {0x3, 0x9}, {0x3}, {0x1, 0x4}, {0x0, 0x5}, {0x6, 0x4}, {0x3}, {0x0, 0x1}, {0x2, 0x2}, {0x1, 0x9}, {0x0, 0x3}, {0x4}, {0x1, 0x5}, {0x2, 0x2}, {0x5, 0x6}, {0x4, 0x2}, {0x3, 0x4}, {0x1, 0x9}, {0x2, 0x6}, {0x1, 0x5}, {0x6, 0x5}, {0x3, 0x8}, {0x6, 0x7}, {0x6, 0x3}, {0x7, 0x5}]}, @NL80211_TXRATE_LEGACY={0xf, 0x1, [0xc, 0x18, 0x5, 0x3f, 0x60, 0x16, 0x30, 0x36, 0x48, 0x24, 0x3]}, @NL80211_TXRATE_HT={0x23, 0x2, [{0x7, 0x3}, {0x2, 0x4}, {0x7, 0xa}, {0x7, 0x9}, {0x3, 0x6}, {0x1, 0x7}, {0x6, 0x7}, {0x6, 0x3}, {0x7, 0x8}, {0x5, 0x8}, {0x1, 0x2}, {0x1, 0x7}, {0x3}, {0x2, 0x3}, {0x0, 0x8}, {0x4, 0x6}, {0x1, 0x6}, {0x2, 0x5}, {0x7, 0x5}, {0x3, 0x3}, {0x4, 0x1}, {0x2, 0x1}, {0x2, 0x4}, {0x5, 0x9}, {0x3, 0x2}, {0x2, 0x9}, {0x1, 0x4}, {0x2, 0x3}, {0x0, 0x6}, {0x7, 0x1}, {}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3bad, 0x9490, 0x800, 0x10, 0x1, 0x8, 0x5d, 0x2]}}, @NL80211_TXRATE_HT={0x34, 0x2, [{0x7, 0x7}, {0x1, 0x8}, {0x5, 0x8}, {}, {}, {0x4, 0x2}, {0x3, 0x6}, {0x1, 0x1}, {0x0, 0x5}, {0x1, 0x3}, {0x0, 0x5}, {0x1, 0x4}, {0x5, 0xa}, {0x3, 0x6}, {0x6}, {0x2, 0x8}, {0x7, 0x4}, {0x4, 0x5}, {0x6}, {0x1, 0x2}, {0x5, 0x1}, {0x7, 0x7}, {0x5, 0x2}, {0x4, 0x3}, {0x0, 0x8}, {0x2, 0x7}, {0x5}, {0x4, 0x7}, {0x1, 0x7}, {0x6, 0x6}, {0x5, 0xa}, {}, {0x7, 0x2}, {0x6, 0x3}, {0x5, 0x3}, {0x4, 0x3}, {0x0, 0x9}, {0x1, 0x3}, {0x1, 0x6}, {0x0, 0x6}, {0x1, 0xa}, {0x1}, {0x1, 0x3}, {0x6, 0xa}, {0x6, 0x3}, {0x4, 0x3}, {0x2, 0x6}, {0x2, 0x1}]}]}, @NL80211_BAND_2GHZ={0x54, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x6, 0x2, [{0x2, 0x5}, {0x7}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x1, 0xfffa, 0x8, 0x0, 0x4, 0x7, 0x3]}}, @NL80211_TXRATE_HT={0x21, 0x2, [{0x0, 0x3}, {}, {0x0, 0x1}, {0x1, 0xa}, {0x7, 0x6}, {0x7, 0x1}, {0x1, 0x7}, {0x3, 0x2}, {0x1, 0x2}, {0x7, 0xa}, {0x5}, {0x0, 0x8}, {0x2, 0x3}, {0x2, 0x1}, {0x5, 0x4}, {0x1, 0x9}, {0x6}, {0x7, 0x8}, {0x7, 0x3}, {0x5, 0x3}, {0x4, 0x8}, {0x1, 0x5}, {0x6, 0x6}, {0x5, 0x3}, {0x5, 0x8}, {0x2, 0x2}, {0x0, 0x5}, {0x1}, {0x5}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x80, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x36, 0x2, [{0x0, 0x1}, {0x5, 0x4}, {0x1, 0xa}, {0x6, 0x2}, {0x3, 0x8}, {0x2, 0x1}, {0x4, 0x1}, {0x3}, {0x7}, {0x0, 0x1}, {0x7, 0x5}, {0x1, 0x8}, {0x5, 0x7}, {0x7, 0x9}, {0x7, 0x6}, {0x5}, {0x0, 0x1}, {0x4, 0x2}, {0x4, 0x1}, {0x0, 0x3}, {0x6, 0x6}, {0x2, 0x6}, {0x2, 0x9}, {0x0, 0x2}, {0x7}, {0x1, 0xa}, {0x1, 0x1}, {0x5, 0x9}, {0x3, 0x8}, {}, {0x6, 0x7}, {0x2}, {0x1, 0x3}, {0x5, 0x5}, {0x5}, {0x3, 0x5}, {0x4, 0x6}, {0x3, 0x6}, {0x2, 0x8}, {}, {0x1, 0x7}, {0x3, 0x4}, {0x1, 0x7}, {0x2, 0x5}, {0x0, 0x4}, {0x5, 0x5}, {0x3, 0x5}, {0x4, 0x2}, {0x4, 0x9}, {0x2, 0x3}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x7, 0xaa, 0x8, 0x10d, 0xfffa, 0x101, 0xeee8]}}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x48, 0x63, 0x30, 0x5, 0x30, 0x3, 0x60, 0x6, 0x1b, 0x60, 0x60, 0x18, 0x36, 0x6, 0x60, 0x1b, 0x12, 0x24, 0xfcac94549c3ac215, 0x6c, 0x30, 0x8, 0x1, 0xb, 0x60]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x18, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x100, 0xffff, 0x2, 0x100, 0xa2, 0x5, 0x9cac, 0x1]}}]}]}]}, 0xa58}, 0x1, 0x0, 0x0, 0x10}, 0x40011) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x121200, 0x140}, 0x18) r5 = syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000001340), 0xc, &(0x7f00000013c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c00000003c92d6814b25f2dd67cd6718a560682efaca522203ec0f81fbdf5d36b7ff0c52037e416ac400bd522", @ANYRES16=r5, @ANYBLOB="010025bd7000fddbdf2508000000050038000100000008000b00030000000500290001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4051}, 0x4824) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r4, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x822904}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x64, r5, 0x9, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xe0}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xffffffff}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4b3b}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x10001}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3ff}]}, 0x64}, 0x1, 0x0, 0x0, 0x41}, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x323) ioctl$TUNSETQUEUE(r3, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r6 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r6, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) 02:40:03 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x0, 0x26) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f00000000c0)=0x1) io_uring_setup(0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x1258, 0x31, 0x1, 0x70bd2b, 0x25dfdbff, {0x8}, [@typed={0x14, 0x3f, 0x0, 0x0, @ipv6=@private0}, @typed={0xc, 0x14, 0x0, 0x0, @u64=0x1}, @nested={0x101, 0x1f, 0x0, 0x1, [@generic="0460", @generic="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"]}, @generic="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", @nested={0x81, 0x0, 0x0, 0x1, [@generic="5c6860039c39376c35e9fea3026fdfb5633cb3288f909b126e3b76c95727e29dec9870788eca4d2dd2c2e3c45e113016ec2d48fb5adbec63465e300509501a30937095c87e7cac492e09d7ee6bc3aded9966e9985a42b2e59fca181cc12ae4e8331ff8ff2a20844ef065c03900"/125]}, @generic="af1352ccb1235974ae5e0ee746ca939404360e10dcd8f20128bc6a9ee3084597d67c16d946282077af8a0c0c00afff6319373f7598b24655247d7d7ed787ff08694e5db491350f629ef6b125fe9ee95f4fbdc2f352a055f59e46992ae6bedc69a50bb151716e11b00caa68896492aec57f7e7772c2c1cde410229814864a8d3a9afc05137bd8eb43570c127e5aa83d0cbbbf53ece93c45524b6e"]}, 0x1258}, 0x1, 0x0, 0x0, 0x80}, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000001680)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000380000000040000000000000000020000000000000000000000000000000000000000000000000e37f25306da938090422422400"/100], 0x58) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x4e24, @broadcast}, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000280)={'syzkaller0\x00', {0x2, 0x0, @dev}}) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x1, @local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000100)={'ip6gre0\x00', {0x2, 0x0, @private}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000001700)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0500ffffffff000000000200000008000300", @ANYRES32, @ANYBLOB="080026006c09000008002700040000006c083a18035f7bef2a1ee07d36b3abf5be6f0ec1723bfde7da10d4320a2c22e90bc13ed48ada3bab0e415a120addf99896472ebc3495cc81457dcce7648dcc9c584cd8062aca4d11c0771b9b61e593cad10198bbea"], 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) 02:40:03 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7}]) 02:40:03 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:03 executing program 4: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="04a0a48a1b173daa1c80acff1ca7eead3048bc4a0e81385873d69dbe7a9ac2d9624c0d6c0a6874ebb19b9b4f04932a0182952d87bd99f03177d25c384ed5fa846ce7fc4f08deea9f12ac515393a3aa33a5b4ec24430138afdc59471b4fdb23434b242d055b31ae8709bc2b44a26a347a8a5d371efb7204b2ae54346e0eeab8801619c3fbe1e95878f84a32f2531bc65cc61a5cfbd68ecef59bcb1fccf56ca209ee5b6465aa3f9db40b49f9953d3a25f4711f0766056e4922a6dc83aa416e9aeed0d14016da943c4564410d5b2aaa1299005dfd00d488a918"], 0x14}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x320) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r3, &(0x7f0000000240)="01", 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)=ANY=[@ANYBLOB='trans=fd\a\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',\x00']) write$binfmt_elf32(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$sock_inet_SIOCSARP(r4, 0x8955, &(0x7f0000000340)={{0x2, 0x4e21, @local}, {0x6, @local}, 0x10, {0x2, 0x4e24, @loopback}, 'batadv0\x00'}) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @rand_addr=0x64010102}, {0x182, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x30, {0x2, 0x4e1e, @broadcast}, 'syzkaller0\x00'}) 02:40:03 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8918, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000ff00000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2570.961297] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2570.964854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:40:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000300000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2570.988854] FAULT_INJECTION: forcing a failure. [ 2570.988854] name failslab, interval 1, probability 0, space 0, times 0 [ 2570.990362] CPU: 1 PID: 13755 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2570.991280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2570.992355] Call Trace: [ 2570.992520] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2570.992700] dump_stack+0x107/0x167 [ 2570.992718] should_fail.cold+0x5/0xa [ 2570.992741] ? create_object.isra.0+0x3a/0xa20 [ 2570.995992] should_failslab+0x5/0x20 [ 2570.996484] kmem_cache_alloc+0x5b/0x310 [ 2570.997010] create_object.isra.0+0x3a/0xa20 [ 2570.997565] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2570.998114] kmem_cache_alloc+0x159/0x310 [ 2570.998583] anon_vma_fork+0x1ff/0x640 [ 2570.998999] copy_process+0x7218/0x7800 [ 2570.999452] ? __cleanup_sighand+0xb0/0xb0 [ 2570.999925] ? find_held_lock+0x2c/0x110 [ 2571.000368] kernel_clone+0xe7/0x980 [ 2571.000770] ? lock_downgrade+0x6d0/0x6d0 [ 2571.001222] ? find_held_lock+0x2c/0x110 [ 2571.001666] ? create_io_thread+0xf0/0xf0 [ 2571.002126] ? ksys_write+0x12d/0x260 [ 2571.002551] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2571.003117] __do_sys_fork+0x8a/0xc0 [ 2571.003548] ? kernel_thread+0xf0/0xf0 [ 2571.003959] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2571.004541] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2571.005107] ? trace_hardirqs_on+0x5b/0x180 [ 2571.005596] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2571.006178] do_syscall_64+0x33/0x40 [ 2571.006592] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2571.007174] RIP: 0033:0x7fadf412db19 [ 2571.007580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2571.009598] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2571.010461] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2571.011260] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2571.011973] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2571.012753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2571.013480] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2571.020776] 9pnet: Could not find request transport: fd 02:40:04 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2571.060194] 9pnet: Could not find request transport: fd 02:40:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f800400000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:40:04 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007e992af4b49ed6bf6cc4f52c7356c9484237b9c8d81db51921f7e99795b8179e1f60773168a688915ea8126e3dfb51e81abc027165b3b5d4c602b8ea5b70461f0b618d828512f3bd6f85a30ab947ceda68fcd4e73b3b2b85e0140de25b3b5c357b38a3d2be702ebbaa544dc15b46931bb00e1cc110838fb641cbcf86c6ec72d629a6f9f9fb347ede679acdea38f5891f515ed907d2e84369580d2c165a8ce453139d528ad49fde0101b"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x20, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:40:04 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) lseek(r3, 0x9, 0x2) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:04 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8}]) [ 2571.152642] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:40:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000500000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2571.160965] device veth0_vlan entered promiscuous mode 02:40:04 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8925, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2571.254313] device veth0_vlan entered promiscuous mode 02:40:18 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8919, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:18 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x34, r1, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x4008001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r2, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x20, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x100, 0x13}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x48000}, 0x5) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x40010, r0, 0xd19000) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r4, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x161}) r6 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r6, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:40:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000600000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:40:18 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() (fail_nth: 100) 02:40:18 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:18 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x0, {0x2, 0x0, @local}, 'syz_tun\x00'}) 02:40:18 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8934, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:18 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x300}]) [ 2585.373354] audit: type=1326 audit(1693276818.365:169): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13801 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2585.400223] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2585.422301] device veth0_vlan entered promiscuous mode 02:40:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000700000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2585.436056] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 [ 2585.474969] FAULT_INJECTION: forcing a failure. [ 2585.474969] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2585.477445] CPU: 0 PID: 13822 Comm: syz-executor.7 Not tainted 5.10.192 #1 [ 2585.478844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2585.480523] Call Trace: [ 2585.481063] dump_stack+0x107/0x167 [ 2585.481815] should_fail.cold+0x5/0xa [ 2585.482600] __alloc_pages_nodemask+0x182/0x600 [ 2585.483564] ? __lockdep_reset_lock+0x180/0x180 [ 2585.484501] ? __lockdep_reset_lock+0x180/0x180 [ 2585.485445] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 2585.486688] alloc_pages_current+0x187/0x280 [ 2585.487595] pte_alloc_one+0x16/0x1a0 [ 2585.488371] __pte_alloc+0x1d/0x330 [ 2585.489118] copy_page_range+0x1b62/0x3810 [ 2585.490025] ? up_write+0x191/0x550 [ 2585.490763] ? vm_iomap_memory+0x190/0x190 [ 2585.491627] ? downgrade_write+0x3a0/0x3a0 [ 2585.492509] ? anon_vma_interval_tree_insert+0x277/0x450 [ 2585.493610] ? __vma_link_rb+0x540/0x700 [ 2585.494443] copy_process+0x759b/0x7800 [ 2585.495311] ? __cleanup_sighand+0xb0/0xb0 [ 2585.496184] ? find_held_lock+0x2c/0x110 [ 2585.497014] kernel_clone+0xe7/0x980 [ 2585.497764] ? lock_downgrade+0x6d0/0x6d0 [ 2585.498597] ? find_held_lock+0x2c/0x110 [ 2585.499445] ? create_io_thread+0xf0/0xf0 [ 2585.500300] ? ksys_write+0x12d/0x260 [ 2585.501081] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2585.502060] __do_sys_fork+0x8a/0xc0 [ 2585.502813] ? kernel_thread+0xf0/0xf0 [ 2585.503636] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2585.504684] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2585.505720] ? trace_hardirqs_on+0x5b/0x180 [ 2585.506586] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2585.507687] do_syscall_64+0x33/0x40 [ 2585.508536] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2585.509568] RIP: 0033:0x7fadf412db19 02:40:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f001800000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2585.510319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2585.514161] RSP: 002b:00007fadf1682188 EFLAGS: 00000246 ORIG_RAX: 0000000000000039 [ 2585.515704] RAX: ffffffffffffffda RBX: 00007fadf4241020 RCX: 00007fadf412db19 [ 2585.517136] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2585.518570] RBP: 00007fadf16821d0 R08: 0000000000000000 R09: 0000000000000000 [ 2585.520012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2585.521445] R13: 00007ffdcd892aaf R14: 00007fadf1682300 R15: 0000000000022000 [ 2585.545516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=13382 comm=kworker/1:2 02:40:18 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x330}]) 02:40:18 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e21, @remote}, {0x0, @link_local}, 0xc, {0x2, 0x0, @local}, 'team_slave_1\x00'}) 02:40:18 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x40804) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2585.621036] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=13382 comm=kworker/1:2 02:40:18 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8935, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2585.641107] device veth0_vlan entered promiscuous mode [ 2585.647487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:40:18 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f001c00000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:40:33 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() 02:40:33 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0xa002, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) r1 = io_uring_setup(0x7a1b, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000000)=[r1], 0x1) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f00000000c0)) 02:40:33 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2600.136970] audit: type=1326 audit(1693276833.129:170): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13854 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2600.149064] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:40:33 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) pwrite64(r0, &(0x7f00000002c0)="972f2322a4cd3dd161a74cce95e3fcb7d397e47cd709f7b63ac24c4f5f3df5e99a1e0074cf9c999cb6473042e0e5405593fe742d8d8b870529e8a8b6d27683ede7f4acccafc779b155e1078db8", 0x4d, 0x5a89) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'sit0\x00'}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000080)={'ip6gre0\x00'}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:40:33 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x500}]) 02:40:33 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x893a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f002000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:40:33 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x10000, 0x0) copy_file_range(r3, &(0x7f0000000140)=0x40, r4, &(0x7f0000000300)=0x4, 0x7f, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2600.168229] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=10105 comm=kworker/0:0 02:40:33 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) syz_io_uring_setup(0x3e4d, &(0x7f00000000c0)={0x0, 0xc93c, 0x1, 0x1, 0x357}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)) syz_io_uring_submit(r2, 0x0, &(0x7f00000001c0)=@IORING_OP_FILES_UPDATE={0x14, 0x5, 0x0, 0x0, 0x8, &(0x7f0000000180)=[r0], 0x1, 0x0, 0x1}, 0x101) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x20, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:40:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f003f00000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2600.223205] device veth0_vlan entered promiscuous mode 02:40:33 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x9) r2 = syz_open_dev$vcsu(&(0x7f0000000040), 0x80fe, 0x400) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0xdb, 0x6, 0x80, 0x7, 0x0, 0x100000001, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x8001, 0x9}, 0x41, 0x8, 0x9, 0x2, 0x5, 0x8001, 0x0, 0x0, 0x6, 0x0, 0x1f}, 0xffffffffffffffff, 0xd, r2, 0x10) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f00000000c0)) 02:40:33 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x700}]) 02:40:33 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0x80000, 0x3) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:40:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f006700000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2600.405859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=13382 comm=kworker/1:2 02:40:33 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8940, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:33 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2600.429597] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2614.447482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:40:47 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) close_range(r1, 0xffffffffffffffff, 0x0) fork() 02:40:47 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3003}]) 02:40:47 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x102) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000040)={'wlan0\x00'}) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000140)={{0x2, 0x0, @remote}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x0, {0x2, 0x3, @private=0xa010102}, 'syzkaller0\x00'}) 02:40:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f048000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:40:47 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8925, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:47 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8941, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:47 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="0700000000000057d5244fb1d57cae0000"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:47 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000e209ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000040)={'veth0_to_batadv\x00', {0x2, 0x0, @dev}}) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000240)=0x1ff, 0x4) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xc) r4 = signalfd4(r0, &(0x7f0000000400)={[0x1]}, 0x8, 0x800) io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) write$binfmt_elf32(r5, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x9, 0x40, 0x81, 0x20, 0x0, 0x40, 0x8, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000002c0), 0x9}, 0x1200, 0x6, 0x1, 0x2, 0x9, 0x6, 0xeaf2, 0x0, 0x1, 0x0, 0x7}, r3, 0xffffffffffffffff, r5, 0xa) [ 2614.467301] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2614.470648] audit: type=1326 audit(1693276847.455:171): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13919 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:40:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000ffdef00000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2614.499107] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2614.507362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2614.510380] device veth0_vlan left promiscuous mode [ 2614.568954] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2614.605351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:40:47 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x10, @remote}, {0x0, @multicast}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) shutdown(r1, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e24, @remote}, 0x280, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000100)='bond0\x00', 0x3, 0xd2cc, 0x7ff}) setsockopt$inet6_int(r2, 0x29, 0x16, &(0x7f00000000c0)=0x3f, 0x4) 02:40:47 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3f00}]) 02:40:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f00f000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2614.674127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:40:47 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x894c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2614.708766] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2614.733156] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:40:47 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8934, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:47 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="7215358d48adf3eec78fc819f31e85a814"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:40:47 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000b0ffff0000000000000000000740889a54985639c3373183b5ab64c3b06f36dec20e433d266fdd9940df52bc88dbd897382732514e4359e4122862aa55953a7efd544026c7a34e4d80bf2a69a75b7c8084e5b435f104cbc2ba2a970833fd199a31fe45289e4fe78b0dd33cc7b9f8a5d44e6521f3edab0e90c9745ffddfdb08d37ab77fcbb723e5c3c26287982b6c164b9171abcf3fb3c7ba0b661f3efc1ba6bc5f19c67973ff55b219a02f576f248c81316e"], 0x14}}, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='trusted.overlay.upper\x00', &(0x7f00000002c0)=""/209, 0xd1) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2614.864902] device veth0_vlan entered promiscuous mode [ 2615.295318] audit: type=1326 audit(1693276848.287:172): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13919 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2631.458785] audit: type=1326 audit(1693276864.451:173): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13984 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:41:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000feffd00000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:41:04 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfeff3f}]) 02:41:04 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:41:04 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1400000000ffff000000000000b58f8300000007be221326f6d0a7a8f348ff0000003f629b4117863b7e8bcfed49047c20eec0a54c7f5d86e8cfcb722ef5617394dfc743e8d55eff777807dc90687ca13b8c3e7622ada5d466c71cb444e5e6ac4a1cecc6448b"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, r1, 0x3, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000800}, 0x80) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:41:04 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8953, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:04 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8935, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:04 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x38}, [{}]}, 0x58) bind$inet(r3, &(0x7f0000000140)={0x2, 0x4e21, @multicast2}, 0x10) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) r5 = openat$cgroup_netprio_ifpriomap(r2, &(0x7f00000002c0), 0x2, 0x0) r6 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) dup2(r5, r6) 02:41:04 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) poll(&(0x7f0000000180)=[{r0, 0x30}, {}, {0xffffffffffffffff, 0xb400}, {0xffffffffffffffff, 0x8420}, {r1, 0x4044}], 0x5, 0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="747261621a4e4d34d57341c62f2ae6fde7bab61a74e0ebdfa11692e2d862196312ce13d4410597262d84a533911f8d45169399e75521b2eed82fdbfee830fcc11b7ccf48c46af2cfc25309d82074abb7919f3fc7fc75b09b6e00"/103, @ANYRESHEX=r3, @ANYBLOB="38ef123a0bba4f", @ANYRESHEX=r4, @ANYBLOB=',\x00']) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) fchmod(r3, 0x68) creat(&(0x7f0000000140)='./file1\x00', 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) r5 = fork() ptrace$cont(0x1f, r5, 0x5, 0x7ff) 02:41:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000008000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2631.523167] device veth0_vlan entered promiscuous mode 02:41:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000020000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:41:04 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000100), 0x44040, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000005, 0x110, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(0x0, r2, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x7) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r1, 0xf50f, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x1000000, 0x8010, r3, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x39}}, 'syzkaller0\x00'}) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) [ 2631.561118] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2631.579357] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:41:04 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1000000}]) 02:41:04 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) fallocate(0xffffffffffffffff, 0x24e8d9f50a7ace86, 0x7ff, 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0xb0, r2, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e24}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7e}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1433}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x31}]}, 0xb0}, 0x1, 0x0, 0x0, 0xc0}, 0x2004c050) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r3, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r4 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2631.611664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:41:04 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8955, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2631.629869] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:41:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000ffffff0000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2631.673107] device veth0_vlan entered promiscuous mode [ 2631.679745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=13382 comm=kworker/1:2 [ 2631.699976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:41:04 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @broadcast}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:41:04 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x893a, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000ff0ffff000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2631.741077] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2632.295036] audit: type=1326 audit(1693276865.287:174): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=13984 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:41:19 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000140)={'ipvlan0\x00'}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:19 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2000000}]) [ 2646.584168] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:41:19 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB="29d2ec01df8c1502d8f56c9960eb3507182362d2a55b6e567ededa6f429d8c7e9eead25c67875daedccd1f003a89b9ae860f07f88e435adbdabc087bfa733f3dcb2c44792e64c24f8cffcb0eb7a0cb0451cc511267227eba0330638162da3cba5a5298ce01c6508daa20576ed2c0c2d1d92e4c3f73e6c74bf69f64", @ANYRESHEX=r2, @ANYBLOB=',\x00']) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) close_range(r0, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x5, &(0x7f00000000c0)=[{0xff, 0x0, 0x85, 0x80000000}, {0x90, 0x29, 0x1f, 0x6f}, {0x1, 0xd1, 0x3, 0xfffffb44}, {0x6, 0x8, 0x7, 0x8}, {0x1f, 0x1, 0x3, 0x9e7}]}, 0x10) fork() ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000400)={{r0}, 0x0, 0x2, @unused=[0x0, 0x5, 0x34, 0x1], @name="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"}) pwritev2(r0, &(0x7f0000000340)=[{&(0x7f0000000140)="c6b5b732485cbec1734b3e4e08029eb4affc975bdfde4428186eaa6be30c2a8fb1a0761245934f8d8167d04421a55b3935cfa02a4441567002a413dcd6deb029df6fe9756ce1ad790391c455050faa6cb2a60018adc40503f7ef0f808e1a45b05fed464790031d7a558314daaa392dc78d52624a0c6f73950b088aa823ec7f67877666d8ed3e566bab7a5cad68af9bea319c5464b58afde1e6c8009df80247b6736bda677aeefe4bfae99908052e52dd824cf1e127fded6e01a179ea378e94954c3d41c38c214714ee1914b1288058b7b4fbb2e9c69430469e6f17b81b2dfba6", 0xe0}, {&(0x7f0000000240)="0396a0", 0x3}, {&(0x7f0000000280)="8e2c69c02bbd52c75e4eeab23e3c3738fd8d8b862acde1af183dc9096af1e0d66e90a25a89f3c8e73e98d0fdadb062dbcc9d654f569855108b7f2157767e71b1a1abf2560ae53e62e3cc1cdb60e19cc157db120b50d042371d895744b8214250a3bba6beaf40ca8df13dfd4aad6745a030166989972e38", 0x77}, {&(0x7f0000000300)="99ff02e6b78b13ec07887df3748bff656852cd04737f19ee06aa6d8c369fadc60d019e0eb35d077e3b4391b56b2af74bad09632a722db62dc2", 0x39}], 0x4, 0x7, 0x3, 0x1) 02:41:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000010000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:41:19 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5e26f2a700000000"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c46000000000000000000000000001d0000000000000000000038000000000000000000000001002000"/88], 0x58) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f00000002c0)={0x1f4, r3, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x75}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010101}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x81}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1000}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7f}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x22}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x12}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1b}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x4c180}, 0x40) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r4 = socket$inet(0x2, 0xa, 0x0) r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(r5, 0x9) r6 = gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x2, 0x6, 0x66, 0x2, 0x0, 0x4, 0x3, 0xb, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0xfbba, 0x1}, 0x2, 0x8, 0x80000001, 0x2, 0x8001, 0x8, 0x6, 0x0, 0x4b, 0x0, 0x6}, r6, 0xe, r5, 0x1) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000540), &(0x7f0000000580)=0x4) 02:41:19 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8940, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:19 executing program 5: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @initdev}, &(0x7f0000000180)=0x10) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000001c0)='macvlan1\x00') ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000240)={0x3, 0x2000}, 0x4) r2 = socket$nl_route(0x10, 0x3, 0x0) pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff}, 0x4800) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000002c0)={'batadv_slave_1\x00', {0x2, 0x0, @multicast1}}) ioctl$BTRFS_IOC_BALANCE(r3, 0x5000940c, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000001000000000000000000000000000000002000"/88], 0x58) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000200)=ANY=[@ANYBLOB="0100001a0100080018000000", @ANYRES32=r0, @ANYBLOB="00dd52d29683b0efdf2766696c653000"]) io_uring_setup(0x0, 0x0) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) fsetxattr$security_ima(r6, &(0x7f0000000000), &(0x7f00000000c0)=@ng={0x4, 0x3, "7acac474c04d08a666bd08f4706715a170a556"}, 0x15, 0x0) 02:41:19 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8980, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2646.614259] audit: type=1326 audit(1693276879.606:175): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14049 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2646.623864] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2646.630996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2646.637055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2646.638879] device veth0_vlan entered promiscuous mode [ 2646.641706] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2646.644817] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:41:19 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x9b79a74e86c5e806, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x90000, 0x80) r3 = openat2(r2, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)={0xc0, 0x0, 0x5}, 0x18) dup(0xffffffffffffffff) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c00817394feb1081403aab177ed549dac7589ee3b23ba5e010e9b9c6b1b4c25b2151b8314523ec4df3c9cc14ba8ad78436e46c9c6db3d30b1bdb5f0e619966656af"]) truncate(&(0x7f0000000200)='./file1\x00', 0x8) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000000)={'rose0\x00', {0x2, 0x0, @remote}}) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x4e20, @empty}, 0x10) r5 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000240)={0x5, 0x5, 0xfff}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:41:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000020000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2646.715340] 9pnet: Insufficient options for proto=fd 02:41:19 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3000000}]) [ 2646.739983] device veth0_vlan entered promiscuous mode [ 2647.448888] audit: type=1326 audit(1693276880.441:176): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14049 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:41:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000030000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:41:36 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x490, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() process_vm_readv(r2, &(0x7f0000001a40)=[{&(0x7f00000018c0)=""/31, 0x1f}, {&(0x7f0000001b40)=""/124, 0x7a}, {&(0x7f0000001980)=""/161, 0xa1}], 0x3, &(0x7f0000001ec0)=[{&(0x7f0000001a80)=""/101, 0x65}, {&(0x7f0000002240)=""/183, 0xffffffbc}, {&(0x7f0000001bc0)=""/122, 0x7a}, {&(0x7f0000001c40)=""/163, 0xa3}, {&(0x7f0000001d00)=""/231, 0xe7}, {&(0x7f0000001e00)}, {&(0x7f0000001e40)=""/9, 0x9}, {&(0x7f0000001b00)=""/46, 0x2e}], 0x8, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000004c0)) r3 = socket$inet(0x2, 0xa, 0x0) r4 = signalfd4(r3, &(0x7f0000000140)={[0x8]}, 0x8, 0x800) r5 = syz_mount_image$nfs(&(0x7f00000002c0), &(0x7f0000000300)='./file1\x00', 0x1df5, 0x2, &(0x7f0000000400)=[{&(0x7f0000000340)="5ac201ca4dadaa78baaa07f780ee909f6d125d8c27b03c2be898f3c99cd05d7eb137bfa78217db9ba0", 0x29, 0x420}, {&(0x7f0000000380)="6498ed426da9157b5167ecf2787fb92bf6fd3902c7930dff3bcc0234e62994ee8949230dd114a3f06d97ae088369fbdfe284854bf86a512960739fa3773e848869ca0cc976d8d94ba03c103ceac6690955d41ffbd9acd2e8a9205ba61f25cbbf1ec69be4616d6349d93e1dba091bf5663cc94e9358606ca0d8", 0x79, 0x37a}], 0x2000000, &(0x7f0000000440)={[{'{'}, {'\x00'}]}) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000000480)=[r3, r5], 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r6, &(0x7f0000000240)="01", 0x1) 02:41:36 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) io_setup(0xb, &(0x7f00000000c0)=0x0) io_cancel(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0xff94, r0, &(0x7f0000000380)="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", 0x135, 0x7fffffff, 0x0, 0x1}, &(0x7f0000000240)) io_setup(0x5, &(0x7f0000000080)=0x0) r3 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) io_submit(r2, 0x1, &(0x7f00000008c0)=[&(0x7f0000000180)={0x0, 0x0, 0x5, 0x1, 0x0, r3, &(0x7f00000001c0)='\\', 0x1524c9e47e6e3884}]) io_pgetevents(r2, 0x9, 0x1, &(0x7f0000000280)=[{}], &(0x7f00000002c0)={0x0, 0x989680}, &(0x7f0000000340)={&(0x7f0000000300)={[0x7fffffff]}, 0x8}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() 02:41:36 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3003eff}]) 02:41:36 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) socket$inet(0x2, 0xa, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e20, @remote}, {0x0, @remote}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000003, 0x11, r0, 0x0) [ 2663.112013] audit: type=1400 audit(1693276896.104:177): avc: denied { tracepoint } for pid=14093 comm="syz-executor.4" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 02:41:36 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8981, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:36 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8941, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:36 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="14b0f898a1ffae7c30ff9fb75be296475b23b091e0062e00000000330d44145670d794b39e6b96009bcf000068000200"/63], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x30f) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8802, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000140)={0x8, 0x4, 0x2, 0x6, "be34490d0217baf408937459c347120ee6d3d655fda1c5fa0dbb6fa7ec2137b6"}) [ 2663.140902] audit: type=1326 audit(1693276896.133:178): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14101 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:41:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000040000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:41:36 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) fallocate(0xffffffffffffffff, 0x58, 0x7, 0xd26f) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) lseek(r0, 0xff, 0x1) 02:41:36 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3300000}]) 02:41:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000050000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:41:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000060000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:41:36 executing program 5: io_uring_setup(0x0, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000000)=0x6e) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @broadcast}, {0x0, @local}, 0x0, {0x2, 0x0, @empty}, 'syzkaller0\x00'}) 02:41:36 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8982, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:36 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000}]) [ 2663.582288] nfs: Unknown parameter '{' [ 2663.590850] device veth0_vlan entered promiscuous mode [ 2663.633699] nfs: Unknown parameter '{' [ 2663.652214] device veth0_vlan entered promiscuous mode [ 2663.968860] audit: type=1326 audit(1693276896.961:179): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14101 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:41:50 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8983, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:50 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}}, 0x38) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000100)={0x0, @aes256, 0x0, @desc1}) ioctl$AUTOFS_IOC_SETTIMEOUT(r1, 0x80049367, &(0x7f00000000c0)=0x1000) close_range(r0, 0xffffffffffffffff, 0x0) fork() [ 2677.960495] audit: type=1326 audit(1693276910.952:180): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14157 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:41:50 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x894c, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:50 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0xd44d, 0x4, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r3, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) r4 = openat$cgroup_subtree(r3, &(0x7f0000000140), 0x2, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000000740)={0x0, 0x0, "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", "5b739dcaae5108c6044a99b30180766341c65e840ae7908898db53aff1dfe11ddd81b3504a1623e7df5a37952ac2f400f8b0ef5f55148c1564650fff72e709437993a515bc7c7e972fce840b0c9fd40feaade34144366f1a6beda40ee69446d11f9aa85d794d14982721d2f59f73714d717cf6373a2f2172d038a1767f93d0a3cd68cef487bf18f69318dc3d1fe8d2974cb29d6a29daae04df0df964586b53ea8ccee336d879064d399e187e224e7dc566b202c3614d6d604a705927c28f25d04df237b1c11bdca2f4079a32a09dcbec5401bbaabb8abe6a03fc690e4dd92a6ef84cbbd148d40fd65733a72f447939554552ee41d95a501337d4418a1d9647835d6662349757b95829390ccfb9429b8e4e96009e50d21a16caa9dcda644dc21fa372ea08e3081f07d3f4f6010a59e54b3bae332d56bc8a816c16fc68e6b5be8b3da89441a6be493dff147f9ccdee3c8907e6a2ad034be073bb63e9c5a804782aa0628ca5555ca161e4eb9609e8acb17aefc7f204daaf477ecc062074bff6e716d73aa91b0bdcca44d6c100ff6543657cb6f4cf858cf5942379d4d6ce68b617d5739676e549a4d8894a60cbdd6efea1559f20ab60edf1f0ef6086bb7414d51f174f7f8c9ee63ab48d885c57ffb5f9b37823f01209d63e2f3b533b29490271577089835e9324d9413675df0ab15567515561c18c86cf11a4b20ef3d2706111769a2ea9409b0bc2663ce5f4cdc5e5780b606e6deb6dd44e8558e906058b9ecce9ca604f3130b59bb04ac0ba301b1f71d8ab919b7ca15db0445d47c66f21a7073ecb98a43bb8d6b360fc4f17aa912cf8d04fbfefe215ce1718743f373018c5c45998fda4b050ff0c12e5be5417ea451e68baf1ffe6968ce6e43a3c389b87e8c9c98ffca2173d1afd9726d9049b4a37b3f6dfc6c79afe3097f12ea9e6c172e66f87df0f5c0a8c020b8dc3f2fedfe36d3dc5028256d7bb1bb9be4476ef6eb271b5d0c1ef487d25ad01891811337c5ae78622909445b7c7ce07ac84c62ad2d692869c80e1f1e499c8ee34c3542f794932d509a42226ed876dd3dd20446f43621ca852de2344f764ffd65fde502772f5bfded7dc4c306ca2e97822b1ac3f1c90540b495952a61eac88b1f07a5f8438a6296ab83ecc1cfaecba7305b4472ac87ef449dfd0f84c6dc4756d869b91eef5b49be05d841d86e6151227c697d090a1c827737b2db62123796c886f42ad4c06ea5b6052a72ffd4200221922dc8e9b2f7c38073d0b2cdb08ca9eaceeb82e333aa5e1cd15053e30cf6ef9a57f043dd56d82fff53f33885a0840bc7ad4f14328828e6123f98ec5b2090dd7e27f4927dcc388e8e66766650efc2d17bd1aa3300cf8575e232fbf88e24c57d5f580561e31a83b51ce9dfacb3e61c2a3984b8346c6293819f8025374b076718f5c12ae982bfde1ff4aaa7c3a990b372b465c2881104db261befef2fecfa5e456efc5bf640b9b87cadff6265cd8cf53dc9d06ab0d043ed18907836c4965aff5ebb8ec44b589ce3b1880da42c12aaf1fc5fbaa7a9352dc1de5469f419185d23cd61a1f958f635f56c5117b8b2d5e22f1d77963ab8c9e55874032d4ea9ba18ef8c8f1e05849b3d8a5b7452bb3f7602df89bd264e396beb64eee10b3cea7a87d667be309357e9e54e1ad2098adaa7ae8a62159a1ce1be7669a7ad045fe236b6fd757d5ee142873414852babcf63275020819e9c73e9d3fc608a650a059654ba58914fcf757dccc94e02128b22b619f1f67556c1b595bba7bdfee47ae63c1663d925a95c7f569073910a8a1d712af7e3c797d1c2004ac780e6b1ec44c2dd3125427f0ea8ad317f0c2be67317fee3a7bf552e6e007d7f3e066820ded6f8b6c13a09e5b8822ccd6dfdad1572688645d2eff77e31f7c41732fd200102125fd69afb11df3a31cefead6b4f9c63724c28589ead21235f86fbc01581f359cedc7bc9a000b69fa2b10eba82eaa92898c2790ba4e17a9b96b40dd825a010f6f83f7cff24de86ca186ab0d5e3cab98cde1ab1b146df3d4027f9b247453f0c20aa4b634908ffbcde7f0725fbdb08d0ef5fdfc2047e4dc5fc7179c612f5d9ca9a462ecf3757524213bc556d9ccbbff0fe45ccd356e16443502b4268a167176ae362df05c310e180cd571592ec83c7bd52d7b37bdcaa6fa0c2f870a1eec969b33a12f9cc5b98c145bfc6548e06f00f651862ab13ccf3f6be50b8ebadf0f4820e296f008d087d3ca48663726089b1cb751aae73bc9cdd64337a60c6893ff18f4ca5a7afc15d3a08ed4f6cd156c7010d24abb9e609674e6dd6350cb9dff378815b8c42a22922a6d40c1d8f55d7b578823fe2cc24aa08ceedca96fa638142a7ab8b216f5d58c3faf39d096fd21c9abbd7282eab245217f1113e4171c1afde97c22f1370f7231ee51440df3970eff83cb18013d96d2145682677531937d10b445f0c0e2df999eaf3facce402061503ad514e2d4575a4c216d11f7861e5c14901ba910c3b30376b2d491273f3733c5dff81f9647e4d86b44d72f72aea38c409563b64b1b2c9fa22da2fecffb44b07d5f35e856f0976211c7c2a5fe233a0387a778a746f2e090fde1585468dd636a8674f0694995c251a8f0ee293763bf92e1837a0affff0ea9a1065f30d9ff9c7670cc0fc095a26d2a7b514c1dabf5fa7a8d7adc2f9796e87172ea9cd7c7ee23e38dc1f6f04738b2649e877d5421c9afe83ee1da96106db82e5d402b4965cb3c7c18effcd1de3a7a52048bb793594dd770509cabce94a7e71bf5d39d05b6000606f0b2e2425a15fa94fb1bc064790663530f58a201b5ef05536d1562ec61a0427e253f5fd8794c096f54ecc7e8663a80fde3aa3be58465cb274d9a09dab27e312cba513cb477f16ecf17e3a5a893a6da5ca718cfba293bfd1869fa40a5166320024af02371ac49174de6860a01c6e797a6dfdbfcde8db8dc8bd787ece4e1c47914d043a7888ca3bf15ff13258d561c03ed81f8ea9fa077861e82b609fbfea8bcee5b1eff50387b37cc7348006b606009ba6207674361c43e32e30866a819113ddbe98e702db6c2482440b25681e356a903f2d5e2d886374083ec7252c5bb58f0b8835a992b41f8a981fc348462f07134cf7b31e3c62c58378f26a5198c89276243e1616ef58932087e90dcb00055829e053d79c89b0784388cbf695c823c6e63deab987ba12d7839a5df5bf10b5b07d956a89ff711ee6f2295af0326977f635b4aa8a11dbdcf36abeda75eadeef1ce982f1637742dec87649fbd6827b39c2bb4dae07331d1f8bf0e126feb61b5d7aae031b790e1e3538be3b5fc2633d842e648e8e0b5efdeb2e51329ac4598e46a00208ea5ecedb84b40a635c7d4a54dcc8e50c9cd791781e6844ff1635ae57baaa135fd83bed54a6b651ad9f91647d066a410871a97efbd34f92750faa5ad64cb5414c5836235b71f965245069906be5e46c03077e33f2b6d4988e874db9b89297bebd13bfe65982b4fa14b885c655d628ce7a49b8bf178689a82b3e173c2c48184a1f0bdbd91058b72a47a692cb378ee79652cc733690fd3bae9d7143cbe7d4bec57a1c0852e8b0ee5a797e60ba557d69883f146a471d54c69c22721669780e556d4ace6536fb165b752a0c0446464eef7d489e1f97ace42e61b60bb7dcca1b9ff7fc4328374e6c1fd137b27d1d7c3551929067017685b305dfb37a2c40e9912c2e42b921b9a74447e0c60c3b6204b629c2cdbe0e1a065aaba0fbe186c7c39f3a7eaf8e19d3441bce49db8eba3fffcdfcaa47feea730819482b2005f03180db7fe4af06316767d761084ffd8e6898f294468e5082beac15adeab51592b265ddb623442286282e0a3f3680b9e7dd69931e66946ef3b4e9d13621b159389c7c5bd6b464aac03cf533da7cc65bb481bdcd6bf608b7e2eeb48c7d497e52dbfae97ce977c5802aa0cf046133dd549660279d63ba4dafc59b16f83b867a3cc6a6e95c80a67ff23296b9e2e83f9e8cc3af221a74799b50e5548f8e46d35e27c7144b9e68cfd1203aa9481527b73dbca17ff090f1cde2a5cad24a25efaa3f3d719dd33cb2e70d1a6672857ca53f3aa3bc85c8efd6d0d8ccdafd96aabef6bb3bf71a41119fbcb4312540e8cec0e5acc27401f1964a881cb6b126f2c01caf60ca44d58d6a6bffb5c10cf8b830d7738af2793dc5af400e62aa553f528628a3a314471cbf38f49d20ed2f6e3350101137325ff79f3eb2c2b02bb40e36865f2e4cb6583f9803b66e4ed05c486b9032e3b152bda5a2e6acef361e29bc1034c64f7c70b68ace730ea84e4edb4e50adf1a199d7e337e0ddd8fc7f43b41d67a39cffbb1b0e4f02cf4c10de0d861f2dcbf2503f0ff31c8d021b0af038a14a2d338b036da5c8fff74a5493857739f5bd46b88e89e0f30ea33324bb8c4466cba673b3c52871888944bf667be9fb08b393388069289fe7c70b3cb4f20b676173d75c08c7a1410d24841e4d11af3e03c613f21fd902cf723d59309ee84ad3c8c235173086f154af3e1d919e36db44ee0f9302a14461ede7b11aeefcfc66b73782bbbe108aeda73352dee1dd82c794640c739a66eeafde765bc2d8fbc24b2ef725c8ef011bf2ce0a2386c9bd6240d9fef82a04d02abd06f657fd84be0e6d29435451a3cb52f9b1943e8122db4be567758193814d063d0ae95f7d62b99d08d0fd77540e98a6c72c9a5915a7012d1f056be21796da2db9a2f877e21125d08fc1c26fe063fdb3a967ac7f6863c68fb5b075a67df7a0416f122786bd53306d4b6855ee822a8026d155ebec7b8cbafa3ba6f525d007b79119cee1a016a879b41baf961fbbcebefa95ef46c1139be334e43dfe1b56bf8b975474f03f4f0897e872849293545ac57e00c9d3cddbc2006018757d10e75cde6e3392d49fdf1f5f80eca627282582bcd071d37bbafdcdc60a16cd39cd0f50fd4b2eaa3d0c32a5c2a65f9291faa72291122a96f8c76d6285bff3707feff489d4adde66c00bc9d151da28f200f1c836a430f4f1dc83c2698473cf7a21fb952927465562ef59ddc1214df64a96d817bc24e01a8417988871ffea7a283f30d7741fdfe927242997d869b148d313a26866b526e411d2808b988f64b0dc0a2e001347af06571d4f6615430c9ddf7c95db44472cc225acf5f9cc0b7eac26a6b69c73dc2a0eb49ddcba54893a3dffc45cc97d0762ac181de46f52c947c1a1beb3ebae1eee0a98fbd3d33e96e37d95882b5ed1c2f94d1d64e789939c1d5fac8a4fea0cd95f6f03d886f0f07d9cb47f4113849b21f6efbc2c295f458b397bf559ba50a5ebd570599a86f7b2bfd1618841012908289e8c3bceb11a8fc761d45358a5ecb70b93e19cd441f7fc5ad083cc42a4f72510c6027da4ed9d58182d1f06f193f4698b162ee"}) ioctl$BTRFS_IOC_TREE_SEARCH(r4, 0xd0009411, &(0x7f0000001e00)={{r5, 0x814, 0x116, 0x3, 0x9, 0x200, 0x3, 0xf8, 0x200, 0x2, 0x1, 0x3d66, 0x80000000, 0x6, 0x5}}) 02:41:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46000000000000000000f5ffffff000000000000000000000038000000000056edb31adf53baf19c4a57898f2a3c37000000000000000020000000000000000000000714d458a0a811e4f66354db6e6e74e0d57543bf2b966600"/103], 0x58) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:41:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000070000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:41:50 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000040)={@empty, @rand_addr, r2}, 0xc) r3 = socket$inet(0x2, 0x3, 0xff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@empty, @rand_addr, r5}, 0xc) r6 = socket$inet(0x2, 0x3, 0xff) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) setsockopt$inet_mreqn(r6, 0x0, 0x20, &(0x7f0000000040)={@empty, @rand_addr, r8}, 0xc) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0xac, 0x0, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x3}, @ETHTOOL_A_LINKINFO_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x3f}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0xff}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x6}]}, 0xac}, 0x1, 0x0, 0x0, 0x20000050}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:41:50 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5000000}]) [ 2677.970102] device veth0_vlan entered promiscuous mode [ 2678.007500] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2678.031933] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:41:51 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000140)=0x1) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000080000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2678.067332] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:41:51 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)=ANY=[@ANYBLOB="010000c81d10000000880000", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x1, 0x80000000}}, './file0\x00'}) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:41:51 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x89a0, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:51 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7000000}]) [ 2678.135912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2678.150954] device veth0_vlan entered promiscuous mode 02:41:51 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x0, 0x165, 0x0, r1}) r3 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) r4 = syz_open_dev$ptys(0xc, 0x3, 0x1) syncfs(r4) 02:41:51 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8953, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:41:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000180000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2678.214832] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2678.222921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2678.239812] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2678.254283] device veth0_vlan entered promiscuous mode 02:41:51 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) fcntl$getown(r0, 0x9) r2 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x1, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r2, 0x8040942d, &(0x7f0000000100)) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x1) [ 2678.795295] audit: type=1326 audit(1693276911.787:181): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14157 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:42:04 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8900) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x8010, r2, 0x92e3b000) umount2(&(0x7f0000000080)='./file0/file0\x00', 0x0) 02:42:04 executing program 7: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() ptrace$setopts(0x4206, 0x0, 0xff, 0x46) 02:42:04 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x89a1, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:04 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8955, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:04 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @remote, 0x4}, 0x1c) io_uring_setup(0x0, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x200, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x205) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) r2 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x40, 0x4, 0x14}, 0x18) shutdown(r2, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='ip6erspan0\x00', 0x10) 02:42:04 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x15, 0x0, 0x161}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000340)) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x120, 0x0, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8001}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4e}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xb16}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e24}, @IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x400}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2020}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x9, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x4040000}, 0x4000030) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000580)={'erspan0\x00'}) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @local}, {0x6, @broadcast}, 0x34, {0x2, 0x4e22, @remote}, 'syzkaller0\x00'}) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x81, 0x5, 0xb7, 0x3e, 0x0, 0x3, 0x20804, 0xa, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8a7, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x8, 0x397, 0x8001, 0x2, 0x75a, 0x2, 0x101, 0x0, 0xfdaf}, 0xffffffffffffffff, 0x9, r2, 0x3) 02:42:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f0000001c0000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:42:04 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8000000}]) 02:42:04 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x6}, {0x2, 0x1, 0x3, 0x401}, {0x3ff, 0x84, 0x8, 0x4}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) r1 = signalfd4(r0, &(0x7f0000000040)={[0x1]}, 0x8, 0x800) r2 = accept4(0xffffffffffffffff, &(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000240)=0x80, 0x80800) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000100)='({)}\xb0^.[\x00', 0x0, r2) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x0, 0x3, 0xff, 0x4, 0x0, 0x101, 0xc210, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x80000000, 0x1}, 0x2, 0x4, 0x4, 0x8, 0x800, 0x8, 0x7ff, 0x0, 0x7, 0x0, 0x400}, 0x0, 0xe, 0xffffffffffffffff, 0xa) r3 = syz_open_dev$sg(&(0x7f0000000280), 0x4, 0x90200) r4 = accept(r2, &(0x7f00000002c0)=@generic, &(0x7f0000000340)=0x80) dup3(r3, r4, 0x80000) fork() 02:42:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f0000003f0000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:42:04 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3f000000}]) 02:42:04 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x2) signalfd4(r0, &(0x7f0000000000), 0x8, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c00dbdb747330ab0dad23d2e0776b38b0e764"]) fadvise64(r2, 0x10001, 0x66a9, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e20, @rand_addr=0x64010101}, {0x306, @multicast}, 0x40, {0x2, 0x4e24, @loopback}, 'team_slave_0\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) 02:42:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000000670000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:42:04 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB="2c7766646e6f3d5d86349404d83656445b6fdb5823f57fc495a016b133696ba7da0b3d7ba27981a8bc0cc999fe2d14829900654ceb30789befed67677d647fb184085cb17f8ce1bf83ad2dccf1605d9ef78bee5d841bccc0f6b519ade57ca46d3c7cb1e0de02baf336530ed719f316a8c892dca401568c4e", @ANYRESHEX=r3, @ANYBLOB=',\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) fdatasync(r5) r6 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder-control\x00', 0x2, 0x0) write(r6, &(0x7f0000000580)="bf8ab8b9cd22a94e26728da02683ac2aa09776ff00c8754e98371d72c8de55ceddc61ff87afa0d00ec092541c46e32ad8751a8e1e825fb780fd7fa7e407ac9dfab59cb737bcbfb3a2367a0a3d404e627f59e17123f", 0x55) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000002c0)) 02:42:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f000004800000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:42:04 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8980, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2691.816215] 9pnet: Insufficient options for proto=fd [ 2691.825734] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:42:04 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3ffffe00}]) 02:42:04 executing program 4: shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffd000/0x3000)=nil) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e20, @private=0xa010102}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:04 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x40049409, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000fffffff8c0000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:42:04 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) write$binfmt_elf32(r3, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}}) close(r6) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000200)={'geneve0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="35000000000000000b000000ac1414bbac1414324e234e21a20200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0000002ac1414bb4e234e2204000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000049d199f20000060081d283ae000000000000c0ffffffffffffff0500ffff00000000"]}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x4}}, './file0\x00'}) openat(r7, &(0x7f0000000280)='./file0\x00', 0x26c000, 0x42) fork() [ 2691.880201] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2691.919237] 9pnet: Insufficient options for proto=fd [ 2691.921304] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2691.929124] device veth0_vlan entered promiscuous mode 02:42:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000ffffffdef0000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2691.958650] audit: type=1326 audit(1693276924.950:182): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14297 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 [ 2691.990088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 [ 2692.053340] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2692.055152] device veth0_vlan entered promiscuous mode [ 2692.060397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2692.063961] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2692.784048] audit: type=1326 audit(1693276925.776:183): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14297 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:42:21 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x7}]}) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) r1 = syz_io_uring_complete(0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000001c0)={0x0}) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x8000, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000180)={r4, 0x2, r5, 0x9b8, 0x80000}) close_range(r0, 0xffffffffffffffff, 0x0) fork() 02:42:21 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000f7ff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r3, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) fsetxattr$security_selinux(r0, &(0x7f00000002c0), &(0x7f0000000300)='system_u:object_r:setfiles_exec_t:s0\x00', 0x25, 0x3) sendfile(r1, r2, &(0x7f0000000140)=0x100000001, 0x9) 02:42:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f00fffff00000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2708.663075] audit: type=1326 audit(1693276941.655:184): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14316 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:42:21 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x1000, 0x6}) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x142, 0x20) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)=ANY=[@ANYBLOB="747eb1be593d66642c7266646e6f3d", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',\x00']) write$binfmt_elf32(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @local}, 0x10) 02:42:21 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8981, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:21 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000080)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x3e5}) r2 = socket$inet(0x2, 0xa, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) socket$nl_route(0x10, 0x3, 0x0) r5 = openat$incfs(r1, &(0x7f00000000c0)='.pending_reads\x00', 0x280400, 0x11) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x4480, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [{@fsname={'fsname', 0x3d, 'rfdno'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@appraise}, {@measure}, {@obj_user={'obj_user', 0x3d, 'trans=fd,'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '{\\\\'}}, {@smackfsdef={'smackfsdef', 0x3d, '*!'}}, {@subj_user={'subj_user', 0x3d, 'wfdno'}}]}}) write$binfmt_elf32(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000001f000000380000000000000000000000000020424d00"/88], 0x58) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000240)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}}) ioctl$F2FS_IOC_GARBAGE_COLLECT(r7, 0x4004f506, &(0x7f0000000040)) 02:42:21 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x40086602, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:21 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xff3e0003}]) [ 2708.694170] device veth0_vlan entered promiscuous mode [ 2708.717186] audit: type=1400 audit(1693276941.708:185): avc: denied { associate } for pid=14318 comm="syz-executor.4" name="tun" dev="devtmpfs" ino=111 scontext=system_u:object_r:setfiles_exec_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 02:42:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000ffffffff60000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2708.747120] 9pnet: Insufficient options for proto=fd [ 2708.765995] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 [ 2708.769612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=11084 comm=kworker/0:1 02:42:21 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) io_uring_setup(0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={""/10, ""/2, @local}, @in=@broadcast}}, {{}, 0x0, @in6=@private2}}, &(0x7f0000000000)=0xe8) 02:42:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000ffffffdfc0000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2708.794298] device veth0_vlan entered promiscuous mode [ 2708.800353] 9pnet: Insufficient options for proto=fd 02:42:21 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfeff3f00000000}]) 02:42:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000ffffffffe0000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) 02:42:21 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x40087602, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) [ 2709.496290] audit: type=1326 audit(1693276942.488:186): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14316 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:42:35 executing program 7: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) close_range(r0, 0xffffffffffffffff, 0x0) fork() 02:42:35 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x8, 0x3, &(0x7f0000000340)=[{&(0x7f0000000140)="c72b5205a6c5dba1b29209e5eedd5e7ea66ad7", 0x13, 0x7b}, {&(0x7f00000002c0)="1ce34cce632df3b53009fc01fbc6a29078a6849cdbce700acf3d1e41d83f7ac0485f711c2fdf6d186c1aaea58d74154e62c736650a4e823ff98d1abc0c4ea652e96f4f283b60fe62c4d488b804d0402bae42e8f66ed56f227449af21522eaaae3c07d6f567", 0x65, 0xffff}, {&(0x7f0000000240)="bfe9c903a51a5e9c84524dcc214563ad", 0x10, 0x8ee7}], 0x40, &(0x7f00000003c0)={[{@dots}, {@fat=@codepage={'codepage', 0x3d, '1255'}}], [{@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/net/tun\x00'}}]}) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000480)={0x9, 0x0, &(0x7f00000004c0)=[0xffffffffffffffff, r3, r2]}, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:42:35 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x4020940d, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:35 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000009c1a2931b7ffff007e060000000000005ba34b0000000004000007b41e14d898100c592ec0a7038fb5aa23f3549fb73fba7f9973468b9de8b1572a3b"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r3, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f00000000c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}}) write$binfmt_elf32(r4, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r4, r6, &(0x7f0000000140)=0x88b7, 0xfffffffffffffffd) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:35 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8982, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:35 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000000000}]) 02:42:35 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0xfffc, @remote}, 'syzkaller0\x00'}) ioctl$FICLONE(r0, 0x40049409, r0) 02:42:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000f00f0ffff0000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2722.624063] audit: type=1326 audit(1693276955.616:187): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14372 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 02:42:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000feffdffff0000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2722.674151] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=9695 comm=kworker/1:3 02:42:35 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x80086601, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:35 executing program 6: io_setup(0xf7, &(0x7f0000000040)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x6d40, 0x0) io_submit(r0, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0xd, 0x0, 0x0, r1, 0x0, 0x3003f00}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000000000000}]) 02:42:35 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = io_uring_setup(0x0, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000002900)='./file1\x00', &(0x7f0000002c40), 0x0, &(0x7f0000002c80)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x58) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0xf507, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8914, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @link_local}, 0x0, {0x2, 0x0, @local}, 'syzkaller0\x00'}) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e24, @multicast2}, 0x10) fremovexattr(r3, &(0x7f0000000240)=@random={'osx.', ':!$/+]#\x00'}) copy_file_range(r3, 0x0, r3, &(0x7f0000000200)=0xd4, 0x3, 0x0) sendto$inet(r0, &(0x7f00000000c0)="a08631386cbb9ea43fd24dc3afd64c52908e3498209fd087cea35d677ac857927ada5ba23c595a33c21f50280bd3d3c9f60ccee80daf32fc923619280576f9629ed615ee330e243e9d8c107d0e004b6b918e5a0fd874c91b1b1bfe4516e8af0d69e7772defd7267a3fd4a59114b44f62ddbe9f80ac68ae45e8f87e9567f2f96480773f080aafc4ee101bc6dd83c47f83af7df6d9950f20e3c6d213fd3b7e569480571efd86d984ac168116f812dc7d74a52f353b27cf46f0029e48750d362be44ee335d5952b53adc179791219269030a76d8a9b", 0xd4, 0x20040040, &(0x7f00000001c0)={0x2, 0x4e21, @empty}, 0x10) 02:42:35 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000d0e5ff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) 02:42:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2000000080000000060000006a0000000ffcfdffff0000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}], 0x0, &(0x7f00000000c0)={[{@journal_async_commit}]}) [ 2722.770192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=13382 comm=kworker/1:2 [ 2722.797114] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=13382 comm=kworker/1:2 02:42:35 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r1 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8983, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000000c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000040)={{0x2, 0x4e24, @remote}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14, {0x2, 0x4e22, @local}, 'syzkaller0\x00'}) 02:42:35 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000000c0)="fe", 0x1, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'veth1_vlan\x00'}) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r2 = socket$inet(0x2, 0xa, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f00000000c0)) [ 2723.454426] audit: type=1326 audit(1693276956.446:188): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14372 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fadf412db19 code=0x0 VM DIAGNOSIS: 02:47:45 Registers: info registers vcpu 0 RAX=ffffffff83e53320 RBX=0000000000000000 RCX=ffffffff83e3b3dc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e53928 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c16b R10=ffffed100d9c782d R11=0000000000000001 R12=0000000000000000 R13=ffffffff856715c8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5332e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055689025e678 CR3=0000000016cee000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000416a3c1d00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e53320 RBX=0000000000000001 RCX=ffffffff83e3b3dc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e53928 RBP=ffffed100112e000 RSP=ffff88800897fe70 R8 =0000000000000001 R9 =ffff88806cf3c16b R10=ffffed100d9e782d R11=0000000000000001 R12=0000000000000001 R13=ffffffff856715c8 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5332e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fe79e9b4010 CR3=0000000016cee000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00fe02fe016c6c6f502e726567616e61 XMM02=746e696820636578650a0a0100010101 XMM03=6508006c61746f7420636578650a0073 XMM04=616320636578650e006e656720636578 XMM05=727420636578650b006574616469646e XMM06=6d696e696d20636578650d0065676169 XMM07=657220726f7475636578651100657a69 XMM08=746f7420636578650a0073746e696820 XMM09=78650e006e6567206365786508006c61 XMM10=78650b006574616469646e6163206365 XMM11=20636578650d00656761697274206365 XMM12=7475636578651100657a696d696e696d XMM13=6578650900737472617473657220726f XMM14=616d7320636578650a007a7a75662063 XMM15=0000736465657320636578650a006873