f reserved sectors [ 455.428233] FAT-fs (loop3): Can't find a valid FAT filesystem 01:11:51 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:11:51 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 455.468202] FAT-fs (loop1): bogus number of reserved sectors [ 455.469031] FAT-fs (loop1): Can't find a valid FAT filesystem [ 455.477802] audit: type=1326 audit(1629162711.904:10): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5755 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 455.490673] audit: type=1326 audit(1629162711.917:11): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5765 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 01:11:51 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:11:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:11:51 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:11:51 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x16, 0x22d}, 0x14}, 0x1, 0x8100}, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000040)=0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:11:51 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 455.552821] FAT-fs (loop1): bogus number of reserved sectors [ 455.554202] FAT-fs (loop1): Can't find a valid FAT filesystem 01:11:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:12:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:03 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:12:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:12:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:12:03 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:03 executing program 4: syz_io_uring_complete(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x12, &(0x7f0000000300)={'trans=virtio,', {[{@version_L}, {@cache_mmap}, {@afid={'afid', 0x3d, 0x9}}, {@access_any}, {@version_u}, {@msize={'msize', 0x3d, 0xa3d}}, {@msize={'msize', 0x3d, 0x8}}, {@cachetag={'cachetag', 0x3d, 'configfs\x00'}}], [{@subj_type={'subj_type', 0x3d, '{-'}}, {@measure}]}}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:12:03 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:12:03 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) [ 467.510098] audit: type=1326 audit(1629162723.929:12): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5796 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 01:12:03 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 467.516013] audit: type=1326 audit(1629162723.943:13): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5798 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 467.538617] FAT-fs (loop1): bogus number of reserved sectors [ 467.539618] FAT-fs (loop1): Can't find a valid FAT filesystem 01:12:03 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:12:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:12:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) [ 467.596284] FAT-fs (loop3): bogus number of reserved sectors [ 467.597256] FAT-fs (loop3): Can't find a valid FAT filesystem [ 467.619380] FAT-fs (loop1): bogus number of reserved sectors [ 467.620227] FAT-fs (loop1): Can't find a valid FAT filesystem 01:12:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:04 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:12:04 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 467.733708] FAT-fs (loop3): bogus number of reserved sectors [ 467.734829] FAT-fs (loop3): Can't find a valid FAT filesystem [ 479.418576] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:12:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:12:23 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:12:23 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:12:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:23 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:12:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:12:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 486.925992] audit: type=1326 audit(1629162743.349:14): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=5843 comm="syz-executor.7" exe="/syz-executor.7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 486.938305] FAT-fs (loop1): bogus number of reserved sectors [ 486.939242] FAT-fs (loop1): Can't find a valid FAT filesystem 01:12:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 486.954818] FAT-fs (loop3): bogus number of reserved sectors [ 486.955688] FAT-fs (loop3): Can't find a valid FAT filesystem 01:12:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:12:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:12:23 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:12:23 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x16, 0x22d}, 0x14}, 0x1, 0x8100}, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000040)=0x4) syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:12:23 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 487.018663] FAT-fs (loop1): bogus number of reserved sectors [ 487.019596] FAT-fs (loop1): Can't find a valid FAT filesystem 01:12:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 487.126615] FAT-fs (loop3): bogus number of reserved sectors [ 487.128063] FAT-fs (loop3): Can't find a valid FAT filesystem [ 498.519143] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:12:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:12:41 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:12:41 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:12:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:41 executing program 4: syz_io_uring_complete(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x12, &(0x7f0000000300)={'trans=virtio,', {[{@version_L}, {@cache_mmap}, {@afid={'afid', 0x3d, 0x9}}, {@access_any}, {@version_u}, {@msize={'msize', 0x3d, 0xa3d}}, {@msize={'msize', 0x3d, 0x8}}, {@cachetag={'cachetag', 0x3d, 'configfs\x00'}}], [{@subj_type={'subj_type', 0x3d, '{-'}}, {@measure}]}}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:12:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:41 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:41 executing program 7: syz_io_uring_complete(0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_virtio(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x12, &(0x7f0000000300)={'trans=virtio,', {[{@version_L}, {@cache_mmap}, {@afid={'afid', 0x3d, 0x9}}, {@access_any}, {@version_u}, {@msize={'msize', 0x3d, 0xa3d}}, {@msize={'msize', 0x3d, 0x8}}, {@cachetag={'cachetag', 0x3d, 'configfs\x00'}}], [{@subj_type={'subj_type', 0x3d, '{-'}}, {@measure}]}}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 505.493173] FAT-fs (loop1): bogus number of reserved sectors [ 505.494129] FAT-fs (loop1): Can't find a valid FAT filesystem 01:12:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:12:41 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x16, 0x22d}, 0x14}, 0x1, 0x8100}, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000040)=0x4) syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 505.523231] FAT-fs (loop3): bogus number of reserved sectors [ 505.524609] FAT-fs (loop3): Can't find a valid FAT filesystem 01:12:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f00000002c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:12:42 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:12:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:12:42 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:12:42 executing program 7 (fault-call:1 fault-nth:0): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 505.668420] FAT-fs (loop1): bogus number of reserved sectors [ 505.669456] FAT-fs (loop1): Can't find a valid FAT filesystem 01:12:42 executing program 4 (fault-call:1 fault-nth:0): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 505.714155] FAT-fs (loop3): bogus number of reserved sectors [ 505.714889] FAT-fs (loop3): Can't find a valid FAT filesystem [ 505.737273] FAULT_INJECTION: forcing a failure. [ 505.737273] name failslab, interval 1, probability 0, space 0, times 1 [ 505.738675] CPU: 0 PID: 5924 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 505.739467] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 505.740795] Call Trace: [ 505.741107] dump_stack+0x107/0x163 [ 505.741531] should_fail.cold+0x5/0xa [ 505.741983] ? copy_process+0x4380/0x6650 [ 505.742495] should_failslab+0x5/0x10 [ 505.742935] kmem_cache_alloc_node+0x55/0x370 [ 505.743457] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 505.744074] copy_process+0x4380/0x6650 [ 505.744545] ? lock_downgrade+0x6d0/0x6d0 [ 505.745028] ? perf_trace_lock+0xac/0x490 [ 505.745519] ? __cleanup_sighand+0xb0/0xb0 [ 505.746010] ? __bpf_prog_run32+0x8f/0xd0 [ 505.746509] ? perf_trace_lock+0xac/0x490 [ 505.746999] kernel_clone+0xe7/0xa20 01:12:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={0x20, r2, 0x505, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000280)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x2f, 0xe6, 0xa9, 0x9, 0x2, @mcast1, @private2, 0x8, 0x20, 0x1, 0xc3}}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x74, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x4f}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x40}, @ETHTOOL_A_LINKMODES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x819}, 0x800) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r5 = syz_io_uring_complete(0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001700), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={0x20, r7, 0x505, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0xc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}]}, 0x20}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000580)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000300000020000180140002006272696467655f736c6176655f30000008000100", @ANYRES32=r11, @ANYBLOB="b25f3795a4a427a3dee365feb083f45ff23029921ec473b6e38152"], 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r5, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0xb0, r7, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4004}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, r4, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x53da21decf64fce3}, 0x48c0) syz_mount_image$nfs4(&(0x7f0000002f40), &(0x7f0000002f80)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{'fsc,ntext=/M\xab\xd5\xef\x87\\\xa6-\"\xe4'}]}) [ 505.747433] ? copy_init_mm+0x20/0x20 [ 505.748102] ? lock_downgrade+0x6d0/0x6d0 [ 505.748567] ? find_held_lock+0x2c/0x110 [ 505.749015] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 505.749588] ? __seccomp_filter+0x236/0x1470 [ 505.750081] ? seccomp_notify_ioctl+0xda0/0xda0 [ 505.750633] __do_sys_clone+0xc8/0x110 [ 505.751068] ? __do_sys_vfork+0xd0/0xd0 [ 505.751519] ? __secure_computing+0xb4/0x290 [ 505.752013] do_syscall_64+0x33/0x40 [ 505.752431] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 505.753006] RIP: 0033:0x466609 [ 505.753363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 505.755424] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 505.756337] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 505.757135] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 505.757929] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 505.758714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 505.759512] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 505.769411] FAULT_INJECTION: forcing a failure. [ 505.769411] name failslab, interval 1, probability 0, space 0, times 0 [ 505.771981] CPU: 1 PID: 5926 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 505.773416] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 505.775840] Call Trace: [ 505.776403] dump_stack+0x107/0x163 [ 505.777182] should_fail.cold+0x5/0xa [ 505.777995] ? copy_process+0x4380/0x6650 [ 505.778895] should_failslab+0x5/0x10 [ 505.779700] kmem_cache_alloc_node+0x55/0x370 [ 505.780647] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 505.781761] copy_process+0x4380/0x6650 [ 505.782639] ? perf_trace_lock+0xac/0x490 [ 505.783528] ? __cleanup_sighand+0xb0/0xb0 [ 505.784423] ? __bpf_prog_run32+0x8f/0xd0 [ 505.785306] ? find_held_lock+0x2c/0x110 [ 505.786177] kernel_clone+0xe7/0xa20 [ 505.786988] ? copy_init_mm+0x20/0x20 [ 505.787798] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 505.788891] ? __seccomp_filter+0x236/0x1470 [ 505.789830] ? seccomp_notify_ioctl+0xda0/0xda0 [ 505.790819] ? __switch_to_asm+0x42/0x70 [ 505.791678] ? __switch_to_asm+0x36/0x70 [ 505.792544] __do_sys_clone+0xc8/0x110 [ 505.793366] ? __do_sys_vfork+0xd0/0xd0 [ 505.794245] ? __secure_computing+0xb4/0x290 [ 505.795191] do_syscall_64+0x33/0x40 [ 505.795980] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 505.797064] RIP: 0033:0x466609 [ 505.797747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 505.801787] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 505.803432] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 505.804948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 505.806474] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 505.807987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 505.809499] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 505.869049] nfs4: Unknown parameter 'ntext' [ 517.389221] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:13:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500", 0xc}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:13:00 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:13:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:00 executing program 0: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="eb58906d6b66732e66617400020820000400008000f8000020004075219f560000000000018c80de2d1a13da6babf4584a4c3f1f314ba19f0e7ac03ae929af002c7a948f694417f5ec0186f4661ca0a786b7c09a22f4fe09d16c5a1d365039e2640040055f1fd73a43cb6bae9b17fd85e379056c607871642b18624589256a1a6337688a2c5c98f8994d968adfacd8bab3212d049605ee651a663d100438c10e13ca8faef901c8719d52448e50cc00783dc6db13f954555ad8bcf926a56540a19f8e5a1b9f0b183c730e284cbf", 0xcd}, {0x0, 0xffffffffffffff98, 0x4002}], 0x0, &(0x7f0000000040)={[{@shortname_winnt}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') r1 = socket$netlink(0x10, 0x3, 0x5) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000009a40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {r3}, {}, {}, {0x0, r4}, {}, {r5}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000340)={r3, 0x8}) r6 = socket$netlink(0x10, 0x3, 0x0) sendfile(r6, r0, 0x0, 0xec0) 01:13:00 executing program 4 (fault-call:1 fault-nth:1): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:00 executing program 7 (fault-call:1 fault-nth:1): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) [ 524.218650] FAULT_INJECTION: forcing a failure. [ 524.218650] name failslab, interval 1, probability 0, space 0, times 0 [ 524.219959] CPU: 0 PID: 5949 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 524.220699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 524.221954] Call Trace: [ 524.222247] dump_stack+0x107/0x163 [ 524.222662] should_fail.cold+0x5/0xa [ 524.223083] ? create_object.isra.0+0x3a/0xa20 [ 524.223586] should_failslab+0x5/0x10 [ 524.224003] kmem_cache_alloc+0x5b/0x350 [ 524.224461] create_object.isra.0+0x3a/0xa20 [ 524.224946] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 524.225512] kmem_cache_alloc_node+0x169/0x370 [ 524.226041] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 524.226645] copy_process+0x4380/0x6650 [ 524.227093] ? lock_downgrade+0x6d0/0x6d0 [ 524.227555] ? perf_trace_lock+0xac/0x490 [ 524.228020] ? __cleanup_sighand+0xb0/0xb0 [ 524.228478] ? __bpf_prog_run32+0x8f/0xd0 [ 524.228933] ? perf_trace_lock+0xac/0x490 [ 524.229400] kernel_clone+0xe7/0xa20 [ 524.229810] ? copy_init_mm+0x20/0x20 [ 524.230229] ? lock_downgrade+0x6d0/0x6d0 [ 524.230697] ? find_held_lock+0x2c/0x110 [ 524.231146] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 524.231720] ? __seccomp_filter+0x236/0x1470 [ 524.232217] ? seccomp_notify_ioctl+0xda0/0xda0 [ 524.232730] __do_sys_clone+0xc8/0x110 [ 524.233171] ? __do_sys_vfork+0xd0/0xd0 [ 524.233621] ? __secure_computing+0xb4/0x290 [ 524.234107] do_syscall_64+0x33/0x40 [ 524.234521] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 524.235094] RIP: 0033:0x466609 [ 524.235456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 524.237463] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 524.238319] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 524.239123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 524.239923] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 524.240707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 524.241484] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 524.244054] FAT-fs (loop0): bogus number of reserved sectors [ 524.244690] FAT-fs (loop0): Can't find a valid FAT filesystem [ 524.246820] FAT-fs (loop1): bogus number of reserved sectors [ 524.247459] FAT-fs (loop1): Can't find a valid FAT filesystem 01:13:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448329102", 0xf}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:00 executing program 4 (fault-call:1 fault-nth:2): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 524.281123] FAT-fs (loop3): bogus number of reserved sectors [ 524.282564] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:00 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500", 0xc}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 524.318188] FAULT_INJECTION: forcing a failure. [ 524.318188] name failslab, interval 1, probability 0, space 0, times 0 [ 524.319960] CPU: 0 PID: 5959 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 524.320942] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 524.322570] Call Trace: [ 524.322956] dump_stack+0x107/0x163 [ 524.323479] should_fail.cold+0x5/0xa [ 524.324027] ? create_object.isra.0+0x3a/0xa20 [ 524.324691] should_failslab+0x5/0x10 [ 524.325235] kmem_cache_alloc+0x5b/0x350 [ 524.325824] create_object.isra.0+0x3a/0xa20 [ 524.326463] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 524.327216] kmem_cache_alloc_node+0x169/0x370 [ 524.327870] copy_process+0x4380/0x6650 [ 524.328438] ? lock_downgrade+0x6d0/0x6d0 [ 524.329031] ? perf_trace_lock+0xac/0x490 [ 524.329622] ? SOFTIRQ_verbose+0x10/0x10 [ 524.330215] ? __cleanup_sighand+0xb0/0xb0 [ 524.330837] ? perf_trace_lock+0xac/0x490 [ 524.331436] kernel_clone+0xe7/0xa20 [ 524.331984] ? copy_init_mm+0x20/0x20 [ 524.332534] ? lock_downgrade+0x6d0/0x6d0 [ 524.333131] ? find_held_lock+0x2c/0x110 [ 524.333735] ? ksys_write+0x12d/0x250 [ 524.334301] __do_sys_clone+0xc8/0x110 [ 524.334871] ? __do_sys_vfork+0xd0/0xd0 [ 524.335454] ? rcu_read_lock_any_held+0x69/0x90 [ 524.336134] ? vfs_write+0x354/0xa20 [ 524.336689] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 524.337450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 524.338209] do_syscall_64+0x33/0x40 [ 524.338763] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 524.339515] RIP: 0033:0x466609 [ 524.339990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 524.342662] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 524.343762] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 524.344806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 524.345839] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 524.346903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 524.347944] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 01:13:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:00 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:13:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) [ 524.393943] FAT-fs (loop1): bogus number of reserved sectors [ 524.394907] FAT-fs (loop1): Can't find a valid FAT filesystem [ 524.422535] FAULT_INJECTION: forcing a failure. [ 524.422535] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 524.423946] CPU: 0 PID: 5974 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 524.424700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 524.425957] Call Trace: [ 524.426248] dump_stack+0x107/0x163 [ 524.426657] should_fail.cold+0x5/0xa [ 524.427063] __alloc_pages_nodemask+0x182/0x680 [ 524.427595] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 524.428270] ? rcu_read_lock_sched_held+0x3a/0x70 [ 524.428811] ? kmem_cache_alloc_node+0x2c3/0x370 [ 524.429351] copy_process+0x629/0x6650 [ 524.429788] ? lock_downgrade+0x6d0/0x6d0 [ 524.430243] ? perf_trace_lock+0xac/0x490 [ 524.430730] ? __cleanup_sighand+0xb0/0xb0 [ 524.431205] ? __bpf_prog_run32+0x8f/0xd0 [ 524.431713] ? perf_trace_lock+0xac/0x490 [ 524.432167] kernel_clone+0xe7/0xa20 [ 524.432575] ? copy_init_mm+0x20/0x20 [ 524.432982] ? lock_downgrade+0x6d0/0x6d0 [ 524.433425] ? find_held_lock+0x2c/0x110 [ 524.433857] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 524.434429] ? __seccomp_filter+0x236/0x1470 [ 524.434929] ? seccomp_notify_ioctl+0xda0/0xda0 [ 524.435447] __do_sys_clone+0xc8/0x110 [ 524.435873] ? __do_sys_vfork+0xd0/0xd0 [ 524.436331] ? __secure_computing+0xb4/0x290 [ 524.436819] do_syscall_64+0x33/0x40 [ 524.437218] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 524.437799] RIP: 0033:0x466609 [ 524.438143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 524.440269] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 524.441117] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 524.441917] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 524.442732] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 524.443544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 524.444344] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 524.541754] FAT-fs (loop3): bogus number of reserved sectors [ 524.542478] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500", 0xc}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:13:12 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:13:12 executing program 7 (fault-call:1 fault-nth:2): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:12 executing program 4 (fault-call:1 fault-nth:3): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) move_mount(r1, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file1\x00', 0x4) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r3, 0x800, 0x0) sendfile(r3, r0, 0x0, 0x7ffffffc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 01:13:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:13:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 536.024522] FAULT_INJECTION: forcing a failure. [ 536.024522] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 536.026501] CPU: 0 PID: 6003 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 536.027637] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 536.029424] Call Trace: [ 536.029845] dump_stack+0x107/0x163 [ 536.030430] should_fail.cold+0x5/0xa [ 536.031093] __alloc_pages_nodemask+0x182/0x680 [ 536.031841] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 536.032788] ? rcu_read_lock_sched_held+0x3a/0x70 [ 536.033549] ? kmem_cache_alloc_node+0x2c3/0x370 [ 536.034256] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 536.035062] copy_process+0x629/0x6650 [ 536.035656] ? lock_downgrade+0x6d0/0x6d0 [ 536.036298] ? perf_trace_lock+0xac/0x490 [ 536.036991] ? __cleanup_sighand+0xb0/0xb0 [ 536.037684] ? __bpf_prog_run32+0x8f/0xd0 [ 536.038368] ? perf_trace_lock+0xac/0x490 [ 536.039073] kernel_clone+0xe7/0xa20 [ 536.039685] ? copy_init_mm+0x20/0x20 [ 536.040309] ? lock_downgrade+0x6d0/0x6d0 [ 536.040978] ? find_held_lock+0x2c/0x110 [ 536.041645] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 536.042490] ? __seccomp_filter+0x236/0x1470 [ 536.043226] ? seccomp_notify_ioctl+0xda0/0xda0 [ 536.043995] __do_sys_clone+0xc8/0x110 [ 536.044629] ? __do_sys_vfork+0xd0/0xd0 [ 536.045299] ? __secure_computing+0xb4/0x290 [ 536.046025] do_syscall_64+0x33/0x40 [ 536.046639] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 536.047488] RIP: 0033:0x466609 [ 536.048016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.051052] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 536.052166] FAULT_INJECTION: forcing a failure. [ 536.052166] name failslab, interval 1, probability 0, space 0, times 0 [ 536.052299] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 536.052316] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 536.057010] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 536.058173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.059381] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:13:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 536.060597] CPU: 1 PID: 6002 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 536.062180] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 536.064595] Call Trace: [ 536.065169] dump_stack+0x107/0x163 [ 536.065959] should_fail.cold+0x5/0xa [ 536.066811] ? prepare_creds+0x29/0x670 [ 536.067690] should_failslab+0x5/0x10 [ 536.068515] kmem_cache_alloc+0x5b/0x350 [ 536.069399] prepare_creds+0x29/0x670 [ 536.070203] ? lockdep_init_map_waits+0x26a/0x700 [ 536.071245] copy_creds+0x72/0x590 [ 536.072025] copy_process+0xf12/0x6650 [ 536.072868] ? lock_downgrade+0x6d0/0x6d0 [ 536.073767] ? perf_trace_lock+0xac/0x490 [ 536.074684] ? __cleanup_sighand+0xb0/0xb0 [ 536.075598] ? __bpf_prog_run32+0x8f/0xd0 [ 536.076502] ? perf_trace_lock+0xac/0x490 [ 536.077405] kernel_clone+0xe7/0xa20 [ 536.078210] ? copy_init_mm+0x20/0x20 [ 536.079038] ? lock_downgrade+0x6d0/0x6d0 [ 536.079945] ? find_held_lock+0x2c/0x110 [ 536.080841] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 536.081967] ? __seccomp_filter+0x236/0x1470 [ 536.082972] ? seccomp_notify_ioctl+0xda0/0xda0 [ 536.084002] __do_sys_clone+0xc8/0x110 [ 536.084865] ? __do_sys_vfork+0xd0/0xd0 [ 536.085740] ? __secure_computing+0xb4/0x290 [ 536.086793] do_syscall_64+0x33/0x40 [ 536.087611] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 536.088772] RIP: 0033:0x466609 [ 536.089476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.093510] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 536.095163] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 536.096715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 536.098305] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 536.100000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.101677] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 536.105527] FAT-fs (loop1): bogus number of reserved sectors [ 536.106625] FAT-fs (loop1): Can't find a valid FAT filesystem [ 536.132953] FAT-fs (loop3): bogus number of reserved sectors [ 536.134142] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:13:12 executing program 7 (fault-call:1 fault-nth:3): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:12 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440", 0x12}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:13:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:12 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500", 0xc}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:13:12 executing program 4 (fault-call:1 fault-nth:4): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 536.290890] FAULT_INJECTION: forcing a failure. [ 536.290890] name failslab, interval 1, probability 0, space 0, times 0 [ 536.292756] CPU: 0 PID: 6018 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 536.293830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 536.295684] Call Trace: [ 536.296108] dump_stack+0x107/0x163 [ 536.296692] should_fail.cold+0x5/0xa [ 536.297299] ? prepare_creds+0x29/0x670 [ 536.297934] should_failslab+0x5/0x10 [ 536.298539] kmem_cache_alloc+0x5b/0x350 [ 536.299217] prepare_creds+0x29/0x670 [ 536.299821] ? lockdep_init_map_waits+0x26a/0x700 [ 536.300564] copy_creds+0x72/0x590 [ 536.301155] copy_process+0xf12/0x6650 [ 536.301795] ? lock_downgrade+0x6d0/0x6d0 [ 536.302465] ? perf_trace_lock+0xac/0x490 [ 536.303176] ? __cleanup_sighand+0xb0/0xb0 [ 536.303861] ? __bpf_prog_run32+0x8f/0xd0 [ 536.304534] ? perf_trace_lock+0xac/0x490 [ 536.305217] kernel_clone+0xe7/0xa20 [ 536.305820] ? copy_init_mm+0x20/0x20 [ 536.306438] ? lock_downgrade+0x6d0/0x6d0 [ 536.307127] ? find_held_lock+0x2c/0x110 [ 536.307782] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 536.308614] ? __seccomp_filter+0x236/0x1470 [ 536.309331] ? seccomp_notify_ioctl+0xda0/0xda0 [ 536.310091] __do_sys_clone+0xc8/0x110 [ 536.310728] ? __do_sys_vfork+0xd0/0xd0 [ 536.311398] ? __secure_computing+0xb4/0x290 [ 536.312095] do_syscall_64+0x33/0x40 [ 536.312696] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 536.313520] RIP: 0033:0x466609 [ 536.314037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.317058] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 536.318343] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 536.319522] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 536.320667] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 536.321818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.323001] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:13:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, 0x0, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) [ 536.325141] FAT-fs (loop3): bogus number of reserved sectors [ 536.326880] FAT-fs (loop3): Can't find a valid FAT filesystem [ 536.372281] FAULT_INJECTION: forcing a failure. [ 536.372281] name failslab, interval 1, probability 0, space 0, times 0 [ 536.374777] CPU: 1 PID: 6025 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 536.376278] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 536.378830] Call Trace: [ 536.379432] dump_stack+0x107/0x163 [ 536.380231] should_fail.cold+0x5/0xa [ 536.381057] ? create_object.isra.0+0x3a/0xa20 [ 536.382033] should_failslab+0x5/0x10 [ 536.382857] kmem_cache_alloc+0x5b/0x350 [ 536.383722] ? lock_acquire+0x197/0x490 [ 536.384574] create_object.isra.0+0x3a/0xa20 [ 536.385510] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 536.386597] kmem_cache_alloc+0x159/0x350 [ 536.387521] prepare_creds+0x29/0x670 [ 536.388329] ? lockdep_init_map_waits+0x26a/0x700 [ 536.389351] copy_creds+0x72/0x590 [ 536.390112] copy_process+0xf12/0x6650 [ 536.390953] ? lock_downgrade+0x6d0/0x6d0 [ 536.391836] ? perf_trace_lock+0xac/0x490 [ 536.392723] ? __cleanup_sighand+0xb0/0xb0 [ 536.393622] ? __bpf_prog_run32+0x8f/0xd0 [ 536.394508] ? perf_trace_lock+0xac/0x490 [ 536.395401] kernel_clone+0xe7/0xa20 [ 536.396195] ? copy_init_mm+0x20/0x20 [ 536.397001] ? lock_downgrade+0x6d0/0x6d0 [ 536.397874] ? find_held_lock+0x2c/0x110 01:13:12 executing program 7 (fault-call:1 fault-nth:4): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 536.398750] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 536.400043] ? __seccomp_filter+0x236/0x1470 [ 536.400995] ? seccomp_notify_ioctl+0xda0/0xda0 [ 536.402001] __do_sys_clone+0xc8/0x110 [ 536.402845] ? __do_sys_vfork+0xd0/0xd0 [ 536.403721] ? __secure_computing+0xb4/0x290 [ 536.404671] do_syscall_64+0x33/0x40 [ 536.405469] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 536.406563] RIP: 0033:0x466609 [ 536.407260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.411690] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 536.413334] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 536.414870] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 536.416397] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 536.417917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.419450] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 536.482158] FAULT_INJECTION: forcing a failure. [ 536.482158] name failslab, interval 1, probability 0, space 0, times 0 [ 536.484978] CPU: 1 PID: 6033 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 536.486419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 536.488825] Call Trace: [ 536.489391] dump_stack+0x107/0x163 [ 536.490172] should_fail.cold+0x5/0xa [ 536.491004] ? create_object.isra.0+0x3a/0xa20 [ 536.491980] should_failslab+0x5/0x10 [ 536.492790] kmem_cache_alloc+0x5b/0x350 [ 536.493653] ? lock_acquire+0x197/0x490 [ 536.494507] create_object.isra.0+0x3a/0xa20 [ 536.495446] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 536.496525] kmem_cache_alloc+0x159/0x350 [ 536.497414] prepare_creds+0x29/0x670 [ 536.498219] ? lockdep_init_map_waits+0x26a/0x700 [ 536.499263] copy_creds+0x72/0x590 [ 536.500025] copy_process+0xf12/0x6650 [ 536.500860] ? lock_downgrade+0x6d0/0x6d0 [ 536.501743] ? perf_trace_lock+0xac/0x490 [ 536.502630] ? __cleanup_sighand+0xb0/0xb0 [ 536.503534] ? __bpf_prog_run32+0x8f/0xd0 [ 536.504419] ? perf_trace_lock+0xac/0x490 [ 536.505307] kernel_clone+0xe7/0xa20 [ 536.506098] ? copy_init_mm+0x20/0x20 [ 536.506909] ? lock_downgrade+0x6d0/0x6d0 [ 536.507792] ? find_held_lock+0x2c/0x110 [ 536.508660] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 536.509755] ? __seccomp_filter+0x236/0x1470 [ 536.510719] ? seccomp_notify_ioctl+0xda0/0xda0 [ 536.511718] __do_sys_clone+0xc8/0x110 [ 536.512550] ? __do_sys_vfork+0xd0/0xd0 [ 536.513417] ? __secure_computing+0xb4/0x290 [ 536.514371] do_syscall_64+0x33/0x40 [ 536.515174] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 536.516268] RIP: 0033:0x466609 [ 536.516956] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 536.520877] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 536.522492] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 536.524012] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 536.525521] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 536.527044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.528563] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:13:12 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500", 0xc}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 536.663219] FAT-fs (loop3): bogus number of reserved sectors [ 536.664645] FAT-fs (loop3): Can't find a valid FAT filesystem [ 536.854374] syz-executor.0 (6000) used greatest stack depth: 23568 bytes left 01:13:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:13:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) move_mount(r1, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file1\x00', 0x4) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r3, 0x800, 0x0) sendfile(r3, r0, 0x0, 0x7ffffffc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 01:13:26 executing program 7 (fault-call:1 fault-nth:5): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:26 executing program 4 (fault-call:1 fault-nth:5): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:26 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500", 0xc}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:13:26 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440", 0x12}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 549.839061] FAULT_INJECTION: forcing a failure. [ 549.839061] name failslab, interval 1, probability 0, space 0, times 0 [ 549.841655] CPU: 0 PID: 6058 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 549.843122] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 549.845511] Call Trace: [ 549.846082] dump_stack+0x107/0x163 [ 549.846875] should_fail.cold+0x5/0xa [ 549.847700] ? security_prepare_creds+0x10a/0x180 [ 549.848740] should_failslab+0x5/0x10 [ 549.849539] __kmalloc+0x72/0x3e0 [ 549.850298] security_prepare_creds+0x10a/0x180 [ 549.851304] prepare_creds+0x45c/0x670 [ 549.852145] ? lockdep_init_map_waits+0x26a/0x700 [ 549.853152] copy_creds+0x72/0x590 [ 549.853943] copy_process+0xf12/0x6650 [ 549.854768] ? lock_downgrade+0x6d0/0x6d0 [ 549.855668] ? perf_trace_lock+0xac/0x490 [ 549.856562] ? __cleanup_sighand+0xb0/0xb0 [ 549.857469] ? __bpf_prog_run32+0x8f/0xd0 [ 549.858361] ? perf_trace_lock+0xac/0x490 [ 549.859293] kernel_clone+0xe7/0xa20 [ 549.860093] ? copy_init_mm+0x20/0x20 [ 549.860908] ? lock_downgrade+0x6d0/0x6d0 [ 549.861790] ? find_held_lock+0x2c/0x110 [ 549.862661] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 549.863781] ? __seccomp_filter+0x236/0x1470 [ 549.864730] ? seccomp_notify_ioctl+0xda0/0xda0 [ 549.865734] __do_sys_clone+0xc8/0x110 [ 549.866565] ? __do_sys_vfork+0xd0/0xd0 [ 549.867449] ? __secure_computing+0xb4/0x290 [ 549.868390] do_syscall_64+0x33/0x40 [ 549.869191] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 549.869277] FAT-fs (loop3): bogus number of reserved sectors [ 549.870256] RIP: 0033:0x466609 [ 549.870277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 549.870287] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 01:13:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) [ 549.870319] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 549.871575] FAT-fs (loop3): Can't find a valid FAT filesystem [ 549.872228] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 549.872239] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 549.872250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.872261] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 549.904546] FAULT_INJECTION: forcing a failure. [ 549.904546] name failslab, interval 1, probability 0, space 0, times 0 01:13:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 549.907031] CPU: 1 PID: 6060 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 549.908435] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 549.910715] Call Trace: [ 549.911279] dump_stack+0x107/0x163 [ 549.912022] should_fail.cold+0x5/0xa [ 549.912796] ? security_prepare_creds+0x10a/0x180 [ 549.913773] should_failslab+0x5/0x10 [ 549.914543] __kmalloc+0x72/0x3e0 [ 549.915278] security_prepare_creds+0x10a/0x180 [ 549.916233] prepare_creds+0x45c/0x670 [ 549.917025] ? lockdep_init_map_waits+0x26a/0x700 [ 549.918014] copy_creds+0x72/0x590 [ 549.918752] copy_process+0xf12/0x6650 [ 549.919558] ? lock_downgrade+0x6d0/0x6d0 [ 549.920393] ? perf_trace_lock+0xac/0x490 [ 549.921297] ? __cleanup_sighand+0xb0/0xb0 [ 549.922178] ? __bpf_prog_run32+0x8f/0xd0 [ 549.923052] ? perf_trace_lock+0xac/0x490 [ 549.923923] kernel_clone+0xe7/0xa20 [ 549.924700] ? copy_init_mm+0x20/0x20 [ 549.925489] ? lock_downgrade+0x6d0/0x6d0 [ 549.926340] ? find_held_lock+0x2c/0x110 [ 549.927194] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 549.928253] ? __seccomp_filter+0x236/0x1470 [ 549.929176] ? seccomp_notify_ioctl+0xda0/0xda0 [ 549.930146] __do_sys_clone+0xc8/0x110 [ 549.930999] ? __do_sys_vfork+0xd0/0xd0 [ 549.931863] ? __secure_computing+0xb4/0x290 [ 549.932772] do_syscall_64+0x33/0x40 [ 549.933527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 549.934565] RIP: 0033:0x466609 [ 549.935241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 549.938951] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 549.940481] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 549.941922] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 549.943440] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 549.944901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.946377] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 549.992089] FAT-fs (loop1): invalid media value (0x00) [ 549.993265] FAT-fs (loop1): Can't find a valid FAT filesystem 01:13:26 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440", 0x12}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:13:26 executing program 7 (fault-call:1 fault-nth:6): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:26 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440", 0x12}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 550.115752] FAULT_INJECTION: forcing a failure. [ 550.115752] name failslab, interval 1, probability 0, space 0, times 0 [ 550.118124] CPU: 1 PID: 6076 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 550.119509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 550.121748] Call Trace: [ 550.122291] dump_stack+0x107/0x163 [ 550.123048] should_fail.cold+0x5/0xa [ 550.123831] ? create_object.isra.0+0x3a/0xa20 [ 550.124750] should_failslab+0x5/0x10 [ 550.125512] kmem_cache_alloc+0x5b/0x350 [ 550.126343] ? kmem_cache_alloc+0x159/0x350 [ 550.127234] create_object.isra.0+0x3a/0xa20 [ 550.128119] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 550.129145] __kmalloc+0x16e/0x3e0 [ 550.129871] security_prepare_creds+0x10a/0x180 [ 550.130794] prepare_creds+0x45c/0x670 [ 550.131601] ? lockdep_init_map_waits+0x26a/0x700 [ 550.132574] copy_creds+0x72/0x590 [ 550.133299] copy_process+0xf12/0x6650 [ 550.134090] ? lock_downgrade+0x6d0/0x6d0 [ 550.134936] ? perf_trace_lock+0xac/0x490 [ 550.135780] ? __cleanup_sighand+0xb0/0xb0 [ 550.136634] ? __bpf_prog_run32+0x8f/0xd0 [ 550.137474] ? perf_trace_lock+0xac/0x490 [ 550.138319] kernel_clone+0xe7/0xa20 [ 550.139096] ? copy_init_mm+0x20/0x20 [ 550.139862] ? lock_downgrade+0x6d0/0x6d0 [ 550.140692] ? find_held_lock+0x2c/0x110 [ 550.141508] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 550.142554] ? __seccomp_filter+0x236/0x1470 [ 550.143490] ? seccomp_notify_ioctl+0xda0/0xda0 [ 550.144437] __do_sys_clone+0xc8/0x110 [ 550.145197] ? __do_sys_vfork+0xd0/0xd0 [ 550.146017] ? __secure_computing+0xb4/0x290 [ 550.146939] do_syscall_64+0x33/0x40 [ 550.147694] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 550.148724] RIP: 0033:0x466609 [ 550.149375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 550.153123] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 550.154653] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 550.156103] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 550.157540] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 550.158993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 550.160427] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 550.223239] FAT-fs (loop1): invalid media value (0x00) [ 550.223908] FAT-fs (loop3): invalid media value (0x00) [ 550.224243] FAT-fs (loop1): Can't find a valid FAT filesystem [ 550.225293] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:37 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440", 0x12}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:13:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:13:37 executing program 7 (fault-call:1 fault-nth:7): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:37 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:37 executing program 4 (fault-call:1 fault-nth:6): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:37 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440", 0x12}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:13:37 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000", 0x15}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 560.828553] FAULT_INJECTION: forcing a failure. [ 560.828553] name failslab, interval 1, probability 0, space 0, times 0 [ 560.829847] CPU: 1 PID: 6105 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 560.829948] FAULT_INJECTION: forcing a failure. [ 560.829948] name failslab, interval 1, probability 0, space 0, times 0 [ 560.830531] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 560.830540] Call Trace: [ 560.833520] dump_stack+0x107/0x163 [ 560.833924] should_fail.cold+0x5/0xa [ 560.834317] ? create_object.isra.0+0x3a/0xa20 [ 560.834818] should_failslab+0x5/0x10 [ 560.835222] kmem_cache_alloc+0x5b/0x350 [ 560.835630] ? kmem_cache_alloc+0x159/0x350 [ 560.836068] create_object.isra.0+0x3a/0xa20 [ 560.836554] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 560.837075] __kmalloc+0x16e/0x3e0 [ 560.837466] security_prepare_creds+0x10a/0x180 [ 560.837939] prepare_creds+0x45c/0x670 [ 560.838470] ? lockdep_init_map_waits+0x26a/0x700 [ 560.839115] copy_creds+0x72/0x590 [ 560.839590] copy_process+0xf12/0x6650 [ 560.840113] ? lock_downgrade+0x6d0/0x6d0 [ 560.840665] ? perf_trace_lock+0xac/0x490 [ 560.841212] ? __cleanup_sighand+0xb0/0xb0 [ 560.841768] ? __bpf_prog_run32+0x8f/0xd0 [ 560.842328] ? perf_trace_lock+0xac/0x490 [ 560.842875] kernel_clone+0xe7/0xa20 [ 560.843392] ? copy_init_mm+0x20/0x20 [ 560.843890] ? lock_downgrade+0x6d0/0x6d0 [ 560.844428] ? find_held_lock+0x2c/0x110 [ 560.844964] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 560.845638] ? __seccomp_filter+0x236/0x1470 [ 560.846217] ? seccomp_notify_ioctl+0xda0/0xda0 [ 560.846834] __do_sys_clone+0xc8/0x110 [ 560.847359] ? __do_sys_vfork+0xd0/0xd0 [ 560.847896] ? __secure_computing+0xb4/0x290 [ 560.848481] do_syscall_64+0x33/0x40 [ 560.848968] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 560.849638] RIP: 0033:0x466609 [ 560.850061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 560.852232] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 560.853068] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 560.853846] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 560.854659] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 560.855516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 560.856351] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 560.857226] CPU: 0 PID: 6101 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 560.858028] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 560.859262] Call Trace: [ 560.859553] dump_stack+0x107/0x163 [ 560.859941] should_fail.cold+0x5/0xa [ 560.860350] ? __delayacct_tsk_init+0x1b/0x80 [ 560.860828] should_failslab+0x5/0x10 [ 560.861229] kmem_cache_alloc+0x5b/0x350 [ 560.861661] ? lockdep_init_map_waits+0x26a/0x700 [ 560.862202] __delayacct_tsk_init+0x1b/0x80 [ 560.862679] copy_process+0x4414/0x6650 [ 560.863113] ? lock_downgrade+0x6d0/0x6d0 [ 560.863585] ? __cleanup_sighand+0xb0/0xb0 [ 560.864033] ? __bpf_prog_run32+0x8f/0xd0 [ 560.864467] ? perf_trace_lock+0xac/0x490 [ 560.864935] kernel_clone+0xe7/0xa20 [ 560.865329] ? copy_init_mm+0x20/0x20 [ 560.865745] ? lock_downgrade+0x6d0/0x6d0 [ 560.866183] ? find_held_lock+0x2c/0x110 [ 560.866628] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 560.867174] ? __seccomp_filter+0x236/0x1470 [ 560.867636] ? seccomp_notify_ioctl+0xda0/0xda0 [ 560.868154] __do_sys_clone+0xc8/0x110 [ 560.868601] ? __do_sys_vfork+0xd0/0xd0 [ 560.869057] ? __secure_computing+0xb4/0x290 [ 560.869547] do_syscall_64+0x33/0x40 [ 560.869959] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 560.870542] RIP: 0033:0x466609 [ 560.870902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 560.872999] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 560.873870] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 560.874687] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 560.875517] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 560.876317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 560.877111] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:13:37 executing program 4 (fault-call:1 fault-nth:7): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 560.899312] FAT-fs (loop3): invalid media value (0x00) [ 560.899954] FAT-fs (loop3): Can't find a valid FAT filesystem [ 560.902822] FAT-fs (loop1): invalid media value (0x00) [ 560.903459] FAT-fs (loop1): Can't find a valid FAT filesystem [ 560.909950] FAT-fs (loop0): invalid media value (0x00) [ 560.910548] FAT-fs (loop0): Can't find a valid FAT filesystem 01:13:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:13:37 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440", 0x12}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 560.950556] FAULT_INJECTION: forcing a failure. [ 560.950556] name failslab, interval 1, probability 0, space 0, times 0 01:13:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 560.951961] CPU: 1 PID: 6115 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 560.952796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 560.954102] Call Trace: [ 560.954397] dump_stack+0x107/0x163 [ 560.954810] should_fail.cold+0x5/0xa [ 560.955245] ? __delayacct_tsk_init+0x1b/0x80 [ 560.955761] should_failslab+0x5/0x10 [ 560.956200] kmem_cache_alloc+0x5b/0x350 [ 560.956673] ? lockdep_init_map_waits+0x26a/0x700 [ 560.957191] __delayacct_tsk_init+0x1b/0x80 [ 560.957696] copy_process+0x4414/0x6650 [ 560.958131] ? lock_downgrade+0x6d0/0x6d0 [ 560.958605] ? __cleanup_sighand+0xb0/0xb0 [ 560.959059] ? __bpf_prog_run32+0x8f/0xd0 [ 560.959550] ? perf_trace_lock+0xac/0x490 [ 560.960039] kernel_clone+0xe7/0xa20 [ 560.960469] ? copy_init_mm+0x20/0x20 [ 560.960899] ? lock_downgrade+0x6d0/0x6d0 [ 560.961369] ? find_held_lock+0x2c/0x110 [ 560.961832] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 560.962417] ? __seccomp_filter+0x236/0x1470 [ 560.962923] ? seccomp_notify_ioctl+0xda0/0xda0 [ 560.963442] __do_sys_clone+0xc8/0x110 [ 560.963886] ? __do_sys_vfork+0xd0/0xd0 [ 560.964349] ? __secure_computing+0xb4/0x290 [ 560.964855] do_syscall_64+0x33/0x40 [ 560.965285] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 560.965879] RIP: 0033:0x466609 [ 560.966251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 560.968357] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 560.969231] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 560.970051] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 560.970874] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 560.971703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 560.972530] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:13:37 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000", 0x15}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 561.016777] FAT-fs (loop3): invalid media value (0x00) [ 561.017459] FAT-fs (loop3): Can't find a valid FAT filesystem 01:13:47 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000", 0x15}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:13:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:13:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:47 executing program 4 (fault-call:1 fault-nth:8): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:13:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) 01:13:47 executing program 7 (fault-call:1 fault-nth:8): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:13:47 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000", 0x15}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 571.388427] FAULT_INJECTION: forcing a failure. [ 571.388427] name failslab, interval 1, probability 0, space 0, times 0 [ 571.390191] CPU: 0 PID: 6139 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 571.391169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 571.392846] Call Trace: [ 571.393231] dump_stack+0x107/0x163 [ 571.393765] should_fail.cold+0x5/0xa [ 571.394342] ? create_object.isra.0+0x3a/0xa20 [ 571.395029] should_failslab+0x5/0x10 [ 571.395578] kmem_cache_alloc+0x5b/0x350 [ 571.396177] create_object.isra.0+0x3a/0xa20 [ 571.396835] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 571.397578] kmem_cache_alloc+0x159/0x350 [ 571.398208] ? lockdep_init_map_waits+0x26a/0x700 [ 571.398930] __delayacct_tsk_init+0x1b/0x80 [ 571.399597] copy_process+0x4414/0x6650 [ 571.400204] ? lock_downgrade+0x6d0/0x6d0 [ 571.400847] ? __cleanup_sighand+0xb0/0xb0 [ 571.401486] ? __bpf_prog_run32+0x8f/0xd0 [ 571.402111] ? perf_trace_lock+0xac/0x490 [ 571.402721] kernel_clone+0xe7/0xa20 [ 571.403280] ? copy_init_mm+0x20/0x20 [ 571.403836] ? lock_downgrade+0x6d0/0x6d0 [ 571.404421] ? find_held_lock+0x2c/0x110 [ 571.405023] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 571.405751] ? __seccomp_filter+0x236/0x1470 [ 571.406385] ? seccomp_notify_ioctl+0xda0/0xda0 [ 571.407022] __do_sys_clone+0xc8/0x110 [ 571.407594] ? __do_sys_vfork+0xd0/0xd0 [ 571.408158] ? __secure_computing+0xb4/0x290 [ 571.408809] do_syscall_64+0x33/0x40 [ 571.409321] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 571.410065] RIP: 0033:0x466609 [ 571.410510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.413204] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 571.414321] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 571.415363] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 571.416396] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 571.417439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 571.418500] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 571.428153] FAT-fs (loop1): invalid media value (0x00) [ 571.428996] FAT-fs (loop1): Can't find a valid FAT filesystem 01:13:47 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f8", 0x16}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:13:47 executing program 7 (fault-call:1 fault-nth:9): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 571.462275] FAULT_INJECTION: forcing a failure. [ 571.462275] name failslab, interval 1, probability 0, space 0, times 0 [ 571.465020] CPU: 1 PID: 6148 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 571.466478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 571.468924] Call Trace: [ 571.469496] dump_stack+0x107/0x163 [ 571.470289] should_fail.cold+0x5/0xa [ 571.471117] ? create_object.isra.0+0x3a/0xa20 [ 571.472111] should_failslab+0x5/0x10 [ 571.472930] kmem_cache_alloc+0x5b/0x350 [ 571.473815] create_object.isra.0+0x3a/0xa20 [ 571.474763] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 571.475878] kmem_cache_alloc+0x159/0x350 [ 571.476786] __delayacct_tsk_init+0x1b/0x80 [ 571.477709] copy_process+0x4414/0x6650 [ 571.478574] ? lock_downgrade+0x6d0/0x6d0 [ 571.479490] ? __cleanup_sighand+0xb0/0xb0 [ 571.480413] ? perf_trace_lock+0xac/0x490 [ 571.481314] kernel_clone+0xe7/0xa20 [ 571.482117] ? copy_init_mm+0x20/0x20 [ 571.482933] ? lock_downgrade+0x6d0/0x6d0 [ 571.483825] ? find_held_lock+0x2c/0x110 [ 571.484703] ? ksys_write+0x12d/0x250 [ 571.485534] __do_sys_clone+0xc8/0x110 [ 571.486369] ? __do_sys_vfork+0xd0/0xd0 [ 571.487222] ? rcu_read_lock_any_held+0x69/0x90 [ 571.488234] ? vfs_write+0x354/0xa20 [ 571.489054] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 571.490183] ? syscall_enter_from_user_mode+0x1d/0x50 [ 571.491304] do_syscall_64+0x33/0x40 [ 571.492108] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 571.493208] RIP: 0033:0x466609 [ 571.493901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.497825] RSP: 002b:00007f5d1133f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 01:13:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 571.499476] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 571.501215] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 571.502769] RBP: 00007f5d1133f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 571.504319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 571.505852] R13: 00007ffe62c6af4f R14: 00007f5d1133f300 R15: 0000000000022000 01:13:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e23, 0x10001, @initdev={0xfe, 0x88, '\x00', 0x5, 0x0}}, 0x1c) [ 571.528444] FAT-fs (loop3): invalid media value (0x00) [ 571.529811] FAT-fs (loop3): Can't find a valid FAT filesystem [ 571.565305] FAULT_INJECTION: forcing a failure. [ 571.565305] name failslab, interval 1, probability 0, space 0, times 0 [ 571.567855] CPU: 1 PID: 6156 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 571.569312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 571.571734] Call Trace: [ 571.572294] dump_stack+0x107/0x163 [ 571.573084] should_fail.cold+0x5/0xa [ 571.574098] ? dup_fd+0x89/0xca0 [ 571.574857] should_failslab+0x5/0x10 [ 571.575714] kmem_cache_alloc+0x5b/0x350 [ 571.576609] dup_fd+0x89/0xca0 [ 571.577323] ? audit_filter_inodes+0x40/0x40 [ 571.578302] ? security_task_alloc+0xe6/0x260 [ 571.579304] copy_process+0x1890/0x6650 [ 571.580206] ? __cleanup_sighand+0xb0/0xb0 [ 571.581129] ? __bpf_prog_run32+0x8f/0xd0 [ 571.582038] ? perf_trace_lock+0xac/0x490 [ 571.582953] kernel_clone+0xe7/0xa20 [ 571.583790] ? copy_init_mm+0x20/0x20 [ 571.584619] ? lock_downgrade+0x6d0/0x6d0 [ 571.585529] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 571.586661] ? __seccomp_filter+0x236/0x1470 [ 571.587653] ? seccomp_notify_ioctl+0xda0/0xda0 [ 571.588677] __do_sys_clone+0xc8/0x110 [ 571.589523] ? __do_sys_vfork+0xd0/0xd0 [ 571.590423] ? __secure_computing+0xb4/0x290 [ 571.591408] do_syscall_64+0x33/0x40 [ 571.592228] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 571.593350] RIP: 0033:0x466609 [ 571.594056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.598085] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 571.599798] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 571.601356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 571.602914] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 571.604493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 571.606046] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:13:48 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000", 0x15}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 571.625814] FAT-fs (loop1): bogus number of FAT sectors [ 571.626595] FAT-fs (loop1): Can't find a valid FAT filesystem 01:13:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:13:48 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f8", 0x16}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 571.683765] FAT-fs (loop3): invalid media value (0x00) [ 571.684548] FAT-fs (loop3): Can't find a valid FAT filesystem [ 571.751158] FAT-fs (loop1): bogus number of FAT sectors [ 571.752520] FAT-fs (loop1): Can't find a valid FAT filesystem 01:13:48 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000", 0x15}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:13:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:13:48 executing program 4 (fault-call:1 fault-nth:9): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 571.830584] FAT-fs (loop3): invalid media value (0x00) [ 571.832039] FAT-fs (loop3): Can't find a valid FAT filesystem [ 571.862243] FAULT_INJECTION: forcing a failure. [ 571.862243] name failslab, interval 1, probability 0, space 0, times 0 [ 571.864091] CPU: 0 PID: 6177 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 571.865074] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 571.866704] Call Trace: [ 571.867083] dump_stack+0x107/0x163 [ 571.867635] should_fail.cold+0x5/0xa [ 571.868183] ? dup_fd+0x89/0xca0 [ 571.868690] should_failslab+0x5/0x10 [ 571.869249] kmem_cache_alloc+0x5b/0x350 [ 571.869848] dup_fd+0x89/0xca0 [ 571.870338] ? audit_filter_inodes+0x40/0x40 [ 571.870975] ? security_task_alloc+0xe6/0x260 [ 571.871617] copy_process+0x1890/0x6650 [ 571.872197] ? __cleanup_sighand+0xb0/0xb0 [ 571.872802] ? __bpf_prog_run32+0x8f/0xd0 [ 571.873396] ? perf_trace_lock+0xac/0x490 [ 571.874012] kernel_clone+0xe7/0xa20 [ 571.874575] ? copy_init_mm+0x20/0x20 [ 571.875112] ? lock_downgrade+0x6d0/0x6d0 [ 571.875721] ? find_held_lock+0x2c/0x110 [ 571.876318] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 571.877055] ? __seccomp_filter+0x236/0x1470 [ 571.877682] ? seccomp_notify_ioctl+0xda0/0xda0 [ 571.878362] __do_sys_clone+0xc8/0x110 [ 571.878914] ? __do_sys_vfork+0xd0/0xd0 [ 571.879520] ? __secure_computing+0xb4/0x290 [ 571.880186] do_syscall_64+0x33/0x40 [ 571.880721] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 571.881451] RIP: 0033:0x466609 [ 571.881911] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.884608] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 571.885755] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 571.886848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 571.887926] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 571.888958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 571.890033] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 582.985557] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:14:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f8", 0x16}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:14:06 executing program 7 (fault-call:1 fault-nth:10): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:06 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f8", 0x16}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:14:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:14:06 executing program 4 (fault-call:1 fault-nth:10): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:14:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 590.380593] FAULT_INJECTION: forcing a failure. [ 590.380593] name failslab, interval 1, probability 0, space 0, times 0 [ 590.381969] CPU: 0 PID: 6198 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 590.382737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 590.384013] Call Trace: [ 590.384309] dump_stack+0x107/0x163 [ 590.384717] should_fail.cold+0x5/0xa [ 590.385161] ? create_object.isra.0+0x3a/0xa20 [ 590.385676] should_failslab+0x5/0x10 [ 590.386102] kmem_cache_alloc+0x5b/0x350 [ 590.386574] create_object.isra.0+0x3a/0xa20 [ 590.387078] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 590.387668] kmem_cache_alloc+0x159/0x350 [ 590.388148] dup_fd+0x89/0xca0 [ 590.388509] ? audit_filter_inodes+0x40/0x40 [ 590.389012] ? security_task_alloc+0xe6/0x260 [ 590.389526] copy_process+0x1890/0x6650 [ 590.389986] ? __cleanup_sighand+0xb0/0xb0 [ 590.390462] ? __bpf_prog_run32+0x8f/0xd0 [ 590.390933] ? perf_trace_lock+0xac/0x490 [ 590.391407] kernel_clone+0xe7/0xa20 [ 590.391849] ? copy_init_mm+0x20/0x20 [ 590.392281] ? lock_downgrade+0x6d0/0x6d0 [ 590.392747] ? find_held_lock+0x2c/0x110 [ 590.393213] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 590.393764] ? __seccomp_filter+0x236/0x1470 [ 590.394236] ? seccomp_notify_ioctl+0xda0/0xda0 [ 590.394734] __do_sys_clone+0xc8/0x110 [ 590.395197] ? __do_sys_vfork+0xd0/0xd0 [ 590.395673] ? __secure_computing+0xb4/0x290 [ 590.396150] do_syscall_64+0x33/0x40 [ 590.396583] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 590.397132] RIP: 0033:0x466609 [ 590.397494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.399545] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 590.400417] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 590.401232] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 590.402039] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 590.402844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 590.403667] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:14:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 590.418811] FAT-fs (loop1): bogus number of FAT sectors [ 590.419436] FAT-fs (loop1): Can't find a valid FAT filesystem 01:14:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100), 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 590.436258] FAULT_INJECTION: forcing a failure. [ 590.436258] name failslab, interval 1, probability 0, space 0, times 0 [ 590.437558] CPU: 0 PID: 6208 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 590.438348] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 590.439647] Call Trace: [ 590.439945] dump_stack+0x107/0x163 [ 590.440357] should_fail.cold+0x5/0xa [ 590.440795] ? create_object.isra.0+0x3a/0xa20 [ 590.441314] should_failslab+0x5/0x10 [ 590.441753] kmem_cache_alloc+0x5b/0x350 [ 590.442223] create_object.isra.0+0x3a/0xa20 [ 590.442723] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 590.443310] kmem_cache_alloc+0x159/0x350 [ 590.443793] dup_fd+0x89/0xca0 [ 590.444162] ? audit_filter_inodes+0x40/0x40 [ 590.444658] ? security_task_alloc+0xe6/0x260 [ 590.445176] copy_process+0x1890/0x6650 [ 590.445640] ? __cleanup_sighand+0xb0/0xb0 [ 590.446131] ? perf_trace_lock+0xac/0x490 [ 590.446612] kernel_clone+0xe7/0xa20 [ 590.447041] ? copy_init_mm+0x20/0x20 [ 590.447470] ? lock_downgrade+0x6d0/0x6d0 [ 590.447950] ? find_held_lock+0x2c/0x110 [ 590.448411] ? ksys_write+0x12d/0x250 [ 590.448839] __do_sys_clone+0xc8/0x110 [ 590.449288] ? __do_sys_vfork+0xd0/0xd0 [ 590.449745] ? rcu_read_lock_any_held+0x69/0x90 [ 590.450294] ? vfs_write+0x354/0xa20 [ 590.450735] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 590.451340] ? syscall_enter_from_user_mode+0x1d/0x50 [ 590.451949] do_syscall_64+0x33/0x40 [ 590.452376] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 590.452967] RIP: 0033:0x466609 [ 590.453342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.455449] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 01:14:06 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 590.456332] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 590.457300] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 590.458108] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 590.458920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 590.459767] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 [ 590.482246] FAT-fs (loop3): bogus number of FAT sectors [ 590.482963] FAT-fs (loop3): Can't find a valid FAT filesystem 01:14:06 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, 0x0) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:14:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:06 executing program 4 (fault-call:1 fault-nth:11): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 590.568281] FAULT_INJECTION: forcing a failure. [ 590.568281] name failslab, interval 1, probability 0, space 0, times 0 [ 590.569669] CPU: 0 PID: 6222 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 590.570436] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 590.571728] Call Trace: [ 590.572028] dump_stack+0x107/0x163 [ 590.572443] should_fail.cold+0x5/0xa [ 590.572867] ? alloc_fdtable+0x7e/0x280 [ 590.573331] should_failslab+0x5/0x10 [ 590.573769] kmem_cache_alloc_trace+0x55/0x360 [ 590.574295] ? rwlock_bug.part.0+0x90/0x90 [ 590.574764] alloc_fdtable+0x7e/0x280 [ 590.575200] dup_fd+0x718/0xca0 [ 590.575573] copy_process+0x1890/0x6650 [ 590.576048] ? __cleanup_sighand+0xb0/0xb0 [ 590.576516] ? __bpf_prog_run32+0x8f/0xd0 [ 590.576987] ? perf_trace_lock+0xac/0x490 [ 590.577470] kernel_clone+0xe7/0xa20 [ 590.577896] ? copy_init_mm+0x20/0x20 [ 590.578329] ? lock_downgrade+0x6d0/0x6d0 [ 590.578799] ? find_held_lock+0x2c/0x110 [ 590.579263] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 590.579881] ? __seccomp_filter+0x236/0x1470 [ 590.580391] ? seccomp_notify_ioctl+0xda0/0xda0 [ 590.580936] __do_sys_clone+0xc8/0x110 [ 590.581377] ? __do_sys_vfork+0xd0/0xd0 [ 590.581835] ? __secure_computing+0xb4/0x290 [ 590.582340] do_syscall_64+0x33/0x40 [ 590.582774] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 590.583357] RIP: 0033:0x466609 [ 590.583732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.585800] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 590.586653] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 590.587448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 590.588269] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 590.589068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 590.589864] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:14:07 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f8", 0x16}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 590.627319] FAT-fs (loop3): bogus number of FAT sectors [ 590.628073] FAT-fs (loop3): Can't find a valid FAT filesystem 01:14:18 executing program 4 (fault-call:1 fault-nth:12): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:18 executing program 7 (fault-call:1 fault-nth:11): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:14:18 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500", 0xc}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:14:18 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, 0x0) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:14:18 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f8", 0x16}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:14:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 602.563292] FAT-fs (loop3): bogus number of FAT sectors [ 602.564002] FAT-fs (loop3): Can't find a valid FAT filesystem [ 602.569946] FAULT_INJECTION: forcing a failure. [ 602.569946] name failslab, interval 1, probability 0, space 0, times 0 [ 602.571915] CPU: 0 PID: 6253 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 602.573034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 602.574914] Call Trace: [ 602.575360] dump_stack+0x107/0x163 [ 602.575993] should_fail.cold+0x5/0xa [ 602.576633] ? create_object.isra.0+0x3a/0xa20 [ 602.577393] should_failslab+0x5/0x10 [ 602.578027] kmem_cache_alloc+0x5b/0x350 [ 602.578702] ? find_held_lock+0x2c/0x110 [ 602.579382] create_object.isra.0+0x3a/0xa20 [ 602.580114] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 602.580961] kmem_cache_alloc_trace+0x151/0x360 [ 602.581739] ? rwlock_bug.part.0+0x90/0x90 [ 602.582438] alloc_fdtable+0x7e/0x280 [ 602.583094] dup_fd+0x718/0xca0 [ 602.583664] copy_process+0x1890/0x6650 [ 602.584357] ? __cleanup_sighand+0xb0/0xb0 [ 602.585076] ? __bpf_prog_run32+0x8f/0xd0 [ 602.585778] ? perf_trace_lock+0xac/0x490 [ 602.586486] kernel_clone+0xe7/0xa20 [ 602.587119] ? copy_init_mm+0x20/0x20 [ 602.587756] ? lock_downgrade+0x6d0/0x6d0 [ 602.588474] ? find_held_lock+0x2c/0x110 [ 602.589156] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 602.590027] ? __seccomp_filter+0x236/0x1470 [ 602.590769] ? seccomp_notify_ioctl+0xda0/0xda0 [ 602.591062] FAULT_INJECTION: forcing a failure. [ 602.591062] name failslab, interval 1, probability 0, space 0, times 0 [ 602.591556] __do_sys_clone+0xc8/0x110 [ 602.593408] ? __do_sys_vfork+0xd0/0xd0 [ 602.594076] ? __secure_computing+0xb4/0x290 [ 602.594801] do_syscall_64+0x33/0x40 [ 602.595411] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 602.596334] RIP: 0033:0x466609 [ 602.596875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.599950] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 602.601219] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 602.602405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 602.603588] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.604785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.605968] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 602.607173] CPU: 1 PID: 6254 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 602.607909] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 602.609105] Call Trace: [ 602.609387] dump_stack+0x107/0x163 [ 602.609774] should_fail.cold+0x5/0xa [ 602.610177] ? alloc_fdtable+0x7e/0x280 [ 602.610600] should_failslab+0x5/0x10 [ 602.611005] kmem_cache_alloc_trace+0x55/0x360 [ 602.611489] ? rwlock_bug.part.0+0x90/0x90 [ 602.611954] alloc_fdtable+0x7e/0x280 [ 602.612362] dup_fd+0x718/0xca0 [ 602.612722] copy_process+0x1890/0x6650 [ 602.613156] ? __cleanup_sighand+0xb0/0xb0 [ 602.613604] ? __bpf_prog_run32+0x8f/0xd0 [ 602.614050] ? perf_trace_lock+0xac/0x490 [ 602.614493] kernel_clone+0xe7/0xa20 [ 602.614891] ? copy_init_mm+0x20/0x20 [ 602.615294] ? lock_downgrade+0x6d0/0x6d0 [ 602.615732] ? find_held_lock+0x2c/0x110 [ 602.616170] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 602.616714] ? __seccomp_filter+0x236/0x1470 [ 602.617180] ? seccomp_notify_ioctl+0xda0/0xda0 [ 602.617675] __do_sys_clone+0xc8/0x110 [ 602.618086] ? __do_sys_vfork+0xd0/0xd0 [ 602.618515] ? __secure_computing+0xb4/0x290 [ 602.618984] do_syscall_64+0x33/0x40 [ 602.619379] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 602.619930] RIP: 0033:0x466609 [ 602.620270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.622205] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 602.623010] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 602.623761] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 602.624528] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.625280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.626031] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:14:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:19 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, 0x0) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:14:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 602.646724] FAT-fs (loop0): bogus number of reserved sectors [ 602.647800] FAT-fs (loop0): Can't find a valid FAT filesystem 01:14:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) move_mount(r1, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file1\x00', 0x4) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) lseek(r3, 0x800, 0x0) sendfile(r3, r0, 0x0, 0x7ffffffc) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 01:14:19 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, 0x0) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:14:19 executing program 4 (fault-call:1 fault-nth:13): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 602.700862] FAULT_INJECTION: forcing a failure. [ 602.700862] name failslab, interval 1, probability 0, space 0, times 0 [ 602.702188] CPU: 1 PID: 6269 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 602.702935] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 602.704192] Call Trace: [ 602.704491] dump_stack+0x107/0x163 [ 602.704896] should_fail.cold+0x5/0xa [ 602.705330] ? kvmalloc_node+0x61/0xf0 [ 602.705761] should_failslab+0x5/0x10 [ 602.706181] __kmalloc_node+0x76/0x4a0 [ 602.706621] kvmalloc_node+0x61/0xf0 [ 602.707031] alloc_fdtable+0xcd/0x280 [ 602.707449] dup_fd+0x718/0xca0 [ 602.707829] copy_process+0x1890/0x6650 [ 602.708279] ? __cleanup_sighand+0xb0/0xb0 [ 602.708745] ? __bpf_prog_run32+0x8f/0xd0 [ 602.709210] ? perf_trace_lock+0xac/0x490 [ 602.709674] kernel_clone+0xe7/0xa20 [ 602.710084] ? copy_init_mm+0x20/0x20 [ 602.710502] ? lock_downgrade+0x6d0/0x6d0 [ 602.710951] ? find_held_lock+0x2c/0x110 [ 602.711395] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 602.711970] ? __seccomp_filter+0x236/0x1470 [ 602.712454] ? seccomp_notify_ioctl+0xda0/0xda0 [ 602.712977] __do_sys_clone+0xc8/0x110 [ 602.713402] ? __do_sys_vfork+0xd0/0xd0 [ 602.713851] ? __secure_computing+0xb4/0x290 [ 602.714340] do_syscall_64+0x33/0x40 [ 602.714762] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 602.715321] RIP: 0033:0x466609 [ 602.715674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.717694] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 602.718527] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 602.719306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 602.720096] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.720873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.721654] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:14:19 executing program 4 (fault-call:1 fault-nth:14): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 602.753194] FAULT_INJECTION: forcing a failure. [ 602.753194] name failslab, interval 1, probability 0, space 0, times 0 [ 602.754473] CPU: 1 PID: 6275 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 602.755215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 602.756466] Call Trace: [ 602.756767] dump_stack+0x107/0x163 [ 602.757171] should_fail.cold+0x5/0xa [ 602.757593] ? create_object.isra.0+0x3a/0xa20 [ 602.758104] should_failslab+0x5/0x10 [ 602.758517] kmem_cache_alloc+0x5b/0x350 [ 602.758975] ? lock_downgrade+0x6d0/0x6d0 [ 602.759432] create_object.isra.0+0x3a/0xa20 [ 602.759917] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 602.760475] __kmalloc_node+0x1ae/0x4a0 [ 602.760927] kvmalloc_node+0x61/0xf0 [ 602.761334] alloc_fdtable+0xcd/0x280 [ 602.761772] dup_fd+0x718/0xca0 [ 602.762147] copy_process+0x1890/0x6650 [ 602.762610] ? __cleanup_sighand+0xb0/0xb0 [ 602.763072] ? __bpf_prog_run32+0x8f/0xd0 [ 602.763526] ? perf_trace_lock+0xac/0x490 [ 602.764009] kernel_clone+0xe7/0xa20 [ 602.764415] ? copy_init_mm+0x20/0x20 [ 602.764840] ? lock_downgrade+0x6d0/0x6d0 [ 602.765295] ? find_held_lock+0x2c/0x110 [ 602.765744] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 602.766307] ? __seccomp_filter+0x236/0x1470 [ 602.766802] ? seccomp_notify_ioctl+0xda0/0xda0 [ 602.767314] __do_sys_clone+0xc8/0x110 [ 602.767735] ? __do_sys_vfork+0xd0/0xd0 [ 602.768191] ? __secure_computing+0xb4/0x290 [ 602.768709] do_syscall_64+0x33/0x40 [ 602.769114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 602.769685] RIP: 0033:0x466609 [ 602.770035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.772082] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 602.772928] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 602.773699] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 602.774493] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.775284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.776090] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:14:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:19 executing program 7 (fault-call:1 fault-nth:12): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 602.883525] FAULT_INJECTION: forcing a failure. [ 602.883525] name failslab, interval 1, probability 0, space 0, times 0 [ 602.885204] CPU: 0 PID: 6285 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 602.886191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 602.887734] Call Trace: [ 602.888102] dump_stack+0x107/0x163 [ 602.888595] should_fail.cold+0x5/0xa [ 602.889119] ? create_object.isra.0+0x3a/0xa20 [ 602.889738] should_failslab+0x5/0x10 [ 602.890254] kmem_cache_alloc+0x5b/0x350 [ 602.890807] ? find_held_lock+0x2c/0x110 [ 602.891360] create_object.isra.0+0x3a/0xa20 [ 602.891953] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 602.892640] kmem_cache_alloc_trace+0x151/0x360 [ 602.893260] ? rwlock_bug.part.0+0x90/0x90 [ 602.893825] alloc_fdtable+0x7e/0x280 [ 602.894334] dup_fd+0x718/0xca0 [ 602.894788] copy_process+0x1890/0x6650 [ 602.895332] ? __cleanup_sighand+0xb0/0xb0 [ 602.895913] ? __bpf_prog_run32+0x8f/0xd0 [ 602.896470] ? perf_trace_lock+0xac/0x490 [ 602.897029] kernel_clone+0xe7/0xa20 [ 602.897530] ? copy_init_mm+0x20/0x20 [ 602.898032] ? lock_downgrade+0x6d0/0x6d0 [ 602.898582] ? find_held_lock+0x2c/0x110 [ 602.899125] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 602.899821] ? __seccomp_filter+0x236/0x1470 [ 602.900409] ? seccomp_notify_ioctl+0xda0/0xda0 [ 602.901028] __do_sys_clone+0xc8/0x110 [ 602.901544] ? __do_sys_vfork+0xd0/0xd0 [ 602.902076] ? __secure_computing+0xb4/0x290 [ 602.902666] do_syscall_64+0x33/0x40 [ 602.903158] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 602.903853] RIP: 0033:0x466609 [ 602.904284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 602.906706] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 602.907711] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 602.908663] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 602.909604] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 602.910544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 602.911487] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:14:29 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, 0x0) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:14:29 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:14:29 executing program 7 (fault-call:1 fault-nth:13): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:14:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:29 executing program 4 (fault-call:1 fault-nth:15): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 613.330458] FAULT_INJECTION: forcing a failure. [ 613.330458] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 613.331804] CPU: 0 PID: 6301 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 613.332535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 613.333753] Call Trace: [ 613.334040] dump_stack+0x107/0x163 [ 613.334464] should_fail.cold+0x5/0xa [ 613.334880] _copy_from_user+0x2e/0x1b0 [ 613.335314] move_addr_to_kernel.part.0+0x31/0x110 [ 613.335839] __sys_connect+0xda/0x190 [ 613.336266] ? __sys_connect_file+0x1a0/0x1a0 [ 613.336745] ? rcu_read_lock_any_held+0x69/0x90 [ 613.337244] ? vfs_write+0x354/0xa20 [ 613.337643] ? fput_many+0x2f/0x1a0 [ 613.338030] ? ksys_write+0x1a5/0x250 [ 613.338506] __x64_sys_connect+0x6f/0xb0 [ 613.338941] ? syscall_enter_from_user_mode+0x1d/0x50 [ 613.339492] do_syscall_64+0x33/0x40 [ 613.339895] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 613.340480] RIP: 0033:0x466609 [ 613.340822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.342871] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 613.343705] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 613.344505] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 613.345292] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 613.346090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 613.346885] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 01:14:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 613.376675] FAULT_INJECTION: forcing a failure. [ 613.376675] name failslab, interval 1, probability 0, space 0, times 0 [ 613.376945] FAULT_INJECTION: forcing a failure. [ 613.376945] name failslab, interval 1, probability 0, space 0, times 0 [ 613.378350] CPU: 0 PID: 6305 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 613.381113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 613.382385] Call Trace: [ 613.382677] dump_stack+0x107/0x163 [ 613.383075] should_fail.cold+0x5/0xa [ 613.383496] ? kvmalloc_node+0x61/0xf0 [ 613.383922] should_failslab+0x5/0x10 [ 613.384357] __kmalloc_node+0x76/0x4a0 [ 613.384806] kvmalloc_node+0x61/0xf0 [ 613.385225] alloc_fdtable+0xcd/0x280 [ 613.385639] dup_fd+0x718/0xca0 [ 613.386010] copy_process+0x1890/0x6650 [ 613.386491] ? __cleanup_sighand+0xb0/0xb0 [ 613.386947] ? __bpf_prog_run32+0x8f/0xd0 [ 613.387406] ? perf_trace_lock+0xac/0x490 [ 613.387867] kernel_clone+0xe7/0xa20 [ 613.388301] ? copy_init_mm+0x20/0x20 [ 613.388719] ? lock_downgrade+0x6d0/0x6d0 [ 613.389165] ? find_held_lock+0x2c/0x110 [ 613.389615] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 613.390196] ? __seccomp_filter+0x236/0x1470 [ 613.390807] ? seccomp_notify_ioctl+0xda0/0xda0 [ 613.391433] __do_sys_clone+0xc8/0x110 [ 613.391961] ? __do_sys_vfork+0xd0/0xd0 [ 613.392491] ? __secure_computing+0xb4/0x290 [ 613.393074] do_syscall_64+0x33/0x40 [ 613.393563] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 613.394207] RIP: 0033:0x466609 [ 613.394637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.396950] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 613.397975] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 613.398940] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 613.399898] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 613.400883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.401820] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 613.402797] CPU: 1 PID: 6306 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 613.404277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 613.406697] Call Trace: [ 613.407261] dump_stack+0x107/0x163 [ 613.408053] should_fail.cold+0x5/0xa [ 613.408870] ? kvmalloc_node+0x61/0xf0 [ 613.409704] should_failslab+0x5/0x10 [ 613.410521] __kmalloc_node+0x76/0x4a0 [ 613.411357] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 613.412455] kvmalloc_node+0x61/0xf0 [ 613.413255] alloc_fdtable+0x139/0x280 [ 613.414091] dup_fd+0x718/0xca0 [ 613.414813] copy_process+0x1890/0x6650 [ 613.415691] ? __cleanup_sighand+0xb0/0xb0 [ 613.416647] ? __bpf_prog_run32+0x8f/0xd0 [ 613.417537] ? perf_trace_lock+0xac/0x490 [ 613.418430] kernel_clone+0xe7/0xa20 [ 613.419223] ? copy_init_mm+0x20/0x20 [ 613.420069] ? lock_downgrade+0x6d0/0x6d0 [ 613.421134] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 613.422444] ? __seccomp_filter+0x236/0x1470 [ 613.423574] ? seccomp_notify_ioctl+0xda0/0xda0 [ 613.424896] __do_sys_clone+0xc8/0x110 [ 613.425671] ? __do_sys_vfork+0xd0/0xd0 [ 613.426486] ? __secure_computing+0xb4/0x290 [ 613.427377] do_syscall_64+0x33/0x40 [ 613.428154] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 613.429186] RIP: 0033:0x466609 [ 613.429826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.433508] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 613.435015] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 613.436454] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 613.437865] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 613.439271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.440697] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:14:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b2444444", 0x8}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:29 executing program 7 (fault-call:1 fault-nth:14): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:29 executing program 5 (fault-call:5 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:14:29 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:29 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, 0x0) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 613.595402] FAULT_INJECTION: forcing a failure. [ 613.595402] name failslab, interval 1, probability 0, space 0, times 0 [ 613.597806] CPU: 1 PID: 6323 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 613.599117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 613.601327] Call Trace: [ 613.601851] dump_stack+0x107/0x163 [ 613.602564] should_fail.cold+0x5/0xa [ 613.603314] ? create_object.isra.0+0x3a/0xa20 [ 613.604218] should_failslab+0x5/0x10 [ 613.604957] kmem_cache_alloc+0x5b/0x350 [ 613.605745] ? lock_downgrade+0x6d0/0x6d0 [ 613.606554] create_object.isra.0+0x3a/0xa20 [ 613.607404] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 613.608407] __kmalloc_node+0x1ae/0x4a0 [ 613.609191] kvmalloc_node+0x61/0xf0 [ 613.609913] alloc_fdtable+0xcd/0x280 [ 613.610796] dup_fd+0x718/0xca0 [ 613.611455] copy_process+0x1890/0x6650 [ 613.612263] ? __cleanup_sighand+0xb0/0xb0 [ 613.613099] ? __bpf_prog_run32+0x8f/0xd0 [ 613.613907] ? perf_trace_lock+0xac/0x490 [ 613.614712] kernel_clone+0xe7/0xa20 [ 613.615436] ? copy_init_mm+0x20/0x20 [ 613.616186] ? lock_downgrade+0x6d0/0x6d0 [ 613.616988] ? find_held_lock+0x2c/0x110 [ 613.617772] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 613.618775] ? __seccomp_filter+0x236/0x1470 [ 613.619627] ? seccomp_notify_ioctl+0xda0/0xda0 [ 613.620539] __do_sys_clone+0xc8/0x110 [ 613.621300] ? __do_sys_vfork+0xd0/0xd0 [ 613.622161] ? __secure_computing+0xb4/0x290 [ 613.623041] do_syscall_64+0x33/0x40 [ 613.623918] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 613.624850] RIP: 0033:0x466609 [ 613.625506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.629038] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 613.630813] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 613.632214] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 613.633608] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 613.635001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.636409] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 613.665864] FAULT_INJECTION: forcing a failure. [ 613.665864] name failslab, interval 1, probability 0, space 0, times 0 [ 613.667992] CPU: 1 PID: 6331 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 613.669078] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 613.670878] Call Trace: [ 613.671323] dump_stack+0x107/0x163 [ 613.671914] should_fail.cold+0x5/0xa [ 613.672548] ? __inet_hash_connect+0x5d0/0xdc0 [ 613.673279] should_failslab+0x5/0x10 [ 613.673890] kmem_cache_alloc+0x5b/0x350 [ 613.674551] __inet_hash_connect+0x5d0/0xdc0 [ 613.675419] ? __inet6_lookup_established+0xaa0/0xaa0 [ 613.676273] ? inet_hash+0xa0/0xa0 [ 613.676892] ? __lock_acquire+0x1666/0x5b20 [ 613.677584] tcp_v6_connect+0x114b/0x1970 [ 613.678247] ? rt6_get_cookie+0x390/0x390 [ 613.678937] __inet_stream_connect+0x812/0xd50 [ 613.679660] ? lock_release+0x6b0/0x6b0 [ 613.680301] ? lock_downgrade+0x6d0/0x6d0 [ 613.680957] ? inet_init_net+0x590/0x590 [ 613.681603] ? mark_held_locks+0x9e/0xe0 [ 613.682250] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 613.683077] ? __local_bh_enable_ip+0x9d/0xf0 [ 613.683791] inet_stream_connect+0x53/0xa0 [ 613.684463] ? __inet_stream_connect+0xd50/0xd50 [ 613.685214] __sys_connect_file+0x157/0x1a0 [ 613.685890] __sys_connect+0x161/0x190 [ 613.686498] ? __sys_connect_file+0x1a0/0x1a0 [ 613.687210] ? vfs_write+0x354/0xa20 [ 613.687808] ? fput_many+0x2f/0x1a0 [ 613.688394] ? ksys_write+0x1a5/0x250 [ 613.689002] __x64_sys_connect+0x6f/0xb0 [ 613.689637] ? syscall_enter_from_user_mode+0x1d/0x50 [ 613.690443] do_syscall_64+0x33/0x40 [ 613.691025] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 613.691828] RIP: 0033:0x466609 [ 613.692344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 613.695237] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 613.696440] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 613.697558] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 613.698677] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 613.699795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 613.700928] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 01:14:41 executing program 5 (fault-call:5 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:14:41 executing program 7 (fault-call:1 fault-nth:15): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:41 executing program 4 (fault-call:1 fault-nth:16): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:14:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:14:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b2444444", 0x8}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 624.752114] FAULT_INJECTION: forcing a failure. [ 624.752114] name failslab, interval 1, probability 0, space 0, times 0 [ 624.753870] CPU: 0 PID: 6350 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 624.754888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 624.756618] Call Trace: [ 624.757009] dump_stack+0x107/0x163 [ 624.757564] should_fail.cold+0x5/0xa [ 624.758146] ? create_object.isra.0+0x3a/0xa20 [ 624.758858] should_failslab+0x5/0x10 [ 624.759451] kmem_cache_alloc+0x5b/0x350 [ 624.760098] create_object.isra.0+0x3a/0xa20 [ 624.760769] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 624.761551] __kmalloc_node+0x1ae/0x4a0 [ 624.762163] kvmalloc_node+0x61/0xf0 [ 624.762707] alloc_fdtable+0x139/0x280 [ 624.763297] dup_fd+0x718/0xca0 [ 624.763813] copy_process+0x1890/0x6650 [ 624.764455] ? __cleanup_sighand+0xb0/0xb0 [ 624.765112] ? __bpf_prog_run32+0x8f/0xd0 [ 624.765749] ? perf_trace_lock+0xac/0x490 [ 624.766407] kernel_clone+0xe7/0xa20 [ 624.766976] ? copy_init_mm+0x20/0x20 [ 624.767567] ? lock_downgrade+0x6d0/0x6d0 [ 624.768209] ? find_held_lock+0x2c/0x110 [ 624.768818] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 624.769584] ? __seccomp_filter+0x236/0x1470 [ 624.770212] ? seccomp_notify_ioctl+0xda0/0xda0 [ 624.770870] __do_sys_clone+0xc8/0x110 01:14:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 624.771391] ? __do_sys_vfork+0xd0/0xd0 [ 624.772057] ? __secure_computing+0xb4/0x290 [ 624.772683] do_syscall_64+0x33/0x40 [ 624.773217] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 624.773928] RIP: 0033:0x466609 [ 624.774417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 624.776954] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 624.778005] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 624.779040] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 624.780030] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 624.780972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 624.781736] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:14:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 624.794277] FAULT_INJECTION: forcing a failure. [ 624.794277] name failslab, interval 1, probability 0, space 0, times 0 [ 624.795590] CPU: 1 PID: 6352 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 624.796340] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 624.797663] Call Trace: [ 624.797973] dump_stack+0x107/0x163 [ 624.798393] should_fail.cold+0x5/0xa [ 624.798837] ? kvmalloc_node+0x61/0xf0 [ 624.799284] should_failslab+0x5/0x10 [ 624.799690] __kmalloc_node+0x76/0x4a0 [ 624.800149] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 624.800699] kvmalloc_node+0x61/0xf0 [ 624.801100] alloc_fdtable+0x139/0x280 [ 624.801521] dup_fd+0x718/0xca0 [ 624.801890] copy_process+0x1890/0x6650 [ 624.802333] ? __cleanup_sighand+0xb0/0xb0 [ 624.802792] ? __bpf_prog_run32+0x8f/0xd0 [ 624.803245] ? perf_trace_lock+0xac/0x490 [ 624.803694] kernel_clone+0xe7/0xa20 [ 624.804096] ? copy_init_mm+0x20/0x20 [ 624.804524] ? lock_downgrade+0x6d0/0x6d0 [ 624.804973] ? find_held_lock+0x2c/0x110 [ 624.805407] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 624.805965] ? __seccomp_filter+0x236/0x1470 [ 624.806433] ? seccomp_notify_ioctl+0xda0/0xda0 [ 624.806947] __do_sys_clone+0xc8/0x110 [ 624.807364] ? __do_sys_vfork+0xd0/0xd0 [ 624.807833] ? __secure_computing+0xb4/0x290 [ 624.808353] do_syscall_64+0x33/0x40 [ 624.808757] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 624.809360] RIP: 0033:0x466609 [ 624.809709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:14:41 executing program 4 (fault-call:1 fault-nth:17): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 624.810497] FAULT_INJECTION: forcing a failure. [ 624.810497] name failslab, interval 1, probability 0, space 0, times 0 [ 624.811797] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 624.811809] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 624.811814] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 624.811819] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 624.811824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 624.811830] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 624.820236] CPU: 0 PID: 6347 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 624.821252] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 624.822896] Call Trace: [ 624.823267] dump_stack+0x107/0x163 [ 624.823796] should_fail.cold+0x5/0xa [ 624.824328] ? create_object.isra.0+0x3a/0xa20 [ 624.824980] should_failslab+0x5/0x10 [ 624.825476] kmem_cache_alloc+0x5b/0x350 [ 624.826056] ? lock_release+0x6b0/0x6b0 [ 624.826581] create_object.isra.0+0x3a/0xa20 [ 624.827214] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 624.827891] kmem_cache_alloc+0x159/0x350 [ 624.828517] __inet_hash_connect+0x5d0/0xdc0 [ 624.829119] ? __inet6_lookup_established+0xaa0/0xaa0 [ 624.829865] ? inet_hash+0xa0/0xa0 [ 624.830361] ? __lock_acquire+0x1666/0x5b20 [ 624.831006] tcp_v6_connect+0x114b/0x1970 [ 624.831620] ? rt6_get_cookie+0x390/0x390 [ 624.832242] __inet_stream_connect+0x812/0xd50 [ 624.832925] ? lock_release+0x6b0/0x6b0 [ 624.833483] ? lock_downgrade+0x6d0/0x6d0 [ 624.834099] ? inet_init_net+0x590/0x590 [ 624.834677] ? mark_held_locks+0x9e/0xe0 [ 624.835261] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 624.836008] ? __local_bh_enable_ip+0x9d/0xf0 [ 624.836663] inet_stream_connect+0x53/0xa0 [ 624.837277] ? __inet_stream_connect+0xd50/0xd50 [ 624.837975] __sys_connect_file+0x157/0x1a0 [ 624.838598] __sys_connect+0x161/0x190 [ 624.839169] ? __sys_connect_file+0x1a0/0x1a0 [ 624.839789] ? vfs_write+0x354/0xa20 [ 624.840324] ? fput_many+0x2f/0x1a0 [ 624.840826] ? ksys_write+0x1a5/0x250 [ 624.841366] __x64_sys_connect+0x6f/0xb0 [ 624.841975] ? syscall_enter_from_user_mode+0x1d/0x50 [ 624.842701] do_syscall_64+0x33/0x40 [ 624.843209] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 624.843956] RIP: 0033:0x466609 [ 624.844421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 624.847086] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 624.848198] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 624.849219] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 624.850264] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 624.851304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 624.852366] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 01:14:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, 0x0) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:14:41 executing program 7 (fault-call:1 fault-nth:16): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 624.938916] FAULT_INJECTION: forcing a failure. [ 624.938916] name failslab, interval 1, probability 0, space 0, times 0 [ 624.940650] CPU: 0 PID: 6363 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 624.941672] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 624.943363] Call Trace: [ 624.943766] dump_stack+0x107/0x163 [ 624.944355] should_fail.cold+0x5/0xa [ 624.944899] ? copy_fs_struct+0x43/0x330 [ 624.945496] should_failslab+0x5/0x10 [ 624.946030] kmem_cache_alloc+0x5b/0x350 [ 624.946605] copy_fs_struct+0x43/0x330 [ 624.947129] copy_process+0x452f/0x6650 [ 624.947690] ? __cleanup_sighand+0xb0/0xb0 [ 624.948275] ? __bpf_prog_run32+0x8f/0xd0 [ 624.948859] ? perf_trace_lock+0xac/0x490 [ 624.949461] kernel_clone+0xe7/0xa20 [ 624.949994] ? copy_init_mm+0x20/0x20 [ 624.950535] ? lock_downgrade+0x6d0/0x6d0 [ 624.951117] ? find_held_lock+0x2c/0x110 [ 624.951700] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 624.952445] ? __seccomp_filter+0x236/0x1470 [ 624.953091] ? seccomp_notify_ioctl+0xda0/0xda0 [ 624.953759] __do_sys_clone+0xc8/0x110 [ 624.954309] ? __do_sys_vfork+0xd0/0xd0 [ 624.954898] ? __secure_computing+0xb4/0x290 [ 624.955541] do_syscall_64+0x33/0x40 [ 624.956077] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 624.956822] RIP: 0033:0x466609 [ 624.957280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 624.959989] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 624.961160] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 624.962141] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 624.962965] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 624.963782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 624.964616] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:14:41 executing program 5 (fault-call:5 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:14:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b2444444", 0x8}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) [ 624.990252] FAULT_INJECTION: forcing a failure. [ 624.990252] name failslab, interval 1, probability 0, space 0, times 0 [ 624.991868] CPU: 0 PID: 6370 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 624.992887] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 624.994353] Call Trace: [ 624.994668] dump_stack+0x107/0x163 [ 624.995153] should_fail.cold+0x5/0xa [ 624.995604] ? create_object.isra.0+0x3a/0xa20 [ 624.996215] should_failslab+0x5/0x10 [ 624.996630] kmem_cache_alloc+0x5b/0x350 [ 624.997127] create_object.isra.0+0x3a/0xa20 [ 624.997617] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 624.998342] __kmalloc_node+0x1ae/0x4a0 [ 624.999027] kvmalloc_node+0x61/0xf0 [ 624.999628] alloc_fdtable+0x139/0x280 [ 625.000296] dup_fd+0x718/0xca0 [ 625.000839] copy_process+0x1890/0x6650 [ 625.001292] ? __cleanup_sighand+0xb0/0xb0 [ 625.001752] ? __bpf_prog_run32+0x8f/0xd0 [ 625.002210] ? perf_trace_lock+0xac/0x490 [ 625.002662] kernel_clone+0xe7/0xa20 [ 625.003102] ? copy_init_mm+0x20/0x20 [ 625.003510] ? lock_downgrade+0x6d0/0x6d0 [ 625.003961] ? find_held_lock+0x2c/0x110 [ 625.004422] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 625.004989] ? __seccomp_filter+0x236/0x1470 [ 625.005463] ? seccomp_notify_ioctl+0xda0/0xda0 [ 625.005995] __do_sys_clone+0xc8/0x110 [ 625.006431] ? __do_sys_vfork+0xd0/0xd0 [ 625.006899] ? __secure_computing+0xb4/0x290 [ 625.007380] do_syscall_64+0x33/0x40 [ 625.007833] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 625.008404] RIP: 0033:0x466609 [ 625.008752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 625.010728] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 625.011577] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 625.012376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 625.013161] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 625.013926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 625.014702] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 625.067305] FAULT_INJECTION: forcing a failure. [ 625.067305] name failslab, interval 1, probability 0, space 0, times 0 [ 625.068813] CPU: 0 PID: 6378 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 625.069565] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 625.070801] Call Trace: [ 625.071091] dump_stack+0x107/0x163 [ 625.071500] should_fail.cold+0x5/0xa [ 625.071942] ? __alloc_skb+0x6d/0x620 [ 625.072391] should_failslab+0x5/0x10 [ 625.072828] kmem_cache_alloc_node+0x55/0x370 [ 625.073350] ? lock_downgrade+0x6d0/0x6d0 [ 625.073793] ? ip6_mtu+0x1b7/0x370 [ 625.074195] __alloc_skb+0x6d/0x620 [ 625.074587] ? tcp_write_queue_purge+0x5a8/0x14a0 [ 625.075148] sk_stream_alloc_skb+0x109/0xc30 [ 625.075644] tcp_connect+0xedc/0x4400 [ 625.076084] ? secure_tcpv6_seq+0x193/0x280 [ 625.076585] ? __tcp_transmit_skb+0x3640/0x3640 [ 625.077116] ? tcp_fastopen_defer_connect+0x7/0x410 [ 625.077710] tcp_v6_connect+0x1382/0x1970 [ 625.078246] ? rt6_get_cookie+0x390/0x390 [ 625.078767] __inet_stream_connect+0x812/0xd50 [ 625.079284] ? lock_release+0x6b0/0x6b0 [ 625.079752] ? lock_downgrade+0x6d0/0x6d0 [ 625.080256] ? inet_init_net+0x590/0x590 [ 625.080725] ? mark_held_locks+0x9e/0xe0 [ 625.081180] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 625.081786] ? __local_bh_enable_ip+0x9d/0xf0 [ 625.082294] inet_stream_connect+0x53/0xa0 [ 625.082773] ? __inet_stream_connect+0xd50/0xd50 [ 625.083420] __sys_connect_file+0x157/0x1a0 [ 625.083915] __sys_connect+0x161/0x190 [ 625.084407] ? __sys_connect_file+0x1a0/0x1a0 [ 625.084969] ? vfs_write+0x354/0xa20 [ 625.085393] ? fput_many+0x2f/0x1a0 [ 625.085811] ? ksys_write+0x1a5/0x250 [ 625.086376] __x64_sys_connect+0x6f/0xb0 [ 625.086853] ? syscall_enter_from_user_mode+0x1d/0x50 [ 625.087538] do_syscall_64+0x33/0x40 [ 625.087963] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 625.088569] RIP: 0033:0x466609 [ 625.088930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 625.091163] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 625.092036] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 625.092977] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 625.093904] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 625.094811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 625.095644] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 01:14:52 executing program 7 (fault-call:1 fault-nth:17): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(0xffffffffffffffff, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:14:52 executing program 5 (fault-call:5 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:14:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, 0x0, 0x140, 0x0) 01:14:52 executing program 4 (fault-call:1 fault-nth:18): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:14:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d47f448", 0xc}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b2444444", 0x8}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 636.389408] FAULT_INJECTION: forcing a failure. [ 636.389408] name failslab, interval 1, probability 0, space 0, times 0 [ 636.391178] CPU: 1 PID: 6392 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 636.392128] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 636.393755] Call Trace: [ 636.394139] dump_stack+0x107/0x163 [ 636.394698] should_fail.cold+0x5/0xa [ 636.395264] ? create_object.isra.0+0x3a/0xa20 [ 636.395911] should_failslab+0x5/0x10 [ 636.396471] kmem_cache_alloc+0x5b/0x350 [ 636.397075] create_object.isra.0+0x3a/0xa20 [ 636.397723] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 636.398470] kmem_cache_alloc+0x159/0x350 [ 636.399094] copy_fs_struct+0x43/0x330 [ 636.399680] copy_process+0x452f/0x6650 [ 636.400287] ? __cleanup_sighand+0xb0/0xb0 [ 636.400910] ? __bpf_prog_run32+0x8f/0xd0 [ 636.401551] ? perf_trace_lock+0xac/0x490 [ 636.402112] kernel_clone+0xe7/0xa20 [ 636.402648] ? copy_init_mm+0x20/0x20 [ 636.403226] ? lock_downgrade+0x6d0/0x6d0 [ 636.403839] ? find_held_lock+0x2c/0x110 [ 636.404433] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 636.405148] ? __seccomp_filter+0x236/0x1470 [ 636.405785] ? seccomp_notify_ioctl+0xda0/0xda0 [ 636.406441] __do_sys_clone+0xc8/0x110 [ 636.407013] ? __do_sys_vfork+0xd0/0xd0 [ 636.407584] ? __secure_computing+0xb4/0x290 [ 636.408252] do_syscall_64+0x33/0x40 [ 636.408815] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 636.409658] RIP: 0033:0x466609 [ 636.410120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 636.413139] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 636.414240] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 636.415405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 636.416482] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 636.417646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 636.418679] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 636.439524] FAULT_INJECTION: forcing a failure. [ 636.439524] name failslab, interval 1, probability 0, space 0, times 0 [ 636.441260] CPU: 0 PID: 6400 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 636.442218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 636.443833] Call Trace: [ 636.444206] dump_stack+0x107/0x163 [ 636.444742] should_fail.cold+0x5/0xa [ 636.445283] ? create_object.isra.0+0x3a/0xa20 [ 636.445945] should_failslab+0x5/0x10 [ 636.446482] kmem_cache_alloc+0x5b/0x350 [ 636.447074] create_object.isra.0+0x3a/0xa20 [ 636.447687] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 636.448428] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 636.449130] ? sk_stream_alloc_skb+0x109/0xc30 [ 636.449783] ? lock_downgrade+0x6d0/0x6d0 [ 636.450374] __alloc_skb+0xb1/0x620 [ 636.450906] sk_stream_alloc_skb+0x109/0xc30 [ 636.451530] tcp_connect+0xedc/0x4400 [ 636.452095] ? secure_tcpv6_seq+0x193/0x280 [ 636.452717] ? __tcp_transmit_skb+0x3640/0x3640 [ 636.453384] ? tcp_fastopen_defer_connect+0x7/0x410 [ 636.454100] tcp_v6_connect+0x1382/0x1970 [ 636.454703] ? rt6_get_cookie+0x390/0x390 [ 636.455316] __inet_stream_connect+0x812/0xd50 [ 636.455974] ? lock_release+0x6b0/0x6b0 [ 636.456540] ? lock_downgrade+0x6d0/0x6d0 [ 636.457135] ? inet_init_net+0x590/0x590 [ 636.457700] ? mark_held_locks+0x9e/0xe0 [ 636.458287] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 636.459015] ? __local_bh_enable_ip+0x9d/0xf0 [ 636.459664] inet_stream_connect+0x53/0xa0 [ 636.460256] ? __inet_stream_connect+0xd50/0xd50 [ 636.460947] __sys_connect_file+0x157/0x1a0 [ 636.461556] __sys_connect+0x161/0x190 [ 636.462133] ? __sys_connect_file+0x1a0/0x1a0 [ 636.462807] ? vfs_write+0x354/0xa20 [ 636.463369] ? fput_many+0x2f/0x1a0 [ 636.463916] ? ksys_write+0x1a5/0x250 [ 636.464518] __x64_sys_connect+0x6f/0xb0 [ 636.465094] ? syscall_enter_from_user_mode+0x1d/0x50 [ 636.465858] do_syscall_64+0x33/0x40 [ 636.466387] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 636.467159] RIP: 0033:0x466609 [ 636.467639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 636.470383] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 636.471519] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 636.472607] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 636.473670] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 636.474724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 636.475764] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 01:14:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b24444446d", 0x9}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:14:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 01:14:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 636.512516] FAULT_INJECTION: forcing a failure. [ 636.512516] name failslab, interval 1, probability 0, space 0, times 0 [ 636.514743] CPU: 1 PID: 6398 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 636.515939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 636.517996] Call Trace: [ 636.518466] dump_stack+0x107/0x163 [ 636.519163] should_fail.cold+0x5/0xa [ 636.519829] ? copy_fs_struct+0x43/0x330 [ 636.520609] should_failslab+0x5/0x10 [ 636.521276] kmem_cache_alloc+0x5b/0x350 [ 636.522065] copy_fs_struct+0x43/0x330 [ 636.522767] copy_process+0x452f/0x6650 [ 636.523535] ? __cleanup_sighand+0xb0/0xb0 [ 636.524297] ? __bpf_prog_run32+0x8f/0xd0 [ 636.525095] ? perf_trace_lock+0xac/0x490 [ 636.525870] kernel_clone+0xe7/0xa20 [ 636.526551] ? copy_init_mm+0x20/0x20 [ 636.527246] ? lock_downgrade+0x6d0/0x6d0 [ 636.528004] ? find_held_lock+0x2c/0x110 [ 636.528774] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 636.529730] ? __seccomp_filter+0x236/0x1470 [ 636.530541] ? seccomp_notify_ioctl+0xda0/0xda0 [ 636.531408] __do_sys_clone+0xc8/0x110 [ 636.532126] ? __do_sys_vfork+0xd0/0xd0 [ 636.532930] ? __secure_computing+0xb4/0x290 [ 636.533746] do_syscall_64+0x33/0x40 [ 636.534442] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 636.535400] RIP: 0033:0x466609 [ 636.535998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 636.539420] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 636.540855] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 636.542187] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 636.543538] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 636.544855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 636.546137] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:14:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, 0x0, 0x140, 0x0) 01:14:52 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, 0x0, 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:14:53 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, 0x0, 0x140, 0x0) 01:14:53 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 647.012841] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:15:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x0, 0x0) 01:15:10 executing program 5 (fault-call:5 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:15:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b244", 0x6}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:10 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, 0x0, 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:15:10 executing program 4 (fault-call:1 fault-nth:19): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:15:10 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, 0x0, 0x140, 0x0) 01:15:10 executing program 7 (fault-call:1 fault-nth:18): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:15:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 653.978286] FAULT_INJECTION: forcing a failure. [ 653.978286] name failslab, interval 1, probability 0, space 0, times 0 [ 653.980888] CPU: 0 PID: 6441 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 653.982359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 653.984833] Call Trace: [ 653.985409] dump_stack+0x107/0x163 [ 653.986207] should_fail.cold+0x5/0xa [ 653.987039] ? copy_process+0x19f8/0x6650 [ 653.987942] should_failslab+0x5/0x10 [ 653.988790] kmem_cache_alloc+0x5b/0x350 [ 653.989672] ? _raw_spin_unlock+0x1a/0x30 [ 653.990574] copy_process+0x19f8/0x6650 [ 653.991465] ? __cleanup_sighand+0xb0/0xb0 [ 653.992382] ? __bpf_prog_run32+0x8f/0xd0 [ 653.993299] ? perf_trace_lock+0xac/0x490 [ 653.994208] kernel_clone+0xe7/0xa20 [ 653.995018] ? copy_init_mm+0x20/0x20 [ 653.995840] ? lock_downgrade+0x6d0/0x6d0 [ 653.996744] ? find_held_lock+0x2c/0x110 [ 653.997618] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 653.998730] ? __seccomp_filter+0x236/0x1470 [ 653.999680] ? seccomp_notify_ioctl+0xda0/0xda0 [ 654.000711] __do_sys_clone+0xc8/0x110 [ 654.001548] ? __do_sys_vfork+0xd0/0xd0 [ 654.002427] ? __secure_computing+0xb4/0x290 [ 654.003384] do_syscall_64+0x33/0x40 [ 654.004186] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 654.005296] RIP: 0033:0x466609 [ 654.005991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 654.009972] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 654.011614] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 654.013157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 654.014689] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 654.016225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 654.017768] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 654.027058] FAULT_INJECTION: forcing a failure. [ 654.027058] name failslab, interval 1, probability 0, space 0, times 0 [ 654.028462] CPU: 1 PID: 6442 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 654.029258] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 654.030555] Call Trace: [ 654.030861] dump_stack+0x107/0x163 [ 654.031284] should_fail.cold+0x5/0xa [ 654.031727] ? create_object.isra.0+0x3a/0xa20 [ 654.032255] should_failslab+0x5/0x10 [ 654.032710] kmem_cache_alloc+0x5b/0x350 [ 654.033176] create_object.isra.0+0x3a/0xa20 [ 654.033674] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 654.034259] kmem_cache_alloc+0x159/0x350 [ 654.034740] copy_fs_struct+0x43/0x330 [ 654.035190] copy_process+0x452f/0x6650 [ 654.035657] ? __cleanup_sighand+0xb0/0xb0 [ 654.036139] ? __bpf_prog_run32+0x8f/0xd0 [ 654.036629] ? perf_trace_lock+0xac/0x490 [ 654.037105] kernel_clone+0xe7/0xa20 [ 654.037532] ? copy_init_mm+0x20/0x20 [ 654.037969] ? lock_downgrade+0x6d0/0x6d0 [ 654.038443] ? find_held_lock+0x2c/0x110 [ 654.038912] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 654.039495] ? __seccomp_filter+0x236/0x1470 [ 654.040003] ? seccomp_notify_ioctl+0xda0/0xda0 [ 654.040535] __do_sys_clone+0xc8/0x110 [ 654.040994] ? __do_sys_vfork+0xd0/0xd0 [ 654.041462] ? __secure_computing+0xb4/0x290 [ 654.041971] do_syscall_64+0x33/0x40 [ 654.042398] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 654.042987] RIP: 0033:0x466609 [ 654.043358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 654.045489] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 654.046366] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 654.047184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 654.047997] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 654.048821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 654.049643] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 654.060512] FAULT_INJECTION: forcing a failure. [ 654.060512] name failslab, interval 1, probability 0, space 0, times 0 [ 654.063084] CPU: 0 PID: 6445 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 654.064551] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 654.067015] Call Trace: [ 654.067591] dump_stack+0x107/0x163 [ 654.068392] should_fail.cold+0x5/0xa [ 654.069252] should_failslab+0x5/0x10 [ 654.070078] __kmalloc_node_track_caller+0x74/0x3f0 [ 654.071152] ? sk_stream_alloc_skb+0x109/0xc30 [ 654.072143] __alloc_skb+0xb1/0x620 [ 654.072953] sk_stream_alloc_skb+0x109/0xc30 [ 654.073906] tcp_connect+0xedc/0x4400 [ 654.074748] ? secure_tcpv6_seq+0x193/0x280 [ 654.075677] ? __tcp_transmit_skb+0x3640/0x3640 [ 654.076697] ? tcp_fastopen_defer_connect+0x7/0x410 [ 654.077800] tcp_v6_connect+0x1382/0x1970 [ 654.078708] ? rt6_get_cookie+0x390/0x390 [ 654.079642] __inet_stream_connect+0x812/0xd50 [ 654.080645] ? lock_release+0x6b0/0x6b0 [ 654.081502] ? lock_downgrade+0x6d0/0x6d0 [ 654.082395] ? inet_init_net+0x590/0x590 [ 654.083275] ? mark_held_locks+0x9e/0xe0 [ 654.084160] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 654.085296] ? __local_bh_enable_ip+0x9d/0xf0 [ 654.086270] inet_stream_connect+0x53/0xa0 [ 654.087185] ? __inet_stream_connect+0xd50/0xd50 [ 654.088206] __sys_connect_file+0x157/0x1a0 [ 654.089155] __sys_connect+0x161/0x190 [ 654.089992] ? __sys_connect_file+0x1a0/0x1a0 [ 654.090966] ? vfs_write+0x354/0xa20 [ 654.091771] ? fput_many+0x2f/0x1a0 [ 654.092557] ? ksys_write+0x1a5/0x250 [ 654.093402] __x64_sys_connect+0x6f/0xb0 [ 654.094280] ? syscall_enter_from_user_mode+0x1d/0x50 [ 654.095392] do_syscall_64+0x33/0x40 [ 654.096196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 654.097319] RIP: 0033:0x466609 [ 654.098015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 654.101982] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 654.103624] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 654.105177] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 654.106715] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 654.108256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 654.109805] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 01:15:10 executing program 7 (fault-call:1 fault-nth:19): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:15:10 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 654.236148] FAULT_INJECTION: forcing a failure. [ 654.236148] name failslab, interval 1, probability 0, space 0, times 0 [ 654.238662] CPU: 0 PID: 6460 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 654.240112] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 654.242573] Call Trace: [ 654.243145] dump_stack+0x107/0x163 [ 654.243934] should_fail.cold+0x5/0xa [ 654.244771] ? copy_process+0x19f8/0x6650 [ 654.245665] should_failslab+0x5/0x10 [ 654.246507] kmem_cache_alloc+0x5b/0x350 [ 654.247389] ? _raw_spin_unlock+0x1a/0x30 [ 654.248288] copy_process+0x19f8/0x6650 [ 654.249192] ? __cleanup_sighand+0xb0/0xb0 [ 654.250111] ? __bpf_prog_run32+0x8f/0xd0 [ 654.251019] ? perf_trace_lock+0xac/0x490 [ 654.251927] kernel_clone+0xe7/0xa20 [ 654.252759] ? copy_init_mm+0x20/0x20 [ 654.253581] ? lock_downgrade+0x6d0/0x6d0 [ 654.254479] ? find_held_lock+0x2c/0x110 [ 654.255357] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 654.256477] ? __seccomp_filter+0x236/0x1470 [ 654.257492] ? seccomp_notify_ioctl+0xda0/0xda0 [ 654.258510] __do_sys_clone+0xc8/0x110 [ 654.259354] ? __do_sys_vfork+0xd0/0xd0 [ 654.260241] ? __secure_computing+0xb4/0x290 [ 654.261221] do_syscall_64+0x33/0x40 [ 654.262030] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 654.263140] RIP: 0033:0x466609 [ 654.263842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 654.267817] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 654.269469] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 654.271008] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 654.272549] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 654.274103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 654.275641] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:15:10 executing program 4 (fault-call:1 fault-nth:20): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:15:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:10 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x0, 0x0) [ 654.395663] FAULT_INJECTION: forcing a failure. [ 654.395663] name failslab, interval 1, probability 0, space 0, times 0 [ 654.397824] CPU: 0 PID: 6465 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 654.399076] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 654.401348] Call Trace: [ 654.401859] dump_stack+0x107/0x163 [ 654.402567] should_fail.cold+0x5/0xa [ 654.403306] ? create_object.isra.0+0x3a/0xa20 [ 654.404190] should_failslab+0x5/0x10 [ 654.404935] kmem_cache_alloc+0x5b/0x350 [ 654.405721] ? lock_downgrade+0x6d0/0x6d0 [ 654.406528] create_object.isra.0+0x3a/0xa20 [ 654.407376] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 654.408360] kmem_cache_alloc+0x159/0x350 [ 654.409176] copy_process+0x19f8/0x6650 [ 654.409967] ? __cleanup_sighand+0xb0/0xb0 [ 654.410786] ? __bpf_prog_run32+0x8f/0xd0 [ 654.411589] ? perf_trace_lock+0xac/0x490 [ 654.412397] kernel_clone+0xe7/0xa20 [ 654.413132] ? copy_init_mm+0x20/0x20 [ 654.413863] ? lock_downgrade+0x6d0/0x6d0 [ 654.414656] ? find_held_lock+0x2c/0x110 [ 654.415438] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 654.416434] ? __seccomp_filter+0x236/0x1470 [ 654.417294] ? seccomp_notify_ioctl+0xda0/0xda0 [ 654.418195] __do_sys_clone+0xc8/0x110 [ 654.418945] ? __do_sys_vfork+0xd0/0xd0 [ 654.419729] ? __secure_computing+0xb4/0x290 [ 654.420589] do_syscall_64+0x33/0x40 [ 654.421326] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 654.422312] RIP: 0033:0x466609 [ 654.422932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 654.426484] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 654.427953] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 654.429334] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 654.430709] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 654.432082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 654.433466] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 664.236543] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:15:27 executing program 4 (fault-call:1 fault-nth:21): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:15:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:27 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x0, 0x0) 01:15:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:27 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, 0x0, 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:15:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b244", 0x6}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:27 executing program 5 (fault-call:5 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:15:27 executing program 7 (fault-call:1 fault-nth:20): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 671.567329] FAULT_INJECTION: forcing a failure. [ 671.567329] name failslab, interval 1, probability 0, space 0, times 0 [ 671.569050] CPU: 0 PID: 6486 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 671.570019] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 671.571622] Call Trace: [ 671.572014] dump_stack+0x107/0x163 [ 671.572537] should_fail.cold+0x5/0xa [ 671.573094] ? copy_process+0x1b77/0x6650 [ 671.573687] should_failslab+0x5/0x10 [ 671.574224] kmem_cache_alloc+0x5b/0x350 [ 671.574804] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 671.575541] copy_process+0x1b77/0x6650 [ 671.576127] ? __cleanup_sighand+0xb0/0xb0 [ 671.576728] ? __bpf_prog_run32+0x8f/0xd0 [ 671.577321] ? perf_trace_lock+0xac/0x490 [ 671.577909] kernel_clone+0xe7/0xa20 [ 671.578436] ? copy_init_mm+0x20/0x20 [ 671.578968] ? lock_downgrade+0x6d0/0x6d0 [ 671.579549] ? find_held_lock+0x2c/0x110 [ 671.580133] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 671.580857] ? __seccomp_filter+0x236/0x1470 [ 671.581542] ? seccomp_notify_ioctl+0xda0/0xda0 [ 671.582218] __do_sys_clone+0xc8/0x110 [ 671.582767] ? __do_sys_vfork+0xd0/0xd0 [ 671.583344] ? __secure_computing+0xb4/0x290 [ 671.583975] do_syscall_64+0x33/0x40 [ 671.584509] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 671.585262] RIP: 0033:0x466609 [ 671.585701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.588159] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 671.589194] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 671.590120] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 671.591071] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.592022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.592986] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:15:28 executing program 4 (fault-call:1 fault-nth:22): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 671.608601] FAULT_INJECTION: forcing a failure. [ 671.608601] name failslab, interval 1, probability 0, space 0, times 0 [ 671.610175] CPU: 0 PID: 6485 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 671.611077] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 671.612592] Call Trace: [ 671.612955] dump_stack+0x107/0x163 [ 671.613445] should_fail.cold+0x5/0xa [ 671.613960] ? create_object.isra.0+0x3a/0xa20 [ 671.614569] should_failslab+0x5/0x10 [ 671.615077] kmem_cache_alloc+0x5b/0x350 [ 671.615628] create_object.isra.0+0x3a/0xa20 [ 671.616213] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 671.616895] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 671.617590] ? sk_stream_alloc_skb+0x109/0xc30 [ 671.618199] ? lock_downgrade+0x6d0/0x6d0 [ 671.618760] __alloc_skb+0xb1/0x620 [ 671.619245] sk_stream_alloc_skb+0x109/0xc30 [ 671.619835] tcp_connect+0xedc/0x4400 [ 671.620353] ? secure_tcpv6_seq+0x193/0x280 [ 671.620932] ? __tcp_transmit_skb+0x3640/0x3640 [ 671.621548] ? tcp_fastopen_defer_connect+0x7/0x410 [ 671.622232] tcp_v6_connect+0x1382/0x1970 [ 671.622788] ? rt6_get_cookie+0x390/0x390 [ 671.623367] __inet_stream_connect+0x812/0xd50 [ 671.623974] ? lock_release+0x6b0/0x6b0 [ 671.624499] ? lock_downgrade+0x6d0/0x6d0 [ 671.625062] ? inet_init_net+0x590/0x590 [ 671.625601] ? mark_held_locks+0x9e/0xe0 [ 671.626143] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 671.626834] ? __local_bh_enable_ip+0x9d/0xf0 [ 671.627435] inet_stream_connect+0x53/0xa0 [ 671.627999] ? __inet_stream_connect+0xd50/0xd50 [ 671.628649] __sys_connect_file+0x157/0x1a0 [ 671.629232] __sys_connect+0x161/0x190 [ 671.629777] ? __sys_connect_file+0x1a0/0x1a0 [ 671.630381] ? vfs_write+0x354/0xa20 [ 671.630901] ? fput_many+0x2f/0x1a0 [ 671.631392] ? ksys_write+0x1a5/0x250 [ 671.631944] __x64_sys_connect+0x6f/0xb0 [ 671.632496] ? syscall_enter_from_user_mode+0x1d/0x50 [ 671.633222] do_syscall_64+0x33/0x40 [ 671.633727] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 671.634446] RIP: 0033:0x466609 [ 671.634881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.635806] FAULT_INJECTION: forcing a failure. [ 671.635806] name failslab, interval 1, probability 0, space 0, times 0 [ 671.637451] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 671.637502] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 671.641067] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 671.642024] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.642976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.643928] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 [ 671.644910] CPU: 1 PID: 6489 Comm: syz-executor.7 Not tainted 5.10.56 #1 01:15:28 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b2444444", 0x8}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 671.645864] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 671.647580] Call Trace: [ 671.647949] dump_stack+0x107/0x163 [ 671.648461] should_fail.cold+0x5/0xa [ 671.649006] ? create_object.isra.0+0x3a/0xa20 [ 671.649633] should_failslab+0x5/0x10 [ 671.650156] kmem_cache_alloc+0x5b/0x350 [ 671.650714] ? lock_downgrade+0x6d0/0x6d0 [ 671.651281] create_object.isra.0+0x3a/0xa20 [ 671.651855] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 671.652568] kmem_cache_alloc+0x159/0x350 [ 671.653130] copy_process+0x19f8/0x6650 [ 671.653703] ? __cleanup_sighand+0xb0/0xb0 [ 671.654261] ? perf_trace_lock+0xac/0x490 [ 671.654851] kernel_clone+0xe7/0xa20 [ 671.655339] ? copy_init_mm+0x20/0x20 [ 671.655864] ? lock_downgrade+0x6d0/0x6d0 [ 671.656404] ? find_held_lock+0x2c/0x110 [ 671.657001] ? ksys_write+0x12d/0x250 [ 671.657573] __do_sys_clone+0xc8/0x110 [ 671.658158] ? __do_sys_vfork+0xd0/0xd0 [ 671.658753] ? rcu_read_lock_any_held+0x69/0x90 [ 671.659359] ? vfs_write+0x354/0xa20 [ 671.659916] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 671.660701] ? syscall_enter_from_user_mode+0x1d/0x50 [ 671.661383] do_syscall_64+0x33/0x40 [ 671.661923] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 671.662685] RIP: 0033:0x466609 [ 671.663242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.665986] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 671.667113] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 671.668182] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 671.669214] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.670288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.671324] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 [ 671.692516] FAULT_INJECTION: forcing a failure. [ 671.692516] name failslab, interval 1, probability 0, space 0, times 0 [ 671.694225] CPU: 1 PID: 6495 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 671.695245] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 671.696881] Call Trace: [ 671.697316] dump_stack+0x107/0x163 [ 671.697866] should_fail.cold+0x5/0xa [ 671.698397] ? create_object.isra.0+0x3a/0xa20 [ 671.699066] should_failslab+0x5/0x10 [ 671.699614] kmem_cache_alloc+0x5b/0x350 [ 671.700229] create_object.isra.0+0x3a/0xa20 [ 671.700860] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 671.701657] kmem_cache_alloc+0x159/0x350 [ 671.702253] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 671.703069] copy_process+0x1b77/0x6650 [ 671.703655] ? __cleanup_sighand+0xb0/0xb0 [ 671.704261] ? __bpf_prog_run32+0x8f/0xd0 [ 671.704851] ? perf_trace_lock+0xac/0x490 [ 671.705464] kernel_clone+0xe7/0xa20 [ 671.705993] ? copy_init_mm+0x20/0x20 [ 671.706531] ? lock_downgrade+0x6d0/0x6d0 [ 671.707130] ? find_held_lock+0x2c/0x110 [ 671.707732] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 671.708501] ? __seccomp_filter+0x236/0x1470 [ 671.709181] ? seccomp_notify_ioctl+0xda0/0xda0 [ 671.709879] __do_sys_clone+0xc8/0x110 [ 671.710455] ? __do_sys_vfork+0xd0/0xd0 [ 671.711045] ? __secure_computing+0xb4/0x290 [ 671.711697] do_syscall_64+0x33/0x40 [ 671.712254] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 671.713020] RIP: 0033:0x466609 [ 671.713494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.716166] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 671.717300] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 671.718329] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 671.719269] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.720208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.721213] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:15:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b244", 0x6}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb5088b244", 0x6}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:28 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x0, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:15:28 executing program 6 (fault-call:5 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:28 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x0, 0x0) [ 671.858478] FAULT_INJECTION: forcing a failure. [ 671.858478] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 671.860264] CPU: 0 PID: 6505 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 671.861240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 671.862867] Call Trace: [ 671.863235] dump_stack+0x107/0x163 [ 671.863741] should_fail.cold+0x5/0xa [ 671.864274] _copy_from_user+0x2e/0x1b0 [ 671.864828] move_addr_to_kernel.part.0+0x31/0x110 [ 671.865522] __sys_connect+0xda/0x190 [ 671.866062] ? __sys_connect_file+0x1a0/0x1a0 [ 671.866701] ? rcu_read_lock_any_held+0x69/0x90 [ 671.867357] ? vfs_write+0x354/0xa20 [ 671.867901] ? fput_many+0x2f/0x1a0 [ 671.868409] ? ksys_write+0x1a5/0x250 [ 671.868980] __x64_sys_connect+0x6f/0xb0 [ 671.869571] ? syscall_enter_from_user_mode+0x1d/0x50 [ 671.870336] do_syscall_64+0x33/0x40 [ 671.870885] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 671.871647] RIP: 0033:0x466609 [ 671.872114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 671.874818] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 671.875953] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 671.877004] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 671.878043] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 671.879094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 671.880144] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 [ 683.439888] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:15:46 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x0, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:15:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:46 executing program 1: unshare(0x60040000) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_names\x00') r2 = dup3(r1, r0, 0x0) pread64(r2, &(0x7f0000000000)=""/21, 0x15, 0x0) 01:15:46 executing program 5 (fault-call:5 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:15:46 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:15:46 executing program 4 (fault-call:1 fault-nth:23): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:15:46 executing program 6 (fault-call:5 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:46 executing program 7 (fault-call:1 fault-nth:21): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 690.504954] FAULT_INJECTION: forcing a failure. [ 690.504954] name failslab, interval 1, probability 0, space 0, times 0 [ 690.506845] CPU: 0 PID: 6526 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 690.507888] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 690.509559] Call Trace: [ 690.509979] dump_stack+0x107/0x163 [ 690.510550] should_fail.cold+0x5/0xa [ 690.511111] ? dup_mm+0x88/0x1110 [ 690.511647] should_failslab+0x5/0x10 [ 690.512208] kmem_cache_alloc+0x5b/0x350 [ 690.512849] dup_mm+0x88/0x1110 [ 690.513359] ? copy_process+0x2034/0x6650 [ 690.514012] ? vm_area_dup+0x290/0x290 [ 690.514605] ? __raw_spin_lock_init+0x34/0x100 [ 690.515317] copy_process+0x2409/0x6650 [ 690.515964] ? __cleanup_sighand+0xb0/0xb0 [ 690.516585] ? __bpf_prog_run32+0x8f/0xd0 [ 690.517227] ? perf_trace_lock+0xac/0x490 [ 690.517861] kernel_clone+0xe7/0xa20 [ 690.518448] ? copy_init_mm+0x20/0x20 [ 690.519005] ? lock_downgrade+0x6d0/0x6d0 [ 690.519648] ? find_held_lock+0x2c/0x110 [ 690.520262] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 690.521059] ? __seccomp_filter+0x236/0x1470 [ 690.521758] ? seccomp_notify_ioctl+0xda0/0xda0 [ 690.522481] __do_sys_clone+0xc8/0x110 [ 690.523074] ? __do_sys_vfork+0xd0/0xd0 [ 690.523713] ? __secure_computing+0xb4/0x290 [ 690.524399] do_syscall_64+0x33/0x40 [ 690.524979] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 690.525802] RIP: 0033:0x466609 [ 690.526313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.529197] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 690.530379] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 690.531471] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 690.532574] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 690.533663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 690.534744] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 690.545035] FAULT_INJECTION: forcing a failure. [ 690.545035] name failslab, interval 1, probability 0, space 0, times 0 [ 690.547604] CPU: 1 PID: 6522 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 690.549081] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 690.551551] Call Trace: [ 690.552133] dump_stack+0x107/0x163 [ 690.552938] should_fail.cold+0x5/0xa [ 690.553804] ? copy_process+0x1b77/0x6650 [ 690.554721] should_failslab+0x5/0x10 [ 690.555552] kmem_cache_alloc+0x5b/0x350 [ 690.556436] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 690.557590] copy_process+0x1b77/0x6650 [ 690.558490] ? __cleanup_sighand+0xb0/0xb0 [ 690.559409] ? __bpf_prog_run32+0x8f/0xd0 [ 690.560313] ? perf_trace_lock+0xac/0x490 [ 690.561225] kernel_clone+0xe7/0xa20 [ 690.562062] ? copy_init_mm+0x20/0x20 [ 690.562886] ? lock_downgrade+0x6d0/0x6d0 [ 690.563783] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 690.564902] ? __seccomp_filter+0x236/0x1470 [ 690.565875] ? seccomp_notify_ioctl+0xda0/0xda0 [ 690.566894] __do_sys_clone+0xc8/0x110 [ 690.567748] ? __do_sys_vfork+0xd0/0xd0 [ 690.568635] ? __secure_computing+0xb4/0x290 [ 690.569619] do_syscall_64+0x33/0x40 [ 690.570433] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 690.571533] RIP: 0033:0x466609 [ 690.572227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.576180] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 690.577842] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 690.579381] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 690.580926] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 690.582465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 690.584001] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 690.591195] FAULT_INJECTION: forcing a failure. [ 690.591195] name failslab, interval 1, probability 0, space 0, times 0 [ 690.593241] CPU: 0 PID: 6533 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 690.594362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 690.596236] Call Trace: [ 690.596677] dump_stack+0x107/0x163 [ 690.597295] should_fail.cold+0x5/0xa [ 690.597934] ? __skb_ext_alloc+0x19/0x80 [ 690.598607] should_failslab+0x5/0x10 [ 690.599237] kmem_cache_alloc+0x5b/0x350 [ 690.599917] __skb_ext_alloc+0x19/0x80 [ 690.600560] skb_ext_add+0x504/0x670 [ 690.601177] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 690.602061] __alloc_skb+0x3c1/0x620 [ 690.602688] sk_stream_alloc_skb+0x109/0xc30 [ 690.603423] tcp_connect+0xedc/0x4400 [ 690.604071] ? secure_tcpv6_seq+0x193/0x280 [ 690.604785] ? __tcp_transmit_skb+0x3640/0x3640 [ 690.605572] ? tcp_fastopen_defer_connect+0x7/0x410 [ 690.606419] tcp_v6_connect+0x1382/0x1970 [ 690.607113] ? rt6_get_cookie+0x390/0x390 [ 690.607836] __inet_stream_connect+0x812/0xd50 [ 690.608597] ? lock_release+0x6b0/0x6b0 [ 690.609263] ? lock_downgrade+0x6d0/0x6d0 [ 690.609955] ? inet_init_net+0x590/0x590 [ 690.610629] ? mark_held_locks+0x9e/0xe0 [ 690.610820] FAULT_INJECTION: forcing a failure. [ 690.610820] name failslab, interval 1, probability 0, space 0, times 0 [ 690.611307] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 690.611320] ? __local_bh_enable_ip+0x9d/0xf0 [ 690.611339] inet_stream_connect+0x53/0xa0 [ 690.611362] ? __inet_stream_connect+0xd50/0xd50 [ 690.616809] __sys_connect_file+0x157/0x1a0 [ 690.617536] __sys_connect+0x161/0x190 [ 690.618181] ? __sys_connect_file+0x1a0/0x1a0 [ 690.618930] ? vfs_write+0x354/0xa20 [ 690.619550] ? fput_many+0x2f/0x1a0 [ 690.620155] ? ksys_write+0x1a5/0x250 [ 690.620797] __x64_sys_connect+0x6f/0xb0 [ 690.621480] ? syscall_enter_from_user_mode+0x1d/0x50 [ 690.622334] do_syscall_64+0x33/0x40 [ 690.622954] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 690.623805] RIP: 0033:0x466609 [ 690.624341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.627416] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 690.628680] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 690.629877] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 690.631061] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 690.632250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 690.633450] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 [ 690.634677] CPU: 1 PID: 6534 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 690.636181] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 690.638626] Call Trace: [ 690.639213] dump_stack+0x107/0x163 [ 690.640013] should_fail.cold+0x5/0xa [ 690.640844] ? __inet_hash_connect+0x5d0/0xdc0 [ 690.641851] should_failslab+0x5/0x10 [ 690.642675] kmem_cache_alloc+0x5b/0x350 [ 690.643569] __inet_hash_connect+0x5d0/0xdc0 [ 690.644536] ? __inet6_lookup_established+0xaa0/0xaa0 [ 690.645677] ? inet_hash+0xa0/0xa0 [ 690.646453] ? __lock_acquire+0x1666/0x5b20 [ 690.647402] tcp_v6_connect+0x114b/0x1970 [ 690.648310] ? rt6_get_cookie+0x390/0x390 [ 690.649279] __inet_stream_connect+0x812/0xd50 [ 690.650268] ? lock_release+0x6b0/0x6b0 [ 690.651123] ? lock_downgrade+0x6d0/0x6d0 [ 690.652017] ? inet_init_net+0x590/0x590 [ 690.652896] ? mark_held_locks+0x9e/0xe0 [ 690.653786] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 690.654922] ? __local_bh_enable_ip+0x9d/0xf0 [ 690.655896] inet_stream_connect+0x53/0xa0 [ 690.656813] ? __inet_stream_connect+0xd50/0xd50 [ 690.657844] __sys_connect_file+0x157/0x1a0 [ 690.658783] __sys_connect+0x161/0x190 [ 690.659621] ? __sys_connect_file+0x1a0/0x1a0 [ 690.660596] ? vfs_write+0x354/0xa20 [ 690.661415] ? fput_many+0x2f/0x1a0 [ 690.662211] ? ksys_write+0x1a5/0x250 [ 690.663044] __x64_sys_connect+0x6f/0xb0 [ 690.663924] ? syscall_enter_from_user_mode+0x1d/0x50 [ 690.665027] do_syscall_64+0x33/0x40 [ 690.665842] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 690.666937] RIP: 0033:0x466609 [ 690.667625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.671556] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 690.673178] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 690.674707] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 690.676226] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 690.677765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 690.679285] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 01:15:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:47 executing program 7 (fault-call:1 fault-nth:22): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 690.712613] FAULT_INJECTION: forcing a failure. [ 690.712613] name failslab, interval 1, probability 0, space 0, times 0 [ 690.715176] CPU: 1 PID: 6540 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 690.716632] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 690.719086] Call Trace: [ 690.719667] dump_stack+0x107/0x163 [ 690.720460] should_fail.cold+0x5/0xa [ 690.721296] ? getname_flags.part.0+0x50/0x4f0 [ 690.722286] should_failslab+0x5/0x10 [ 690.723115] kmem_cache_alloc+0x5b/0x350 [ 690.724005] getname_flags.part.0+0x50/0x4f0 [ 690.724966] getname+0x8e/0xd0 [ 690.725674] do_sys_openat2+0xf5/0x420 [ 690.726516] ? build_open_flags+0x680/0x680 [ 690.727448] ? __mutex_unlock_slowpath+0xe1/0x600 [ 690.728496] ? wait_for_completion+0x270/0x270 [ 690.729517] __x64_sys_openat+0x13f/0x1f0 [ 690.730420] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 690.731470] ? ksys_write+0x1a5/0x250 [ 690.732316] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 690.733462] ? syscall_enter_from_user_mode+0x1d/0x50 [ 690.734585] do_syscall_64+0x33/0x40 [ 690.735398] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 690.736511] RIP: 0033:0x466609 [ 690.737216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.741189] RSP: 002b:00007fc51c606188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 690.742855] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 690.744393] RDX: 0000000000000140 RSI: 0000000020000240 RDI: ffffffffffffffff [ 690.745941] RBP: 00007fc51c6061d0 R08: 0000000000000000 R09: 0000000000000000 [ 690.747492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 690.749035] R13: 00007ffffc2fbbef R14: 00007fc51c606300 R15: 0000000000022000 01:15:47 executing program 6 (fault-call:5 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 690.810053] FAULT_INJECTION: forcing a failure. [ 690.810053] name failslab, interval 1, probability 0, space 0, times 0 [ 690.812389] CPU: 0 PID: 6548 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 690.813684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 690.815869] Call Trace: [ 690.816378] dump_stack+0x107/0x163 [ 690.817082] should_fail.cold+0x5/0xa [ 690.817821] ? create_object.isra.0+0x3a/0xa20 [ 690.818696] should_failslab+0x5/0x10 [ 690.819427] kmem_cache_alloc+0x5b/0x350 [ 690.820213] create_object.isra.0+0x3a/0xa20 [ 690.821059] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 690.822079] kmem_cache_alloc+0x159/0x350 [ 690.822886] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 690.823909] copy_process+0x1b77/0x6650 [ 690.824702] ? __cleanup_sighand+0xb0/0xb0 [ 690.825533] ? __bpf_prog_run32+0x8f/0xd0 [ 690.826339] ? perf_trace_lock+0xac/0x490 [ 690.827142] kernel_clone+0xe7/0xa20 [ 690.827859] ? copy_init_mm+0x20/0x20 [ 690.828590] ? lock_downgrade+0x6d0/0x6d0 [ 690.829391] ? find_held_lock+0x2c/0x110 [ 690.830186] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 690.831165] ? __seccomp_filter+0x236/0x1470 [ 690.832006] ? seccomp_notify_ioctl+0xda0/0xda0 [ 690.832897] __do_sys_clone+0xc8/0x110 [ 690.833657] ? __do_sys_vfork+0xd0/0xd0 [ 690.834434] ? __secure_computing+0xb4/0x290 [ 690.835278] do_syscall_64+0x33/0x40 [ 690.835983] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 690.836962] RIP: 0033:0x466609 [ 690.837567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.841074] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 690.842488] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 690.843846] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 690.845198] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 690.846574] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 690.847928] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:15:47 executing program 4 (fault-call:1 fault-nth:24): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:15:47 executing program 0 (fault-call:1 fault-nth:1): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 690.903800] FAULT_INJECTION: forcing a failure. [ 690.903800] name failslab, interval 1, probability 0, space 0, times 0 [ 690.906106] CPU: 1 PID: 6552 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 690.907395] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 690.909593] Call Trace: [ 690.910103] dump_stack+0x107/0x163 [ 690.910816] should_fail.cold+0x5/0xa [ 690.911544] ? create_object.isra.0+0x3a/0xa20 [ 690.912411] should_failslab+0x5/0x10 [ 690.913150] kmem_cache_alloc+0x5b/0x350 [ 690.913933] create_object.isra.0+0x3a/0xa20 [ 690.914773] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 690.915730] kmem_cache_alloc+0x159/0x350 [ 690.916549] dup_mm+0x88/0x1110 [ 690.917175] ? copy_process+0x2034/0x6650 [ 690.918037] ? vm_area_dup+0x290/0x290 [ 690.918300] FAULT_INJECTION: forcing a failure. [ 690.918300] name failslab, interval 1, probability 0, space 0, times 0 [ 690.918916] ? __raw_spin_lock_init+0x34/0x100 [ 690.918945] copy_process+0x2409/0x6650 [ 690.919000] ? __cleanup_sighand+0xb0/0xb0 [ 690.923805] ? __bpf_prog_run32+0x8f/0xd0 [ 690.924607] ? perf_trace_lock+0xac/0x490 [ 690.925572] kernel_clone+0xe7/0xa20 [ 690.926294] ? copy_init_mm+0x20/0x20 [ 690.927155] ? lock_downgrade+0x6d0/0x6d0 [ 690.927946] ? find_held_lock+0x2c/0x110 [ 690.928867] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 690.929877] ? __seccomp_filter+0x236/0x1470 [ 690.930771] ? seccomp_notify_ioctl+0xda0/0xda0 [ 690.931661] __do_sys_clone+0xc8/0x110 [ 690.932387] ? __do_sys_vfork+0xd0/0xd0 [ 690.933163] ? __secure_computing+0xb4/0x290 [ 690.934000] do_syscall_64+0x33/0x40 [ 690.934716] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 690.935667] RIP: 0033:0x466609 [ 690.936281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.939733] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 690.941143] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 690.942480] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 690.943800] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 690.945120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 690.946468] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 690.947831] CPU: 0 PID: 6553 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 690.949160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 690.951312] Call Trace: [ 690.951820] dump_stack+0x107/0x163 [ 690.952513] should_fail.cold+0x5/0xa [ 690.953247] ? create_object.isra.0+0x3a/0xa20 [ 690.954129] should_failslab+0x5/0x10 [ 690.954852] kmem_cache_alloc+0x5b/0x350 [ 690.955622] ? lock_release+0x6b0/0x6b0 [ 690.956385] create_object.isra.0+0x3a/0xa20 [ 690.957212] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 690.958211] kmem_cache_alloc+0x159/0x350 [ 690.959004] __inet_hash_connect+0x5d0/0xdc0 [ 690.959857] ? __inet6_lookup_established+0xaa0/0xaa0 [ 690.960842] ? inet_hash+0xa0/0xa0 [ 690.961542] ? __lock_acquire+0x1666/0x5b20 [ 690.962375] tcp_v6_connect+0x114b/0x1970 [ 690.963172] ? rt6_get_cookie+0x390/0x390 [ 690.963993] __inet_stream_connect+0x812/0xd50 [ 690.964861] ? lock_release+0x6b0/0x6b0 [ 690.965625] ? lock_downgrade+0x6d0/0x6d0 [ 690.966412] ? inet_init_net+0x590/0x590 [ 690.967177] ? mark_held_locks+0x9e/0xe0 [ 690.967951] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 690.968933] ? __local_bh_enable_ip+0x9d/0xf0 [ 690.969796] inet_stream_connect+0x53/0xa0 [ 690.970590] ? __inet_stream_connect+0xd50/0xd50 [ 690.971487] __sys_connect_file+0x157/0x1a0 [ 690.972306] __sys_connect+0x161/0x190 [ 690.973034] ? __sys_connect_file+0x1a0/0x1a0 [ 690.973901] ? vfs_write+0x354/0xa20 [ 690.974603] ? fput_many+0x2f/0x1a0 [ 690.975313] ? ksys_write+0x1a5/0x250 [ 690.976047] __x64_sys_connect+0x6f/0xb0 [ 690.976833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 690.977815] do_syscall_64+0x33/0x40 [ 690.978538] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 690.979508] RIP: 0033:0x466609 [ 690.980132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.983612] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 690.985086] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 690.986441] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 690.987838] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 690.989176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 690.990336] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 01:15:47 executing program 1: unshare(0x60040000) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_tables_names\x00') r2 = dup3(r1, r0, 0x0) pread64(r2, &(0x7f0000000000)=""/21, 0x15, 0x0) 01:15:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb", 0x2}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 691.071970] FAULT_INJECTION: forcing a failure. [ 691.071970] name failslab, interval 1, probability 0, space 0, times 0 [ 691.074039] CPU: 0 PID: 6561 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 691.075177] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 691.077048] Call Trace: [ 691.077494] dump_stack+0x107/0x163 [ 691.078115] should_fail.cold+0x5/0xa [ 691.078768] ? create_object.isra.0+0x3a/0xa20 [ 691.079561] should_failslab+0x5/0x10 [ 691.080225] kmem_cache_alloc+0x5b/0x350 [ 691.080937] create_object.isra.0+0x3a/0xa20 [ 691.081683] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 691.082575] kmem_cache_alloc+0x159/0x350 [ 691.083263] getname_flags.part.0+0x50/0x4f0 [ 691.084017] getname+0x8e/0xd0 [ 691.084541] do_sys_openat2+0xf5/0x420 [ 691.085208] ? build_open_flags+0x680/0x680 [ 691.085919] ? __mutex_unlock_slowpath+0xe1/0x600 [ 691.086709] ? wait_for_completion+0x270/0x270 [ 691.087498] __x64_sys_openat+0x13f/0x1f0 [ 691.088172] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 691.089004] ? ksys_write+0x1a5/0x250 [ 691.089680] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 691.090588] ? syscall_enter_from_user_mode+0x1d/0x50 [ 691.091490] do_syscall_64+0x33/0x40 [ 691.092106] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 691.092972] RIP: 0033:0x466609 [ 691.093515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 691.096726] RSP: 002b:00007fc51c606188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 691.098075] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 691.099287] RDX: 0000000000000140 RSI: 0000000020000240 RDI: ffffffffffffffff [ 691.100491] RBP: 00007fc51c6061d0 R08: 0000000000000000 R09: 0000000000000000 [ 691.101672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 691.102828] R13: 00007ffffc2fbbef R14: 00007fc51c606300 R15: 0000000000022000 01:15:47 executing program 5 (fault-call:5 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:15:47 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x0, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:15:47 executing program 4 (fault-call:1 fault-nth:25): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 691.307442] FAULT_INJECTION: forcing a failure. [ 691.307442] name failslab, interval 1, probability 0, space 0, times 0 [ 691.309488] CPU: 0 PID: 6568 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 691.310574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 691.312460] Call Trace: [ 691.312900] dump_stack+0x107/0x163 [ 691.313537] should_fail.cold+0x5/0xa [ 691.314172] ? create_object.isra.0+0x3a/0xa20 [ 691.314925] should_failslab+0x5/0x10 [ 691.315543] kmem_cache_alloc+0x5b/0x350 [ 691.316203] create_object.isra.0+0x3a/0xa20 [ 691.316931] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 691.317752] kmem_cache_alloc+0x159/0x350 [ 691.318427] __skb_ext_alloc+0x19/0x80 [ 691.319036] skb_ext_add+0x504/0x670 [ 691.319631] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 691.320458] ? lock_downgrade+0x6d0/0x6d0 [ 691.321140] __alloc_skb+0x3c1/0x620 [ 691.321776] sk_stream_alloc_skb+0x109/0xc30 [ 691.322490] tcp_connect+0xedc/0x4400 [ 691.323109] ? secure_tcpv6_seq+0x193/0x280 [ 691.323820] ? __tcp_transmit_skb+0x3640/0x3640 [ 691.324572] ? tcp_fastopen_defer_connect+0x7/0x410 [ 691.325464] tcp_v6_connect+0x1382/0x1970 [ 691.326147] ? rt6_get_cookie+0x390/0x390 [ 691.326842] __inet_stream_connect+0x812/0xd50 [ 691.327581] ? lock_release+0x6b0/0x6b0 [ 691.328196] ? lock_downgrade+0x6d0/0x6d0 [ 691.328859] ? inet_init_net+0x590/0x590 [ 691.329495] ? mark_held_locks+0x9e/0xe0 [ 691.330154] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 691.330982] ? __local_bh_enable_ip+0x9d/0xf0 [ 691.331701] inet_stream_connect+0x53/0xa0 [ 691.332379] ? __inet_stream_connect+0xd50/0xd50 [ 691.333141] __sys_connect_file+0x157/0x1a0 [ 691.333844] __sys_connect+0x161/0x190 [ 691.334474] ? __sys_connect_file+0x1a0/0x1a0 [ 691.335183] ? vfs_write+0x354/0xa20 [ 691.335808] ? fput_many+0x2f/0x1a0 [ 691.336381] ? ksys_write+0x1a5/0x250 [ 691.337032] __x64_sys_connect+0x6f/0xb0 [ 691.337686] ? syscall_enter_from_user_mode+0x1d/0x50 [ 691.338516] do_syscall_64+0x33/0x40 [ 691.339114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 691.339914] RIP: 0033:0x466609 [ 691.340432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 691.343381] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 691.344599] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 691.345883] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 691.347108] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 691.348353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 691.349584] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 01:15:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb", 0x2}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:15:47 executing program 7 (fault-call:1 fault-nth:23): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 691.384576] FAULT_INJECTION: forcing a failure. [ 691.384576] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 691.386608] CPU: 1 PID: 6573 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 691.387931] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 691.389732] Call Trace: [ 691.390253] dump_stack+0x107/0x163 [ 691.390971] should_fail.cold+0x5/0xa [ 691.391728] __alloc_pages_nodemask+0x182/0x680 [ 691.392631] ? perf_trace_lock+0xac/0x490 [ 691.393458] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 691.394493] ? create_object.isra.0+0x3ad/0xa20 [ 691.395248] alloc_pages_current+0x187/0x280 [ 691.395953] __get_free_pages+0xc/0xa0 [ 691.396573] pgd_alloc+0x84/0x4e0 [ 691.397129] ? pgd_page_get_mm+0x40/0x40 [ 691.397798] ? lockdep_init_map_waits+0x26a/0x700 [ 691.398563] ? lockdep_init_map_waits+0x26a/0x700 [ 691.399366] mm_init+0x633/0xa60 [ 691.399952] dup_mm+0xd5/0x1110 [ 691.400485] ? copy_process+0x2034/0x6650 [ 691.401175] ? vm_area_dup+0x290/0x290 [ 691.401969] ? __raw_spin_lock_init+0x34/0x100 [ 691.402747] copy_process+0x2409/0x6650 [ 691.403556] ? __cleanup_sighand+0xb0/0xb0 [ 691.404282] ? __bpf_prog_run32+0x8f/0xd0 [ 691.405108] ? perf_trace_lock+0xac/0x490 [ 691.405825] kernel_clone+0xe7/0xa20 [ 691.406560] ? copy_init_mm+0x20/0x20 [ 691.407194] ? lock_downgrade+0x6d0/0x6d0 [ 691.408004] ? find_held_lock+0x2c/0x110 [ 691.408798] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 691.409693] ? __seccomp_filter+0x236/0x1470 [ 691.410565] ? seccomp_notify_ioctl+0xda0/0xda0 [ 691.411358] __do_sys_clone+0xc8/0x110 [ 691.412005] ? __do_sys_vfork+0xd0/0xd0 [ 691.412562] ? __secure_computing+0xb4/0x290 [ 691.413180] do_syscall_64+0x33/0x40 [ 691.413688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 691.414369] RIP: 0033:0x466609 [ 691.414798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 691.417230] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 691.418249] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 691.419195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 691.420139] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 691.421081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 691.422042] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 691.470269] FAULT_INJECTION: forcing a failure. [ 691.470269] name failslab, interval 1, probability 0, space 0, times 0 [ 691.471987] CPU: 0 PID: 6580 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 691.473032] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 691.474776] Call Trace: [ 691.475169] dump_stack+0x107/0x163 [ 691.475730] should_fail.cold+0x5/0xa [ 691.476288] ? dup_mm+0x88/0x1110 [ 691.476745] should_failslab+0x5/0x10 [ 691.477274] kmem_cache_alloc+0x5b/0x350 [ 691.477818] dup_mm+0x88/0x1110 [ 691.478272] ? copy_process+0x2034/0x6650 [ 691.478861] ? vm_area_dup+0x290/0x290 [ 691.479378] ? __raw_spin_lock_init+0x34/0x100 [ 691.480027] copy_process+0x2409/0x6650 [ 691.480569] ? __cleanup_sighand+0xb0/0xb0 [ 691.481176] ? perf_trace_lock+0xac/0x490 [ 691.481746] kernel_clone+0xe7/0xa20 [ 691.482282] ? copy_init_mm+0x20/0x20 [ 691.482827] ? lock_downgrade+0x6d0/0x6d0 [ 691.483406] ? find_held_lock+0x2c/0x110 [ 691.483944] ? ksys_write+0x12d/0x250 [ 691.484469] __do_sys_clone+0xc8/0x110 [ 691.485016] ? __do_sys_vfork+0xd0/0xd0 [ 691.485539] ? rcu_read_lock_any_held+0x69/0x90 [ 691.486148] ? vfs_write+0x354/0xa20 [ 691.486667] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 691.487353] ? syscall_enter_from_user_mode+0x1d/0x50 [ 691.488091] do_syscall_64+0x33/0x40 [ 691.488625] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 691.489345] RIP: 0033:0x466609 [ 691.489788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 691.492172] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 691.493279] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 691.494209] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 691.495239] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 691.496261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 691.497235] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 01:16:04 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x0, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400, 0x5) 01:16:04 executing program 7 (fault-call:1 fault-nth:24): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:04 executing program 5 (fault-call:5 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:16:04 executing program 0 (fault-call:1 fault-nth:2): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:16:04 executing program 4 (fault-call:1 fault-nth:26): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:04 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(0x0, 0x400, 0x5) 01:16:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb", 0x2}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:04 executing program 6 (fault-call:5 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 707.822587] FAULT_INJECTION: forcing a failure. [ 707.822587] name failslab, interval 1, probability 0, space 0, times 0 [ 707.824837] CPU: 1 PID: 6598 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 707.826004] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 707.827921] Call Trace: [ 707.828391] dump_stack+0x107/0x163 [ 707.829008] should_fail.cold+0x5/0xa [ 707.829795] ? vm_area_dup+0x78/0x290 [ 707.830631] should_failslab+0x5/0x10 [ 707.831457] kmem_cache_alloc+0x5b/0x350 [ 707.832352] vm_area_dup+0x78/0x290 [ 707.833160] ? __lock_acquire+0xbc2/0x5b20 [ 707.834126] ? perf_trace_lock+0xac/0x490 [ 707.835002] ? SOFTIRQ_verbose+0x10/0x10 [ 707.835876] ? __lockdep_reset_lock+0x180/0x180 [ 707.836882] ? vm_area_alloc+0x110/0x110 [ 707.837745] ? find_held_lock+0x2c/0x110 [ 707.838625] ? get_mm_exe_file+0x139/0x2c0 [ 707.839499] ? lock_downgrade+0x6d0/0x6d0 [ 707.840396] ? down_write_nested+0xe4/0x160 [ 707.841291] ? rwsem_down_write_slowpath+0xbf0/0xbf0 [ 707.842399] ? get_mm_exe_file+0x162/0x2c0 [ 707.843277] dup_mm+0x44d/0x1110 [ 707.844017] ? copy_process+0x2034/0x6650 [ 707.844887] ? vm_area_dup+0x290/0x290 [ 707.845753] ? __raw_spin_lock_init+0x34/0x100 [ 707.846717] copy_process+0x2409/0x6650 [ 707.847628] ? __cleanup_sighand+0xb0/0xb0 [ 707.848519] ? __bpf_prog_run32+0x8f/0xd0 [ 707.849428] ? perf_trace_lock+0xac/0x490 [ 707.850328] kernel_clone+0xe7/0xa20 [ 707.851142] ? copy_init_mm+0x20/0x20 [ 707.851931] ? lock_downgrade+0x6d0/0x6d0 [ 707.852824] ? find_held_lock+0x2c/0x110 [ 707.853696] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 707.854507] ? __seccomp_filter+0x236/0x1470 [ 707.855224] ? seccomp_notify_ioctl+0xda0/0xda0 [ 707.855957] __do_sys_clone+0xc8/0x110 [ 707.856594] ? __do_sys_vfork+0xd0/0xd0 [ 707.857235] ? __secure_computing+0xb4/0x290 [ 707.857974] do_syscall_64+0x33/0x40 [ 707.858556] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 707.859377] RIP: 0033:0x466609 [ 707.859881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.862860] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 707.864041] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 707.865190] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 707.866346] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.867500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.868642] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 707.876284] FAULT_INJECTION: forcing a failure. [ 707.876284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 707.878247] CPU: 1 PID: 6595 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 707.879359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 707.881241] Call Trace: [ 707.881688] dump_stack+0x107/0x163 [ 707.882292] should_fail.cold+0x5/0xa [ 707.882931] strncpy_from_user+0x34/0x460 [ 707.883619] getname_flags.part.0+0x95/0x4f0 [ 707.884353] getname+0x8e/0xd0 [ 707.884893] do_sys_openat2+0xf5/0x420 [ 707.885550] ? build_open_flags+0x680/0x680 [ 707.886247] ? __mutex_unlock_slowpath+0xe1/0x600 [ 707.887038] ? wait_for_completion+0x270/0x270 [ 707.887810] __x64_sys_openat+0x13f/0x1f0 [ 707.888497] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 707.889005] FAULT_INJECTION: forcing a failure. [ 707.889005] name failslab, interval 1, probability 0, space 0, times 0 [ 707.889288] ? ksys_write+0x1a5/0x250 [ 707.889310] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 707.889331] ? syscall_enter_from_user_mode+0x1d/0x50 [ 707.893483] do_syscall_64+0x33/0x40 [ 707.894114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 707.894958] RIP: 0033:0x466609 [ 707.895523] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.898587] RSP: 002b:00007fc51c627188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 707.899812] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 707.900986] RDX: 0000000000000140 RSI: 0000000020000240 RDI: 0000000000000005 [ 707.902183] RBP: 00007fc51c6271d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.903364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 707.904536] R13: 00007ffffc2fbbef R14: 00007fc51c627300 R15: 0000000000022000 [ 707.905757] CPU: 0 PID: 6605 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 707.906923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 707.908812] Call Trace: [ 707.909264] dump_stack+0x107/0x163 [ 707.909891] should_fail.cold+0x5/0xa [ 707.910520] ? dup_mm+0x88/0x1110 [ 707.911100] should_failslab+0x5/0x10 [ 707.911747] kmem_cache_alloc+0x5b/0x350 [ 707.912428] dup_mm+0x88/0x1110 [ 707.912974] ? copy_process+0x2034/0x6650 [ 707.913675] ? vm_area_dup+0x290/0x290 [ 707.914310] ? __raw_spin_lock_init+0x34/0x100 [ 707.915068] copy_process+0x2409/0x6650 [ 707.915723] ? __cleanup_sighand+0xb0/0xb0 [ 707.916429] ? perf_trace_lock+0xac/0x490 [ 707.917112] kernel_clone+0xe7/0xa20 [ 707.917761] ? copy_init_mm+0x20/0x20 [ 707.918367] ? lock_downgrade+0x6d0/0x6d0 [ 707.919047] ? find_held_lock+0x2c/0x110 [ 707.919711] ? ksys_write+0x12d/0x250 [ 707.920353] __do_sys_clone+0xc8/0x110 [ 707.920979] ? __do_sys_vfork+0xd0/0xd0 [ 707.921660] ? rcu_read_lock_any_held+0x69/0x90 [ 707.922415] ? vfs_write+0x354/0xa20 [ 707.923048] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 707.923901] ? syscall_enter_from_user_mode+0x1d/0x50 [ 707.924754] do_syscall_64+0x33/0x40 [ 707.925359] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 707.926238] RIP: 0033:0x466609 [ 707.926773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.929840] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 707.931074] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 707.932272] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 707.933452] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.934639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 707.935824] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 [ 707.945965] FAULT_INJECTION: forcing a failure. [ 707.945965] name failslab, interval 1, probability 0, space 0, times 0 [ 707.947876] CPU: 0 PID: 6594 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 707.949008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 707.950896] Call Trace: [ 707.950928] FAULT_INJECTION: forcing a failure. [ 707.950928] name failslab, interval 1, probability 0, space 0, times 0 [ 707.951335] dump_stack+0x107/0x163 [ 707.951356] should_fail.cold+0x5/0xa [ 707.954599] should_failslab+0x5/0x10 [ 707.955237] __kmalloc_node_track_caller+0x74/0x3f0 [ 707.956037] ? sk_stream_alloc_skb+0x109/0xc30 [ 707.956791] ? lock_downgrade+0x6d0/0x6d0 [ 707.957458] __alloc_skb+0xb1/0x620 [ 707.958086] sk_stream_alloc_skb+0x109/0xc30 [ 707.958830] tcp_connect+0xedc/0x4400 [ 707.959479] ? secure_tcpv6_seq+0x193/0x280 [ 707.960193] ? __tcp_transmit_skb+0x3640/0x3640 [ 707.960972] ? tcp_fastopen_defer_connect+0x7/0x410 [ 707.961837] tcp_v6_connect+0x1382/0x1970 [ 707.962535] ? rt6_get_cookie+0x390/0x390 [ 707.963262] __inet_stream_connect+0x812/0xd50 [ 707.964024] ? lock_release+0x6b0/0x6b0 [ 707.964680] ? lock_downgrade+0x6d0/0x6d0 [ 707.965379] ? inet_init_net+0x590/0x590 [ 707.966074] ? mark_held_locks+0x9e/0xe0 [ 707.966760] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 707.967632] ? __local_bh_enable_ip+0x9d/0xf0 [ 707.968393] inet_stream_connect+0x53/0xa0 [ 707.969104] ? __inet_stream_connect+0xd50/0xd50 [ 707.969914] __sys_connect_file+0x157/0x1a0 [ 707.970626] __sys_connect+0x161/0x190 [ 707.971278] ? __sys_connect_file+0x1a0/0x1a0 [ 707.972031] ? vfs_write+0x354/0xa20 [ 707.972657] ? fput_many+0x2f/0x1a0 [ 707.973268] ? ksys_write+0x1a5/0x250 [ 707.973935] __x64_sys_connect+0x6f/0xb0 [ 707.974717] ? syscall_enter_from_user_mode+0x1d/0x50 [ 707.975621] do_syscall_64+0x33/0x40 [ 707.976249] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 707.977143] RIP: 0033:0x466609 [ 707.977707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 707.980922] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 707.982214] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 707.983468] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 707.984729] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 707.985926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 707.987181] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 [ 707.988459] CPU: 1 PID: 6601 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 707.989699] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 707.991683] Call Trace: [ 707.992146] dump_stack+0x107/0x163 [ 707.992796] should_fail.cold+0x5/0xa [ 707.993463] ? skb_clone+0x14f/0x3c0 [ 707.994112] should_failslab+0x5/0x10 [ 707.994766] kmem_cache_alloc+0x5b/0x350 [ 707.995475] skb_clone+0x14f/0x3c0 [ 707.996061] packet_rcv+0xe41/0x1400 [ 707.996698] packet_rcv_fanout+0x277/0x950 [ 707.997381] ? skb_clone+0x1aa/0x3c0 [ 707.998035] ? packet_getname_spkt+0x2d0/0x2d0 [ 707.998751] dev_queue_xmit_nit+0x38b/0xad0 [ 707.999499] dev_hard_start_xmit+0xab/0x840 [ 708.000262] __dev_queue_xmit+0x17da/0x27d0 [ 708.001010] ? find_held_lock+0x2c/0x110 [ 708.001652] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 708.002431] ? mark_held_locks+0x9e/0xe0 [ 708.003135] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 708.003952] ip6_finish_output2+0xde1/0x1f50 [ 708.004718] __ip6_finish_output.part.0+0x4f3/0xb50 [ 708.005498] ip6_output+0x3e0/0x820 [ 708.006148] ip6_xmit+0x10a5/0x1c40 [ 708.006724] ? ip6_append_data+0x330/0x330 [ 708.007431] ? inet6_csk_xmit+0x56/0x620 [ 708.008061] ? lock_release+0x6b0/0x6b0 [ 708.008753] ? inet6_csk_route_socket+0x6a7/0xef0 [ 708.009599] ? inet6_csk_route_req+0x7e0/0x7e0 [ 708.010383] inet6_csk_xmit+0x316/0x620 [ 708.011068] ? inet6_csk_update_pmtu+0x180/0x180 [ 708.011793] ? lock_downgrade+0x6d0/0x6d0 [ 708.012531] ? csum_ipv6_magic+0x1e/0x70 [ 708.013158] ? inet6_csk_update_pmtu+0x180/0x180 [ 708.013983] __tcp_transmit_skb+0x18a8/0x3640 [ 708.014685] ? __tcp_select_window+0x910/0x910 [ 708.015471] ? trace_hardirqs_on+0x5b/0x180 [ 708.016146] ? ktime_get+0x1bf/0x1f0 [ 708.016790] tcp_connect+0x2e10/0x4400 [ 708.017475] ? secure_tcpv6_seq+0x193/0x280 [ 708.018152] ? __tcp_transmit_skb+0x3640/0x3640 [ 708.018942] ? tcp_fastopen_defer_connect+0x7/0x410 [ 708.019752] tcp_v6_connect+0x1382/0x1970 [ 708.020488] ? rt6_get_cookie+0x390/0x390 [ 708.021165] __inet_stream_connect+0x812/0xd50 [ 708.021967] ? lock_release+0x6b0/0x6b0 [ 708.022654] ? lock_downgrade+0x6d0/0x6d0 [ 708.023291] ? inet_init_net+0x590/0x590 [ 708.023990] ? mark_held_locks+0x9e/0xe0 [ 708.024622] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 708.025529] ? __local_bh_enable_ip+0x9d/0xf0 [ 708.026232] inet_stream_connect+0x53/0xa0 [ 708.026948] ? __inet_stream_connect+0xd50/0xd50 [ 708.027681] __sys_connect_file+0x157/0x1a0 [ 708.028435] __sys_connect+0x161/0x190 [ 708.029031] ? __sys_connect_file+0x1a0/0x1a0 [ 708.029832] ? vfs_write+0x354/0xa20 [ 708.030483] ? fput_many+0x2f/0x1a0 [ 708.031086] ? ksys_write+0x1a5/0x250 [ 708.031744] __x64_sys_connect+0x6f/0xb0 [ 708.032416] ? syscall_enter_from_user_mode+0x1d/0x50 [ 708.033303] do_syscall_64+0x33/0x40 [ 708.033927] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 708.034806] RIP: 0033:0x466609 [ 708.035335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.038546] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 708.039832] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 708.041056] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 708.042224] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.043399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 708.044580] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 01:16:04 executing program 7 (fault-call:1 fault-nth:25): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 708.070317] FAULT_INJECTION: forcing a failure. [ 708.070317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 708.072472] CPU: 0 PID: 6613 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 708.073712] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 708.075697] Call Trace: [ 708.076181] dump_stack+0x107/0x163 [ 708.076799] should_fail.cold+0x5/0xa [ 708.077483] __alloc_pages_nodemask+0x182/0x680 [ 708.078327] ? perf_trace_lock+0xac/0x490 [ 708.079036] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 708.080118] ? create_object.isra.0+0x3ad/0xa20 [ 708.080940] alloc_pages_current+0x187/0x280 [ 708.081736] __get_free_pages+0xc/0xa0 [ 708.082455] pgd_alloc+0x84/0x4e0 [ 708.083043] ? pgd_page_get_mm+0x40/0x40 [ 708.083721] ? lockdep_init_map_waits+0x26a/0x700 [ 708.084614] ? lockdep_init_map_waits+0x26a/0x700 [ 708.085398] mm_init+0x633/0xa60 [ 708.086028] dup_mm+0xd5/0x1110 [ 708.086566] ? copy_process+0x2034/0x6650 [ 708.087277] ? vm_area_dup+0x290/0x290 [ 708.087983] ? __raw_spin_lock_init+0x34/0x100 [ 708.088763] copy_process+0x2409/0x6650 [ 708.089470] ? __cleanup_sighand+0xb0/0xb0 [ 708.090224] ? __bpf_prog_run32+0x8f/0xd0 [ 708.090896] ? perf_trace_lock+0xac/0x490 [ 708.091607] kernel_clone+0xe7/0xa20 [ 708.092280] ? copy_init_mm+0x20/0x20 [ 708.092914] ? lock_downgrade+0x6d0/0x6d0 [ 708.093622] ? find_held_lock+0x2c/0x110 [ 708.094346] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 708.095193] ? __seccomp_filter+0x236/0x1470 [ 708.095955] ? seccomp_notify_ioctl+0xda0/0xda0 [ 708.096746] __do_sys_clone+0xc8/0x110 [ 708.097375] ? __do_sys_vfork+0xd0/0xd0 [ 708.098137] ? __secure_computing+0xb4/0x290 [ 708.098863] do_syscall_64+0x33/0x40 [ 708.099533] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 708.100368] RIP: 0033:0x466609 [ 708.100910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.104021] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 708.105248] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 708.106431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 708.107647] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.108814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 708.110043] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:16:04 executing program 4 (fault-call:1 fault-nth:27): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:04 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(0x0, 0x400, 0x5) 01:16:04 executing program 7 (fault-call:1 fault-nth:26): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:04 executing program 1: unshare(0x2050300) r0 = socket$inet(0x2, 0x1, 0x0) unshare(0x8020000) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@multicast1, @multicast2, @loopback}, 0xc) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) 01:16:04 executing program 0 (fault-call:1 fault-nth:3): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:16:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x0) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:04 executing program 6 (fault-call:5 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 708.212486] FAULT_INJECTION: forcing a failure. [ 708.212486] name failslab, interval 1, probability 0, space 0, times 0 [ 708.214615] CPU: 0 PID: 6621 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 708.215789] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 708.217678] Call Trace: [ 708.218130] dump_stack+0x107/0x163 [ 708.218716] should_fail.cold+0x5/0xa [ 708.219402] ? create_object.isra.0+0x3a/0xa20 [ 708.220156] should_failslab+0x5/0x10 [ 708.220765] kmem_cache_alloc+0x5b/0x350 [ 708.221477] create_object.isra.0+0x3a/0xa20 [ 708.222188] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 708.223024] kmem_cache_alloc+0x159/0x350 [ 708.223772] vm_area_dup+0x78/0x290 [ 708.224362] ? __lock_acquire+0xbc2/0x5b20 [ 708.225108] ? perf_trace_lock+0xac/0x490 [ 708.225848] ? SOFTIRQ_verbose+0x10/0x10 [ 708.226498] ? __lockdep_reset_lock+0x180/0x180 [ 708.227244] ? vm_area_alloc+0x110/0x110 [ 708.227886] ? find_held_lock+0x2c/0x110 [ 708.228537] ? get_mm_exe_file+0x139/0x2c0 [ 708.229217] ? lock_downgrade+0x6d0/0x6d0 [ 708.229921] ? down_write_nested+0xe4/0x160 [ 708.230662] ? rwsem_down_write_slowpath+0xbf0/0xbf0 [ 708.231503] ? get_mm_exe_file+0x162/0x2c0 [ 708.232196] dup_mm+0x44d/0x1110 [ 708.232794] ? copy_process+0x2034/0x6650 [ 708.232977] FAULT_INJECTION: forcing a failure. [ 708.232977] name failslab, interval 1, probability 0, space 0, times 0 [ 708.233480] ? vm_area_dup+0x290/0x290 [ 708.235789] ? __raw_spin_lock_init+0x34/0x100 [ 708.236574] copy_process+0x2409/0x6650 [ 708.237313] ? __cleanup_sighand+0xb0/0xb0 [ 708.237998] ? __bpf_prog_run32+0x8f/0xd0 [ 708.238748] ? perf_trace_lock+0xac/0x490 [ 708.239411] kernel_clone+0xe7/0xa20 [ 708.240053] ? copy_init_mm+0x20/0x20 [ 708.240726] ? lock_downgrade+0x6d0/0x6d0 [ 708.241410] ? find_held_lock+0x2c/0x110 [ 708.242118] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 708.243042] ? __seccomp_filter+0x236/0x1470 [ 708.243794] ? seccomp_notify_ioctl+0xda0/0xda0 [ 708.244653] __do_sys_clone+0xc8/0x110 [ 708.245324] ? __do_sys_vfork+0xd0/0xd0 [ 708.246068] ? __secure_computing+0xb4/0x290 [ 708.246852] do_syscall_64+0x33/0x40 [ 708.247472] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 708.248320] RIP: 0033:0x466609 [ 708.248857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.252009] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 708.253343] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 708.254634] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 708.255841] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.257093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 708.258363] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 708.259602] CPU: 1 PID: 6625 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 708.260602] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 708.262252] Call Trace: [ 708.262651] dump_stack+0x107/0x163 [ 708.263179] should_fail.cold+0x5/0xa [ 708.263729] ? create_object.isra.0+0x3a/0xa20 [ 708.264380] should_failslab+0x5/0x10 [ 708.264912] kmem_cache_alloc+0x5b/0x350 [ 708.265015] FAULT_INJECTION: forcing a failure. [ 708.265015] name failslab, interval 1, probability 0, space 0, times 0 [ 708.265492] create_object.isra.0+0x3a/0xa20 [ 708.265504] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 708.265521] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 708.269467] ? sk_stream_alloc_skb+0x109/0xc30 [ 708.270136] __alloc_skb+0xb1/0x620 [ 708.270646] sk_stream_alloc_skb+0x109/0xc30 [ 708.271275] tcp_connect+0xedc/0x4400 [ 708.271837] ? secure_tcpv6_seq+0x193/0x280 [ 708.272448] ? __tcp_transmit_skb+0x3640/0x3640 [ 708.273102] ? tcp_fastopen_defer_connect+0x7/0x410 [ 708.273839] tcp_v6_connect+0x1382/0x1970 [ 708.274432] ? rt6_get_cookie+0x390/0x390 [ 708.275054] __inet_stream_connect+0x812/0xd50 [ 708.275735] ? lock_release+0x6b0/0x6b0 [ 708.276296] ? lock_downgrade+0x6d0/0x6d0 [ 708.276880] ? inet_init_net+0x590/0x590 [ 708.277467] ? mark_held_locks+0x9e/0xe0 [ 708.278072] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 708.278817] ? __local_bh_enable_ip+0x9d/0xf0 [ 708.279473] inet_stream_connect+0x53/0xa0 [ 708.280087] ? __inet_stream_connect+0xd50/0xd50 [ 708.280770] __sys_connect_file+0x157/0x1a0 [ 708.281398] __sys_connect+0x161/0x190 [ 708.281970] ? __sys_connect_file+0x1a0/0x1a0 [ 708.282629] ? vfs_write+0x354/0xa20 [ 708.283169] ? fput_many+0x2f/0x1a0 [ 708.283703] ? ksys_write+0x1a5/0x250 [ 708.284243] __x64_sys_connect+0x6f/0xb0 [ 708.284822] ? syscall_enter_from_user_mode+0x1d/0x50 [ 708.285568] do_syscall_64+0x33/0x40 [ 708.286105] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 708.286845] RIP: 0033:0x466609 [ 708.287299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.290015] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 708.291097] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 708.292144] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 708.293176] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.294219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 708.295234] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 [ 708.296317] CPU: 0 PID: 6619 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 708.297570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 708.299543] Call Trace: [ 708.300017] dump_stack+0x107/0x163 [ 708.300688] should_fail.cold+0x5/0xa [ 708.301343] ? vm_area_dup+0x78/0x290 [ 708.302012] should_failslab+0x5/0x10 [ 708.302708] kmem_cache_alloc+0x5b/0x350 [ 708.303420] vm_area_dup+0x78/0x290 [ 708.304058] ? __lock_acquire+0xbc2/0x5b20 [ 708.304833] ? perf_trace_lock+0xac/0x490 [ 708.305564] ? SOFTIRQ_verbose+0x10/0x10 [ 708.306300] ? __lockdep_reset_lock+0x180/0x180 [ 708.307098] ? vm_area_alloc+0x110/0x110 [ 708.307793] ? find_held_lock+0x2c/0x110 [ 708.308540] ? get_mm_exe_file+0x139/0x2c0 [ 708.309263] ? lock_downgrade+0x6d0/0x6d0 [ 708.309992] ? down_write_nested+0xe4/0x160 [ 708.310792] ? rwsem_down_write_slowpath+0xbf0/0xbf0 [ 708.311642] ? get_mm_exe_file+0x162/0x2c0 [ 708.312420] dup_mm+0x44d/0x1110 [ 708.312985] ? copy_process+0x2034/0x6650 [ 708.313583] ? vm_area_dup+0x290/0x290 [ 708.314199] ? __raw_spin_lock_init+0x34/0x100 [ 708.314851] copy_process+0x2409/0x6650 [ 708.315457] ? __cleanup_sighand+0xb0/0xb0 [ 708.316104] ? __bpf_prog_run32+0x8f/0xd0 [ 708.316724] ? perf_trace_lock+0xac/0x490 [ 708.317328] kernel_clone+0xe7/0xa20 [ 708.317884] ? copy_init_mm+0x20/0x20 [ 708.318402] ? lock_downgrade+0x6d0/0x6d0 [ 708.319024] ? find_held_lock+0x2c/0x110 [ 708.319576] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 708.320310] ? __seccomp_filter+0x236/0x1470 [ 708.320935] ? seccomp_notify_ioctl+0xda0/0xda0 [ 708.321639] __do_sys_clone+0xc8/0x110 [ 708.322192] ? __do_sys_vfork+0xd0/0xd0 [ 708.322786] ? __secure_computing+0xb4/0x290 [ 708.323411] do_syscall_64+0x33/0x40 [ 708.323989] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 708.324753] RIP: 0033:0x466609 [ 708.325256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.327758] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 708.328856] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 708.329894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 708.330977] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.332044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 708.333082] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 708.367654] FAULT_INJECTION: forcing a failure. [ 708.367654] name failslab, interval 1, probability 0, space 0, times 0 [ 708.369043] CPU: 1 PID: 6630 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 708.369854] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 708.371151] Call Trace: [ 708.371457] dump_stack+0x107/0x163 [ 708.371900] should_fail.cold+0x5/0xa [ 708.372348] ? __alloc_file+0x21/0x310 [ 708.372810] should_failslab+0x5/0x10 [ 708.373253] kmem_cache_alloc+0x5b/0x350 [ 708.373750] __alloc_file+0x21/0x310 [ 708.374182] alloc_empty_file+0x6d/0x170 [ 708.374658] path_openat+0xde/0x26c0 [ 708.375099] ? path_lookupat+0x850/0x850 [ 708.375570] ? perf_trace_lock+0xac/0x490 [ 708.376037] ? SOFTIRQ_verbose+0x10/0x10 [ 708.376498] ? lock_acquire+0x197/0x490 [ 708.376952] ? __lockdep_reset_lock+0x180/0x180 [ 708.377481] do_filp_open+0x17e/0x3c0 [ 708.377905] ? may_open_dev+0xf0/0xf0 [ 708.378342] ? __alloc_fd+0x2a5/0x620 [ 708.378780] ? lock_downgrade+0x6d0/0x6d0 [ 708.379268] ? rwlock_bug.part.0+0x90/0x90 [ 708.379765] ? _raw_spin_unlock+0x1a/0x30 [ 708.380225] ? __alloc_fd+0x2a5/0x620 [ 708.380638] do_sys_openat2+0x16d/0x420 [ 708.381085] ? build_open_flags+0x680/0x680 [ 708.381587] ? __mutex_unlock_slowpath+0xe1/0x600 [ 708.382135] ? wait_for_completion+0x270/0x270 [ 708.382650] __x64_sys_openat+0x13f/0x1f0 [ 708.383118] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 708.383655] ? ksys_write+0x1a5/0x250 [ 708.384097] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 708.384705] ? syscall_enter_from_user_mode+0x1d/0x50 [ 708.385303] do_syscall_64+0x33/0x40 [ 708.385715] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 708.386279] RIP: 0033:0x466609 [ 708.386645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 708.388769] RSP: 002b:00007fc51c627188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 708.389647] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 708.390465] RDX: 0000000000000140 RSI: 0000000020000240 RDI: 0000000000000005 [ 708.391290] RBP: 00007fc51c6271d0 R08: 0000000000000000 R09: 0000000000000000 [ 708.392112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 708.392938] R13: 00007ffffc2fbbef R14: 00007fc51c627300 R15: 0000000000022000 01:16:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x0) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:04 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(0x0, 0x400, 0x5) [ 719.166434] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:16:22 executing program 4 (fault-call:1 fault-nth:28): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:22 executing program 5 (fault-call:5 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:16:22 executing program 0 (fault-call:1 fault-nth:4): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:16:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = fsopen(&(0x7f0000000000)='cpuset\x00', 0x1) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000040)='\x00', &(0x7f0000000140)='./file1\x00', r0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000003180)=[{&(0x7f00000000c0)="4ad6689d49bcfa7b4df990344a5718d6f1b0168f173c3c0d2d343d9a7efce07d51d0cf89c2bfce042d", 0x29}], 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc0c0583b, &(0x7f0000000080)) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) statx(r2, &(0x7f0000000180)='./file1\x00', 0x4000, 0x20, &(0x7f00000001c0)) 01:16:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x0) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:22 executing program 7 (fault-call:1 fault-nth:27): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:22 executing program 6 (fault-call:5 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:22 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x5) [ 726.024941] FAULT_INJECTION: forcing a failure. [ 726.024941] name failslab, interval 1, probability 0, space 0, times 0 [ 726.026476] CPU: 0 PID: 6646 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 726.027335] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 726.028805] Call Trace: [ 726.029151] dump_stack+0x107/0x163 [ 726.032043] should_fail.cold+0x5/0xa [ 726.032554] ? create_object.isra.0+0x3a/0xa20 [ 726.033152] should_failslab+0x5/0x10 [ 726.033644] kmem_cache_alloc+0x5b/0x350 [ 726.034220] create_object.isra.0+0x3a/0xa20 [ 726.034788] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 726.035445] kmem_cache_alloc+0x159/0x350 [ 726.035983] vm_area_dup+0x78/0x290 [ 726.036463] ? __lock_acquire+0xbc2/0x5b20 [ 726.037013] ? perf_trace_lock+0xac/0x490 [ 726.037565] ? SOFTIRQ_verbose+0x10/0x10 [ 726.038114] ? __lockdep_reset_lock+0x180/0x180 [ 726.038719] ? vm_area_alloc+0x110/0x110 [ 726.039243] ? find_held_lock+0x2c/0x110 [ 726.039784] ? get_mm_exe_file+0x139/0x2c0 [ 726.040306] ? lock_downgrade+0x6d0/0x6d0 [ 726.040835] ? down_write_nested+0xe4/0x160 [ 726.041402] ? rwsem_down_write_slowpath+0xbf0/0xbf0 [ 726.042055] ? get_mm_exe_file+0x162/0x2c0 [ 726.042569] dup_mm+0x44d/0x1110 [ 726.042978] ? copy_process+0x2034/0x6650 [ 726.043466] ? vm_area_dup+0x290/0x290 [ 726.043935] ? __raw_spin_lock_init+0x34/0x100 [ 726.044522] copy_process+0x2409/0x6650 [ 726.045054] ? __cleanup_sighand+0xb0/0xb0 [ 726.045591] ? __bpf_prog_run32+0x8f/0xd0 [ 726.046134] ? perf_trace_lock+0xac/0x490 [ 726.046665] kernel_clone+0xe7/0xa20 [ 726.047140] ? copy_init_mm+0x20/0x20 [ 726.047620] ? lock_downgrade+0x6d0/0x6d0 [ 726.048129] ? find_held_lock+0x2c/0x110 [ 726.048653] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 726.049315] ? __seccomp_filter+0x236/0x1470 [ 726.049884] ? seccomp_notify_ioctl+0xda0/0xda0 [ 726.050482] __do_sys_clone+0xc8/0x110 [ 726.050987] ? __do_sys_vfork+0xd0/0xd0 [ 726.051497] ? __secure_computing+0xb4/0x290 [ 726.052064] do_syscall_64+0x33/0x40 [ 726.052547] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.053193] RIP: 0033:0x466609 [ 726.053604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.055951] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 726.056919] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 726.057816] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 726.058718] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.059641] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 726.060554] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 726.089015] FAULT_INJECTION: forcing a failure. [ 726.089015] name failslab, interval 1, probability 0, space 0, times 0 [ 726.090316] FAULT_INJECTION: forcing a failure. [ 726.090316] name failslab, interval 1, probability 0, space 0, times 0 [ 726.091194] CPU: 0 PID: 6655 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 726.093344] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 726.094970] Call Trace: [ 726.095352] dump_stack+0x107/0x163 [ 726.095829] should_fail.cold+0x5/0xa [ 726.096393] should_failslab+0x5/0x10 [ 726.096919] __kmalloc_node_track_caller+0x74/0x3f0 [ 726.097631] ? sk_stream_alloc_skb+0x109/0xc30 [ 726.098266] ? lock_downgrade+0x6d0/0x6d0 [ 726.098847] __alloc_skb+0xb1/0x620 [ 726.099357] sk_stream_alloc_skb+0x109/0xc30 [ 726.099963] tcp_connect+0xedc/0x4400 [ 726.100491] ? secure_tcpv6_seq+0x193/0x280 [ 726.101084] ? __tcp_transmit_skb+0x3640/0x3640 [ 726.101725] ? tcp_fastopen_defer_connect+0x7/0x410 [ 726.102446] tcp_v6_connect+0x1382/0x1970 [ 726.103029] ? rt6_get_cookie+0x390/0x390 [ 726.103663] __inet_stream_connect+0x812/0xd50 [ 726.104327] ? lock_release+0x6b0/0x6b0 [ 726.104859] ? lock_downgrade+0x6d0/0x6d0 [ 726.105467] ? inet_init_net+0x590/0x590 [ 726.106070] ? mark_held_locks+0x9e/0xe0 [ 726.106680] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 726.107471] ? __local_bh_enable_ip+0x9d/0xf0 [ 726.108144] inet_stream_connect+0x53/0xa0 [ 726.108752] ? __inet_stream_connect+0xd50/0xd50 [ 726.109365] __sys_connect_file+0x157/0x1a0 [ 726.109931] __sys_connect+0x161/0x190 [ 726.110499] ? __sys_connect_file+0x1a0/0x1a0 [ 726.111178] ? vfs_write+0x354/0xa20 [ 726.111725] ? fput_many+0x2f/0x1a0 [ 726.112247] ? ksys_write+0x1a5/0x250 [ 726.112785] __x64_sys_connect+0x6f/0xb0 [ 726.113360] ? syscall_enter_from_user_mode+0x1d/0x50 [ 726.114075] do_syscall_64+0x33/0x40 [ 726.114574] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.115239] RIP: 0033:0x466609 [ 726.115670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.117976] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 726.119033] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 726.119984] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 726.120980] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.121942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.122936] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 [ 726.123962] CPU: 1 PID: 6660 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 726.124736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 726.126022] Call Trace: [ 726.126315] dump_stack+0x107/0x163 [ 726.126724] should_fail.cold+0x5/0xa [ 726.127154] ? create_object.isra.0+0x3a/0xa20 [ 726.127674] should_failslab+0x5/0x10 [ 726.128101] kmem_cache_alloc+0x5b/0x350 [ 726.128555] ? lock_acquire+0x197/0x490 [ 726.129008] create_object.isra.0+0x3a/0xa20 [ 726.129498] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 726.130061] kmem_cache_alloc+0x159/0x350 [ 726.130526] skb_clone+0x14f/0x3c0 [ 726.130917] dev_queue_xmit_nit+0x3a7/0xad0 [ 726.131397] ? ipv6_mc_check_mld+0x1110/0x1110 [ 726.131922] dev_hard_start_xmit+0xab/0x840 [ 726.132399] __dev_queue_xmit+0x17da/0x27d0 [ 726.132871] ? find_held_lock+0x2c/0x110 [ 726.133303] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 726.133815] ? mark_held_locks+0x9e/0xe0 [ 726.134281] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 726.134871] ip6_finish_output2+0xde1/0x1f50 [ 726.135361] __ip6_finish_output.part.0+0x4f3/0xb50 [ 726.135915] ip6_output+0x3e0/0x820 [ 726.136335] ip6_xmit+0x10a5/0x1c40 [ 726.136745] ? ip6_append_data+0x330/0x330 [ 726.137208] ? inet6_csk_xmit+0x56/0x620 [ 726.137662] ? lock_release+0x6b0/0x6b0 [ 726.138125] ? inet6_csk_route_socket+0x6a7/0xef0 [ 726.138651] ? inet6_csk_route_req+0x7e0/0x7e0 [ 726.139167] inet6_csk_xmit+0x316/0x620 [ 726.139611] ? inet6_csk_update_pmtu+0x180/0x180 [ 726.140129] ? lock_downgrade+0x6d0/0x6d0 [ 726.140610] ? csum_ipv6_magic+0x1e/0x70 [ 726.141060] ? inet6_csk_update_pmtu+0x180/0x180 [ 726.141597] __tcp_transmit_skb+0x18a8/0x3640 [ 726.142128] ? __tcp_select_window+0x910/0x910 [ 726.142645] ? trace_hardirqs_on+0x5b/0x180 [ 726.143154] ? ktime_get+0x1bf/0x1f0 [ 726.143562] tcp_connect+0x2e10/0x4400 01:16:22 executing program 7 (fault-call:1 fault-nth:28): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 726.144026] ? secure_tcpv6_seq+0x193/0x280 [ 726.145204] ? __tcp_transmit_skb+0x3640/0x3640 [ 726.146552] ? tcp_fastopen_defer_connect+0x7/0x410 [ 726.147987] tcp_v6_connect+0x1382/0x1970 [ 726.149148] ? rt6_get_cookie+0x390/0x390 [ 726.150417] __inet_stream_connect+0x812/0xd50 [ 726.151684] ? lock_release+0x6b0/0x6b0 [ 726.152769] ? lock_downgrade+0x6d0/0x6d0 [ 726.153902] ? inet_init_net+0x590/0x590 [ 726.155017] ? mark_held_locks+0x9e/0xe0 [ 726.156158] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 726.157553] ? __local_bh_enable_ip+0x9d/0xf0 [ 726.158817] inet_stream_connect+0x53/0xa0 [ 726.159959] ? __inet_stream_connect+0xd50/0xd50 [ 726.161279] __sys_connect_file+0x157/0x1a0 [ 726.162503] __sys_connect+0x161/0x190 [ 726.163576] ? __sys_connect_file+0x1a0/0x1a0 [ 726.164812] ? vfs_write+0x354/0xa20 [ 726.165843] ? fput_many+0x2f/0x1a0 [ 726.166887] ? ksys_write+0x1a5/0x250 [ 726.167965] __x64_sys_connect+0x6f/0xb0 [ 726.169075] ? syscall_enter_from_user_mode+0x1d/0x50 [ 726.170498] do_syscall_64+0x33/0x40 [ 726.171530] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.172925] RIP: 0033:0x466609 [ 726.173807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.179057] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 726.181252] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 726.182990] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 726.184545] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.186109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 726.187665] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 [ 726.214817] FAULT_INJECTION: forcing a failure. [ 726.214817] name failslab, interval 1, probability 0, space 0, times 0 [ 726.216728] CPU: 0 PID: 6665 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 726.217752] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 726.219428] Call Trace: [ 726.219814] dump_stack+0x107/0x163 [ 726.220354] should_fail.cold+0x5/0xa [ 726.220912] ? create_object.isra.0+0x3a/0xa20 [ 726.221582] should_failslab+0x5/0x10 [ 726.222170] kmem_cache_alloc+0x5b/0x350 [ 726.222774] create_object.isra.0+0x3a/0xa20 [ 726.223404] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 726.224162] kmem_cache_alloc+0x159/0x350 [ 726.224785] __alloc_file+0x21/0x310 [ 726.225332] alloc_empty_file+0x6d/0x170 [ 726.225938] path_openat+0xde/0x26c0 [ 726.226474] ? path_lookupat+0x850/0x850 [ 726.227079] ? perf_trace_lock+0xac/0x490 [ 726.227695] ? SOFTIRQ_verbose+0x10/0x10 [ 726.228282] ? lock_acquire+0x197/0x490 [ 726.228845] ? __lockdep_reset_lock+0x180/0x180 [ 726.229523] do_filp_open+0x17e/0x3c0 [ 726.230077] ? may_open_dev+0xf0/0xf0 [ 726.230624] ? __alloc_fd+0x2a5/0x620 [ 726.231125] ? lock_downgrade+0x6d0/0x6d0 [ 726.231727] ? rwlock_bug.part.0+0x90/0x90 [ 726.232366] ? _raw_spin_unlock+0x1a/0x30 [ 726.232974] ? __alloc_fd+0x2a5/0x620 [ 726.233547] do_sys_openat2+0x16d/0x420 [ 726.234144] ? build_open_flags+0x680/0x680 [ 726.234761] ? __mutex_unlock_slowpath+0xe1/0x600 [ 726.235458] ? wait_for_completion+0x270/0x270 [ 726.236124] __x64_sys_openat+0x13f/0x1f0 [ 726.236734] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 726.237452] ? ksys_write+0x1a5/0x250 [ 726.238021] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 726.238783] ? syscall_enter_from_user_mode+0x1d/0x50 [ 726.239542] do_syscall_64+0x33/0x40 [ 726.240091] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.240839] RIP: 0033:0x466609 [ 726.241307] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.244045] RSP: 002b:00007fc51c606188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 726.245187] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 726.246258] RDX: 0000000000000140 RSI: 0000000020000240 RDI: ffffffffffffffff [ 726.247329] RBP: 00007fc51c6061d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.248319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.249332] R13: 00007ffffc2fbbef R14: 00007fc51c606300 R15: 0000000000022000 [ 726.267213] FAULT_INJECTION: forcing a failure. [ 726.267213] name failslab, interval 1, probability 0, space 0, times 0 [ 726.269796] CPU: 1 PID: 6667 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 726.271273] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 726.273692] Call Trace: [ 726.274276] dump_stack+0x107/0x163 [ 726.275067] should_fail.cold+0x5/0xa 01:16:22 executing program 6 (fault-call:5 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 726.275888] ? vm_area_dup+0x78/0x290 [ 726.276883] should_failslab+0x5/0x10 [ 726.277696] kmem_cache_alloc+0x5b/0x350 [ 726.278595] vm_area_dup+0x78/0x290 [ 726.279388] ? perf_trace_lock+0xac/0x490 [ 726.280275] ? copy_page_range+0x242d/0x3810 [ 726.281218] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 726.282354] ? __lockdep_reset_lock+0x180/0x180 [ 726.283368] ? find_held_lock+0x2c/0x110 [ 726.284249] ? dup_mm+0x631/0x1110 [ 726.285024] ? vm_area_alloc+0x110/0x110 [ 726.285897] ? find_held_lock+0x2c/0x110 [ 726.286773] ? vm_iomap_memory+0x190/0x190 [ 726.287686] ? up_write+0x191/0x550 [ 726.288473] ? downgrade_write+0x3a0/0x3a0 [ 726.289365] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 726.290453] ? __vma_link_rb+0x540/0x700 [ 726.291321] dup_mm+0x44d/0x1110 [ 726.292065] ? vm_area_dup+0x290/0x290 [ 726.292894] ? __raw_spin_lock_init+0x34/0x100 [ 726.293882] copy_process+0x2409/0x6650 [ 726.294772] ? __cleanup_sighand+0xb0/0xb0 [ 726.295688] ? perf_trace_lock+0xac/0x490 [ 726.296589] kernel_clone+0xe7/0xa20 [ 726.297390] ? copy_init_mm+0x20/0x20 [ 726.298204] ? lock_downgrade+0x6d0/0x6d0 [ 726.299077] ? find_held_lock+0x2c/0x110 [ 726.299934] ? ksys_write+0x12d/0x250 [ 726.300756] __do_sys_clone+0xc8/0x110 [ 726.301586] ? __do_sys_vfork+0xd0/0xd0 [ 726.302451] ? rcu_read_lock_any_held+0x69/0x90 [ 726.303444] ? vfs_write+0x354/0xa20 [ 726.304264] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 726.305378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 726.306498] do_syscall_64+0x33/0x40 [ 726.307307] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.308403] RIP: 0033:0x466609 [ 726.309094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.313043] RSP: 002b:00007f5d1133f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 726.314689] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 726.316213] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 726.317738] RBP: 00007f5d1133f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.319252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 726.320779] R13: 00007ffe62c6af4f R14: 00007f5d1133f300 R15: 0000000000022000 [ 726.344395] FAULT_INJECTION: forcing a failure. [ 726.344395] name failslab, interval 1, probability 0, space 0, times 0 [ 726.346928] CPU: 1 PID: 6676 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 726.348374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 726.350771] Call Trace: [ 726.351329] dump_stack+0x107/0x163 [ 726.352116] should_fail.cold+0x5/0xa [ 726.352934] ? vm_area_dup+0x78/0x290 [ 726.353750] should_failslab+0x5/0x10 [ 726.354582] kmem_cache_alloc+0x5b/0x350 [ 726.355459] vm_area_dup+0x78/0x290 [ 726.356255] ? perf_trace_lock+0xac/0x490 [ 726.357137] ? copy_page_range+0x242d/0x3810 [ 726.357456] FAULT_INJECTION: forcing a failure. [ 726.357456] name failslab, interval 1, probability 0, space 0, times 0 [ 726.358088] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 726.358109] ? __lockdep_reset_lock+0x180/0x180 [ 726.358140] ? find_held_lock+0x2c/0x110 [ 726.362590] ? dup_mm+0x631/0x1110 [ 726.363353] ? vm_area_alloc+0x110/0x110 [ 726.364210] ? find_held_lock+0x2c/0x110 [ 726.365077] ? vm_iomap_memory+0x190/0x190 [ 726.366021] ? up_write+0x191/0x550 [ 726.366806] ? downgrade_write+0x3a0/0x3a0 [ 726.367683] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 726.368745] ? __vma_link_rb+0x540/0x700 [ 726.369624] dup_mm+0x44d/0x1110 [ 726.370388] ? vm_area_dup+0x290/0x290 [ 726.371219] ? __raw_spin_lock_init+0x34/0x100 [ 726.372178] copy_process+0x2409/0x6650 [ 726.373044] ? __cleanup_sighand+0xb0/0xb0 [ 726.373978] ? perf_trace_lock+0xac/0x490 [ 726.374857] kernel_clone+0xe7/0xa20 [ 726.375636] ? copy_init_mm+0x20/0x20 [ 726.376454] ? lock_downgrade+0x6d0/0x6d0 [ 726.377327] ? find_held_lock+0x2c/0x110 [ 726.378210] ? ksys_write+0x12d/0x250 [ 726.379025] __do_sys_clone+0xc8/0x110 [ 726.379849] ? __do_sys_vfork+0xd0/0xd0 [ 726.380685] ? rcu_read_lock_any_held+0x69/0x90 [ 726.381667] ? vfs_write+0x354/0xa20 [ 726.382494] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 726.383606] ? syscall_enter_from_user_mode+0x1d/0x50 [ 726.384714] do_syscall_64+0x33/0x40 [ 726.385447] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.386427] RIP: 0033:0x466609 [ 726.387038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.390481] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 726.391910] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 726.393250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 726.394612] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.395954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 726.397308] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 [ 726.398726] CPU: 0 PID: 6677 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 726.399664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 726.401207] Call Trace: [ 726.401574] dump_stack+0x107/0x163 [ 726.402102] should_fail.cold+0x5/0xa [ 726.402650] ? create_object.isra.0+0x3a/0xa20 [ 726.403291] should_failslab+0x5/0x10 [ 726.403845] kmem_cache_alloc+0x5b/0x350 [ 726.404409] create_object.isra.0+0x3a/0xa20 [ 726.405022] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 726.405717] __kmalloc_node_track_caller+0x1a6/0x3f0 [ 726.406451] ? sk_stream_alloc_skb+0x109/0xc30 [ 726.407113] ? lock_downgrade+0x6d0/0x6d0 [ 726.407697] __alloc_skb+0xb1/0x620 [ 726.408196] sk_stream_alloc_skb+0x109/0xc30 [ 726.408797] tcp_connect+0xedc/0x4400 [ 726.409345] ? secure_tcpv6_seq+0x193/0x280 [ 726.409967] ? __tcp_transmit_skb+0x3640/0x3640 [ 726.410613] ? tcp_fastopen_defer_connect+0x7/0x410 [ 726.411323] tcp_v6_connect+0x1382/0x1970 [ 726.411909] ? rt6_get_cookie+0x390/0x390 [ 726.412516] __inet_stream_connect+0x812/0xd50 [ 726.413152] ? lock_release+0x6b0/0x6b0 [ 726.413729] ? lock_downgrade+0x6d0/0x6d0 [ 726.414318] ? inet_init_net+0x590/0x590 [ 726.414906] ? mark_held_locks+0x9e/0xe0 [ 726.415483] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 726.416252] ? __local_bh_enable_ip+0x9d/0xf0 [ 726.416897] inet_stream_connect+0x53/0xa0 [ 726.417479] ? __inet_stream_connect+0xd50/0xd50 [ 726.418156] __sys_connect_file+0x157/0x1a0 [ 726.418756] __sys_connect+0x161/0x190 [ 726.419299] ? __sys_connect_file+0x1a0/0x1a0 [ 726.419925] ? vfs_write+0x354/0xa20 [ 726.420475] ? fput_many+0x2f/0x1a0 [ 726.421011] ? ksys_write+0x1a5/0x250 [ 726.421561] __x64_sys_connect+0x6f/0xb0 [ 726.422177] ? syscall_enter_from_user_mode+0x1d/0x50 [ 726.422934] do_syscall_64+0x33/0x40 [ 726.423479] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.424205] RIP: 0033:0x466609 [ 726.424658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.427338] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 726.428460] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 726.429500] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 726.430518] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.431571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.432577] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 01:16:22 executing program 0 (fault-call:1 fault-nth:5): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:16:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = fsopen(&(0x7f0000000000)='cpuset\x00', 0x1) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000040)='\x00', &(0x7f0000000140)='./file1\x00', r0) syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000003180)=[{&(0x7f00000000c0)="4ad6689d49bcfa7b4df990344a5718d6f1b0168f173c3c0d2d343d9a7efce07d51d0cf89c2bfce042d", 0x29}], 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0xc0c0583b, &(0x7f0000000080)) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x4) statx(r2, &(0x7f0000000180)='./file1\x00', 0x4000, 0x20, &(0x7f00000001c0)) [ 726.502953] FAULT_INJECTION: forcing a failure. [ 726.502953] name failslab, interval 1, probability 0, space 0, times 0 [ 726.504691] CPU: 0 PID: 6682 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 726.505665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 726.507358] Call Trace: [ 726.507749] dump_stack+0x107/0x163 [ 726.508265] should_fail.cold+0x5/0xa [ 726.508803] ? security_file_alloc+0x34/0x170 [ 726.509441] should_failslab+0x5/0x10 [ 726.509985] kmem_cache_alloc+0x5b/0x350 [ 726.510545] security_file_alloc+0x34/0x170 [ 726.511147] __alloc_file+0xb6/0x310 [ 726.511665] alloc_empty_file+0x6d/0x170 [ 726.512239] path_openat+0xde/0x26c0 [ 726.512783] ? path_lookupat+0x850/0x850 [ 726.513364] ? perf_trace_lock+0xac/0x490 [ 726.513962] ? SOFTIRQ_verbose+0x10/0x10 [ 726.514546] ? lock_acquire+0x197/0x490 [ 726.515118] ? __lockdep_reset_lock+0x180/0x180 [ 726.515779] do_filp_open+0x17e/0x3c0 [ 726.516311] ? may_open_dev+0xf0/0xf0 [ 726.516849] ? __alloc_fd+0x2a5/0x620 [ 726.517370] ? lock_downgrade+0x6d0/0x6d0 [ 726.517950] ? rwlock_bug.part.0+0x90/0x90 [ 726.518560] ? _raw_spin_unlock+0x1a/0x30 [ 726.519155] ? __alloc_fd+0x2a5/0x620 [ 726.519697] do_sys_openat2+0x16d/0x420 [ 726.520258] ? build_open_flags+0x680/0x680 [ 726.520876] ? __mutex_unlock_slowpath+0xe1/0x600 [ 726.521565] ? wait_for_completion+0x270/0x270 [ 726.522245] __x64_sys_openat+0x13f/0x1f0 [ 726.522837] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 726.523526] ? ksys_write+0x1a5/0x250 [ 726.524073] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 726.524805] ? syscall_enter_from_user_mode+0x1d/0x50 [ 726.525512] do_syscall_64+0x33/0x40 [ 726.526056] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 726.526794] RIP: 0033:0x466609 [ 726.527268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 726.530012] RSP: 002b:00007fc51c627188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 726.531160] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 726.532224] RDX: 0000000000000140 RSI: 0000000020000240 RDI: 0000000000000005 [ 726.533207] RBP: 00007fc51c6271d0 R08: 0000000000000000 R09: 0000000000000000 [ 726.534226] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.535233] R13: 00007ffffc2fbbef R14: 00007fc51c627300 R15: 0000000000022000 01:16:36 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x5) 01:16:36 executing program 7 (fault-call:1 fault-nth:29): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:36 executing program 5 (fault-call:5 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:16:36 executing program 6 (fault-call:5 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:36 executing program 0 (fault-call:1 fault-nth:6): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:16:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/88) 01:16:36 executing program 4 (fault-call:1 fault-nth:29): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 740.511391] FAULT_INJECTION: forcing a failure. [ 740.511391] name failslab, interval 1, probability 0, space 0, times 0 [ 740.513052] CPU: 1 PID: 6704 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 740.514016] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 740.515511] Call Trace: [ 740.515918] dump_stack+0x107/0x163 [ 740.516470] should_fail.cold+0x5/0xa [ 740.517044] ? __skb_ext_alloc+0x19/0x80 [ 740.517655] should_failslab+0x5/0x10 [ 740.518233] kmem_cache_alloc+0x5b/0x350 [ 740.518850] __skb_ext_alloc+0x19/0x80 [ 740.519431] skb_ext_add+0x504/0x670 [ 740.520001] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 740.520802] __alloc_skb+0x3c1/0x620 [ 740.521354] sk_stream_alloc_skb+0x109/0xc30 [ 740.521996] tcp_connect+0xedc/0x4400 [ 740.522590] ? secure_tcpv6_seq+0x193/0x280 [ 740.523222] ? __tcp_transmit_skb+0x3640/0x3640 [ 740.523895] ? tcp_fastopen_defer_connect+0x7/0x410 [ 740.524638] tcp_v6_connect+0x1382/0x1970 [ 740.525254] ? rt6_get_cookie+0x390/0x390 [ 740.525895] __inet_stream_connect+0x812/0xd50 [ 740.526577] ? lock_release+0x6b0/0x6b0 [ 740.527156] ? lock_downgrade+0x6d0/0x6d0 [ 740.527761] ? inet_init_net+0x590/0x590 [ 740.528359] ? mark_held_locks+0x9e/0xe0 [ 740.528952] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 740.529714] ? __local_bh_enable_ip+0x9d/0xf0 [ 740.530347] inet_stream_connect+0x53/0xa0 [ 740.530978] ? __inet_stream_connect+0xd50/0xd50 [ 740.531682] __sys_connect_file+0x157/0x1a0 [ 740.532325] __sys_connect+0x161/0x190 [ 740.532905] ? __sys_connect_file+0x1a0/0x1a0 [ 740.533587] ? vfs_write+0x354/0xa20 [ 740.534156] ? fput_many+0x2f/0x1a0 [ 740.534695] ? ksys_write+0x1a5/0x250 [ 740.535243] __x64_sys_connect+0x6f/0xb0 [ 740.535813] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.536527] do_syscall_64+0x33/0x40 [ 740.537059] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 740.537761] RIP: 0033:0x466609 [ 740.538233] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.540852] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 740.541911] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 740.542915] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 740.543929] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.544957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 740.546007] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 [ 740.560396] FAULT_INJECTION: forcing a failure. [ 740.560396] name failslab, interval 1, probability 0, space 0, times 0 [ 740.562142] CPU: 1 PID: 6707 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 740.563099] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 740.564719] Call Trace: [ 740.565105] dump_stack+0x107/0x163 [ 740.565632] should_fail.cold+0x5/0xa [ 740.566207] ? skb_clone+0x14f/0x3c0 [ 740.566746] should_failslab+0x5/0x10 [ 740.567294] kmem_cache_alloc+0x5b/0x350 [ 740.567889] skb_clone+0x14f/0x3c0 [ 740.568407] packet_rcv+0xe41/0x1400 [ 740.568964] packet_rcv_fanout+0x277/0x950 [ 740.569565] ? skb_clone+0x1aa/0x3c0 [ 740.570085] ? packet_getname_spkt+0x2d0/0x2d0 [ 740.570769] dev_queue_xmit_nit+0x38b/0xad0 [ 740.571422] dev_hard_start_xmit+0xab/0x840 [ 740.572069] __dev_queue_xmit+0x17da/0x27d0 [ 740.572716] ? find_held_lock+0x2c/0x110 [ 740.573312] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 740.574006] ? mark_held_locks+0x9e/0xe0 [ 740.574629] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 740.575407] ip6_finish_output2+0xde1/0x1f50 [ 740.576076] __ip6_finish_output.part.0+0x4f3/0xb50 [ 740.576818] ip6_output+0x3e0/0x820 [ 740.577178] FAULT_INJECTION: forcing a failure. [ 740.577178] name failslab, interval 1, probability 0, space 0, times 0 [ 740.577362] ip6_xmit+0x10a5/0x1c40 [ 740.579532] ? ip6_append_data+0x330/0x330 [ 740.580156] ? inet6_csk_xmit+0x56/0x620 [ 740.580760] ? lock_release+0x6b0/0x6b0 [ 740.581346] ? inet6_csk_route_socket+0x6a7/0xef0 [ 740.582057] ? inet6_csk_route_req+0x7e0/0x7e0 [ 740.582770] inet6_csk_xmit+0x316/0x620 [ 740.583359] ? inet6_csk_update_pmtu+0x180/0x180 [ 740.584051] ? lock_downgrade+0x6d0/0x6d0 [ 740.584678] ? csum_ipv6_magic+0x1e/0x70 [ 740.585281] ? inet6_csk_update_pmtu+0x180/0x180 [ 740.585979] __tcp_transmit_skb+0x18a8/0x3640 [ 740.586669] ? __tcp_select_window+0x910/0x910 [ 740.587353] ? trace_hardirqs_on+0x5b/0x180 [ 740.587989] ? ktime_get+0x1bf/0x1f0 [ 740.588545] tcp_connect+0x2e10/0x4400 [ 740.589142] ? secure_tcpv6_seq+0x193/0x280 [ 740.589771] ? __tcp_transmit_skb+0x3640/0x3640 [ 740.590479] ? tcp_fastopen_defer_connect+0x7/0x410 [ 740.591242] tcp_v6_connect+0x1382/0x1970 [ 740.591873] ? rt6_get_cookie+0x390/0x390 [ 740.592530] __inet_stream_connect+0x812/0xd50 [ 740.593204] ? lock_release+0x6b0/0x6b0 [ 740.593790] ? lock_downgrade+0x6d0/0x6d0 [ 740.594411] ? inet_init_net+0x590/0x590 [ 740.595017] ? mark_held_locks+0x9e/0xe0 [ 740.595619] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 740.596387] ? __local_bh_enable_ip+0x9d/0xf0 [ 740.597054] inet_stream_connect+0x53/0xa0 [ 740.597676] ? __inet_stream_connect+0xd50/0xd50 [ 740.598400] __sys_connect_file+0x157/0x1a0 [ 740.599038] __sys_connect+0x161/0x190 [ 740.599608] ? __sys_connect_file+0x1a0/0x1a0 [ 740.600272] ? vfs_write+0x354/0xa20 [ 740.600824] ? fput_many+0x2f/0x1a0 [ 740.601361] ? ksys_write+0x1a5/0x250 [ 740.601937] __x64_sys_connect+0x6f/0xb0 [ 740.602546] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.603305] do_syscall_64+0x33/0x40 [ 740.603859] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 740.604626] RIP: 0033:0x466609 [ 740.605120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.607842] RSP: 002b:00007f9e279d9188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 740.608960] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 740.610003] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 740.611072] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.612114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 740.613159] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 [ 740.614250] CPU: 0 PID: 6714 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 740.615223] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 740.616803] Call Trace: [ 740.617179] dump_stack+0x107/0x163 [ 740.617693] should_fail.cold+0x5/0xa [ 740.618239] ? create_object.isra.0+0x3a/0xa20 [ 740.618876] should_failslab+0x5/0x10 [ 740.619405] kmem_cache_alloc+0x5b/0x350 [ 740.619984] ? mark_held_locks+0x9e/0xe0 [ 740.620554] create_object.isra.0+0x3a/0xa20 [ 740.621165] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 740.621791] FAULT_INJECTION: forcing a failure. [ 740.621791] name failslab, interval 1, probability 0, space 0, times 0 [ 740.621873] kmem_cache_alloc+0x159/0x350 [ 740.621901] vm_area_dup+0x78/0x290 [ 740.624598] ? perf_trace_lock+0xac/0x490 [ 740.625175] ? copy_page_range+0x242d/0x3810 [ 740.625788] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 740.626529] ? __lockdep_reset_lock+0x180/0x180 [ 740.627184] ? find_held_lock+0x2c/0x110 [ 740.627748] ? dup_mm+0x631/0x1110 [ 740.628240] ? vm_area_alloc+0x110/0x110 [ 740.628800] ? find_held_lock+0x2c/0x110 [ 740.629370] ? vm_iomap_memory+0x190/0x190 [ 740.629960] ? up_write+0x191/0x550 [ 740.630482] ? downgrade_write+0x3a0/0x3a0 [ 740.631067] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 740.631761] ? __vma_link_rb+0x540/0x700 [ 740.632324] dup_mm+0x44d/0x1110 [ 740.632805] ? vm_area_dup+0x290/0x290 [ 740.633349] ? __raw_spin_lock_init+0x34/0x100 [ 740.633986] copy_process+0x2409/0x6650 [ 740.634574] ? __cleanup_sighand+0xb0/0xb0 [ 740.635165] ? perf_trace_lock+0xac/0x490 [ 740.635744] kernel_clone+0xe7/0xa20 [ 740.636262] ? copy_init_mm+0x20/0x20 [ 740.636786] ? lock_downgrade+0x6d0/0x6d0 [ 740.637362] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 740.638099] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 740.638855] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 740.639617] __do_sys_clone+0xc8/0x110 [ 740.640157] ? __do_sys_vfork+0xd0/0xd0 [ 740.640694] ? rcu_read_lock_any_held+0x69/0x90 [ 740.641311] ? vfs_write+0x354/0xa20 [ 740.641832] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 740.642571] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.643288] do_syscall_64+0x33/0x40 [ 740.643802] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 740.644514] RIP: 0033:0x466609 [ 740.644958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.647508] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 740.648560] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 740.649544] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 740.650540] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.651528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 740.652513] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 [ 740.653540] CPU: 1 PID: 6712 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 740.654581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 740.656216] Call Trace: [ 740.656611] dump_stack+0x107/0x163 [ 740.657145] should_fail.cold+0x5/0xa [ 740.657704] ? create_object.isra.0+0x3a/0xa20 [ 740.658389] should_failslab+0x5/0x10 [ 740.658938] kmem_cache_alloc+0x5b/0x350 [ 740.659526] ? mark_held_locks+0x9e/0xe0 [ 740.660122] create_object.isra.0+0x3a/0xa20 [ 740.660756] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 740.661496] kmem_cache_alloc+0x159/0x350 [ 740.662120] vm_area_dup+0x78/0x290 [ 740.662656] ? perf_trace_lock+0xac/0x490 [ 740.663253] ? copy_page_range+0x242d/0x3810 [ 740.663891] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 740.664651] ? __lockdep_reset_lock+0x180/0x180 [ 740.665342] ? find_held_lock+0x2c/0x110 [ 740.665937] ? dup_mm+0x631/0x1110 [ 740.666477] ? vm_area_alloc+0x110/0x110 [ 740.667068] ? find_held_lock+0x2c/0x110 [ 740.667659] ? vm_iomap_memory+0x190/0x190 [ 740.668275] ? up_write+0x191/0x550 [ 740.668806] ? downgrade_write+0x3a0/0x3a0 [ 740.669400] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 740.670112] ? __vma_link_rb+0x540/0x700 [ 740.670708] dup_mm+0x44d/0x1110 [ 740.671224] ? vm_area_dup+0x290/0x290 [ 740.671796] ? __raw_spin_lock_init+0x34/0x100 [ 740.672464] copy_process+0x2409/0x6650 [ 740.673079] ? __cleanup_sighand+0xb0/0xb0 [ 740.673701] ? perf_trace_lock+0xac/0x490 [ 740.674337] kernel_clone+0xe7/0xa20 [ 740.674883] ? copy_init_mm+0x20/0x20 [ 740.675433] ? lock_downgrade+0x6d0/0x6d0 [ 740.676034] ? find_held_lock+0x2c/0x110 [ 740.676633] ? ksys_write+0x12d/0x250 [ 740.677199] __do_sys_clone+0xc8/0x110 [ 740.677766] ? __do_sys_vfork+0xd0/0xd0 [ 740.678354] ? rcu_read_lock_any_held+0x69/0x90 [ 740.679024] ? vfs_write+0x354/0xa20 [ 740.679587] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 740.680349] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.681108] do_syscall_64+0x33/0x40 [ 740.681648] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 740.682395] RIP: 0033:0x466609 [ 740.682865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.685507] RSP: 002b:00007f5d1133f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 740.686628] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 740.687649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 740.688672] RBP: 00007f5d1133f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.689695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 740.690711] R13: 00007ffe62c6af4f R14: 00007f5d1133f300 R15: 0000000000022000 01:16:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000000)=""/88) [ 740.744100] FAULT_INJECTION: forcing a failure. [ 740.744100] name failslab, interval 1, probability 0, space 0, times 0 [ 740.745710] CPU: 0 PID: 6717 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 740.746574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 740.747999] Call Trace: [ 740.748329] dump_stack+0x107/0x163 [ 740.748782] should_fail.cold+0x5/0xa [ 740.749269] ? create_object.isra.0+0x3a/0xa20 [ 740.749843] should_failslab+0x5/0x10 [ 740.750322] kmem_cache_alloc+0x5b/0x350 [ 740.750834] ? lock_downgrade+0x6d0/0x6d0 [ 740.751349] create_object.isra.0+0x3a/0xa20 [ 740.751945] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 740.752614] kmem_cache_alloc+0x159/0x350 [ 740.753174] security_file_alloc+0x34/0x170 [ 740.753744] __alloc_file+0xb6/0x310 [ 740.754259] alloc_empty_file+0x6d/0x170 [ 740.754822] path_openat+0xde/0x26c0 [ 740.755331] ? path_lookupat+0x850/0x850 [ 740.755897] ? perf_trace_lock+0xac/0x490 [ 740.756439] ? SOFTIRQ_verbose+0x10/0x10 [ 740.757000] ? lock_acquire+0x197/0x490 [ 740.757527] ? __lockdep_reset_lock+0x180/0x180 [ 740.758160] do_filp_open+0x17e/0x3c0 [ 740.758652] ? may_open_dev+0xf0/0xf0 [ 740.759177] ? __alloc_fd+0x2a5/0x620 [ 740.759701] ? lock_downgrade+0x6d0/0x6d0 [ 740.760253] ? rwlock_bug.part.0+0x90/0x90 [ 740.760843] ? _raw_spin_unlock+0x1a/0x30 [ 740.761402] ? __alloc_fd+0x2a5/0x620 [ 740.761927] do_sys_openat2+0x16d/0x420 [ 740.762464] ? __switch_to+0x572/0x1000 [ 740.763002] ? __switch_to_asm+0x42/0x70 [ 740.763554] ? build_open_flags+0x680/0x680 [ 740.764096] ? __schedule+0x850/0x1e80 [ 740.764622] __x64_sys_openat+0x13f/0x1f0 [ 740.765184] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 740.765832] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 740.766523] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.767202] do_syscall_64+0x33/0x40 [ 740.767670] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 740.768366] RIP: 0033:0x466609 [ 740.768810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.771328] RSP: 002b:00007fc51c606188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 740.772355] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 740.773330] RDX: 0000000000000140 RSI: 0000000020000240 RDI: ffffffffffffffff [ 740.774306] RBP: 00007fc51c6061d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.775268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 740.776142] R13: 00007ffffc2fbbef R14: 00007fc51c606300 R15: 0000000000022000 01:16:37 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x5) 01:16:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:37 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x5) 01:16:37 executing program 6 (fault-call:5 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:37 executing program 7 (fault-call:1 fault-nth:30): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 740.937601] FAULT_INJECTION: forcing a failure. [ 740.937601] name failslab, interval 1, probability 0, space 0, times 0 [ 740.939050] CPU: 0 PID: 6732 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 740.939845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 740.941126] Call Trace: [ 740.941436] dump_stack+0x107/0x163 [ 740.941861] should_fail.cold+0x5/0xa [ 740.942337] ? create_object.isra.0+0x3a/0xa20 [ 740.942871] should_failslab+0x5/0x10 [ 740.943321] kmem_cache_alloc+0x5b/0x350 [ 740.943794] create_object.isra.0+0x3a/0xa20 [ 740.944301] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 740.944881] kmem_cache_alloc+0x159/0x350 [ 740.945364] __skb_ext_alloc+0x19/0x80 [ 740.945813] skb_ext_add+0x504/0x670 [ 740.946229] ? __kmalloc_node_track_caller+0x302/0x3f0 [ 740.946801] ? lock_downgrade+0x6d0/0x6d0 [ 740.947252] __alloc_skb+0x3c1/0x620 [ 740.947661] sk_stream_alloc_skb+0x109/0xc30 [ 740.948143] tcp_connect+0xedc/0x4400 [ 740.948578] ? secure_tcpv6_seq+0x193/0x280 [ 740.949061] ? __tcp_transmit_skb+0x3640/0x3640 [ 740.949565] ? tcp_fastopen_defer_connect+0x7/0x410 [ 740.950129] tcp_v6_connect+0x1382/0x1970 [ 740.950589] ? rt6_get_cookie+0x390/0x390 [ 740.951091] __inet_stream_connect+0x812/0xd50 [ 740.951613] ? lock_release+0x6b0/0x6b0 [ 740.952067] ? lock_downgrade+0x6d0/0x6d0 [ 740.952544] ? inet_init_net+0x590/0x590 [ 740.953010] ? mark_held_locks+0x9e/0xe0 [ 740.953484] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 740.954084] ? __local_bh_enable_ip+0x9d/0xf0 [ 740.954616] inet_stream_connect+0x53/0xa0 [ 740.955101] ? __inet_stream_connect+0xd50/0xd50 [ 740.955643] __sys_connect_file+0x157/0x1a0 [ 740.956134] __sys_connect+0x161/0x190 [ 740.956579] ? __sys_connect_file+0x1a0/0x1a0 [ 740.957088] ? vfs_write+0x354/0xa20 [ 740.957514] ? fput_many+0x2f/0x1a0 [ 740.957927] ? ksys_write+0x1a5/0x250 [ 740.958377] __x64_sys_connect+0x6f/0xb0 [ 740.958836] ? syscall_enter_from_user_mode+0x1d/0x50 [ 740.959420] do_syscall_64+0x33/0x40 [ 740.959841] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 740.960422] RIP: 0033:0x466609 [ 740.960789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.962893] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 740.963701] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 740.964507] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 740.965306] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 740.966113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 740.966914] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 [ 740.993976] FAULT_INJECTION: forcing a failure. [ 740.993976] name failslab, interval 1, probability 0, space 0, times 0 [ 740.995349] CPU: 0 PID: 6735 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 740.996109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 740.997415] Call Trace: [ 740.997719] dump_stack+0x107/0x163 [ 740.998154] should_fail.cold+0x5/0xa [ 740.998570] ? vm_area_dup+0x78/0x290 [ 740.998990] should_failslab+0x5/0x10 [ 740.999398] kmem_cache_alloc+0x5b/0x350 [ 740.999855] vm_area_dup+0x78/0x290 [ 741.000254] ? perf_trace_lock+0xac/0x490 [ 741.000706] ? copy_page_range+0x242d/0x3810 [ 741.001179] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 741.001757] ? __lockdep_reset_lock+0x180/0x180 [ 741.002282] ? find_held_lock+0x2c/0x110 [ 741.002725] ? dup_mm+0x631/0x1110 [ 741.003109] ? vm_area_alloc+0x110/0x110 [ 741.003545] ? find_held_lock+0x2c/0x110 [ 741.003991] ? vm_iomap_memory+0x190/0x190 [ 741.004443] ? up_write+0x191/0x550 [ 741.004864] ? downgrade_write+0x3a0/0x3a0 [ 741.005314] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 741.005856] ? vma_interval_tree_augment_rotate+0x17b/0x1e0 [ 741.006492] ? __vma_link_rb+0x540/0x700 [ 741.006937] dup_mm+0x44d/0x1110 [ 741.007310] ? vm_area_dup+0x290/0x290 [ 741.007738] ? __raw_spin_lock_init+0x34/0x100 [ 741.008243] copy_process+0x2409/0x6650 [ 741.008699] ? __cleanup_sighand+0xb0/0xb0 [ 741.009178] ? perf_trace_lock+0xac/0x490 [ 741.009660] kernel_clone+0xe7/0xa20 [ 741.010072] ? copy_init_mm+0x20/0x20 [ 741.010523] ? lock_downgrade+0x6d0/0x6d0 [ 741.010976] ? find_held_lock+0x2c/0x110 [ 741.011442] ? ksys_write+0x12d/0x250 [ 741.011892] __do_sys_clone+0xc8/0x110 [ 741.012337] ? __do_sys_vfork+0xd0/0xd0 [ 741.012798] ? rcu_read_lock_any_held+0x69/0x90 [ 741.013334] ? vfs_write+0x354/0xa20 [ 741.013771] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 741.014381] ? syscall_enter_from_user_mode+0x1d/0x50 [ 741.014987] do_syscall_64+0x33/0x40 [ 741.015407] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 741.015993] RIP: 0033:0x466609 [ 741.016360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 741.018473] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 741.019345] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 741.020149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 741.020957] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 741.021772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 741.022616] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 [ 751.135042] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:16:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:16:54 executing program 4 (fault-call:1 fault-nth:30): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:54 executing program 7 (fault-call:1 fault-nth:31): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:54 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:16:54 executing program 0 (fault-call:1 fault-nth:7): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) 01:16:54 executing program 5 (fault-call:5 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:16:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:54 executing program 6 (fault-call:5 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 757.967524] FAULT_INJECTION: forcing a failure. [ 757.967524] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 757.970049] CPU: 0 PID: 6745 Comm: syz-executor.5 Not tainted 5.10.56 #1 [ 757.971345] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 757.973487] Call Trace: [ 757.973991] dump_stack+0x107/0x163 [ 757.974715] should_fail.cold+0x5/0xa [ 757.975444] _copy_from_user+0x2e/0x1b0 [ 757.976199] kstrtouint_from_user+0xbd/0x220 [ 757.977028] ? kstrtou8_from_user+0x200/0x200 [ 757.977889] ? lock_acquire+0x197/0x490 [ 757.978649] ? ksys_write+0x12d/0x250 [ 757.979400] proc_fail_nth_write+0x78/0x220 [ 757.980212] ? proc_task_getattr+0x1e0/0x1e0 [ 757.981049] ? proc_task_getattr+0x1e0/0x1e0 [ 757.981875] vfs_write+0x29a/0xa20 [ 757.982561] ksys_write+0x12d/0x250 [ 757.983247] ? __ia32_sys_read+0xb0/0xb0 [ 757.984020] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 757.985010] ? syscall_enter_from_user_mode+0x1d/0x50 [ 757.985987] do_syscall_64+0x33/0x40 [ 757.986715] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 757.987684] RIP: 0033:0x4192bf [ 757.988297] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 757.991770] RSP: 002b:00007f9e279d9170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 757.993214] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004192bf [ 757.994588] RDX: 0000000000000001 RSI: 00007f9e279d91e0 RDI: 0000000000000005 [ 757.995954] RBP: 00007f9e279d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 757.997314] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 757.998685] R13: 00007ffcb893989f R14: 00007f9e279d9300 R15: 0000000000022000 [ 758.006564] FAULT_INJECTION: forcing a failure. [ 758.006564] name failslab, interval 1, probability 0, space 0, times 0 [ 758.008767] CPU: 0 PID: 6758 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 758.010049] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.012215] Call Trace: [ 758.012721] dump_stack+0x107/0x163 [ 758.013420] should_fail.cold+0x5/0xa [ 758.014161] ? create_object.isra.0+0x3a/0xa20 [ 758.015049] should_failslab+0x5/0x10 [ 758.015778] kmem_cache_alloc+0x5b/0x350 [ 758.016546] ? mark_held_locks+0x9e/0xe0 [ 758.017320] create_object.isra.0+0x3a/0xa20 [ 758.018149] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 758.019130] kmem_cache_alloc+0x159/0x350 [ 758.019926] vm_area_dup+0x78/0x290 [ 758.020626] ? perf_trace_lock+0xac/0x490 [ 758.021409] ? copy_page_range+0x242d/0x3810 [ 758.022243] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 758.023247] ? __lockdep_reset_lock+0x180/0x180 [ 758.023775] FAULT_INJECTION: forcing a failure. [ 758.023775] name failslab, interval 1, probability 0, space 0, times 0 [ 758.024134] ? find_held_lock+0x2c/0x110 [ 758.026736] ? dup_mm+0x631/0x1110 [ 758.027410] ? vm_area_alloc+0x110/0x110 [ 758.028181] ? find_held_lock+0x2c/0x110 [ 758.028971] ? vm_iomap_memory+0x190/0x190 [ 758.029776] ? up_write+0x191/0x550 [ 758.030481] ? downgrade_write+0x3a0/0x3a0 [ 758.031287] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 758.032235] ? vma_interval_tree_augment_rotate+0x17b/0x1e0 [ 758.033317] ? __vma_link_rb+0x540/0x700 [ 758.034096] dup_mm+0x44d/0x1110 [ 758.034772] ? vm_area_dup+0x290/0x290 [ 758.035516] ? __raw_spin_lock_init+0x34/0x100 [ 758.036387] copy_process+0x2409/0x6650 [ 758.037167] ? __cleanup_sighand+0xb0/0xb0 [ 758.037971] ? __bpf_prog_run32+0x8f/0xd0 [ 758.038770] ? perf_trace_lock+0xac/0x490 [ 758.039572] kernel_clone+0xe7/0xa20 [ 758.040278] ? copy_init_mm+0x20/0x20 [ 758.040995] ? lock_downgrade+0x6d0/0x6d0 [ 758.041773] ? find_held_lock+0x2c/0x110 [ 758.042564] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 758.043539] ? __seccomp_filter+0x236/0x1470 [ 758.044381] ? seccomp_notify_ioctl+0xda0/0xda0 [ 758.045268] __do_sys_clone+0xc8/0x110 [ 758.046008] ? __do_sys_vfork+0xd0/0xd0 [ 758.046790] ? __secure_computing+0xb4/0x290 [ 758.047632] do_syscall_64+0x33/0x40 [ 758.048336] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.049314] RIP: 0033:0x466609 [ 758.049924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.053447] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 758.054899] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 758.056254] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 758.057615] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.058965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 758.060328] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 758.061711] CPU: 1 PID: 6762 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 758.062844] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.064700] Call Trace: [ 758.065133] dump_stack+0x107/0x163 [ 758.065734] should_fail.cold+0x5/0xa [ 758.066356] ? vm_area_dup+0x78/0x290 [ 758.066994] should_failslab+0x5/0x10 [ 758.067617] kmem_cache_alloc+0x5b/0x350 [ 758.068287] vm_area_dup+0x78/0x290 [ 758.068899] ? perf_trace_lock+0xac/0x490 [ 758.069582] ? copy_page_range+0x242d/0x3810 [ 758.070309] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 758.071184] ? __lockdep_reset_lock+0x180/0x180 [ 758.071959] ? find_held_lock+0x2c/0x110 [ 758.072637] ? dup_mm+0x631/0x1110 [ 758.073231] ? vm_area_alloc+0x110/0x110 [ 758.073896] ? find_held_lock+0x2c/0x110 [ 758.074586] ? vm_iomap_memory+0x190/0x190 [ 758.075265] ? up_write+0x191/0x550 [ 758.075867] ? downgrade_write+0x3a0/0x3a0 [ 758.076537] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 758.077350] ? __vma_link_rb+0x540/0x700 [ 758.078008] dup_mm+0x44d/0x1110 [ 758.078571] ? vm_area_dup+0x290/0x290 [ 758.079195] ? __raw_spin_lock_init+0x34/0x100 [ 758.079940] copy_process+0x2409/0x6650 [ 758.080600] ? __cleanup_sighand+0xb0/0xb0 [ 758.081283] ? perf_trace_lock+0xac/0x490 [ 758.081961] kernel_clone+0xe7/0xa20 [ 758.082570] ? copy_init_mm+0x20/0x20 [ 758.083176] ? lock_downgrade+0x6d0/0x6d0 [ 758.083861] ? find_held_lock+0x2c/0x110 [ 758.084521] ? ksys_write+0x12d/0x250 [ 758.085163] __do_sys_clone+0xc8/0x110 [ 758.085801] ? __do_sys_vfork+0xd0/0xd0 [ 758.086469] ? rcu_read_lock_any_held+0x69/0x90 [ 758.087232] ? vfs_write+0x354/0xa20 [ 758.087866] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 758.088722] ? syscall_enter_from_user_mode+0x1d/0x50 [ 758.089576] do_syscall_64+0x33/0x40 [ 758.090189] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.091042] RIP: 0033:0x466609 [ 758.091567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.094600] RSP: 002b:00007f5d1133f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 758.095846] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 758.097021] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 758.098193] RBP: 00007f5d1133f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.099384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 758.100555] R13: 00007ffe62c6af4f R14: 00007f5d1133f300 R15: 0000000000022000 01:16:54 executing program 7 (fault-call:1 fault-nth:32): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 758.114884] FAULT_INJECTION: forcing a failure. [ 758.114884] name failslab, interval 1, probability 0, space 0, times 0 [ 758.117106] CPU: 0 PID: 6755 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 758.118418] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.120568] Call Trace: [ 758.121073] dump_stack+0x107/0x163 [ 758.121774] should_fail.cold+0x5/0xa [ 758.122514] ? lock_release+0x6b0/0x6b0 [ 758.123275] ? skb_clone+0x14f/0x3c0 [ 758.123986] should_failslab+0x5/0x10 [ 758.124709] kmem_cache_alloc+0x5b/0x350 [ 758.125508] skb_clone+0x14f/0x3c0 [ 758.126197] dev_queue_xmit_nit+0x3a7/0xad0 [ 758.127053] ? ipv6_mc_check_mld+0x1110/0x1110 [ 758.127939] dev_hard_start_xmit+0xab/0x840 [ 758.128777] __dev_queue_xmit+0x17da/0x27d0 [ 758.129608] ? find_held_lock+0x2c/0x110 [ 758.130396] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 758.131281] ? mark_held_locks+0x9e/0xe0 [ 758.132075] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 758.133074] ip6_finish_output2+0xde1/0x1f50 [ 758.133933] __ip6_finish_output.part.0+0x4f3/0xb50 [ 758.134905] ip6_output+0x3e0/0x820 [ 758.135607] ip6_xmit+0x10a5/0x1c40 [ 758.136317] ? ip6_append_data+0x330/0x330 [ 758.137109] ? inet6_csk_xmit+0x56/0x620 [ 758.137884] ? lock_release+0x6b0/0x6b0 [ 758.138650] ? inet6_csk_route_socket+0x6a7/0xef0 [ 758.139566] ? inet6_csk_route_req+0x7e0/0x7e0 [ 758.140449] inet6_csk_xmit+0x316/0x620 [ 758.141208] ? inet6_csk_update_pmtu+0x180/0x180 [ 758.142107] ? lock_downgrade+0x6d0/0x6d0 [ 758.142923] ? csum_ipv6_magic+0x1e/0x70 [ 758.143702] ? inet6_csk_update_pmtu+0x180/0x180 [ 758.144606] __tcp_transmit_skb+0x18a8/0x3640 [ 758.145475] ? __tcp_select_window+0x910/0x910 [ 758.146349] ? trace_hardirqs_on+0x5b/0x180 [ 758.147182] ? ktime_get+0x1bf/0x1f0 [ 758.147895] tcp_connect+0x2e10/0x4400 [ 758.148656] ? secure_tcpv6_seq+0x193/0x280 [ 758.149469] ? __tcp_transmit_skb+0x3640/0x3640 [ 758.150356] ? tcp_fastopen_defer_connect+0x7/0x410 [ 758.151349] tcp_v6_connect+0x1382/0x1970 [ 758.152143] ? rt6_get_cookie+0x390/0x390 [ 758.152978] __inet_stream_connect+0x812/0xd50 [ 758.153847] ? lock_release+0x6b0/0x6b0 [ 758.154618] ? lock_downgrade+0x6d0/0x6d0 [ 758.155408] ? inet_init_net+0x590/0x590 [ 758.156184] ? mark_held_locks+0x9e/0xe0 [ 758.156963] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 758.157960] ? __local_bh_enable_ip+0x9d/0xf0 [ 758.158830] inet_stream_connect+0x53/0xa0 [ 758.159634] ? __inet_stream_connect+0xd50/0xd50 [ 758.160547] __sys_connect_file+0x157/0x1a0 [ 758.161378] __sys_connect+0x161/0x190 [ 758.162116] ? __sys_connect_file+0x1a0/0x1a0 [ 758.162988] ? vfs_write+0x354/0xa20 [ 758.163702] ? fput_many+0x2f/0x1a0 [ 758.164392] ? ksys_write+0x1a5/0x250 [ 758.165130] __x64_sys_connect+0x6f/0xb0 [ 758.165903] ? syscall_enter_from_user_mode+0x1d/0x50 [ 758.166886] do_syscall_64+0x33/0x40 [ 758.167593] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.168564] RIP: 0033:0x466609 [ 758.169177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.172680] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 758.174130] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 758.175493] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 758.176844] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.178199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 758.179548] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 [ 758.186412] FAULT_INJECTION: forcing a failure. [ 758.186412] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 758.188955] CPU: 0 PID: 6766 Comm: syz-executor.0 Not tainted 5.10.56 #1 [ 758.190227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.192384] Call Trace: [ 758.192888] dump_stack+0x107/0x163 [ 758.193593] should_fail.cold+0x5/0xa [ 758.194323] _copy_to_user+0x2e/0x180 [ 758.195065] simple_read_from_buffer+0xcc/0x160 [ 758.195966] proc_fail_nth_read+0x194/0x220 [ 758.196791] ? proc_sessionid_read+0x220/0x220 [ 758.197642] ? security_file_permission+0x24e/0x570 [ 758.198608] ? proc_sessionid_read+0x220/0x220 [ 758.199465] vfs_read+0x228/0x580 [ 758.200127] ksys_read+0x12d/0x250 [ 758.200803] ? __ia32_sys_pwrite64+0x230/0x230 [ 758.201680] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 758.202697] ? syscall_enter_from_user_mode+0x1d/0x50 [ 758.203672] do_syscall_64+0x33/0x40 [ 758.204363] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.205316] RIP: 0033:0x41935c [ 758.205908] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 758.209367] RSP: 002b:00007fc51c606170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 758.210839] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 758.212198] RDX: 000000000000000f RSI: 00007fc51c6061e0 RDI: 0000000000000005 [ 758.213552] RBP: 00007fc51c6061d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.214920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 758.216276] R13: 00007ffffc2fbbef R14: 00007fc51c606300 R15: 0000000000022000 01:16:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:16:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:54 executing program 6 (fault-call:5 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 758.302790] FAULT_INJECTION: forcing a failure. [ 758.302790] name failslab, interval 1, probability 0, space 0, times 0 [ 758.304689] CPU: 1 PID: 6772 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 758.305803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.307653] Call Trace: [ 758.308092] dump_stack+0x107/0x163 [ 758.308699] should_fail.cold+0x5/0xa [ 758.309331] ? vm_area_dup+0x78/0x290 [ 758.309959] should_failslab+0x5/0x10 [ 758.310613] kmem_cache_alloc+0x5b/0x350 [ 758.311286] vm_area_dup+0x78/0x290 [ 758.311899] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 758.312671] ? lock_downgrade+0x6d0/0x6d0 [ 758.313352] ? perf_trace_lock+0xac/0x490 [ 758.314032] ? copy_page_range+0x242d/0x3810 [ 758.314762] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 758.315636] ? __lockdep_reset_lock+0x180/0x180 [ 758.316403] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 758.317184] ? avc_has_extended_perms+0xec0/0xec0 [ 758.317935] ? dup_mm+0x631/0x1110 [ 758.318534] ? vm_area_alloc+0x110/0x110 [ 758.319204] ? find_held_lock+0x2c/0x110 [ 758.319873] ? selinux_vm_enough_memory+0x10f/0x170 [ 758.320701] ? selinux_sb_statfs+0x250/0x250 [ 758.321412] ? up_write+0x191/0x550 [ 758.322018] ? percpu_counter_add_batch+0x8b/0x130 [ 758.322832] ? __vm_enough_memory+0x184/0x360 [ 758.323568] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 758.324398] dup_mm+0x44d/0x1110 [ 758.324970] ? vm_area_dup+0x290/0x290 [ 758.325605] ? __raw_spin_lock_init+0x34/0x100 [ 758.326361] copy_process+0x2409/0x6650 [ 758.327043] ? __cleanup_sighand+0xb0/0xb0 [ 758.327740] ? __bpf_prog_run32+0x8f/0xd0 [ 758.328412] ? perf_trace_lock+0xac/0x490 [ 758.329107] kernel_clone+0xe7/0xa20 [ 758.329725] ? copy_init_mm+0x20/0x20 [ 758.330352] ? lock_downgrade+0x6d0/0x6d0 [ 758.331055] ? find_held_lock+0x2c/0x110 [ 758.331728] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 758.332587] ? __seccomp_filter+0x236/0x1470 [ 758.333326] ? seccomp_notify_ioctl+0xda0/0xda0 [ 758.334112] __do_sys_clone+0xc8/0x110 [ 758.334770] ? __do_sys_vfork+0xd0/0xd0 [ 758.335459] ? __secure_computing+0xb4/0x290 [ 758.336203] do_syscall_64+0x33/0x40 [ 758.336830] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.337684] RIP: 0033:0x466609 [ 758.338224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.341302] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 758.342579] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 758.343769] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 758.344956] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.346144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 758.347354] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:16:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x5) 01:16:54 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:16:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) [ 758.372474] FAULT_INJECTION: forcing a failure. [ 758.372474] name failslab, interval 1, probability 0, space 0, times 0 [ 758.374410] CPU: 1 PID: 6780 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 758.375459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.377213] Call Trace: [ 758.377621] dump_stack+0x107/0x163 [ 758.378191] should_fail.cold+0x5/0xa [ 758.378809] ? create_object.isra.0+0x3a/0xa20 [ 758.379514] should_failslab+0x5/0x10 [ 758.380101] kmem_cache_alloc+0x5b/0x350 [ 758.380736] ? lock_acquire+0x197/0x490 [ 758.381364] create_object.isra.0+0x3a/0xa20 [ 758.382046] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 758.382854] kmem_cache_alloc+0x159/0x350 [ 758.383501] skb_clone+0x14f/0x3c0 [ 758.384058] dev_queue_xmit_nit+0x3a7/0xad0 [ 758.384729] ? ipv6_mc_check_mld+0x1110/0x1110 [ 758.385456] dev_hard_start_xmit+0xab/0x840 [ 758.386143] __dev_queue_xmit+0x17da/0x27d0 [ 758.386837] ? find_held_lock+0x2c/0x110 [ 758.387464] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 758.388189] ? mark_held_locks+0x9e/0xe0 [ 758.388823] ? lockdep_hardirqs_on_prepare+0x129/0x3e0 [ 758.389640] ip6_finish_output2+0xde1/0x1f50 [ 758.390339] __ip6_finish_output.part.0+0x4f3/0xb50 [ 758.391140] ip6_output+0x3e0/0x820 [ 758.391703] ip6_xmit+0x10a5/0x1c40 [ 758.392282] ? ip6_append_data+0x330/0x330 [ 758.392920] ? inet6_csk_xmit+0x56/0x620 [ 758.393551] ? lock_release+0x6b0/0x6b0 [ 758.394162] ? inet6_csk_route_socket+0x6a7/0xef0 [ 758.394926] ? inet6_csk_route_req+0x7e0/0x7e0 [ 758.395650] inet6_csk_xmit+0x316/0x620 [ 758.396267] ? inet6_csk_update_pmtu+0x180/0x180 [ 758.397001] ? lock_downgrade+0x6d0/0x6d0 [ 758.397643] ? csum_ipv6_magic+0x1e/0x70 [ 758.398277] ? inet6_csk_update_pmtu+0x180/0x180 [ 758.399029] __tcp_transmit_skb+0x18a8/0x3640 [ 758.399737] ? __tcp_select_window+0x910/0x910 [ 758.400448] ? trace_hardirqs_on+0x5b/0x180 [ 758.401115] ? ktime_get+0x1bf/0x1f0 [ 758.401702] tcp_connect+0x2e10/0x4400 [ 758.402320] ? secure_tcpv6_seq+0x193/0x280 [ 758.403012] ? __tcp_transmit_skb+0x3640/0x3640 [ 758.403752] ? tcp_fastopen_defer_connect+0x7/0x410 [ 758.404555] tcp_v6_connect+0x1382/0x1970 [ 758.405209] ? rt6_get_cookie+0x390/0x390 [ 758.405884] __inet_stream_connect+0x812/0xd50 [ 758.406603] ? lock_release+0x6b0/0x6b0 [ 758.407216] ? lock_downgrade+0x6d0/0x6d0 [ 758.407845] ? inet_init_net+0x590/0x590 [ 758.408459] ? mark_held_locks+0x9e/0xe0 [ 758.409077] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 758.409867] ? __local_bh_enable_ip+0x9d/0xf0 [ 758.410572] inet_stream_connect+0x53/0xa0 [ 758.411229] ? __inet_stream_connect+0xd50/0xd50 [ 758.411969] __sys_connect_file+0x157/0x1a0 [ 758.412642] __sys_connect+0x161/0x190 [ 758.413249] ? __sys_connect_file+0x1a0/0x1a0 [ 758.413957] ? vfs_write+0x354/0xa20 [ 758.414557] ? fput_many+0x2f/0x1a0 [ 758.415123] ? ksys_write+0x1a5/0x250 [ 758.415725] __x64_sys_connect+0x6f/0xb0 [ 758.416357] ? syscall_enter_from_user_mode+0x1d/0x50 [ 758.417159] do_syscall_64+0x33/0x40 [ 758.417734] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.418540] RIP: 0033:0x466609 [ 758.419041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.421919] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 758.423123] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 758.424232] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 758.425339] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.426458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 758.427569] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 01:16:54 executing program 4 (fault-call:1 fault-nth:31): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:16:54 executing program 2 (fault-call:5 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:16:54 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:16:54 executing program 3 (fault-call:2 fault-nth:0): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:16:54 executing program 7 (fault-call:1 fault-nth:33): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:16:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x2) [ 758.598907] FAULT_INJECTION: forcing a failure. [ 758.598907] name failslab, interval 1, probability 0, space 0, times 0 [ 758.600242] CPU: 1 PID: 6794 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 758.600969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.602250] Call Trace: [ 758.602562] dump_stack+0x107/0x163 [ 758.602991] should_fail.cold+0x5/0xa [ 758.603433] ? getname_flags.part.0+0x50/0x4f0 [ 758.603966] should_failslab+0x5/0x10 [ 758.604411] kmem_cache_alloc+0x5b/0x350 [ 758.604886] ? ksys_write+0x12d/0x250 [ 758.605328] getname_flags.part.0+0x50/0x4f0 [ 758.605838] ? __mutex_unlock_slowpath+0xe1/0x600 [ 758.606381] getname_flags+0x9a/0xe0 [ 758.606809] do_mknodat.part.0+0xaf/0x3d0 [ 758.607287] ? __ia32_sys_mkdir+0x80/0x80 [ 758.607765] ? ksys_write+0x1a5/0x250 [ 758.608206] __x64_sys_mknod+0xf8/0x120 [ 758.608672] do_syscall_64+0x33/0x40 [ 758.609101] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.609700] RIP: 0033:0x466609 [ 758.610079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.612189] RSP: 002b:00007f7a36279188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 758.613066] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 758.613890] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 758.614707] RBP: 00007f7a362791d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.615535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 758.616348] R13: 00007ffc1a9c088f R14: 00007f7a36279300 R15: 0000000000022000 [ 758.621006] FAULT_INJECTION: forcing a failure. [ 758.621006] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 758.622341] CPU: 1 PID: 6796 Comm: syz-executor.2 Not tainted 5.10.56 #1 [ 758.623106] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.624352] Call Trace: [ 758.624647] dump_stack+0x107/0x163 [ 758.625067] should_fail.cold+0x5/0xa [ 758.625506] _copy_to_iter+0x258/0x1080 [ 758.625965] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 758.626564] ? SOFTIRQ_verbose+0x10/0x10 [ 758.627034] ? _copy_from_iter_nocache+0xc20/0xc20 [ 758.627593] ? lock_chain_count+0x20/0x20 [ 758.628074] ? __virt_addr_valid+0x232/0x310 [ 758.628579] ? __check_object_size+0x319/0x440 [ 758.629119] simple_copy_to_iter+0x4c/0x70 [ 758.629596] __skb_datagram_iter+0x4f3/0x880 [ 758.630107] ? zerocopy_sg_from_iter+0x110/0x110 [ 758.630668] skb_copy_datagram_iter+0x88/0x230 [ 758.631190] tcp_recvmsg+0xf8b/0x2800 [ 758.631643] ? tcp_splice_read+0x820/0x820 [ 758.632124] ? find_held_lock+0x2c/0x110 [ 758.632598] ? selinux_socket_recvmsg+0x1fd/0x2b0 [ 758.633159] ? selinux_socket_sendmsg+0x2b0/0x2b0 [ 758.633721] ? lock_downgrade+0x6d0/0x6d0 [ 758.634204] ? lock_downgrade+0x6d0/0x6d0 [ 758.634688] ? perf_trace_lock+0xac/0x490 [ 758.635182] ? tcp_splice_read+0x820/0x820 [ 758.635676] inet6_recvmsg+0x13b/0x670 [ 758.636117] ? __fget_files+0x251/0x410 [ 758.636561] ? inet6_bind+0x120/0x120 [ 758.636992] ? security_socket_recvmsg+0x95/0xc0 [ 758.637514] ? inet6_bind+0x120/0x120 [ 758.637944] sock_recvmsg+0xfb/0x180 [ 758.638368] __sys_recvfrom+0x1be/0x2f0 [ 758.638826] ? __ia32_sys_send+0x100/0x100 [ 758.639297] ? lock_downgrade+0x6d0/0x6d0 [ 758.639772] ? wait_for_completion+0x270/0x270 [ 758.640294] ? rcu_read_lock_any_held+0x69/0x90 [ 758.640811] ? vfs_write+0x354/0xa20 [ 758.641231] ? fput_many+0x2f/0x1a0 [ 758.641641] ? ksys_write+0x1a5/0x250 [ 758.642071] __x64_sys_recvfrom+0xdd/0x1b0 [ 758.642560] ? syscall_enter_from_user_mode+0x1d/0x50 [ 758.643135] do_syscall_64+0x33/0x40 [ 758.643549] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.644131] RIP: 0033:0x466609 [ 758.644490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.646589] RSP: 002b:00007f81768b5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 758.647441] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 758.648245] RDX: 0000000020001700 RSI: 0000000020000700 RDI: 0000000000000003 [ 758.649046] RBP: 00007f81768b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.649862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 758.650667] R13: 00007fffbe55c00f R14: 00007f81768b5300 R15: 0000000000022000 [ 758.673521] FAULT_INJECTION: forcing a failure. [ 758.673521] name failslab, interval 1, probability 0, space 0, times 0 [ 758.675447] CPU: 0 PID: 6803 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 758.676562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.678444] Call Trace: [ 758.678876] dump_stack+0x107/0x163 [ 758.679478] should_fail.cold+0x5/0xa [ 758.680107] ? create_object.isra.0+0x3a/0xa20 [ 758.680856] should_failslab+0x5/0x10 [ 758.681466] kmem_cache_alloc+0x5b/0x350 [ 758.682100] ? mark_held_locks+0x9e/0xe0 [ 758.682777] create_object.isra.0+0x3a/0xa20 [ 758.683479] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 758.684317] kmem_cache_alloc+0x159/0x350 [ 758.684986] vm_area_dup+0x78/0x290 [ 758.685595] ? perf_trace_lock+0xac/0x490 [ 758.686260] ? copy_page_range+0x242d/0x3810 [ 758.686977] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 758.687842] ? __lockdep_reset_lock+0x180/0x180 [ 758.688619] ? find_held_lock+0x2c/0x110 [ 758.689293] ? dup_mm+0x631/0x1110 [ 758.689878] ? vm_area_alloc+0x110/0x110 [ 758.690564] ? find_held_lock+0x2c/0x110 [ 758.691233] ? vm_iomap_memory+0x190/0x190 [ 758.691923] ? up_write+0x191/0x550 [ 758.692523] ? downgrade_write+0x3a0/0x3a0 [ 758.693222] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 758.694049] ? __vma_link_rb+0x540/0x700 [ 758.694741] dup_mm+0x44d/0x1110 [ 758.695314] ? vm_area_dup+0x290/0x290 [ 758.695960] ? __raw_spin_lock_init+0x34/0x100 [ 758.696708] copy_process+0x2409/0x6650 [ 758.697346] ? __cleanup_sighand+0xb0/0xb0 [ 758.698044] ? __bpf_prog_run32+0x8f/0xd0 [ 758.698747] ? perf_trace_lock+0xac/0x490 [ 758.699408] kernel_clone+0xe7/0xa20 [ 758.700001] ? copy_init_mm+0x20/0x20 [ 758.700600] ? lock_downgrade+0x6d0/0x6d0 [ 758.701241] ? find_held_lock+0x2c/0x110 [ 758.701891] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 758.702735] ? __seccomp_filter+0x236/0x1470 [ 758.703444] ? seccomp_notify_ioctl+0xda0/0xda0 [ 758.704200] __do_sys_clone+0xc8/0x110 [ 758.704816] ? __do_sys_vfork+0xd0/0xd0 [ 758.705472] ? __secure_computing+0xb4/0x290 [ 758.706185] do_syscall_64+0x33/0x40 [ 758.706786] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.707614] RIP: 0033:0x466609 [ 758.708135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.711176] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 758.712429] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 758.713604] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 758.714784] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.715960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 758.717147] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 758.727656] FAULT_INJECTION: forcing a failure. [ 758.727656] name failslab, interval 1, probability 0, space 0, times 0 [ 758.728990] CPU: 1 PID: 6804 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 758.729737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 758.730967] Call Trace: [ 758.731253] dump_stack+0x107/0x163 [ 758.731655] should_fail.cold+0x5/0xa [ 758.732069] ? create_object.isra.0+0x3a/0xa20 [ 758.732563] should_failslab+0x5/0x10 [ 758.732984] kmem_cache_alloc+0x5b/0x350 [ 758.733419] ? mark_held_locks+0x9e/0xe0 [ 758.733863] create_object.isra.0+0x3a/0xa20 [ 758.734334] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 758.734889] kmem_cache_alloc+0x159/0x350 [ 758.735339] vm_area_dup+0x78/0x290 [ 758.735740] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 758.736236] ? lock_downgrade+0x6d0/0x6d0 [ 758.736682] ? perf_trace_lock+0xac/0x490 [ 758.737135] ? copy_page_range+0x242d/0x3810 [ 758.737635] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 758.738233] ? __lockdep_reset_lock+0x180/0x180 [ 758.738780] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 758.739316] ? avc_has_extended_perms+0xec0/0xec0 [ 758.739865] ? dup_mm+0x631/0x1110 [ 758.740275] ? vm_area_alloc+0x110/0x110 [ 758.740736] ? find_held_lock+0x2c/0x110 [ 758.741202] ? selinux_vm_enough_memory+0x10f/0x170 [ 758.741767] ? selinux_sb_statfs+0x250/0x250 [ 758.742264] ? up_write+0x191/0x550 [ 758.742703] ? percpu_counter_add_batch+0x8b/0x130 [ 758.743267] ? __vm_enough_memory+0x184/0x360 [ 758.743774] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 758.744361] dup_mm+0x44d/0x1110 [ 758.744751] ? vm_area_dup+0x290/0x290 [ 758.745201] ? __raw_spin_lock_init+0x34/0x100 [ 758.745724] copy_process+0x2409/0x6650 [ 758.746185] ? __cleanup_sighand+0xb0/0xb0 [ 758.746665] ? __bpf_prog_run32+0x8f/0xd0 [ 758.747125] ? perf_trace_lock+0xac/0x490 [ 758.747594] kernel_clone+0xe7/0xa20 [ 758.748016] ? copy_init_mm+0x20/0x20 [ 758.748432] ? lock_downgrade+0x6d0/0x6d0 [ 758.748890] ? find_held_lock+0x2c/0x110 [ 758.749345] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 758.749919] ? __seccomp_filter+0x236/0x1470 [ 758.750430] ? seccomp_notify_ioctl+0xda0/0xda0 [ 758.750943] __do_sys_clone+0xc8/0x110 [ 758.751363] ? __do_sys_vfork+0xd0/0xd0 [ 758.751816] ? __secure_computing+0xb4/0x290 [ 758.752319] do_syscall_64+0x33/0x40 [ 758.752734] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 758.753311] RIP: 0033:0x466609 [ 758.753678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 758.755773] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 758.756644] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 758.757464] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 758.758368] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 758.759187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 758.759986] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 770.246462] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:17:13 executing program 6 (fault-call:5 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:17:13 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x3) 01:17:13 executing program 4 (fault-call:1 fault-nth:32): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:17:13 executing program 7 (fault-call:1 fault-nth:34): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:17:13 executing program 2 (fault-call:5 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:17:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x103fa0, 0x22) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x401, 0x3, 0x0, 0x10001, 0x83ac}) 01:17:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0x3, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:17:13 executing program 3 (fault-call:2 fault-nth:1): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) [ 777.404130] FAULT_INJECTION: forcing a failure. [ 777.404130] name failslab, interval 1, probability 0, space 0, times 0 [ 777.405903] CPU: 1 PID: 6828 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 777.406955] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 777.408686] Call Trace: [ 777.409093] dump_stack+0x107/0x163 [ 777.409660] should_fail.cold+0x5/0xa [ 777.410228] ? anon_vma_clone+0xdc/0x580 [ 777.410843] should_failslab+0x5/0x10 [ 777.411407] kmem_cache_alloc+0x5b/0x350 [ 777.412019] anon_vma_clone+0xdc/0x580 [ 777.412625] anon_vma_fork+0x82/0x630 [ 777.413182] ? __vm_enough_memory+0x184/0x360 [ 777.413872] dup_mm+0x861/0x1110 [ 777.414400] ? vm_area_dup+0x290/0x290 [ 777.415012] ? __raw_spin_lock_init+0x34/0x100 [ 777.415706] copy_process+0x2409/0x6650 [ 777.416354] ? __cleanup_sighand+0xb0/0xb0 [ 777.417001] ? __bpf_prog_run32+0x8f/0xd0 [ 777.417622] ? perf_trace_lock+0xac/0x490 [ 777.418281] kernel_clone+0xe7/0xa20 [ 777.418860] ? copy_init_mm+0x20/0x20 [ 777.419442] ? lock_downgrade+0x6d0/0x6d0 [ 777.419568] FAULT_INJECTION: forcing a failure. [ 777.419568] name failslab, interval 1, probability 0, space 0, times 0 [ 777.420064] ? find_held_lock+0x2c/0x110 [ 777.420081] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 777.420107] ? __seccomp_filter+0x236/0x1470 [ 777.425780] ? seccomp_notify_ioctl+0xda0/0xda0 [ 777.426977] __do_sys_clone+0xc8/0x110 [ 777.427928] ? __do_sys_vfork+0xd0/0xd0 [ 777.429121] ? __secure_computing+0xb4/0x290 [ 777.430195] do_syscall_64+0x33/0x40 [ 777.431299] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 777.432527] RIP: 0033:0x466609 [ 777.433465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.436656] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 777.437894] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 777.439061] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 777.440216] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.441269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.442228] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 777.443230] CPU: 0 PID: 6833 Comm: syz-executor.6 Not tainted 5.10.56 #1 [ 777.444709] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 777.447116] Call Trace: [ 777.447685] dump_stack+0x107/0x163 [ 777.448465] should_fail.cold+0x5/0xa [ 777.449284] should_failslab+0x5/0x10 [ 777.450092] __kmalloc_node_track_caller+0x74/0x3f0 [ 777.451170] ? skb_copy+0x137/0x2f0 [ 777.451945] ? __lockdep_reset_lock+0x180/0x180 [ 777.452940] __alloc_skb+0xb1/0x620 [ 777.453713] skb_copy+0x137/0x2f0 [ 777.454460] tcp_send_synack+0x5b0/0x1450 [ 777.455362] ? mark_held_locks+0x9e/0xe0 [ 777.456228] ? tcp_send_active_reset+0x850/0x850 [ 777.457243] ? tcp_sync_mss+0x33a/0xb10 [ 777.458096] tcp_rcv_state_process+0x23d8/0x4aa0 [ 777.459123] ? tcp_finish_connect+0x520/0x520 [ 777.460074] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 777.461186] ? SOFTIRQ_verbose+0x10/0x10 [ 777.462037] ? find_held_lock+0x2c/0x110 [ 777.462930] ? __release_sock+0xd0/0x3b0 [ 777.463815] tcp_v6_do_rcv+0x7b0/0x1290 [ 777.464661] ? __local_bh_enable_ip+0x9d/0xf0 [ 777.465619] ? trace_hardirqs_on+0x5b/0x180 [ 777.466540] __release_sock+0x139/0x3b0 [ 777.467410] release_sock+0x54/0x1b0 [ 777.468205] __inet_stream_connect+0x57e/0xd50 [ 777.469190] ? inet_init_net+0x590/0x590 [ 777.470058] ? prepare_to_wait_exclusive+0x2a0/0x2a0 [ 777.471157] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 777.472268] ? __local_bh_enable_ip+0x9d/0xf0 [ 777.473226] inet_stream_connect+0x53/0xa0 [ 777.474118] ? __inet_stream_connect+0xd50/0xd50 [ 777.475129] __sys_connect_file+0x157/0x1a0 [ 777.476050] __sys_connect+0x161/0x190 [ 777.476874] ? __sys_connect_file+0x1a0/0x1a0 [ 777.477827] ? vfs_write+0x354/0xa20 [ 777.478621] ? fput_many+0x2f/0x1a0 [ 777.479429] ? ksys_write+0x1a5/0x250 [ 777.480251] __x64_sys_connect+0x6f/0xb0 [ 777.481112] ? syscall_enter_from_user_mode+0x1d/0x50 [ 777.482464] do_syscall_64+0x33/0x40 [ 777.483298] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 777.484614] RIP: 0033:0x466609 [ 777.485306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.489216] RSP: 002b:00007f62d035f188 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 777.490849] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 777.492369] RDX: 000000000000001c RSI: 0000000020000000 RDI: 0000000000000003 [ 777.493893] RBP: 00007f62d035f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.495434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.496954] R13: 00007fffa5de282f R14: 00007f62d035f300 R15: 0000000000022000 [ 777.517069] FAULT_INJECTION: forcing a failure. [ 777.517069] name failslab, interval 1, probability 0, space 0, times 0 [ 777.518403] FAULT_INJECTION: forcing a failure. [ 777.518403] name failslab, interval 1, probability 0, space 0, times 0 [ 777.519567] CPU: 0 PID: 6832 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 777.519586] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 777.525052] Call Trace: [ 777.525625] dump_stack+0x107/0x163 [ 777.526452] should_fail.cold+0x5/0xa [ 777.527294] ? create_object.isra.0+0x3a/0xa20 [ 777.528253] should_failslab+0x5/0x10 [ 777.529244] kmem_cache_alloc+0x5b/0x350 [ 777.530136] create_object.isra.0+0x3a/0xa20 [ 777.531285] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 777.532403] kmem_cache_alloc+0x159/0x350 [ 777.533486] getname_flags.part.0+0x50/0x4f0 [ 777.534464] ? __mutex_unlock_slowpath+0xe1/0x600 [ 777.535736] getname_flags+0x9a/0xe0 [ 777.536527] do_mknodat.part.0+0xaf/0x3d0 [ 777.537608] ? __ia32_sys_mkdir+0x80/0x80 [ 777.538493] ? ksys_write+0x1a5/0x250 [ 777.539526] __x64_sys_mknod+0xf8/0x120 [ 777.540565] do_syscall_64+0x33/0x40 [ 777.541359] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 777.542683] RIP: 0033:0x466609 [ 777.543402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.547321] RSP: 002b:00007f7a36279188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 777.548949] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 777.550476] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 777.552012] RBP: 00007f7a362791d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.553544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 777.555072] R13: 00007ffc1a9c088f R14: 00007f7a36279300 R15: 0000000000022000 [ 777.556640] CPU: 1 PID: 6839 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 777.557628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 777.559251] Call Trace: [ 777.559626] dump_stack+0x107/0x163 [ 777.560162] should_fail.cold+0x5/0xa [ 777.560699] ? vm_area_dup+0x78/0x290 [ 777.561244] should_failslab+0x5/0x10 [ 777.561792] kmem_cache_alloc+0x5b/0x350 [ 777.562368] vm_area_dup+0x78/0x290 [ 777.562907] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 777.563569] ? lock_downgrade+0x6d0/0x6d0 [ 777.564140] ? perf_trace_lock+0xac/0x490 [ 777.564719] ? copy_page_range+0x242d/0x3810 [ 777.565330] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 777.566085] ? __lockdep_reset_lock+0x180/0x180 [ 777.566758] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 777.567429] ? avc_has_extended_perms+0xec0/0xec0 [ 777.568115] ? dup_mm+0x631/0x1110 [ 777.568642] ? vm_area_alloc+0x110/0x110 [ 777.569215] ? find_held_lock+0x2c/0x110 [ 777.569805] ? selinux_vm_enough_memory+0x10f/0x170 [ 777.570519] ? selinux_sb_statfs+0x250/0x250 [ 777.571152] ? up_write+0x191/0x550 [ 777.571667] ? percpu_counter_add_batch+0x8b/0x130 [ 777.572371] ? __vm_enough_memory+0x184/0x360 [ 777.573022] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 777.573756] dup_mm+0x44d/0x1110 [ 777.574256] ? vm_area_dup+0x290/0x290 [ 777.574823] ? __raw_spin_lock_init+0x34/0x100 [ 777.575479] copy_process+0x2409/0x6650 [ 777.576072] ? __cleanup_sighand+0xb0/0xb0 [ 777.576687] ? perf_trace_lock+0xac/0x490 [ 777.577303] kernel_clone+0xe7/0xa20 [ 777.577830] ? copy_init_mm+0x20/0x20 [ 777.578369] ? lock_downgrade+0x6d0/0x6d0 [ 777.578972] ? find_held_lock+0x2c/0x110 [ 777.579549] ? ksys_write+0x12d/0x250 [ 777.580099] __do_sys_clone+0xc8/0x110 [ 777.580643] ? __do_sys_vfork+0xd0/0xd0 [ 777.581149] ? rcu_read_lock_any_held+0x69/0x90 [ 777.581721] ? vfs_write+0x354/0xa20 [ 777.582228] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 777.582887] ? syscall_enter_from_user_mode+0x1d/0x50 [ 777.583576] do_syscall_64+0x33/0x40 [ 777.584040] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 777.584719] RIP: 0033:0x466609 [ 777.585118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.587571] RSP: 002b:00007f5d1133f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 777.588580] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 777.589521] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 777.590464] RBP: 00007f5d1133f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.591414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.592360] R13: 00007ffe62c6af4f R14: 00007f5d1133f300 R15: 0000000000022000 [ 777.594960] FAULT_INJECTION: forcing a failure. [ 777.594960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 777.597602] CPU: 0 PID: 6830 Comm: syz-executor.2 Not tainted 5.10.56 #1 [ 777.599058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 777.601466] Call Trace: [ 777.602032] dump_stack+0x107/0x163 [ 777.602845] should_fail.cold+0x5/0xa [ 777.603666] _copy_to_user+0x2e/0x180 [ 777.604486] simple_read_from_buffer+0xcc/0x160 [ 777.605487] proc_fail_nth_read+0x194/0x220 [ 777.606413] ? proc_sessionid_read+0x220/0x220 [ 777.607396] ? security_file_permission+0x24e/0x570 [ 777.608473] ? proc_sessionid_read+0x220/0x220 [ 777.609452] vfs_read+0x228/0x580 [ 777.610199] ksys_read+0x12d/0x250 [ 777.610976] ? __ia32_sys_pwrite64+0x230/0x230 [ 777.611978] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 777.613095] ? syscall_enter_from_user_mode+0x1d/0x50 [ 777.614200] do_syscall_64+0x33/0x40 [ 777.615003] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 777.616097] RIP: 0033:0x41935c [ 777.616785] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 777.620719] RSP: 002b:00007f81768b5170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 777.622315] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 000000000041935c [ 777.623861] RDX: 000000000000000f RSI: 00007f81768b51e0 RDI: 0000000000000004 [ 777.625381] RBP: 00007f81768b51d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.626908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 777.628418] R13: 00007fffbe55c00f R14: 00007f81768b5300 R15: 0000000000022000 01:17:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x2, {{0x2, 0x0, @multicast2}}}, 0x108) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="e000ae140b0000000000000000000000d3c750e7da5980cec31797b93bce2fa8870927885c7bd5dc43fd1a6ef15a5922525cdaa90ae7d0115f5d64e51c0d2e0dcb44e8d787fb9422b1d3f85f6c1bee500f5ee52208d370f50731d61dc96d9b44b883e314ce857f9c1b4740ba794ba58fd8ac8973e0265db4"], 0x10) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r2, 0x107, 0x0, 0x0, &(0x7f0000000040)=0xfffffffffffffeee) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000540)={0x0, {{0x2, 0x0, @loopback}}}, 0x88) 01:17:14 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x4) 01:17:14 executing program 3 (fault-call:2 fault-nth:2): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:17:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0x7, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 777.771914] FAULT_INJECTION: forcing a failure. [ 777.771914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 777.773492] CPU: 1 PID: 6851 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 777.774444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 777.775918] Call Trace: [ 777.776239] dump_stack+0x107/0x163 [ 777.776635] should_fail.cold+0x5/0xa [ 777.777105] strncpy_from_user+0x34/0x460 [ 777.777610] getname_flags.part.0+0x95/0x4f0 [ 777.778148] ? __mutex_unlock_slowpath+0xe1/0x600 [ 777.778755] getname_flags+0x9a/0xe0 [ 777.779206] do_mknodat.part.0+0xaf/0x3d0 [ 777.779697] ? __ia32_sys_mkdir+0x80/0x80 [ 777.780199] ? ksys_write+0x1a5/0x250 [ 777.780674] __x64_sys_mknod+0xf8/0x120 [ 777.781145] do_syscall_64+0x33/0x40 [ 777.781590] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 777.782198] RIP: 0033:0x466609 [ 777.782574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.784766] RSP: 002b:00007f7a36279188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 777.785685] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 777.786516] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 777.787372] RBP: 00007f7a362791d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.788214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 777.789046] R13: 00007ffc1a9c088f R14: 00007f7a36279300 R15: 0000000000022000 01:17:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f00000000c0)=@v3={0x3000000, [{0x20, 0x9}, {0x691c, 0x8}], 0xffffffffffffffff}, 0x18, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100), &(0x7f00000001c0)='.\x00', 0x2, 0x3) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=ANY=[@ANYBLOB="f00000001a0001000000000000000000ac14189ed5cdf8a626825ef20b340a14bb0000e3e55bc17051eb34f700000000000000000000000000000000000000000000000000001e059a9f4dd696df000000000000000003082566cc232f766fc1a684d8f52c12beb65501b4f554e391daa7071dd41a60a900914424c1", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="ff01000000000000000000000000000100000000000000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00"/168], 0xf0}}, 0x0) readahead(r2, 0x7fffffff, 0xfffffffffffffff8) pwrite64(r0, &(0x7f0000000300)="af", 0xfffffeb2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000540)=0x5) 01:17:14 executing program 7 (fault-call:1 fault-nth:35): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:17:14 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x5) [ 777.895827] FAULT_INJECTION: forcing a failure. [ 777.895827] name failslab, interval 1, probability 0, space 0, times 0 [ 777.897243] CPU: 1 PID: 6864 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 777.897989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 777.898819] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 777.899225] Call Trace: [ 777.899242] dump_stack+0x107/0x163 [ 777.899255] should_fail.cold+0x5/0xa [ 777.899275] ? create_object.isra.0+0x3a/0xa20 [ 777.899286] should_failslab+0x5/0x10 [ 777.902697] kmem_cache_alloc+0x5b/0x350 [ 777.903177] create_object.isra.0+0x3a/0xa20 [ 777.903651] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 777.904225] kmem_cache_alloc+0x159/0x350 [ 777.904685] anon_vma_clone+0xdc/0x580 [ 777.905117] anon_vma_fork+0x82/0x630 [ 777.905534] ? __vm_enough_memory+0x184/0x360 [ 777.906035] dup_mm+0x861/0x1110 [ 777.906410] ? vm_area_dup+0x290/0x290 [ 777.906856] ? __raw_spin_lock_init+0x34/0x100 [ 777.907360] copy_process+0x2409/0x6650 [ 777.907820] ? __cleanup_sighand+0xb0/0xb0 [ 777.908286] ? __bpf_prog_run32+0x8f/0xd0 [ 777.908751] ? perf_trace_lock+0xac/0x490 [ 777.909216] kernel_clone+0xe7/0xa20 [ 777.909629] ? copy_init_mm+0x20/0x20 [ 777.910046] ? lock_downgrade+0x6d0/0x6d0 [ 777.910500] ? find_held_lock+0x2c/0x110 [ 777.910963] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 777.911539] ? __seccomp_filter+0x236/0x1470 [ 777.912034] ? seccomp_notify_ioctl+0xda0/0xda0 [ 777.912560] __do_sys_clone+0xc8/0x110 [ 777.912985] ? __do_sys_vfork+0xd0/0xd0 [ 777.913438] ? __secure_computing+0xb4/0x290 [ 777.913927] do_syscall_64+0x33/0x40 01:17:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0x11, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 777.914347] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 777.915126] RIP: 0033:0x466609 [ 777.915512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.917513] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 777.918345] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 777.919130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 777.919908] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 777.920680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 777.921464] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 778.668578] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 790.598506] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:17:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:17:33 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x6) 01:17:33 executing program 3 (fault-call:2 fault-nth:3): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:17:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f00000000c0)=@v3={0x3000000, [{0x20, 0x9}, {0x691c, 0x8}], 0xffffffffffffffff}, 0x18, 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000100), &(0x7f00000001c0)='.\x00', 0x2, 0x3) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000340)=ANY=[@ANYBLOB="f00000001a0001000000000000000000ac14189ed5cdf8a626825ef20b340a14bb0000e3e55bc17051eb34f700000000000000000000000000000000000000000000000000001e059a9f4dd696df000000000000000003082566cc232f766fc1a684d8f52c12beb65501b4f554e391daa7071dd41a60a900914424c1", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="ff01000000000000000000000000000100000000000000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00"/168], 0xf0}}, 0x0) readahead(r2, 0x7fffffff, 0xfffffffffffffff8) pwrite64(r0, &(0x7f0000000300)="af", 0xfffffeb2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000540)=0x5) 01:17:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:17:33 executing program 7 (fault-call:1 fault-nth:36): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:17:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:17:33 executing program 4 (fault-call:1 fault-nth:33): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 797.256934] FAULT_INJECTION: forcing a failure. [ 797.256934] name failslab, interval 1, probability 0, space 0, times 0 [ 797.258363] CPU: 0 PID: 6891 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 797.259265] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 797.260672] Call Trace: [ 797.261009] dump_stack+0x107/0x163 [ 797.261423] should_fail.cold+0x5/0xa [ 797.261850] ? create_object.isra.0+0x3a/0xa20 [ 797.262454] should_failslab+0x5/0x10 [ 797.262880] kmem_cache_alloc+0x5b/0x350 [ 797.263425] ? mark_held_locks+0x9e/0xe0 [ 797.263872] create_object.isra.0+0x3a/0xa20 [ 797.264447] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 797.265005] kmem_cache_alloc+0x159/0x350 [ 797.265551] vm_area_dup+0x78/0x290 [ 797.265954] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 797.266557] ? lock_downgrade+0x6d0/0x6d0 [ 797.267009] ? perf_trace_lock+0xac/0x490 [ 797.267561] ? copy_page_range+0x242d/0x3810 [ 797.268044] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 797.268724] ? __lockdep_reset_lock+0x180/0x180 [ 797.269236] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 797.269841] ? avc_has_extended_perms+0xec0/0xec0 [ 797.270502] ? dup_mm+0x631/0x1110 [ 797.270917] ? vm_area_alloc+0x110/0x110 [ 797.271454] ? find_held_lock+0x2c/0x110 [ 797.272002] ? selinux_vm_enough_memory+0x10f/0x170 [ 797.272689] ? selinux_sb_statfs+0x250/0x250 [ 797.273292] ? up_write+0x191/0x550 [ 797.273798] ? percpu_counter_add_batch+0x8b/0x130 [ 797.274476] ? __vm_enough_memory+0x184/0x360 [ 797.275093] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 797.275797] dup_mm+0x44d/0x1110 [ 797.276219] ? vm_area_dup+0x290/0x290 [ 797.276682] ? __raw_spin_lock_init+0x34/0x100 [ 797.277219] copy_process+0x2409/0x6650 [ 797.277693] ? __cleanup_sighand+0xb0/0xb0 [ 797.278288] ? __bpf_prog_run32+0x8f/0xd0 [ 797.278879] ? perf_trace_lock+0xac/0x490 [ 797.279501] kernel_clone+0xe7/0xa20 [ 797.280036] ? copy_init_mm+0x20/0x20 [ 797.280535] ? lock_downgrade+0x6d0/0x6d0 [ 797.281068] ? find_held_lock+0x2c/0x110 [ 797.281583] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 797.282246] ? __seccomp_filter+0x236/0x1470 [ 797.282819] ? seccomp_notify_ioctl+0xda0/0xda0 [ 797.283432] __do_sys_clone+0xc8/0x110 [ 797.283930] ? __do_sys_vfork+0xd0/0xd0 [ 797.284452] ? __secure_computing+0xb4/0x290 [ 797.285025] do_syscall_64+0x33/0x40 [ 797.285505] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 797.286156] RIP: 0033:0x466609 [ 797.286571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 797.288922] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 797.289899] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 797.290806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 797.291727] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 797.292634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 797.293542] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 797.323708] FAULT_INJECTION: forcing a failure. [ 797.323708] name failslab, interval 1, probability 0, space 0, times 0 [ 797.325667] CPU: 0 PID: 6902 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 797.326618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 797.328219] Call Trace: [ 797.328598] dump_stack+0x107/0x163 [ 797.329138] should_fail.cold+0x5/0xa [ 797.329705] ? down_write+0xe0/0x150 [ 797.330245] ? anon_vma_clone+0xdc/0x580 [ 797.330840] should_failslab+0x5/0x10 [ 797.331413] kmem_cache_alloc+0x5b/0x350 [ 797.332026] anon_vma_clone+0xdc/0x580 [ 797.332582] anon_vma_fork+0x82/0x630 [ 797.333152] ? __vm_enough_memory+0x184/0x360 [ 797.333785] dup_mm+0x861/0x1110 [ 797.334311] ? vm_area_dup+0x290/0x290 [ 797.334874] ? __raw_spin_lock_init+0x34/0x100 [ 797.335522] copy_process+0x2409/0x6650 [ 797.336100] ? __cleanup_sighand+0xb0/0xb0 [ 797.336699] ? perf_trace_lock+0xac/0x490 [ 797.337291] kernel_clone+0xe7/0xa20 [ 797.337815] ? copy_init_mm+0x20/0x20 [ 797.338351] ? lock_downgrade+0x6d0/0x6d0 [ 797.338932] ? find_held_lock+0x2c/0x110 [ 797.339529] ? ksys_write+0x12d/0x250 [ 797.340092] __do_sys_clone+0xc8/0x110 [ 797.340636] ? __do_sys_vfork+0xd0/0xd0 [ 797.341199] ? rcu_read_lock_any_held+0x69/0x90 [ 797.341850] ? vfs_write+0x354/0xa20 [ 797.342395] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 797.343170] ? syscall_enter_from_user_mode+0x1d/0x50 [ 797.343894] do_syscall_64+0x33/0x40 [ 797.344401] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 797.345117] RIP: 0033:0x466609 [ 797.345575] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 797.348132] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 797.349219] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 797.350242] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 797.351302] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 797.352347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 797.353362] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 [ 797.357381] FAULT_INJECTION: forcing a failure. [ 797.357381] name failslab, interval 1, probability 0, space 0, times 0 [ 797.359265] CPU: 0 PID: 6908 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 797.360213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 797.361679] Call Trace: [ 797.362023] dump_stack+0x107/0x163 [ 797.362494] should_fail.cold+0x5/0xa [ 797.362986] ? __d_alloc+0x2a/0x990 [ 797.363466] should_failslab+0x5/0x10 [ 797.363948] kmem_cache_alloc+0x5b/0x350 [ 797.364463] ? __d_lookup+0x3e8/0x710 [ 797.364951] __d_alloc+0x2a/0x990 [ 797.365399] d_alloc+0x46/0x1c0 [ 797.365833] __lookup_hash+0xc8/0x190 [ 797.366315] filename_create+0x186/0x490 [ 797.366840] ? filename_parentat+0x560/0x560 [ 797.367423] ? getname_flags.part.0+0x1dd/0x4f0 [ 797.368026] do_mknodat.part.0+0xc2/0x3d0 [ 797.368559] ? __ia32_sys_mkdir+0x80/0x80 [ 797.369104] __x64_sys_mknod+0xf8/0x120 [ 797.369613] do_syscall_64+0x33/0x40 [ 797.370087] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 797.370745] RIP: 0033:0x466609 [ 797.371170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 797.373524] RSP: 002b:00007f7a36258188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 797.374496] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 797.375418] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 797.376328] RBP: 00007f7a362581d0 R08: 0000000000000000 R09: 0000000000000000 [ 797.377244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 797.378158] R13: 00007ffc1a9c088f R14: 00007f7a36258300 R15: 0000000000022000 [ 797.381684] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:17:33 executing program 3 (fault-call:2 fault-nth:4): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) [ 797.435563] FAULT_INJECTION: forcing a failure. [ 797.435563] name failslab, interval 1, probability 0, space 0, times 0 [ 797.437284] CPU: 1 PID: 6913 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 797.438042] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 797.439332] Call Trace: [ 797.439632] dump_stack+0x107/0x163 [ 797.440042] should_fail.cold+0x5/0xa [ 797.440481] ? create_object.isra.0+0x3a/0xa20 [ 797.440991] should_failslab+0x5/0x10 [ 797.441423] kmem_cache_alloc+0x5b/0x350 [ 797.441880] ? SOFTIRQ_verbose+0x10/0x10 [ 797.442341] ? mark_lock+0xf5/0x2df0 [ 797.442757] create_object.isra.0+0x3a/0xa20 [ 797.443310] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 797.443861] kmem_cache_alloc+0x159/0x350 [ 797.444406] __d_alloc+0x2a/0x990 [ 797.444787] d_alloc_parallel+0x111/0x1aa0 [ 797.445356] ? __d_lookup_rcu+0x6b0/0x6b0 [ 797.445803] ? SOFTIRQ_verbose+0x10/0x10 [ 797.446339] ? lockdep_init_map_waits+0x26a/0x700 [ 797.446858] ? lockdep_init_map_waits+0x26a/0x700 [ 797.447434] ? __raw_spin_lock_init+0x34/0x100 [ 797.447947] __lookup_slow+0x193/0x490 [ 797.448383] ? do_raw_spin_unlock+0x4f/0x210 [ 797.448885] ? lookup_open.isra.0+0x1230/0x1230 [ 797.449424] ? selinux_inode_permission+0x3fc/0x630 [ 797.449985] ? selinux_path_notify+0x480/0x480 [ 797.450501] walk_component+0x41a/0x6a0 [ 797.450945] ? handle_dots.part.0+0x1540/0x1540 [ 797.451485] ? security_inode_permission+0xcb/0x100 [ 797.452051] link_path_walk.part.0+0x695/0xbe0 [ 797.452576] ? walk_component+0x6a0/0x6a0 [ 797.453051] path_parentat+0xa8/0x1b0 [ 797.453478] filename_parentat+0x188/0x560 [ 797.453951] ? kernel_text_address+0xea/0x120 [ 797.454455] ? getname+0xd0/0xd0 [ 797.454844] ? __might_fault+0xd3/0x180 [ 797.455319] ? lock_downgrade+0x6d0/0x6d0 [ 797.455785] ? __virt_addr_valid+0x232/0x310 [ 797.456283] ? __check_object_size+0x319/0x440 [ 797.456794] filename_create+0x9e/0x490 [ 797.457243] ? filename_parentat+0x560/0x560 [ 797.457731] ? getname_flags.part.0+0x1dd/0x4f0 [ 797.458250] ? __mutex_unlock_slowpath+0xe1/0x600 [ 797.458790] do_mknodat.part.0+0xc2/0x3d0 [ 797.459275] ? __ia32_sys_mkdir+0x80/0x80 [ 797.459744] ? ksys_write+0x1a5/0x250 [ 797.460179] __x64_sys_mknod+0xf8/0x120 [ 797.460627] do_syscall_64+0x33/0x40 [ 797.461052] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 797.461622] RIP: 0033:0x466609 [ 797.461979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 797.464010] RSP: 002b:00007f7a36279188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 797.464832] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 797.465631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 797.466431] RBP: 00007f7a362791d0 R08: 0000000000000000 R09: 0000000000000000 [ 797.467253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 797.468077] R13: 00007ffc1a9c088f R14: 00007f7a36279300 R15: 0000000000022000 [ 809.686345] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:17:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0x2, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:17:52 executing program 7 (fault-call:1 fault-nth:37): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:17:52 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RFLUSH(r1, &(0x7f0000000000)={0x7}, 0x7) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0xc, 0x0) syncfs(r0) write$P9_RFLUSH(r0, &(0x7f0000000000)={0x7}, 0x7) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000100)={0x8001, 0x8, '\x00', 0x1, &(0x7f0000000140)=[0x0]}) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_capability(r2, 0x0, 0x0, 0x0, 0x0) 01:17:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x2, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:17:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x2, 0x0, 0x0, 0x0) 01:17:52 executing program 4 (fault-call:1 fault-nth:34): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:17:52 executing program 3 (fault-call:2 fault-nth:5): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:17:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x7) [ 815.878938] FAULT_INJECTION: forcing a failure. [ 815.878938] name failslab, interval 1, probability 0, space 0, times 0 [ 815.880725] CPU: 0 PID: 6927 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 815.881690] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 815.883307] Call Trace: [ 815.883703] dump_stack+0x107/0x163 [ 815.884243] should_fail.cold+0x5/0xa [ 815.884809] ? anon_vma_clone+0xdc/0x580 [ 815.885392] should_failslab+0x5/0x10 [ 815.885936] kmem_cache_alloc+0x5b/0x350 [ 815.886530] anon_vma_clone+0xdc/0x580 [ 815.887113] anon_vma_fork+0x82/0x630 [ 815.887682] ? __vm_enough_memory+0x184/0x360 [ 815.888331] dup_mm+0x861/0x1110 [ 815.888835] ? vm_area_dup+0x290/0x290 [ 815.889405] ? __raw_spin_lock_init+0x34/0x100 [ 815.890069] copy_process+0x2409/0x6650 [ 815.890670] ? __cleanup_sighand+0xb0/0xb0 [ 815.891264] ? __bpf_prog_run32+0x8f/0xd0 [ 815.891826] ? perf_trace_lock+0xac/0x490 [ 815.892366] kernel_clone+0xe7/0xa20 [ 815.892839] ? copy_init_mm+0x20/0x20 [ 815.893314] ? lock_downgrade+0x6d0/0x6d0 [ 815.893840] ? find_held_lock+0x2c/0x110 [ 815.894353] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 815.895014] ? __seccomp_filter+0x236/0x1470 [ 815.895597] ? seccomp_notify_ioctl+0xda0/0xda0 [ 815.896221] __do_sys_clone+0xc8/0x110 [ 815.896716] ? __do_sys_vfork+0xd0/0xd0 [ 815.897265] ? __secure_computing+0xb4/0x290 [ 815.897848] do_syscall_64+0x33/0x40 [ 815.898345] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 815.898991] RIP: 0033:0x466609 [ 815.899430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 815.901852] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 815.902857] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 815.903806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 815.904749] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 815.905675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 815.906572] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 815.911528] FAULT_INJECTION: forcing a failure. [ 815.911528] name failslab, interval 1, probability 0, space 0, times 0 [ 815.913220] CPU: 1 PID: 6932 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 815.914209] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 815.915810] Call Trace: [ 815.916218] dump_stack+0x107/0x163 [ 815.916750] should_fail.cold+0x5/0xa [ 815.917333] ? create_object.isra.0+0x3a/0xa20 [ 815.917981] should_failslab+0x5/0x10 [ 815.918526] kmem_cache_alloc+0x5b/0x350 [ 815.919108] create_object.isra.0+0x3a/0xa20 [ 815.919766] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 815.920488] kmem_cache_alloc+0x159/0x350 [ 815.921098] anon_vma_clone+0xdc/0x580 [ 815.921685] anon_vma_fork+0x82/0x630 [ 815.922247] ? __vm_enough_memory+0x184/0x360 [ 815.922911] dup_mm+0x861/0x1110 [ 815.923453] ? vm_area_dup+0x290/0x290 [ 815.924052] ? __raw_spin_lock_init+0x34/0x100 [ 815.924728] copy_process+0x2409/0x6650 [ 815.925342] ? __cleanup_sighand+0xb0/0xb0 [ 815.925943] ? __bpf_prog_run32+0x8f/0xd0 [ 815.926553] ? perf_trace_lock+0xac/0x490 [ 815.927154] kernel_clone+0xe7/0xa20 [ 815.927707] ? copy_init_mm+0x20/0x20 [ 815.928248] ? lock_downgrade+0x6d0/0x6d0 [ 815.928833] ? find_held_lock+0x2c/0x110 [ 815.929470] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 815.930249] ? __seccomp_filter+0x236/0x1470 [ 815.930941] ? seccomp_notify_ioctl+0xda0/0xda0 [ 815.931659] __do_sys_clone+0xc8/0x110 [ 815.932276] ? __do_sys_vfork+0xd0/0xd0 [ 815.932880] ? __secure_computing+0xb4/0x290 [ 815.933578] do_syscall_64+0x33/0x40 [ 815.934129] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 815.934892] RIP: 0033:0x466609 [ 815.935353] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 815.938110] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 815.939312] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 815.940388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 815.941463] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 815.942524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 815.943654] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 816.005255] FAULT_INJECTION: forcing a failure. [ 816.005255] name failslab, interval 1, probability 0, space 0, times 0 [ 816.007220] CPU: 1 PID: 6945 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 816.008178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 816.009774] Call Trace: [ 816.010157] dump_stack+0x107/0x163 [ 816.010676] should_fail.cold+0x5/0xa [ 816.011232] ? vfat_add_entry+0x236/0x2720 [ 816.011863] should_failslab+0x5/0x10 [ 816.012414] kmem_cache_alloc_trace+0x55/0x360 [ 816.013080] ? perf_trace_lock+0xac/0x490 [ 816.013692] vfat_add_entry+0x236/0x2720 [ 816.014290] ? lock_release+0x6b0/0x6b0 [ 816.014874] ? find_held_lock+0x2c/0x110 [ 816.015466] ? current_time+0x72/0x2c0 [ 816.016036] ? vfat_rmdir+0x450/0x450 [ 816.016589] ? mark_held_locks+0x9e/0xe0 [ 816.017191] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 816.017953] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 816.018700] ? trace_hardirqs_on+0x5b/0x180 [ 816.019335] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 816.020100] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 816.020831] ? current_time+0x1e6/0x2c0 [ 816.021409] ? igrab+0xb0/0xb0 [ 816.021883] ? selinux_determine_inode_label+0x1ab/0x340 [ 816.022687] vfat_create+0x115/0x3c0 [ 816.023243] ? selinux_inode_init_security+0x690/0x690 [ 816.024020] ? vfat_add_entry+0x2720/0x2720 [ 816.024684] vfs_create+0x372/0x580 [ 816.025219] do_mknodat.part.0+0x2bd/0x3d0 [ 816.025839] ? __ia32_sys_mkdir+0x80/0x80 [ 816.026461] __x64_sys_mknod+0xf8/0x120 [ 816.027042] do_syscall_64+0x33/0x40 [ 816.027594] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 816.028334] RIP: 0033:0x466609 [ 816.028806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.031477] RSP: 002b:00007f7a36258188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 816.032579] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 816.033613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 816.034639] RBP: 00007f7a362581d0 R08: 0000000000000000 R09: 0000000000000000 [ 816.035672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 816.036712] R13: 00007ffc1a9c088f R14: 00007f7a36258300 R15: 0000000000022000 01:17:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001702, 0x0, 0x0, 0x0) 01:17:52 executing program 4 (fault-call:1 fault-nth:35): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 816.075220] FAULT_INJECTION: forcing a failure. [ 816.075220] name failslab, interval 1, probability 0, space 0, times 0 [ 816.077108] CPU: 0 PID: 6950 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 816.078205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 816.079874] Call Trace: [ 816.080275] dump_stack+0x107/0x163 [ 816.080846] should_fail.cold+0x5/0xa [ 816.081440] ? create_object.isra.0+0x3a/0xa20 [ 816.082129] should_failslab+0x5/0x10 [ 816.082698] kmem_cache_alloc+0x5b/0x350 [ 816.083330] create_object.isra.0+0x3a/0xa20 [ 816.084015] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 816.084791] kmem_cache_alloc+0x159/0x350 [ 816.085426] anon_vma_clone+0xdc/0x580 [ 816.086028] anon_vma_fork+0x82/0x630 [ 816.086630] ? __vm_enough_memory+0x184/0x360 [ 816.087311] dup_mm+0x861/0x1110 [ 816.087879] ? vm_area_dup+0x290/0x290 [ 816.088471] ? __raw_spin_lock_init+0x34/0x100 [ 816.089173] copy_process+0x2409/0x6650 [ 816.089812] ? __cleanup_sighand+0xb0/0xb0 [ 816.090460] ? __bpf_prog_run32+0x8f/0xd0 [ 816.091130] ? perf_trace_lock+0xac/0x490 [ 816.091782] kernel_clone+0xe7/0xa20 [ 816.092350] ? copy_init_mm+0x20/0x20 [ 816.092925] ? lock_downgrade+0x6d0/0x6d0 [ 816.093555] ? find_held_lock+0x2c/0x110 [ 816.094184] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 816.094979] ? __seccomp_filter+0x236/0x1470 [ 816.095675] ? seccomp_notify_ioctl+0xda0/0xda0 [ 816.096388] __do_sys_clone+0xc8/0x110 [ 816.096974] ? __do_sys_vfork+0xd0/0xd0 [ 816.097593] ? __secure_computing+0xb4/0x290 [ 816.098250] do_syscall_64+0x33/0x40 [ 816.098803] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 816.099587] RIP: 0033:0x466609 [ 816.100077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.102849] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 816.104031] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 816.105100] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 816.106107] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 816.107173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 816.108222] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 01:17:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0x3, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:17:52 executing program 4 (fault-call:1 fault-nth:36): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:17:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x3, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:17:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x8) 01:17:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001703, 0x0, 0x0, 0x0) 01:17:52 executing program 3 (fault-call:2 fault-nth:6): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:17:52 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RFLUSH(r1, &(0x7f0000000000)={0x7}, 0x7) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0xc, 0x0) syncfs(r0) write$P9_RFLUSH(r0, &(0x7f0000000000)={0x7}, 0x7) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000100)={0x8001, 0x8, '\x00', 0x1, &(0x7f0000000140)=[0x0]}) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_capability(r2, 0x0, 0x0, 0x0, 0x0) 01:17:52 executing program 7 (fault-call:1 fault-nth:38): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:17:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0x7, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 816.290830] FAULT_INJECTION: forcing a failure. [ 816.290830] name failslab, interval 1, probability 0, space 0, times 0 [ 816.292982] CPU: 0 PID: 6962 Comm: syz-executor.4 Not tainted 5.10.56 #1 [ 816.294213] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 816.296263] Call Trace: [ 816.296752] dump_stack+0x107/0x163 [ 816.297415] should_fail.cold+0x5/0xa [ 816.298114] ? down_write+0xe0/0x150 [ 816.298798] ? anon_vma_clone+0xdc/0x580 [ 816.299577] should_failslab+0x5/0x10 [ 816.300301] kmem_cache_alloc+0x5b/0x350 [ 816.301093] anon_vma_clone+0xdc/0x580 [ 816.301851] anon_vma_fork+0x82/0x630 [ 816.302548] ? __vm_enough_memory+0x184/0x360 [ 816.303352] dup_mm+0x861/0x1110 [ 816.303881] ? vm_area_dup+0x290/0x290 [ 816.304455] ? __raw_spin_lock_init+0x34/0x100 [ 816.305121] copy_process+0x2409/0x6650 [ 816.305720] ? __cleanup_sighand+0xb0/0xb0 [ 816.306326] ? __bpf_prog_run32+0x8f/0xd0 [ 816.306944] ? perf_trace_lock+0xac/0x490 [ 816.307561] kernel_clone+0xe7/0xa20 [ 816.308113] ? copy_init_mm+0x20/0x20 [ 816.308666] ? lock_downgrade+0x6d0/0x6d0 [ 816.309278] ? find_held_lock+0x2c/0x110 [ 816.309884] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 816.310640] ? __seccomp_filter+0x236/0x1470 [ 816.311287] ? seccomp_notify_ioctl+0xda0/0xda0 [ 816.311981] __do_sys_clone+0xc8/0x110 [ 816.312547] ? __do_sys_vfork+0xd0/0xd0 [ 816.313141] ? __secure_computing+0xb4/0x290 [ 816.313793] do_syscall_64+0x33/0x40 [ 816.314336] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 816.315082] RIP: 0033:0x466609 [ 816.315565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.318209] RSP: 002b:00007f5d11360188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 816.319331] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 816.320416] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 816.321449] RBP: 00007f5d113601d0 R08: 0000000000000000 R09: 0000000000000000 [ 816.322475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 816.323512] R13: 00007ffe62c6af4f R14: 00007f5d11360300 R15: 0000000000022000 [ 816.337872] FAULT_INJECTION: forcing a failure. [ 816.337872] name failslab, interval 1, probability 0, space 0, times 0 [ 816.339234] CPU: 1 PID: 6968 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 816.339994] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 816.341208] Call Trace: [ 816.341491] dump_stack+0x107/0x163 [ 816.341881] should_fail.cold+0x5/0xa [ 816.342286] ? anon_vma_clone+0xdc/0x580 [ 816.342721] should_failslab+0x5/0x10 [ 816.343126] kmem_cache_alloc+0x5b/0x350 [ 816.343637] anon_vma_clone+0xdc/0x580 [ 816.344077] anon_vma_fork+0x82/0x630 [ 816.344506] ? __vm_enough_memory+0x184/0x360 [ 816.345007] dup_mm+0x861/0x1110 [ 816.345384] ? vm_area_dup+0x290/0x290 [ 816.345831] ? __raw_spin_lock_init+0x34/0x100 [ 816.346339] copy_process+0x2409/0x6650 [ 816.346812] ? __cleanup_sighand+0xb0/0xb0 [ 816.347271] ? __bpf_prog_run32+0x8f/0xd0 [ 816.347769] ? perf_trace_lock+0xac/0x490 [ 816.348232] kernel_clone+0xe7/0xa20 [ 816.348648] ? copy_init_mm+0x20/0x20 [ 816.349063] ? lock_downgrade+0x6d0/0x6d0 [ 816.349518] ? find_held_lock+0x2c/0x110 [ 816.349966] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 816.350545] ? __seccomp_filter+0x236/0x1470 [ 816.351039] ? seccomp_notify_ioctl+0xda0/0xda0 [ 816.351598] __do_sys_clone+0xc8/0x110 [ 816.352030] ? __do_sys_vfork+0xd0/0xd0 [ 816.352487] ? __secure_computing+0xb4/0x290 [ 816.352984] do_syscall_64+0x33/0x40 [ 816.353393] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 816.353967] RIP: 0033:0x466609 [ 816.354325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.356420] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 816.357285] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 816.358099] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 816.358903] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 816.359736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 816.360541] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 816.377564] FAULT_INJECTION: forcing a failure. [ 816.377564] name failslab, interval 1, probability 0, space 0, times 0 [ 816.378902] CPU: 1 PID: 6969 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 816.379708] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 816.380966] Call Trace: [ 816.381265] dump_stack+0x107/0x163 [ 816.381669] should_fail.cold+0x5/0xa [ 816.382103] ? fat_parse_long.constprop.0+0x8e5/0xb50 [ 816.382670] should_failslab+0x5/0x10 [ 816.383096] kmem_cache_alloc+0x5b/0x350 [ 816.383576] fat_parse_long.constprop.0+0x8e5/0xb50 [ 816.384136] ? vfat_lookup+0xeb/0x610 [ 816.384571] fat_search_long+0x380/0xd90 [ 816.385036] ? fat_parse_short+0xd30/0xd30 [ 816.385507] ? vfat_lookup+0xeb/0x610 [ 816.385941] ? perf_trace_lock+0xac/0x490 [ 816.386396] ? SOFTIRQ_verbose+0x10/0x10 [ 816.386848] ? __lockdep_reset_lock+0x180/0x180 [ 816.387367] ? kmem_cache_alloc+0x159/0x350 [ 816.387872] ? find_held_lock+0x2c/0x110 [ 816.388331] vfat_lookup+0x2d4/0x610 [ 816.388743] ? vfat_revalidate+0x190/0x190 [ 816.389209] ? rwlock_bug.part.0+0x90/0x90 [ 816.389677] ? do_raw_spin_unlock+0x4f/0x210 [ 816.390171] ? _raw_spin_unlock+0x1a/0x30 [ 816.390647] __lookup_hash+0x11d/0x190 [ 816.391077] filename_create+0x186/0x490 [ 816.391568] ? filename_parentat+0x560/0x560 [ 816.392059] ? getname_flags.part.0+0x1dd/0x4f0 [ 816.392592] do_mknodat.part.0+0xc2/0x3d0 [ 816.393060] ? __ia32_sys_mkdir+0x80/0x80 [ 816.393535] __x64_sys_mknod+0xf8/0x120 [ 816.393984] do_syscall_64+0x33/0x40 [ 816.394406] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 816.394977] RIP: 0033:0x466609 [ 816.395338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 816.397460] RSP: 002b:00007f7a36279188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 816.398329] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 816.399139] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 816.399975] RBP: 00007f7a362791d0 R08: 0000000000000000 R09: 0000000000000000 [ 816.400784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 816.401592] R13: 00007ffc1a9c088f R14: 00007f7a36279300 R15: 0000000000022000 01:17:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:17:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x40001e00, 0x0, 0x0, 0x0) 01:17:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x9) 01:17:52 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x8) 01:17:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0x11, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:17:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:17:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x2, 0x0, 0x0) [ 826.257044] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:18:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:18:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x3, 0x0, 0x0) 01:18:09 executing program 7 (fault-call:1 fault-nth:39): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:18:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xa) 01:18:09 executing program 3 (fault-call:2 fault-nth:7): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:18:09 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RFLUSH(r1, &(0x7f0000000000)={0x7}, 0x7) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0xc, 0x0) syncfs(r0) write$P9_RFLUSH(r0, &(0x7f0000000000)={0x7}, 0x7) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r1, 0xc0389424, &(0x7f0000000100)={0x8001, 0x8, '\x00', 0x1, &(0x7f0000000140)=[0x0]}) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fsetxattr$security_capability(r2, 0x0, 0x0, 0x0, 0x0) 01:18:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 832.736923] FAULT_INJECTION: forcing a failure. [ 832.736923] name failslab, interval 1, probability 0, space 0, times 0 [ 832.738806] CPU: 0 PID: 7026 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 832.739824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 832.741123] Call Trace: [ 832.741420] dump_stack+0x107/0x163 [ 832.741825] should_fail.cold+0x5/0xa [ 832.742250] ? create_object.isra.0+0x3a/0xa20 [ 832.742755] should_failslab+0x5/0x10 [ 832.743185] kmem_cache_alloc+0x5b/0x350 [ 832.743646] ? mark_held_locks+0x9e/0xe0 [ 832.744121] create_object.isra.0+0x3a/0xa20 [ 832.744610] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 832.745194] kmem_cache_alloc+0x159/0x350 [ 832.745669] anon_vma_clone+0xdc/0x580 [ 832.746124] anon_vma_fork+0x82/0x630 [ 832.746556] ? __vm_enough_memory+0x184/0x360 [ 832.747075] dup_mm+0x861/0x1110 [ 832.747462] ? vm_area_dup+0x290/0x290 [ 832.747927] ? __raw_spin_lock_init+0x34/0x100 [ 832.748444] copy_process+0x2409/0x6650 [ 832.748914] ? __cleanup_sighand+0xb0/0xb0 [ 832.749397] ? __bpf_prog_run32+0x8f/0xd0 [ 832.749868] ? perf_trace_lock+0xac/0x490 [ 832.750342] kernel_clone+0xe7/0xa20 [ 832.750763] ? copy_init_mm+0x20/0x20 [ 832.751193] ? lock_downgrade+0x6d0/0x6d0 [ 832.751666] ? find_held_lock+0x2c/0x110 [ 832.752124] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 832.752708] ? __seccomp_filter+0x236/0x1470 [ 832.753208] ? seccomp_notify_ioctl+0xda0/0xda0 [ 832.753738] __do_sys_clone+0xc8/0x110 [ 832.754173] ? __do_sys_vfork+0xd0/0xd0 [ 832.754638] ? __secure_computing+0xb4/0x290 [ 832.755142] do_syscall_64+0x33/0x40 [ 832.755554] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 832.756139] RIP: 0033:0x466609 [ 832.756506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.758524] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 832.759403] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 832.760252] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 832.761075] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 832.761902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 832.762735] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:18:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x8, 0x0, 0x0, 0x0, 0x0) [ 832.803036] FAULT_INJECTION: forcing a failure. [ 832.803036] name failslab, interval 1, probability 0, space 0, times 0 [ 832.804415] CPU: 1 PID: 7027 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 832.805182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 832.806470] Call Trace: [ 832.806771] dump_stack+0x107/0x163 [ 832.807195] should_fail.cold+0x5/0xa [ 832.807627] ? vfat_add_entry+0x236/0x2720 [ 832.808133] should_failslab+0x5/0x10 [ 832.808563] kmem_cache_alloc_trace+0x55/0x360 [ 832.809079] ? perf_trace_lock+0xac/0x490 [ 832.809550] vfat_add_entry+0x236/0x2720 [ 832.810013] ? lock_release+0x6b0/0x6b0 [ 832.810446] ? find_held_lock+0x2c/0x110 [ 832.810913] ? current_time+0x72/0x2c0 [ 832.811361] ? vfat_rmdir+0x450/0x450 [ 832.811782] ? mark_held_locks+0x9e/0xe0 [ 832.812247] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 832.812835] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 832.813409] ? trace_hardirqs_on+0x5b/0x180 [ 832.813885] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 832.814456] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 832.815018] ? current_time+0x1e6/0x2c0 [ 832.815465] ? igrab+0xb0/0xb0 [ 832.815825] ? selinux_determine_inode_label+0x1ab/0x340 [ 832.816434] vfat_create+0x115/0x3c0 [ 832.816847] ? selinux_inode_init_security+0x690/0x690 [ 832.817432] ? vfat_add_entry+0x2720/0x2720 [ 832.817939] vfs_create+0x372/0x580 [ 832.818347] do_mknodat.part.0+0x2bd/0x3d0 [ 832.818820] ? __ia32_sys_mkdir+0x80/0x80 [ 832.819279] __x64_sys_mknod+0xf8/0x120 [ 832.819731] do_syscall_64+0x33/0x40 [ 832.820137] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 832.820701] RIP: 0033:0x466609 [ 832.821071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.823167] RSP: 002b:00007f7a36279188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 832.824062] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 832.824877] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 832.825694] RBP: 00007f7a362791d0 R08: 0000000000000000 R09: 0000000000000000 [ 832.826498] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 832.827314] R13: 00007ffc1a9c088f R14: 00007f7a36279300 R15: 0000000000022000 01:18:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xb) 01:18:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x2, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:18:09 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 01:18:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xc) 01:18:19 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xd) 01:18:19 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x10, 0x0, 0x0, 0x0, 0x0) 01:18:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x300, 0x0, 0x0) 01:18:19 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x3, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:18:19 executing program 3 (fault-call:2 fault-nth:8): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:18:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) unlink(&(0x7f0000000080)='./file1\x00') r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ftruncate(r2, 0x5) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) r4 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ftruncate(r4, 0x2001000) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000009, 0x2011, r4, 0x0) pwritev2(r4, &(0x7f0000000180)=[{&(0x7f0000000000)="92", 0x1}], 0x1, 0x0, 0x0, 0x0) ftruncate(r4, 0x84) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) 01:18:19 executing program 7 (fault-call:1 fault-nth:40): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 843.409965] FAULT_INJECTION: forcing a failure. [ 843.409965] name failslab, interval 1, probability 0, space 0, times 0 [ 843.411756] CPU: 1 PID: 7076 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 843.412786] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 843.414460] Call Trace: [ 843.414823] dump_stack+0x107/0x163 [ 843.415353] should_fail.cold+0x5/0xa [ 843.415909] ? anon_vma_fork+0xed/0x630 [ 843.416500] should_failslab+0x5/0x10 [ 843.417064] kmem_cache_alloc+0x5b/0x350 [ 843.417678] anon_vma_fork+0xed/0x630 [ 843.418228] ? __vm_enough_memory+0x184/0x360 [ 843.418891] dup_mm+0x861/0x1110 [ 843.419384] ? vm_area_dup+0x290/0x290 [ 843.419968] ? __raw_spin_lock_init+0x34/0x100 [ 843.420631] copy_process+0x2409/0x6650 [ 843.421236] ? __cleanup_sighand+0xb0/0xb0 [ 843.421861] ? __bpf_prog_run32+0x8f/0xd0 [ 843.422470] ? perf_trace_lock+0xac/0x490 [ 843.423088] kernel_clone+0xe7/0xa20 [ 843.423644] ? copy_init_mm+0x20/0x20 [ 843.424251] ? lock_downgrade+0x6d0/0x6d0 [ 843.424856] ? find_held_lock+0x2c/0x110 [ 843.425467] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 843.426244] ? __seccomp_filter+0x236/0x1470 [ 843.426901] ? seccomp_notify_ioctl+0xda0/0xda0 [ 843.427537] __do_sys_clone+0xc8/0x110 [ 843.428095] ? __do_sys_vfork+0xd0/0xd0 [ 843.428696] ? __secure_computing+0xb4/0x290 [ 843.429365] do_syscall_64+0x33/0x40 [ 843.429920] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 843.430658] RIP: 0033:0x466609 [ 843.431141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 843.433878] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 843.435009] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 843.436080] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 843.437120] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 843.438092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 843.439161] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:18:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:18:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0xff03, 0x0, 0x0) [ 843.489886] FAULT_INJECTION: forcing a failure. [ 843.489886] name failslab, interval 1, probability 0, space 0, times 0 [ 843.491202] CPU: 1 PID: 7077 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 843.492005] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 843.493226] Call Trace: [ 843.493535] dump_stack+0x107/0x163 [ 843.493960] should_fail.cold+0x5/0xa [ 843.494388] ? create_object.isra.0+0x3a/0xa20 [ 843.494904] should_failslab+0x5/0x10 [ 843.495329] kmem_cache_alloc+0x5b/0x350 [ 843.495782] ? __lock_acquire+0x1666/0x5b20 [ 843.496293] create_object.isra.0+0x3a/0xa20 [ 843.496788] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 843.497365] kmem_cache_alloc_trace+0x151/0x360 [ 843.497907] vfat_add_entry+0x236/0x2720 [ 843.498374] ? lock_release+0x6b0/0x6b0 [ 843.498823] ? find_held_lock+0x2c/0x110 [ 843.499290] ? current_time+0x72/0x2c0 [ 843.499734] ? vfat_rmdir+0x450/0x450 [ 843.500183] ? mark_held_locks+0x9e/0xe0 [ 843.500652] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 843.501249] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 843.501800] ? trace_hardirqs_on+0x5b/0x180 [ 843.502279] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 843.502868] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 843.503448] ? current_time+0x1e6/0x2c0 [ 843.503920] ? igrab+0xb0/0xb0 [ 843.504281] ? selinux_determine_inode_label+0x1ab/0x340 [ 843.504898] vfat_create+0x115/0x3c0 [ 843.505317] ? selinux_inode_init_security+0x690/0x690 [ 843.505896] ? vfat_add_entry+0x2720/0x2720 [ 843.506401] vfs_create+0x372/0x580 [ 843.506815] do_mknodat.part.0+0x2bd/0x3d0 [ 843.507292] ? __ia32_sys_mkdir+0x80/0x80 [ 843.507747] __x64_sys_mknod+0xf8/0x120 [ 843.508224] do_syscall_64+0x33/0x40 [ 843.508651] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 843.509230] RIP: 0033:0x466609 [ 843.509581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 843.511704] RSP: 002b:00007f7a36279188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 843.512610] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 843.513369] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 843.514125] RBP: 00007f7a362791d0 R08: 0000000000000000 R09: 0000000000000000 [ 843.514878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 843.515636] R13: 00007ffc1a9c088f R14: 00007f7a36279300 R15: 0000000000022000 [ 853.129327] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:18:36 executing program 3 (fault-call:2 fault-nth:9): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:18:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x1000000, 0x0, 0x0) 01:18:36 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:36 executing program 1: mlockall(0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x1, 0x0) mlockall(0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x100a024, &(0x7f00000002c0)=ANY=[@ANYBLOB='huge=advise,uid=', @ANYRESHEX=r0, @ANYBLOB="2c646566636f6e7465f6301eabe5bad2a68f78743d726f6f742c61756469742c7353636c6162656c2c00"]) 01:18:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xe) 01:18:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x50, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:18:36 executing program 7 (fault-call:1 fault-nth:41): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:18:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x11, 0x0, 0x0, 0x0, 0x0) [ 860.254360] FAULT_INJECTION: forcing a failure. [ 860.254360] name failslab, interval 1, probability 0, space 0, times 0 [ 860.255714] CPU: 0 PID: 7119 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 860.256469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 860.257720] Call Trace: [ 860.258009] dump_stack+0x107/0x163 [ 860.258404] should_fail.cold+0x5/0xa [ 860.258819] ? create_object.isra.0+0x3a/0xa20 [ 860.259306] should_failslab+0x5/0x10 [ 860.259772] kmem_cache_alloc+0x5b/0x350 [ 860.260232] create_object.isra.0+0x3a/0xa20 [ 860.260707] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 860.261255] kmem_cache_alloc+0x159/0x350 [ 860.261703] anon_vma_fork+0xed/0x630 [ 860.262114] ? __vm_enough_memory+0x184/0x360 [ 860.262601] dup_mm+0x861/0x1110 [ 860.262971] ? vm_area_dup+0x290/0x290 [ 860.263396] ? __raw_spin_lock_init+0x34/0x100 [ 860.263902] copy_process+0x2409/0x6650 [ 860.264365] ? __cleanup_sighand+0xb0/0xb0 [ 860.264820] ? __bpf_prog_run32+0x8f/0xd0 [ 860.265277] ? perf_trace_lock+0xac/0x490 [ 860.265735] kernel_clone+0xe7/0xa20 [ 860.266136] ? copy_init_mm+0x20/0x20 [ 860.266542] ? lock_downgrade+0x6d0/0x6d0 [ 860.266989] ? find_held_lock+0x2c/0x110 [ 860.267428] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 860.267980] ? __seccomp_filter+0x236/0x1470 [ 860.268465] ? seccomp_notify_ioctl+0xda0/0xda0 [ 860.268969] __do_sys_clone+0xc8/0x110 [ 860.269388] ? __do_sys_vfork+0xd0/0xd0 [ 860.269831] ? __secure_computing+0xb4/0x290 [ 860.270313] do_syscall_64+0x33/0x40 [ 860.270886] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 860.271485] RIP: 0033:0x466609 [ 860.271849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 860.273965] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 860.274817] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 860.275626] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 860.276442] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 860.277261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 860.278056] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:18:36 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xf) [ 860.345400] FAULT_INJECTION: forcing a failure. [ 860.345400] name failslab, interval 1, probability 0, space 0, times 0 [ 860.346733] CPU: 0 PID: 7121 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 860.347455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 860.348741] Call Trace: [ 860.349041] dump_stack+0x107/0x163 [ 860.349455] should_fail.cold+0x5/0xa [ 860.349901] ? fat_alloc_inode+0x18/0x160 [ 860.350354] should_failslab+0x5/0x10 [ 860.350779] kmem_cache_alloc+0x5b/0x350 [ 860.351230] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 860.351818] ? fat_free_inode+0x20/0x20 [ 860.352268] fat_alloc_inode+0x18/0x160 [ 860.352718] ? fat_free_inode+0x20/0x20 [ 860.353153] alloc_inode+0x63/0x230 [ 860.353567] new_inode+0x23/0x240 [ 860.353949] fat_build_inode+0x146/0x2d0 [ 860.354417] vfat_create+0x259/0x3c0 [ 860.354820] ? vfat_add_entry+0x2720/0x2720 [ 860.355324] vfs_create+0x372/0x580 [ 860.355720] do_mknodat.part.0+0x2bd/0x3d0 [ 860.356217] ? __ia32_sys_mkdir+0x80/0x80 [ 860.356669] __x64_sys_mknod+0xf8/0x120 [ 860.357133] do_syscall_64+0x33/0x40 [ 860.357550] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 860.358099] RIP: 0033:0x466609 [ 860.358469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 860.360456] RSP: 002b:00007f7a36279188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 860.361343] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 860.362157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 860.362982] RBP: 00007f7a362791d0 R08: 0000000000000000 R09: 0000000000000000 [ 860.363801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 860.364619] R13: 00007ffc1a9c088f R14: 00007f7a36279300 R15: 0000000000022000 01:18:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x60, 0x0, 0x0, 0x0, 0x0) 01:18:36 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x2000000, 0x0, 0x0) 01:18:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfc, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 871.426399] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:18:54 executing program 1: mlockall(0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x1, 0x0) mlockall(0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x100a024, &(0x7f00000002c0)=ANY=[@ANYBLOB='huge=advise,uid=', @ANYRESHEX=r0, @ANYBLOB="2c646566636f6e7465f6301eabe5bad2a68f78743d726f6f742c61756469742c7353636c6162656c2c00"]) 01:18:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x1100, 0x0, 0x0, 0x0, 0x0) 01:18:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x1f4, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:18:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:54 executing program 3 (fault-call:2 fault-nth:10): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:18:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x10) 01:18:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x3000000, 0x0, 0x0) 01:18:54 executing program 7 (fault-call:1 fault-nth:42): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 878.029343] FAULT_INJECTION: forcing a failure. [ 878.029343] name failslab, interval 1, probability 0, space 0, times 0 [ 878.030708] CPU: 1 PID: 7166 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 878.031449] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 878.032725] Call Trace: [ 878.033028] dump_stack+0x107/0x163 [ 878.033437] should_fail.cold+0x5/0xa [ 878.033866] ? anon_vma_fork+0x1dd/0x630 [ 878.034343] should_failslab+0x5/0x10 [ 878.034781] kmem_cache_alloc+0x5b/0x350 [ 878.035257] anon_vma_fork+0x1dd/0x630 [ 878.035712] dup_mm+0x861/0x1110 [ 878.036115] ? vm_area_dup+0x290/0x290 [ 878.036579] ? __raw_spin_lock_init+0x34/0x100 [ 878.037124] copy_process+0x2409/0x6650 [ 878.037593] ? __cleanup_sighand+0xb0/0xb0 [ 878.038081] ? __bpf_prog_run32+0x8f/0xd0 [ 878.038564] ? perf_trace_lock+0xac/0x490 [ 878.039050] kernel_clone+0xe7/0xa20 [ 878.039482] ? copy_init_mm+0x20/0x20 [ 878.039916] ? lock_downgrade+0x6d0/0x6d0 [ 878.040395] ? find_held_lock+0x2c/0x110 [ 878.040892] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 878.041485] ? __seccomp_filter+0x236/0x1470 [ 878.041992] ? seccomp_notify_ioctl+0xda0/0xda0 [ 878.042511] __do_sys_clone+0xc8/0x110 [ 878.042956] ? __do_sys_vfork+0xd0/0xd0 [ 878.043428] ? __secure_computing+0xb4/0x290 [ 878.043937] do_syscall_64+0x33/0x40 [ 878.044361] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 878.044960] RIP: 0033:0x466609 [ 878.045339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 878.047459] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 878.048343] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 878.049171] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 878.050000] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 878.050826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 878.051666] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:18:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0xff030000, 0x0, 0x0) 01:18:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x3f00, 0x0, 0x0, 0x0, 0x0) [ 878.090533] FAULT_INJECTION: forcing a failure. [ 878.090533] name failslab, interval 1, probability 0, space 0, times 0 [ 878.091830] CPU: 1 PID: 7164 Comm: syz-executor.3 Not tainted 5.10.56 #1 [ 878.092559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 878.093852] Call Trace: [ 878.094151] dump_stack+0x107/0x163 [ 878.094564] should_fail.cold+0x5/0xa [ 878.094997] ? create_object.isra.0+0x3a/0xa20 [ 878.095518] should_failslab+0x5/0x10 [ 878.095958] kmem_cache_alloc+0x5b/0x350 [ 878.096433] ? mark_held_locks+0x9e/0xe0 [ 878.096900] create_object.isra.0+0x3a/0xa20 [ 878.097395] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 878.097972] kmem_cache_alloc+0x159/0x350 [ 878.098455] vfat_add_entry+0x2fa/0x2720 [ 878.098917] ? lock_release+0x6b0/0x6b0 [ 878.099378] ? find_held_lock+0x2c/0x110 [ 878.099851] ? current_time+0x72/0x2c0 [ 878.100297] ? vfat_rmdir+0x450/0x450 [ 878.100742] ? mark_held_locks+0x9e/0xe0 [ 878.101212] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 878.101812] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 878.102391] ? trace_hardirqs_on+0x5b/0x180 [ 878.102882] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 878.103469] ? ktime_get_coarse_real_ts64+0xfd/0x190 [ 878.104051] ? current_time+0x1e6/0x2c0 [ 878.104516] ? igrab+0xb0/0xb0 [ 878.104885] ? selinux_determine_inode_label+0x1ab/0x340 [ 878.105520] vfat_create+0x115/0x3c0 [ 878.105944] ? selinux_inode_init_security+0x690/0x690 [ 878.106541] ? vfat_add_entry+0x2720/0x2720 [ 878.107050] vfs_create+0x372/0x580 [ 878.107465] do_mknodat.part.0+0x2bd/0x3d0 [ 878.107942] ? __ia32_sys_mkdir+0x80/0x80 [ 878.108431] __x64_sys_mknod+0xf8/0x120 [ 878.108875] do_syscall_64+0x33/0x40 [ 878.109302] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 878.109893] RIP: 0033:0x466609 [ 878.110260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 878.112360] RSP: 002b:00007f7a36279188 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 878.113253] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 878.114076] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000280 [ 878.114890] RBP: 00007f7a362791d0 R08: 0000000000000000 R09: 0000000000000000 [ 878.115724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 878.116541] R13: 00007ffc1a9c088f R14: 00007f7a36279300 R15: 0000000000022000 01:18:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:54 executing program 3 (fault-call:2 fault-nth:11): r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:18:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x4000, 0x0, 0x0, 0x0, 0x0) 01:18:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x100000000000000, 0x0, 0x0) 01:18:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x218, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:18:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x11) 01:18:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x6, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:54 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x8, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:54 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x0, 0x0) 01:18:54 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x12) 01:18:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x200000000000000, 0x0, 0x0) 01:18:54 executing program 7 (fault-call:1 fault-nth:43): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:18:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x240, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 878.486198] FAULT_INJECTION: forcing a failure. [ 878.486198] name failslab, interval 1, probability 0, space 0, times 0 [ 878.487552] CPU: 1 PID: 7207 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 878.488269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 878.489541] Call Trace: [ 878.489844] dump_stack+0x107/0x163 [ 878.490249] should_fail.cold+0x5/0xa [ 878.490676] ? create_object.isra.0+0x3a/0xa20 [ 878.491189] should_failslab+0x5/0x10 [ 878.491613] kmem_cache_alloc+0x5b/0x350 [ 878.492065] ? mark_held_locks+0x9e/0xe0 [ 878.492539] create_object.isra.0+0x3a/0xa20 [ 878.493007] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 878.493571] kmem_cache_alloc+0x159/0x350 [ 878.494039] anon_vma_fork+0x1dd/0x630 [ 878.494478] dup_mm+0x861/0x1110 [ 878.494867] ? vm_area_dup+0x290/0x290 [ 878.495289] ? __raw_spin_lock_init+0x34/0x100 [ 878.495797] copy_process+0x2409/0x6650 [ 878.496253] ? __cleanup_sighand+0xb0/0xb0 [ 878.496746] ? __bpf_prog_run32+0x8f/0xd0 [ 878.497185] ? perf_trace_lock+0xac/0x490 [ 878.497645] kernel_clone+0xe7/0xa20 [ 878.498059] ? copy_init_mm+0x20/0x20 [ 878.498476] ? lock_downgrade+0x6d0/0x6d0 [ 878.498936] ? find_held_lock+0x2c/0x110 [ 878.499390] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 878.499966] ? __seccomp_filter+0x236/0x1470 [ 878.500463] ? seccomp_notify_ioctl+0xda0/0xda0 [ 878.500981] __do_sys_clone+0xc8/0x110 [ 878.501410] ? __do_sys_vfork+0xd0/0xd0 [ 878.501863] ? __secure_computing+0xb4/0x290 [ 878.502354] do_syscall_64+0x33/0x40 [ 878.502764] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 878.503336] RIP: 0033:0x466609 [ 878.503689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 878.505749] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 878.506600] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 878.507372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 878.508161] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 878.508938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 878.509692] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:18:54 executing program 7 (fault-call:1 fault-nth:44): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:18:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:18:55 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x13) 01:18:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x300000000000000, 0x0, 0x0) 01:18:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x200000000000000, 0x0, 0x0) [ 878.648689] FAULT_INJECTION: forcing a failure. [ 878.648689] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 878.650102] CPU: 0 PID: 7229 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 878.650835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 878.652052] Call Trace: [ 878.652339] dump_stack+0x107/0x163 [ 878.652744] should_fail.cold+0x5/0xa [ 878.653160] __alloc_pages_nodemask+0x182/0x680 [ 878.653658] ? __lockdep_reset_lock+0x180/0x180 [ 878.654162] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 878.654819] ? copy_page_range+0x2821/0x3810 [ 878.655299] alloc_pages_current+0x187/0x280 [ 878.655777] get_zeroed_page+0x14/0xa0 [ 878.656191] __pud_alloc+0x33/0x270 [ 878.656592] copy_page_range+0x2be1/0x3810 [ 878.657053] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 878.657621] ? __lockdep_reset_lock+0x180/0x180 [ 878.658152] ? vm_iomap_memory+0x190/0x190 [ 878.658622] ? downgrade_write+0x3a0/0x3a0 [ 878.659082] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 878.659620] ? vma_interval_tree_augment_rotate+0x17b/0x1e0 [ 878.660236] ? __vma_link_rb+0x540/0x700 [ 878.660698] dup_mm+0x8b9/0x1110 [ 878.661074] ? vm_area_dup+0x290/0x290 [ 878.661497] ? __raw_spin_lock_init+0x34/0x100 [ 878.661998] copy_process+0x2409/0x6650 [ 878.662443] ? __cleanup_sighand+0xb0/0xb0 [ 878.662900] ? __bpf_prog_run32+0x8f/0xd0 [ 878.663361] ? perf_trace_lock+0xac/0x490 [ 878.663821] kernel_clone+0xe7/0xa20 [ 878.664225] ? copy_init_mm+0x20/0x20 [ 878.664645] ? lock_downgrade+0x6d0/0x6d0 [ 878.665096] ? find_held_lock+0x2c/0x110 [ 878.665548] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 878.666105] ? __seccomp_filter+0x236/0x1470 [ 878.666590] ? seccomp_notify_ioctl+0xda0/0xda0 [ 878.667086] __do_sys_clone+0xc8/0x110 [ 878.667514] ? __do_sys_vfork+0xd0/0xd0 [ 878.667955] ? __secure_computing+0xb4/0x290 [ 878.668449] do_syscall_64+0x33/0x40 [ 878.668865] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 878.669424] RIP: 0033:0x466609 [ 878.669775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 878.671790] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 878.672746] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 878.673566] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 878.674330] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 878.675103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 878.675871] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 890.112630] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:19:12 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x18) 01:19:12 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x6000, 0x0, 0x0, 0x0, 0x0) 01:19:12 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x2, 0x0) 01:19:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0xff03000000000000, 0x0, 0x0) 01:19:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x200000000000000, 0x0, 0x0) 01:19:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x300, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:19:12 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x50, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:19:12 executing program 7 (fault-call:1 fault-nth:45): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:19:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x200000000000000, 0x0, 0x0) [ 896.223965] FAULT_INJECTION: forcing a failure. [ 896.223965] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 896.226630] CPU: 1 PID: 7256 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 896.228080] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 896.230533] Call Trace: [ 896.231104] dump_stack+0x107/0x163 [ 896.231890] should_fail.cold+0x5/0xa [ 896.232750] __alloc_pages_nodemask+0x182/0x680 [ 896.233757] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 896.235060] ? lock_downgrade+0x6d0/0x6d0 [ 896.235954] ? do_raw_spin_lock+0x121/0x260 [ 896.236903] alloc_pages_current+0x187/0x280 [ 896.237853] __pmd_alloc+0x37/0x5e0 [ 896.238641] copy_page_range+0x2b18/0x3810 [ 896.239554] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 896.240794] ? __lockdep_reset_lock+0x180/0x180 [ 896.241847] ? vm_iomap_memory+0x190/0x190 [ 896.242766] ? downgrade_write+0x3a0/0x3a0 [ 896.243674] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 896.244771] ? vma_interval_tree_augment_rotate+0x17b/0x1e0 [ 896.245983] ? __vma_link_rb+0x540/0x700 [ 896.246840] dup_mm+0x8b9/0x1110 [ 896.247576] ? vm_area_dup+0x290/0x290 [ 896.248403] ? __raw_spin_lock_init+0x34/0x100 [ 896.249383] copy_process+0x2409/0x6650 [ 896.250246] ? __cleanup_sighand+0xb0/0xb0 [ 896.251131] ? __bpf_prog_run32+0x8f/0xd0 [ 896.252011] ? perf_trace_lock+0xac/0x490 [ 896.252946] kernel_clone+0xe7/0xa20 [ 896.253794] ? copy_init_mm+0x20/0x20 [ 896.254634] ? lock_downgrade+0x6d0/0x6d0 [ 896.255575] ? find_held_lock+0x2c/0x110 [ 896.256453] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 896.257561] ? __seccomp_filter+0x236/0x1470 [ 896.258515] ? seccomp_notify_ioctl+0xda0/0xda0 [ 896.259528] __do_sys_clone+0xc8/0x110 [ 896.260367] ? __do_sys_vfork+0xd0/0xd0 [ 896.261249] ? __secure_computing+0xb4/0x290 [ 896.262200] do_syscall_64+0x33/0x40 [ 896.262991] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 896.264086] RIP: 0033:0x466609 [ 896.264798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 896.268733] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 896.270367] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 896.271898] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 896.273442] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 896.274965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 896.276493] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 907.540616] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:19:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x2) 01:19:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xf0) 01:19:30 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x20010, 0x0, 0x0, 0x0, 0x0) 01:19:30 executing program 7 (fault-call:1 fault-nth:46): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:19:30 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x3, 0x0) 01:19:30 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfc, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:19:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x3e8, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:19:30 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xf) 01:19:30 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x214) [ 914.372191] FAULT_INJECTION: forcing a failure. [ 914.372191] name failslab, interval 1, probability 0, space 0, times 0 [ 914.375586] CPU: 1 PID: 7297 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 914.377541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 914.380761] Call Trace: [ 914.381595] dump_stack+0x107/0x163 [ 914.382652] should_fail.cold+0x5/0xa [ 914.383750] ? __pmd_alloc+0x94/0x5e0 [ 914.384846] should_failslab+0x5/0x10 [ 914.385950] kmem_cache_alloc+0x5b/0x350 [ 914.387128] __pmd_alloc+0x94/0x5e0 [ 914.388183] copy_page_range+0x2b18/0x3810 [ 914.389430] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 914.390937] ? __lockdep_reset_lock+0x180/0x180 [ 914.392359] ? vm_iomap_memory+0x190/0x190 [ 914.393610] ? downgrade_write+0x3a0/0x3a0 [ 914.394822] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 914.396257] ? vma_interval_tree_augment_rotate+0x17b/0x1e0 [ 914.397891] ? __vma_link_rb+0x540/0x700 [ 914.399070] dup_mm+0x8b9/0x1110 [ 914.400075] ? vm_area_dup+0x290/0x290 [ 914.401227] ? __raw_spin_lock_init+0x34/0x100 [ 914.402552] copy_process+0x2409/0x6650 [ 914.403757] ? __cleanup_sighand+0xb0/0xb0 [ 914.404966] ? __bpf_prog_run32+0x8f/0xd0 [ 914.406178] ? perf_trace_lock+0xac/0x490 [ 914.407397] kernel_clone+0xe7/0xa20 [ 914.408479] ? copy_init_mm+0x20/0x20 [ 914.409598] ? lock_downgrade+0x6d0/0x6d0 [ 914.410788] ? find_held_lock+0x2c/0x110 [ 914.411949] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 914.413452] ? __seccomp_filter+0x236/0x1470 [ 914.414734] ? seccomp_notify_ioctl+0xda0/0xda0 [ 914.416098] __do_sys_clone+0xc8/0x110 [ 914.417228] ? __do_sys_vfork+0xd0/0xd0 [ 914.418423] ? __secure_computing+0xb4/0x290 [ 914.419702] do_syscall_64+0x33/0x40 [ 914.420792] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 914.422295] RIP: 0033:0x466609 [ 914.423232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.428529] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 914.430759] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 914.432808] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 914.434844] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 914.436860] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 914.438890] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:19:30 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x20200, 0x0, 0x0, 0x0, 0x0) 01:19:30 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x4, 0x0) [ 927.014413] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:19:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x3) 01:19:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x3e8, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:19:50 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x5, 0x0) 01:19:50 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x300) 01:19:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x500, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:19:50 executing program 7 (fault-call:1 fault-nth:47): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:19:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x80000, 0x0, 0x0, 0x0, 0x0) 01:19:50 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x1f4, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 933.834582] FAULT_INJECTION: forcing a failure. [ 933.834582] name failslab, interval 1, probability 0, space 0, times 0 [ 933.836332] CPU: 0 PID: 7334 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 933.837328] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 933.839009] Call Trace: [ 933.839425] dump_stack+0x107/0x163 [ 933.839996] should_fail.cold+0x5/0xa [ 933.840589] ? __pmd_alloc+0x94/0x5e0 [ 933.841135] should_failslab+0x5/0x10 [ 933.841610] kmem_cache_alloc+0x5b/0x350 [ 933.842073] __pmd_alloc+0x94/0x5e0 [ 933.842550] copy_page_range+0x2b18/0x3810 [ 933.843127] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 933.843855] ? __lockdep_reset_lock+0x180/0x180 [ 933.844496] ? vm_iomap_memory+0x190/0x190 [ 933.845098] ? downgrade_write+0x3a0/0x3a0 [ 933.845661] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 933.846345] ? vma_interval_tree_augment_rotate+0x17b/0x1e0 [ 933.847079] ? __vma_link_rb+0x540/0x700 [ 933.847659] dup_mm+0x8b9/0x1110 [ 933.848134] ? vm_area_dup+0x290/0x290 [ 933.848640] ? __raw_spin_lock_init+0x34/0x100 [ 933.849245] copy_process+0x2409/0x6650 [ 933.849811] ? __cleanup_sighand+0xb0/0xb0 [ 933.850370] ? __bpf_prog_run32+0x8f/0xd0 [ 933.850937] ? perf_trace_lock+0xac/0x490 [ 933.851482] kernel_clone+0xe7/0xa20 [ 933.851991] ? copy_init_mm+0x20/0x20 [ 933.852504] ? lock_downgrade+0x6d0/0x6d0 [ 933.853065] ? find_held_lock+0x2c/0x110 [ 933.853636] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 933.854320] ? __seccomp_filter+0x236/0x1470 [ 933.854915] ? seccomp_notify_ioctl+0xda0/0xda0 [ 933.855537] __do_sys_clone+0xc8/0x110 [ 933.856048] ? __do_sys_vfork+0xd0/0xd0 [ 933.856585] ? __secure_computing+0xb4/0x290 [ 933.857228] do_syscall_64+0x33/0x40 [ 933.857775] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 933.858464] RIP: 0033:0x466609 [ 933.858898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 933.861280] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 933.862342] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 933.863336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 933.864293] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 933.865303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 933.866316] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:19:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x300) 01:19:50 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x218, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:19:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x3) 01:19:50 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x480) 01:19:50 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x6, 0x0) 01:19:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x3) 01:19:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x600, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:19:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x3) 01:19:50 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0xff03) 01:19:50 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x240, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:19:50 executing program 7 (fault-call:1 fault-nth:48): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:19:50 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x500) [ 934.134896] FAULT_INJECTION: forcing a failure. [ 934.134896] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 934.136302] CPU: 1 PID: 7379 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 934.137070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 934.138376] Call Trace: [ 934.138690] dump_stack+0x107/0x163 [ 934.139109] should_fail.cold+0x5/0xa [ 934.139544] __alloc_pages_nodemask+0x182/0x680 [ 934.140076] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 934.140773] ? find_held_lock+0x2c/0x110 [ 934.141250] ? __pmd_alloc+0x2db/0x5e0 [ 934.141672] ? lock_downgrade+0x6d0/0x6d0 [ 934.142147] ? do_raw_spin_lock+0x121/0x260 [ 934.142656] alloc_pages_current+0x187/0x280 [ 934.143162] pte_alloc_one+0x16/0x190 [ 934.143592] __pte_alloc+0x1d/0x320 [ 934.144020] copy_page_range+0x1a1d/0x3810 [ 934.144511] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 934.145102] ? __lockdep_reset_lock+0x180/0x180 [ 934.145674] ? vm_iomap_memory+0x190/0x190 [ 934.146127] ? downgrade_write+0x3a0/0x3a0 [ 934.146614] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 934.147187] ? __vma_link_rb+0x540/0x700 [ 934.147663] dup_mm+0x8b9/0x1110 [ 934.148061] ? vm_area_dup+0x290/0x290 [ 934.148510] ? __raw_spin_lock_init+0x34/0x100 [ 934.149035] copy_process+0x2409/0x6650 [ 934.149516] ? __cleanup_sighand+0xb0/0xb0 [ 934.149999] ? __bpf_prog_run32+0x8f/0xd0 [ 934.150474] ? perf_trace_lock+0xac/0x490 [ 934.150949] kernel_clone+0xe7/0xa20 [ 934.151375] ? copy_init_mm+0x20/0x20 [ 934.151807] ? lock_downgrade+0x6d0/0x6d0 [ 934.152276] ? find_held_lock+0x2c/0x110 [ 934.152742] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 934.153329] ? __seccomp_filter+0x236/0x1470 [ 934.153805] ? seccomp_notify_ioctl+0xda0/0xda0 [ 934.154328] __do_sys_clone+0xc8/0x110 [ 934.154756] ? __do_sys_vfork+0xd0/0xd0 [ 934.155189] ? __secure_computing+0xb4/0x290 [ 934.155689] do_syscall_64+0x33/0x40 [ 934.156109] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 934.156647] RIP: 0033:0x466609 [ 934.157008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 934.158973] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 934.159837] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 934.160655] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 934.161478] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 934.162288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 934.163106] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 945.171404] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:20:09 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x5, 0x0) 01:20:09 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x7, 0x0) 01:20:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x600) 01:20:09 executing program 7 (fault-call:1 fault-nth:49): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:20:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x300, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:20:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x700, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:20:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x1000000) 01:20:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x100000, 0x0, 0x0, 0x0, 0x0) [ 952.960140] FAULT_INJECTION: forcing a failure. [ 952.960140] name failslab, interval 1, probability 0, space 0, times 0 [ 952.963142] CPU: 1 PID: 7403 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 952.964865] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 952.967787] Call Trace: [ 952.968467] dump_stack+0x107/0x163 [ 952.969407] should_fail.cold+0x5/0xa [ 952.970372] ? ptlock_alloc+0x1d/0x70 [ 952.971340] should_failslab+0x5/0x10 [ 952.972303] kmem_cache_alloc+0x5b/0x350 [ 952.973342] ptlock_alloc+0x1d/0x70 [ 952.974278] pte_alloc_one+0x68/0x190 [ 952.975150] __pte_alloc+0x1d/0x320 [ 952.975984] copy_page_range+0x1a1d/0x3810 [ 952.976951] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 952.978159] ? __lockdep_reset_lock+0x180/0x180 [ 952.979262] ? vm_iomap_memory+0x190/0x190 [ 952.980240] ? downgrade_write+0x3a0/0x3a0 [ 952.981201] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 952.982344] ? __vma_link_rb+0x540/0x700 [ 952.983279] dup_mm+0x8b9/0x1110 [ 952.984068] ? vm_area_dup+0x290/0x290 [ 952.984966] ? __raw_spin_lock_init+0x34/0x100 [ 952.986033] copy_process+0x2409/0x6650 [ 952.986973] ? __cleanup_sighand+0xb0/0xb0 [ 952.987941] ? __bpf_prog_run32+0x8f/0xd0 [ 952.988892] ? perf_trace_lock+0xac/0x490 [ 952.989860] kernel_clone+0xe7/0xa20 [ 952.990713] ? copy_init_mm+0x20/0x20 [ 952.991577] ? lock_downgrade+0x6d0/0x6d0 [ 952.992517] ? find_held_lock+0x2c/0x110 [ 952.993443] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 952.994674] ? __seccomp_filter+0x236/0x1470 [ 952.995694] ? seccomp_notify_ioctl+0xda0/0xda0 [ 952.996769] __do_sys_clone+0xc8/0x110 [ 952.997660] ? __do_sys_vfork+0xd0/0xd0 [ 952.998601] ? __secure_computing+0xb4/0x290 [ 952.999624] do_syscall_64+0x33/0x40 [ 953.000467] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 953.001649] RIP: 0033:0x466609 [ 953.002400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.006585] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 953.008307] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 953.009937] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 953.011574] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.013207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 953.014844] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:20:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfc, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:20:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe00, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:20:09 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x101000, 0x0, 0x0, 0x0, 0x0) 01:20:09 executing program 7 (fault-call:1 fault-nth:50): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:20:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x2000000) 01:20:09 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x700) 01:20:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x3e8, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:20:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x3000000) 01:20:09 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x500, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 953.191699] FAULT_INJECTION: forcing a failure. [ 953.191699] name failslab, interval 1, probability 0, space 0, times 0 [ 953.194331] CPU: 1 PID: 7432 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 953.195784] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 953.198217] Call Trace: [ 953.198787] dump_stack+0x107/0x163 [ 953.199579] should_fail.cold+0x5/0xa [ 953.200404] ? create_object.isra.0+0x3a/0xa20 [ 953.201387] should_failslab+0x5/0x10 [ 953.202229] kmem_cache_alloc+0x5b/0x350 [ 953.203104] ? __alloc_pages_slowpath.constprop.0+0x2210/0x2210 [ 953.204393] create_object.isra.0+0x3a/0xa20 [ 953.205331] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 953.206430] kmem_cache_alloc+0x159/0x350 [ 953.207328] ptlock_alloc+0x1d/0x70 [ 953.208108] pte_alloc_one+0x68/0x190 [ 953.208924] __pte_alloc+0x1d/0x320 [ 953.209721] copy_page_range+0x1a1d/0x3810 [ 953.210629] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 953.211754] ? __lockdep_reset_lock+0x180/0x180 [ 953.212794] ? vm_iomap_memory+0x190/0x190 [ 953.213716] ? downgrade_write+0x3a0/0x3a0 [ 953.214620] ? rwsem_down_read_slowpath+0xb90/0xb90 [ 953.215692] ? __vma_link_rb+0x540/0x700 [ 953.216571] dup_mm+0x8b9/0x1110 [ 953.217314] ? vm_area_dup+0x290/0x290 [ 953.218167] ? __raw_spin_lock_init+0x34/0x100 [ 953.219152] copy_process+0x2409/0x6650 [ 953.220036] ? __cleanup_sighand+0xb0/0xb0 [ 953.220941] ? __bpf_prog_run32+0x8f/0xd0 [ 953.221844] ? perf_trace_lock+0xac/0x490 [ 953.222742] kernel_clone+0xe7/0xa20 [ 953.223568] ? copy_init_mm+0x20/0x20 [ 953.224378] ? lock_downgrade+0x6d0/0x6d0 [ 953.225267] ? find_held_lock+0x2c/0x110 [ 953.226142] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 953.227247] ? __seccomp_filter+0x236/0x1470 [ 953.228198] ? seccomp_notify_ioctl+0xda0/0xda0 [ 953.229203] __do_sys_clone+0xc8/0x110 [ 953.230051] ? __do_sys_vfork+0xd0/0xd0 [ 953.230928] ? __secure_computing+0xb4/0x290 [ 953.231882] do_syscall_64+0x33/0x40 [ 953.232682] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 953.233799] RIP: 0033:0x466609 [ 953.234488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.238434] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 953.240068] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 953.241597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 953.243151] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.244684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 953.246220] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 963.647489] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:20:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0xff030000) 01:20:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x3000000) 01:20:26 executing program 7 (fault-call:1 fault-nth:51): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:20:26 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x400000, 0x0, 0x0, 0x0, 0x0) 01:20:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x1802, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:20:26 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x900) 01:20:26 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xf, 0x0) 01:20:26 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x600, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 970.273390] FAULT_INJECTION: forcing a failure. [ 970.273390] name failslab, interval 1, probability 0, space 0, times 0 [ 970.274801] CPU: 1 PID: 7463 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 970.275584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 970.276870] Call Trace: [ 970.277195] dump_stack+0x107/0x163 [ 970.277618] should_fail.cold+0x5/0xa [ 970.278050] ? vm_area_dup+0x78/0x290 [ 970.278490] should_failslab+0x5/0x10 [ 970.278915] kmem_cache_alloc+0x5b/0x350 [ 970.279377] vm_area_dup+0x78/0x290 [ 970.279779] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 970.280304] ? lock_downgrade+0x6d0/0x6d0 [ 970.280752] ? copy_page_range+0x242d/0x3810 [ 970.281269] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 970.281785] ? avc_has_extended_perms+0xec0/0xec0 [ 970.282360] ? vm_area_alloc+0x110/0x110 [ 970.282813] ? selinux_vm_enough_memory+0x10f/0x170 [ 970.283380] ? selinux_sb_statfs+0x250/0x250 [ 970.283880] ? percpu_counter_add_batch+0x8b/0x130 [ 970.284443] ? __vm_enough_memory+0x184/0x360 [ 970.284934] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 970.285526] dup_mm+0x44d/0x1110 [ 970.285910] ? vm_area_dup+0x290/0x290 [ 970.286375] ? __raw_spin_lock_init+0x34/0x100 [ 970.286891] copy_process+0x2409/0x6650 [ 970.287369] ? __cleanup_sighand+0xb0/0xb0 [ 970.287868] ? __bpf_prog_run32+0x8f/0xd0 [ 970.288335] ? perf_trace_lock+0xac/0x490 [ 970.288805] kernel_clone+0xe7/0xa20 [ 970.289226] ? copy_init_mm+0x20/0x20 [ 970.289650] ? lock_downgrade+0x6d0/0x6d0 [ 970.290126] ? find_held_lock+0x2c/0x110 [ 970.290585] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 970.291163] ? __seccomp_filter+0x236/0x1470 [ 970.291688] ? seccomp_notify_ioctl+0xda0/0xda0 [ 970.292208] __do_sys_clone+0xc8/0x110 [ 970.292648] ? __do_sys_vfork+0xd0/0xd0 [ 970.293104] ? __secure_computing+0xb4/0x290 [ 970.293625] do_syscall_64+0x33/0x40 [ 970.294061] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 970.294652] RIP: 0033:0x466609 [ 970.295010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 970.297140] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 970.297986] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 970.298796] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 970.299613] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 970.300434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 970.301255] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:20:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x100000000000000) 01:20:26 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xa00) 01:20:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x3000000) 01:20:26 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x10, 0x0) [ 980.426028] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:20:43 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x11, 0x0) 01:20:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x700, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:20:43 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xb00) 01:20:43 executing program 7 (fault-call:1 fault-nth:52): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:20:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x4000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:20:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x5e8000, 0x0, 0x0, 0x0, 0x0) 01:20:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x200000000000000) 01:20:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x3000000) [ 987.322600] FAULT_INJECTION: forcing a failure. [ 987.322600] name failslab, interval 1, probability 0, space 0, times 0 [ 987.324409] CPU: 0 PID: 7503 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 987.325395] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 987.327084] Call Trace: [ 987.327484] dump_stack+0x107/0x163 [ 987.328012] should_fail.cold+0x5/0xa [ 987.328561] ? create_object.isra.0+0x3a/0xa20 [ 987.329226] should_failslab+0x5/0x10 [ 987.329800] kmem_cache_alloc+0x5b/0x350 [ 987.330405] create_object.isra.0+0x3a/0xa20 [ 987.331062] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 987.331836] kmem_cache_alloc+0x159/0x350 [ 987.332490] vm_area_dup+0x78/0x290 [ 987.333050] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 987.333763] ? lock_downgrade+0x6d0/0x6d0 [ 987.334423] ? copy_page_range+0x242d/0x3810 [ 987.335130] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 987.335841] ? avc_has_extended_perms+0xec0/0xec0 [ 987.336593] ? vm_area_alloc+0x110/0x110 [ 987.337224] ? selinux_vm_enough_memory+0x10f/0x170 [ 987.337955] ? selinux_sb_statfs+0x250/0x250 [ 987.338637] ? percpu_counter_add_batch+0x8b/0x130 [ 987.339373] ? __vm_enough_memory+0x184/0x360 [ 987.340036] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 987.340785] dup_mm+0x44d/0x1110 [ 987.341281] ? vm_area_dup+0x290/0x290 [ 987.341825] ? __raw_spin_lock_init+0x34/0x100 [ 987.342484] copy_process+0x2409/0x6650 [ 987.343069] ? __cleanup_sighand+0xb0/0xb0 [ 987.343665] ? __bpf_prog_run32+0x8f/0xd0 [ 987.344256] ? perf_trace_lock+0xac/0x490 [ 987.344860] kernel_clone+0xe7/0xa20 [ 987.345408] ? copy_init_mm+0x20/0x20 [ 987.345954] ? lock_downgrade+0x6d0/0x6d0 [ 987.346550] ? find_held_lock+0x2c/0x110 [ 987.347144] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 987.347897] ? __seccomp_filter+0x236/0x1470 [ 987.348472] ? seccomp_notify_ioctl+0xda0/0xda0 [ 987.349121] __do_sys_clone+0xc8/0x110 [ 987.349669] ? __do_sys_vfork+0xd0/0xd0 [ 987.350273] ? __secure_computing+0xb4/0x290 [ 987.350904] do_syscall_64+0x33/0x40 [ 987.351445] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 987.352188] RIP: 0033:0x466609 [ 987.352650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 987.355369] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 987.356469] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 987.357502] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 987.358529] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 987.359576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 987.360587] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:20:43 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xa00) 01:20:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x300000000000000) 01:20:43 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x60, 0x0) 01:20:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x4002, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:20:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe00, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:20:43 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xc00) [ 999.969190] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:21:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x1802, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:02 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xd00) 01:21:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0xff03000000000000) 01:21:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x100000000000000) 01:21:02 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x600000, 0x0, 0x0, 0x0, 0x0) 01:21:02 executing program 7 (fault-call:1 fault-nth:53): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:21:02 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xf0, 0x0) 01:21:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x80fe, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x100000000000000) 01:21:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x4000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1006.116815] FAULT_INJECTION: forcing a failure. [ 1006.116815] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.118787] CPU: 1 PID: 7559 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1006.119862] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1006.121710] Call Trace: [ 1006.122148] dump_stack+0x107/0x163 [ 1006.122762] should_fail.cold+0x5/0xa [ 1006.123392] ? anon_vma_clone+0xdc/0x580 [ 1006.124068] should_failslab+0x5/0x10 [ 1006.124692] kmem_cache_alloc+0x5b/0x350 [ 1006.125364] anon_vma_clone+0xdc/0x580 [ 1006.126014] anon_vma_fork+0x82/0x630 [ 1006.126659] ? __vm_enough_memory+0x184/0x360 [ 1006.127403] dup_mm+0x861/0x1110 [ 1006.127973] ? vm_area_dup+0x290/0x290 [ 1006.128619] ? __raw_spin_lock_init+0x34/0x100 [ 1006.129373] copy_process+0x2409/0x6650 [ 1006.130054] ? __cleanup_sighand+0xb0/0xb0 [ 1006.130762] ? __bpf_prog_run32+0x8f/0xd0 [ 1006.131436] ? perf_trace_lock+0xac/0x490 [ 1006.132111] kernel_clone+0xe7/0xa20 [ 1006.132712] ? copy_init_mm+0x20/0x20 [ 1006.133324] ? lock_downgrade+0x6d0/0x6d0 [ 1006.134001] ? find_held_lock+0x2c/0x110 [ 1006.134660] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1006.135499] ? __seccomp_filter+0x236/0x1470 [ 1006.136233] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1006.136999] __do_sys_clone+0xc8/0x110 [ 1006.137647] ? __do_sys_vfork+0xd0/0xd0 [ 1006.138314] ? __secure_computing+0xb4/0x290 [ 1006.139062] do_syscall_64+0x33/0x40 [ 1006.139670] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.140516] RIP: 0033:0x466609 [ 1006.141043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1006.144070] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1006.145306] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1006.146464] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1006.147636] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1006.148792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1006.149947] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:21:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x34}}, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000003cc0)={@loopback, 0x0}, &(0x7f0000003d00)=0x14) sendmmsg$inet6(r1, &(0x7f0000004140)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="79d3fbf0898507921f62beda8c3928c787e91d0a667987b2f40017e5a5424f59951e018d723b08e570f23b8d2a78c336f125bb887dbe9171e893d30d59a57de35258e0fea1437fa8b5c78943cc832a", 0x4f}, {&(0x7f0000000080)="6b05638a865c81550081a3a6780e26f42c4c7c888b54c3e73d", 0x19}, {&(0x7f0000000180)="d753d4a1e3bec42e42cb354d7a9cfef613acaf505b8c25c46b1e10039bbcd4b25d134174d621247b302b9bc43db5c4d9b7befc9e965c", 0x36}, {&(0x7f00000001c0)="601390dadd157d286088fe3b5abc2509aec8e2be3cad9a0dee9da2c89cfaec3a04e3d8eefdf57fbbd5f0aae2c97c632caaf738c967b95cd9a7046253cd5262f28ae7f1685ed4c5415affb48339bbbd73acab94d8eb60289d2afc5463bc5258d4835b35e5ea943bd585a94a1cd175518ebde6a712d209343077578b6e8676", 0x7e}], 0x4, &(0x7f0000004580)=[@dstopts={{0x68, 0x29, 0x37, {0x3b, 0x9, '\x00', [@calipso={0x7, 0x40, {0x1, 0xe, 0x4, 0x40, [0x10000, 0x100, 0x3, 0x3, 0x2, 0x7, 0xd3]}}, @jumbo={0xc2, 0x4, 0x10001}, @enc_lim={0x4, 0x1, 0x1f}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8}}, @dstopts_2292={{0x78, 0x29, 0x4, {0x1, 0xb, '\x00', [@generic={0x4, 0x57, "b9c56e87c7b68259c9796483151513bf85c212f4689a9c754cc5f524a168a5109e9837a25ed07f6df0aa8f0d329e963f23e1c3d156aade3ed2917d6513cb0505c0728a72ad9c4fd887a95c279bba173876f9604f81c76d"}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x40}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x45, 0xa, 0x2, 0x5, 0x0, [@private2, @mcast2, @private1, @empty, @rand_addr=' \x01\x00']}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}], 0x190}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000400)="3a62b75d88a685613efa7841c6a7e2b9a40f2d44be8954a5bfef4f646e16a69a98fd8e91d90b36353724a079de84db92f63adb7f5756e1d9e547533ad797a20c06bdb0b5946e9fda8703aa5091e5f075ce259fcb94c80b4e9f58ef3fb387ba904a", 0x61}, {&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000000480)="c99d59ab63c90d4dfeb0d294a2653661aadd80", 0x13}, {&(0x7f0000000580)="6d5a77e472b94150a1ca5a76799b0c3445474f35075e9c2cd64907b2438e31048c9fe954e07e5b127105f008dec5082643fefb2b82e0957e96def2d2ce14a622cdcb3aecbb5507bf35317bf98a922c1b81b432eb0cc8251bd7ee6b36a427853900bee795a239aa248a805b1038d3f4fe2c2adddf698d34e864fc901ab0a15d33cda48b449d1c3c8b2a3b027ebd88b2c175f1d6aed859d165973e887f5b040fd29ea414", 0xa3}, {&(0x7f00000004c0)="bf9ece1d5fda3bb47341ff17f775de65f76834c994f6", 0x16}, {&(0x7f0000000500)="9ec0769758ad8a3b7c980e0d90a1709638a8ded0d9195f3ebd9b04c8d75a1ab8de4880246f43bd17398e1819ab99d882fad40b5cb0a4c500", 0x38}], 0x6, &(0x7f0000002700)=[@flowinfo={{0x14, 0x29, 0xb, 0x7}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xbc96}}], 0x30}}, {{&(0x7f0000002740)={0xa, 0x4e23, 0x26, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xb}}, 0xfffffffe}, 0x1c, &(0x7f0000003840)=[{&(0x7f0000002780)="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", 0x1000}, {&(0x7f0000003780)="8f7fb784571496a27490c598475ca28b8e7851e5617c3f5f64e0d03fe46bf892988f11fa4b3c11d63cd72e2a91e4e1857b74070d5d5374b4d3960cb6ea559259917b8c3edad66fc415d359fd9039c80ebb6c91d027cf5051ff", 0x59}, {&(0x7f0000003800)="39031e022bf41f32c1db15fa63d2685878f74688d527b9d9043659ad5dc074afeed2", 0x22}], 0x3, &(0x7f0000003880)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}, @rthdrdstopts={{0xa8, 0x29, 0x37, {0x3c, 0x11, '\x00', [@generic={0x1, 0x8d, "464e941c6504d5425f7aafb3aaea2d4693438c10228962bb6343f297b680283e90a54d2d384c18f37c80f45f2a6f68540d707c2e316a17ff4ff7dd949e494654a50baad0200aa6fcd2b2ff12a65f4cfff3df9de016e18e0499fca4245db2fdec6bde79cb40a4f507e45d72d9a592606972c85eceed6addae219cd697787e11ed4282711b468f9f8df9067b41a4"}]}}}], 0xc0}}, {{&(0x7f0000003940)={0xa, 0x4e20, 0xfffff3d9, @mcast2, 0x5}, 0x1c, &(0x7f0000003bc0)=[{&(0x7f0000003980)="190996867ba0b0ab6f0ad759da0353a79c4d88600c896665f031bd8e76c223557a052c4526c09d3d9ffbd360333374e974b1487ddcdbc7a4d65ff95e8c43d06e31059f6bea0109b49a9c49db5bbf68cf11f35c39ce81a7", 0x57}, {&(0x7f0000003a00)="c534c8a047f364827c30d7f580bd862eb39da7", 0x13}, {&(0x7f0000003a40)="0bfb45c2fa76617758215b2a0e2a76c86aad2dd281", 0x15}, {&(0x7f0000003a80)="a2e03a8aadaf2df17bf3a2e65a6a6fef6826dc3dd494651db6c3129396bebfd7d9f9f4b45e821267b04705532f09f17cc597320d98b9421c34cf229a9af1a2aec017b840ca26803d65c9f47e2e19fe7ec87f1ef4822208f254f3f3f1089701c636c0a972955d86a8fdaf87f25396503552d40cdf95bed435fa599c57522c041fb4872721c19c82ad410394a477e851d94ecc1f", 0x93}, {&(0x7f0000003b40)="844a012bcd40e5639efc0765c28226be1fc5e0097d7d2a883ddc9c03dba4a0179f6c7c0c4159", 0x26}, {&(0x7f0000003b80)="d97a123727881d28b1f3ac79a77848547e696d33559245", 0x17}], 0x6, &(0x7f0000003c40)=[@dstopts={{0x28, 0x29, 0x37, {0x98, 0x1, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x87}, @jumbo={0xc2, 0x4, 0x60000000}]}}}], 0x28}}, {{0x0, 0x0, &(0x7f0000003c80), 0x0, &(0x7f0000003d40)=[@rthdrdstopts={{0x150, 0x29, 0x37, {0x0, 0x26, '\x00', [@enc_lim={0x4, 0x1, 0x9}, @pad1, @generic={0x6, 0x9b, "82d4199501879bf4ca8f65a216f46c2064674e6a394c20dd0c54f33ffdcaf7befdc11a5a313399c34d7e8de82195c9fbfd35b3ea504ad82a96efdbf864d03347a6759d8f385cd33c897bacfaea36f3d219e586f33d3a45ada3ac9657cb4f6e680f85bba30fd3f24776ee1569b69be42fba7959570c9a43bd0b7eeaf42b1c28a6f9f486e795f40de9b0b0a73b37fd9c74c25ae17aaade2d27e50f17"}, @hao={0xc9, 0x10, @empty}, @generic={0x53, 0x80, "66bd028ef0c8904a365eab8008d2069a66cc04f638e2e04de87442bb8933f44729f4c48840c70d59e6edb148b1047a72de0e474824195de255ad54142e6415cf9e3c64cce2e6ab7534ca8c9e60b4cc40bb6027d66a1a800653f454c1f0aabfe8b53bdb358adbfc6ea26b94c776ced009429741a22bd7df94b314c9e9cb9b1141"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private1={0xfc, 0x1, '\x00', 0x1}, r5}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0xc, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x5}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xd78b}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r6}}}], 0x1d8}}, {{&(0x7f0000003f40)={0xa, 0x4e21, 0x10001, @remote}, 0x1c, &(0x7f0000004080)=[{&(0x7f0000003f80)="62b234409476036006b92ad3d02740e23847d6cb4ce41415a829a44550eae21184d144a14e1335cc62bc3453cd3bdbc705207a0f3d29d85ec2cabc3ae14be4f76eee776f6af9d693d33271680f291019c1fa7fab9838763f6fcc349cfc33a1ad890728b3f042b353d4ad447e4e24c25a7e00cc6d9e3da564723650b6f8e04c22adce3fd5454717b37788c3", 0x8b}, {&(0x7f0000004040)="6911d48d107c5b6838079855ac09e7b622ddd1b55bfae50ad2", 0x19}], 0x2, &(0x7f00000040c0)=[@dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @hoplimit={{0x14, 0x29, 0x34, 0x1f}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x11, 0x2, 0x1, 0x2, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0xab2d3a1bf6d9487e, 0x0, '\x00', [@ra={0x5, 0x2, 0xfff8}, @pad1]}}}], 0x78}}], 0x6, 0x800) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000004540)={0x0, 0x0, &(0x7f0000004380)=[{&(0x7f00000042c0)="5ad41e45ef80568a2c1d74aafb0ccd868fd06d7927f258aab7972cdaa21d73cf6229349b6ab337a58069dff68ad3bddce695db501cbf4cae3a760c479d757772882f94f82a38fc86c25bc28d4885dca7b8b62def9e5b6628c2afcd4b3635ed2427931b8ac2f6a541cb568ad7f5a32b81bba1", 0x72}, {&(0x7f0000003c80)="b8f7412025dc222fc22e52a7da82", 0xe}, {&(0x7f0000004340)="00eeb7064c23f2b55f98ed93b85fbf46e4ace5a3290163f39378179daf9c17310c3fb4ad6da55d5503e91d82c27cb5", 0x2f}], 0x3, &(0x7f00000043c0)=[@flowinfo={{0x14, 0x29, 0xb, 0xf29}}, @dontfrag={{0x14, 0x29, 0x3e, 0xe501}}, @dstopts={{0x110, 0x29, 0x37, {0x32, 0x1e, '\x00', [@generic={0x2, 0xea, "7599e8297dbaec6a0a0584d15e6c3938820e4198d79518448751c984c55568c1307bdbc97a44611091dd67c1eab2b3b5d152441ac4bbfdabf1e061bc2fcef3179158e9f7284d30236d5509ab0958f08a477b6abb3f78555c30137e4ab41ba6b18c73dbe919f56542e7d5747ed140e556b5d975552d81bb8a1bd76a397eabaf90ece60407aedbf7414b1ffadf76315a981f387db3357d1b21c3c08b2e6beb472ae7af30707f845e4a7d1324bd4524561bad95b7387da66255d837d9cba0a48a98a4d9ee347a1ed024c1a14845f1b650a80cef5239aa591c59c04f4aef8a3d36c72467dee836999266b49b"}, @ra={0x5, 0x2, 0x1}, @ra={0x5, 0x2, 0x2}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2}}], 0x170}, 0x20) 01:21:02 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x214, 0x0) 01:21:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x100000000000000) 01:21:02 executing program 7 (fault-call:1 fault-nth:54): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:21:02 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x805e00, 0x0, 0x0, 0x0, 0x0) 01:21:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xc0fe, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:02 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xe00) 01:21:02 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x4002, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1006.315505] FAULT_INJECTION: forcing a failure. [ 1006.315505] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.316853] CPU: 0 PID: 7599 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1006.317597] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1006.318899] Call Trace: [ 1006.319203] dump_stack+0x107/0x163 [ 1006.319624] should_fail.cold+0x5/0xa [ 1006.320051] ? anon_vma_clone+0xdc/0x580 [ 1006.320512] should_failslab+0x5/0x10 [ 1006.320950] kmem_cache_alloc+0x5b/0x350 [ 1006.321412] anon_vma_clone+0xdc/0x580 [ 1006.321847] anon_vma_fork+0x82/0x630 [ 1006.322280] ? __vm_enough_memory+0x184/0x360 [ 1006.322796] dup_mm+0x861/0x1110 [ 1006.323185] ? vm_area_dup+0x290/0x290 [ 1006.323623] ? __raw_spin_lock_init+0x34/0x100 [ 1006.324143] copy_process+0x2409/0x6650 [ 1006.324619] ? __cleanup_sighand+0xb0/0xb0 [ 1006.325101] ? __bpf_prog_run32+0x8f/0xd0 [ 1006.325577] ? perf_trace_lock+0xac/0x490 [ 1006.326050] kernel_clone+0xe7/0xa20 [ 1006.326468] ? copy_init_mm+0x20/0x20 [ 1006.326914] ? lock_downgrade+0x6d0/0x6d0 [ 1006.327382] ? find_held_lock+0x2c/0x110 [ 1006.327838] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1006.328407] ? __seccomp_filter+0x236/0x1470 [ 1006.328908] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1006.329427] __do_sys_clone+0xc8/0x110 [ 1006.329862] ? __do_sys_vfork+0xd0/0xd0 [ 1006.330320] ? __secure_computing+0xb4/0x290 [ 1006.330831] do_syscall_64+0x33/0x40 [ 1006.331244] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.331827] RIP: 0033:0x466609 [ 1006.332199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1006.334260] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1006.335113] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1006.335915] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1006.336724] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1006.337541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1006.338362] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 1017.707572] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:21:21 executing program 7 (fault-call:1 fault-nth:55): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:21:21 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x214, 0x0) 01:21:21 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x300, 0x0) 01:21:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000016002d0200000000932696a89e3ce47a929d845830a8db532e68cf760795371500000000000000f7"], 0x14}, 0x1, 0x8100}, 0x0) r3 = dup3(r2, r2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001700)="1f05a06fe6c6331b5b7a798952c8f2a6d333f8d03a5cccf8143d9f4bcf7cf04c641e7a99fb78ccceb5044b8a0d1767d9e9afe8cbb742844dfa7cc13c1292ab5cd8b4efb80d23576ae1f4f96f7fef1e08c5a03894d092fcf598b767f4c96cbbfb96f4344c0d250cb20b6ed212695c7a4d6239bd1c489328579c8ec5938b9a45dc320428437a2980a7aa8ac775e77d080ad52d30d6b7de089f00ea72d7d6e4ef4fd353cf2446a385110033e4e338bd146f0a0019ff641f47b5f07cf5ea42070555ab40478f29a041e02c3c56942ebdddc2ef03d4e3b1ff6067a5fff1651392d5f3362ee2106ddcf3d78b4b27999220cb507299c67f35676f3966b96dc0570c06a2c734dca094dad57b405b659aac4e0a6116b05e59dd46a7a1fa75bfafcca18ce730608d9d05428d06b02d24fc7d536801980ff3bccae987eb858aefce0ad95a91dcf7a961771e9b0f88411a3080a6a68c5cb02be596a0d851642f986355f295e387bdbb2026b77a778ecb8bfcbf0d6948cc67ce2f3632f568cdf19e62e59b7ba3aa88897f31f9091c7dc648d733e8cf8075054d67b7b6cc824ab19bbe0912b3b75c559987f46f23380f4f7cc84b691126146d3b786eaa1fae7b0d8584ec53b439954e79810b6c07d8519774a976e9ebe3262f703249091686e299d4227650b9fa287216f6e6ed438cb6eeccf690d18f258d063af79fa1c7d6f0b2ecdf106085632c8e6c4bd83b187b4e79250fc0ea9178e723dd9857cd512accefa9b7489a7aa5bf1ab1ca93ae4308567b35221df060b23308b7cae1e0b74db3b722c06f9c1e25d6027492df2401d7b954ee93cb7e5b3625b7b5f07e517b08b2a1b04260158cc591fd2012accabb34cbdeb8ea2b48996816808ef67cf3af8eb52d175b78b059cd664601c9a80300aa6c187bab794c756453935441c2b64603993e035a6ade45a83465bd5a8b0e21ad7743211aae271b785794ea691af065bcf0774345340664a81b49ba489d7a5c2a1d4d20efe066a11672526ac21433c3a366172a0044bcc61ee84f72ea5bcab0c111a90fbb9f7e5b8f275948cdd4ef8d437728c6a3db7f2163795d2b819b24b2c709d495249c25d09063458dd16b20f008f843646817c63f3db82fb2073898ae7e672384d875265d69a993fe62caf416e80747e048b5f2e497e1161925a7d5b84299db51b4e13bec91bf9d81a9fa4f5d67902615459fd120226a01574aca54cdbc63173c5c906b76a275ef56fe59536cb5a98a8e858bb730c9c9a31e93390af960bcd92a94afe1b2f2dc5903ccb32fee86355ce78584d4de525bfdf4cb5f5dc6ce44b36f8300106aa159604a54fa635f85dd0fa6760d430aa33613b410219467f3877c7303539d4f3110e979f07a92e2291bbbb0058b5b0a4c9ffbd29bbb1e50416aaeee5de8133c3b2335b629a1284dfa72ac6818ce5235b7e4c0e13c3cf8289d93f3f0120ceda636d0b5d59a2cbad32ed58f588278515e65deddc7993d72f8429f6cecdb5202aa666c2861fc104f1f90173b45fb292e2085dcbf8ae44f0e81ccd7d43e70194418729d1c0db8c66faca8f585bb6214679e191f2be85ae412caabe1b635d62f31490845489aae171c7e99ac0ccf84f70b1135bc27baeaac9c5bc230deadab75ec6a63d2816e0074f058ad18de9a9a30cd0689f551ece3f0b406a7db23efb303df0a030911ed731cdb657870f5f6cf998dd5fb9f7972f71eb6982b6396fad1bfa6ac2123c4093104d0231c219ed7ecb4ac6bb57712b321f47b3d4f4297672a5201bf5ddff33c94520121e9806d09593b2dbb71a1e1904238c2d5c43e94c71740eacb8d4cce2afb2ca2b41814d73824197195c17f8afd721488e5f07bf67f38e91967d0b8499fdccc01165f59ca6c3097182192b5df13bdc6c111303a27f7e57a84bd47df258c5ed4dc52f8f49e7719ef3ba791cfc99ea8dd7936b57c8baa5887e5f7025eadfc547ad51bc2ee461e4c9c6f6e0237f74fd347c69ae5bc31e444aa5574bac9ba8984dec385630a1027629e5a834c79eba615d52c33f1896a937cd51d5ec52676fae7324e1c97cef0688e8423027505615bb7c7e997c98fad52863a0f2f4beaf677cc4a8b6c41b5f21b8689ef6f76c44158423bfd31dff64c3386cd679f480f7bde6650e20172ab2a1cecfe30531b5bd4bf9cf118d0669deff10a69a5cf14d2eb368ba69748b3d3e40ad45a4a8d01a000df4b9094963c9488da8bc268a2a6aaf87b7805f7b201ac2cfb0a94f46606cc8ae55bfa1d42800d48275544d35445c86c09b4e513bc84dca33fc638b03ca207c062c957fc79e5ebe5b0830795717846a463ca63b0a80c45d50e22a9e64ad6df26463ac77318ba2fdb21704f47d5db2a99f460226757b221022c0d73cadb517a539fd9935f905d37488141a7b6cc216887a46d8481d5287744cca8e373367df10fd1dff9fcf9fd4d04c697bfce2c47be9f1073d4468343d55f314a924b45eb72a4e02468a64e9d20639d9172f35341f73341cd3293ab49be91e66453d4f1949afc5ecf1b578adc959add20cc09345c2c4848dc775790405c93bf8a973fa06e8e45e255423ec2ac49ceb6ca7b076cb0c6aa31e31cb4b0b7db6b758f382e1e1ab85e1a6ff44347f59813564e0c545245fa091e375c1b07c2ee17a26383ff45f52759ae4177bbd7fa18a3ba7fb0043d887132bc8f6c0b148ebc240acaf59c57f0024416785248a12302c40ef73c10b6021f7f02133bddd272849c0bb88970d98bba3e56ba22339791d918e7a7923112ba7607b273b6e55885fbae62717c4e489bea073081e6bb3752b3219c548dda75952bed634bb414bfe8446c5163062ed1633f0e7257396f2b4075baa4dc9f07060ea6fc29bfe8ed0958ae47c63bebf640cd2d9d4817fa658434b3510dbb81b29a170b94e3911d37ef58cdfd296243ce7e39be87000fc50e2020edaf1afa99c68b8b6406112de0ae80789e65543fbaea7d31f21fec6de14d93a7040ff242f7d8772d9596c56b52f6b6f21fb4ff547f5f6fad1ab9a5104f2c82a4b2df210b08521317e15de454d9bf6eabdf237815ca3d06de89517d4d230248a91697afcd32974202e97ebd1c6f05494d4ffecfa2eca217828d04dafc307d5de0baacf14f8cddb6a1f7c3f33ccedeb8733519df2057ced31a7bd8d1097030cb436aac326907edc68e3f4ed193328ec87c27c143453ad7b055bb72272abfcdcfeec365dda0aadc09fbfc336e95be90224d42a1c817a77b58806245d6bc1f784a41a12f886df2b818a954d10acd99cf8efb7980f9f12fb8308b27dc74dd8e17353d5c9395e93170153cd9cefad4564952f67f1ff9ac45dfb2fd30452a79d32e4ba1dc3bf7c7330d2c756433ed1f008d965138ea734617e86c112af466e0c2dcd34b8dfdd4cb5db3bc9bf562951c68e06dde387169b84ba9c1a25cc3b226939b6cb87995edf31d36edcc88ba359a01d4ba24148b27e8fb50b2fb6003eeb260b6fae160a64cdbf63ee8118cab3c371738404cf75c0f744fd1d3ddfaa6056af8a6d9d017f0998f249556454c37673d1584be8767747627065eddc9d356c624dbd3b2ca4136b98055f1dad0d4bd856308913f548ace1e66118367c43a53ee91c95622fc662a495a48b935ce8814b98ca177fd46ef04a005bc3a5302b08552f188d022411d15d586cba44e5b798b2829f24dff79a9adf69c1702d3554a4b2534448289c7b124fb99b44cee58fa59041367dd87f9e8a277e3bd74db5a12ac4be78585c24aa245a6f4f8b1ff78a60d868418b235a049b7601899dced7a23f5725b2b89005b8d536b037ed63526a86df193d513140a1eced5a7de9b67e0ec752816e7947bbe3307ce1ec0727e4892256e40a816a91a9560facc3b66ec03cb31bc8c649addf22b186818c763e8b43adffbde2a6652b8f38f0563cc2a74df96ca848a3f5d2ed51f1741a9bf4960c74891733629242002c910d9a5226d7467d5afbab6e16671fa007c1eaa44c8255f882d90bc7081ca5815454aa0291cd4b0a6591d29bc6dbb68f3226ea8f283c9935181188480504d4a03615a105e7cf90acda1b6e7f6c13cc2df864ea07821fed089b9e0e4c466cfcc697a3ba3140ccd509ed016248cb21e28297110699bd51d2f2b1d7ae4b713813bcb9c36d5ad283d27541aea149b4eef9133dfa09188af18c6481dcac8a57e80807a8700b1e331d4656bd3e6c4c121b5f146159509b50b10cc13da9429a47ee6b3a9a64de5062d84a83cf806311c7b6136176a2b587ff701e165604e256cd179156395d0b3c189054478ed068e7a961fcb4ee183229abaf7fd9acb64865ef982426147ff3dfa7144c1ca3643d3ec240680a816eccfe40b7f001311e6d2ee21b2685710f16d7b17a520058d9888634a51e148aed46f367f6120e80d9632ae7bf422dc69497406d04d9ce917a6f457321b8f80bde1b001394dcec85305be783516c691fded6024e0e53824774ba93ae76235f7b2d4845d4ada5565585cb89b89f80e2dca76cda3eed8cdb57e0e02b5da559e50a023027afb84b7b27d43dc619bc8983f2a7cb8935c0563126e520f4a2e4631a47621b4fdd189cebf70e64ea1481a9e94bdf8527d906522785fc119ae67c889f94f9b469706a52ab6c27c1fe3511babee7783c5346c7224d7d8bc7aae6d2c0769cf984f89f7b0adb16980dca28ea13e9a238961bd029be472c2e24b1bd9b8b54a3065c0b079b9d7e73876ebe9963e9ce0a3e22736d00e4a32d09d4a6ccc13dd80c028b9d164cbe0ff006bc3efb50244714d12a199ab5ff7eb6d98d590dc50143a1e1309be6797952e5c4dd0197835e49f5963041d75a1227e820ae624e9301643b0a831284a3f6e66b434bb2a043f787a4153fea031fb81ae8281192556f2eb309b7269516c81294fcd028e53022458ffabb0817f7406525968643a9e9d5da71f8ecbf5da922c8e1df253177619fbb0ace01a35c1ca22289fd5947200c071440fa52794289ac0903ff243792c30a293253025486fd52df944a0d7186dd2e34f8b8e090b744d32bb42a2a061f92eeea78e6a807b805d5d1c80982d42fd5780e7542f2d3e6dceceafbe06ec86ca028d615c98156ced3421f6cfed6a93664bcd56060cfb611e37b274ab80f5091ce5e177725173ea42d6a844cd068fe5590e815126f470ac5c90a8fac24ff3f7cf121fb25b3a5b0e7a032861cc712f3af41ff9defa8b29470f9d76b5336454f907d7528727341e2349cd6a45fbfe3c97057ce688274fb18a7e0152e38f45b52f941a79ce557a1079399e096b41f5c15ac16e92a415e15bb1bbcc43cea65e26dd70b564efa50ceef0d5c0cb5006689c8dfed94ff263806477809c1f8780fc8d30fcf8ce9e0e8672ca830168750f4ef5f85381cef3344933a044f38cdf76887d38b3356a237a07479d687ab0442a94b2eb903f60921eb01f7d4d0a2c1c8c67e6cf8b18f514a54c82abcfd2f0470e801f9aed938b86b1f7dead72935ed7b94c0d4de582f7bbce8ad12fce915c894c67fba47749ed4b460ba0fde1f2845aad4ee23274fa4d1b75af562eaef7741abda59b0fd087c869e2c1fa0b8734da0f9a425d19d033bbd981dcb25f181de7a885d0afc0c51bb5d2474feeef8815ae6a4666c12b4c08c158d539f14a35ddf93d51281a450ce52eb3ed6983cfe0d13438c78ec5dad2f65231fd79e579275cefc150b1444bc6a0cba89f4d3e173a152e31053a24c7923e51ca34b67f04a97b1dce0a0215b387eee4ff3a81f0c437042bb74311dd48fb78dace9ee4cbb2144a46e5", 0x1000}, {&(0x7f0000000180)="1cd611dd8ab145fc212f9408ce377dab28058cf00c7338e5e0487032cbf221d9e790fc5c05b9cce1aa459063303a52f94cca9027b1b6d6404d82a08da37890657a1fc8d28249d895467c014d9f2cedc9f4d365f07cb6c687215b3e0e04f3db90df89f4e2a14aa2eec3fc7ca63320a92b65115ee82401f82de840a92aaafd04d6c4649e89c2e67c3ed197ca9293297bdacca6a7932824bb3931c630597c71d54c1b3acd59e74d46e64edbddd8bb8d451fea582b988aed4877fed2093301a9f7c9bafa", 0xc2}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="f4169d122226a4ab4b221828f3ddbe7187e5a55a293041d22a4479c6791ae540fd05fb5fad13c031aacd00bd3a794afb296341706cad046c9eb68d1cf0affa96867f5718ec446eb832d13b018396a036d1e1fbe50e37d40baa01547e538dd7af667c68f8b3c78051d5e05e9b6b8c2c9764abae05727f2f4a4dcd99845bfae97685410f80042bf6c819b08aeb4c899075fdc02d467733ded8593433f80e2cd544d52b885b9b6cdaab1bf87f0887eecc4dbe96edc3b5b3404419f99ce49a1ce0a6a0", 0xc1}, {&(0x7f00000003c0)="e3f60a52bb465b59584cb7ac0c63f354defb241f511593f3d933c4b91b244a8b06ca5308c01687e8ce97a375954650f795602954f07120957b4be854fe32ad18ce4306109aedb5a5562a7086d912fe4597f3d5657167d8eb6f42cbadf99c930fa090f26c1e3205d19cb20b3075daff39b0d52e053d90fcb3aaa3fd1adbfa977937", 0x81}], 0x5}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:21 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xf00) 01:21:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x90541e, 0x0, 0x0, 0x0, 0x0) 01:21:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe803, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 1024.665601] FAULT_INJECTION: forcing a failure. [ 1024.665601] name failslab, interval 1, probability 0, space 0, times 0 [ 1024.668377] CPU: 0 PID: 7622 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1024.669808] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1024.672210] Call Trace: [ 1024.672774] dump_stack+0x107/0x163 [ 1024.673549] should_fail.cold+0x5/0xa [ 1024.674353] ? down_write+0xe0/0x150 [ 1024.675162] ? anon_vma_clone+0xdc/0x580 [ 1024.676024] should_failslab+0x5/0x10 [ 1024.676824] kmem_cache_alloc+0x5b/0x350 [ 1024.677691] anon_vma_clone+0xdc/0x580 [ 1024.678529] anon_vma_fork+0x82/0x630 [ 1024.679354] ? __vm_enough_memory+0x184/0x360 [ 1024.680308] dup_mm+0x861/0x1110 [ 1024.681048] ? vm_area_dup+0x290/0x290 [ 1024.681883] ? __raw_spin_lock_init+0x34/0x100 [ 1024.682856] copy_process+0x2409/0x6650 [ 1024.683741] ? __cleanup_sighand+0xb0/0xb0 [ 1024.684629] ? __bpf_prog_run32+0x8f/0xd0 [ 1024.685511] ? perf_trace_lock+0xac/0x490 [ 1024.686398] kernel_clone+0xe7/0xa20 [ 1024.687220] ? copy_init_mm+0x20/0x20 [ 1024.688020] ? lock_downgrade+0x6d0/0x6d0 [ 1024.688887] ? find_held_lock+0x2c/0x110 [ 1024.689739] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1024.690826] ? __seccomp_filter+0x236/0x1470 [ 1024.691786] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1024.692776] __do_sys_clone+0xc8/0x110 [ 1024.693596] ? __do_sys_vfork+0xd0/0xd0 [ 1024.694461] ? __secure_computing+0xb4/0x290 [ 1024.695414] do_syscall_64+0x33/0x40 [ 1024.696201] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1024.697278] RIP: 0033:0x466609 [ 1024.697959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1024.701864] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1024.703485] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1024.704983] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1024.706478] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1024.707982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1024.709476] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:21:21 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x1000000, 0x0, 0x0, 0x0, 0x0) 01:21:21 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xf, 0x0) 01:21:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xf401, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:21 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x480, 0x0) 01:21:21 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x80fe, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:21 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x1100) 01:21:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x5d, &(0x7f0000000540)=[{&(0x7f0000000040)="cf88f4c7dfed129f2a8e149c9286b2a592c8fb7df4df06dde624406b4712b58c455e534dbd45c13b185485c253cf77934ef91efd07ad8d0eaa204e9b705d2e28410942f9735c85718318dd", 0x3}], 0x1}, 0x30044883) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x4001, 0x0) recvfrom$inet6(r1, &(0x7f0000000140)=""/24, 0x18, 0x2000, &(0x7f0000000180)={0xa, 0x4e20, 0x7, @local, 0x151a3715}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1036.076554] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:21:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) r1 = signalfd4(r0, &(0x7f0000000080)={[0x401]}, 0x8, 0x800) r2 = fork() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f00000005c0)={0x0, 0xffffffffffffff64, &(0x7f00000003c0)=[{&(0x7f0000000180)="93", 0xffffffffffffff82}], 0x1, &(0x7f0000000580)=[@cred={{0x1c, 0x1, 0x2, {r2, 0x0, 0xee01}}}], 0x20}, 0x80) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000001700)=ANY=[@ANYBLOB="20190000150000082bbd7000f7dbdf251900000014000100ff0200000000000000000000000000010d034c80a65310d943134df0fa2fd4e298161dd63f1ce3e8743836971fe4db2c11ab3cc85793a078d73252008908326477ce42f67832f53d111bce0f1ba19ab4c011eeea332341546b9d2d52fa5ba82e7b4885e7e26f37c10d6df03c4f36fc6f656734a5e0be555328c65fa41e4d27af153c7ee590119db5cebb598d772b11bd8016ffbf43fd60d5a2365982a6880233f462771a194c3328404e2125d511d091cec5437f75a610f8838c933320b8a00cd440d4e49720bdb6fcd9d47e9c242ed55b84c1582ea05b4b481bf04ae58a7efea4d18947192d9afdfbdc2a405e198fb1c181eec7039c88a18d851473836ad38c0d3cf93026e3c84f993ab8e5e84b7f45c8c0e5e08df11d78c82518fc8d2ca2d53bc3a0eb8a103e852c30903894fc01ab90932f8bfb5113c1f017f281becde280f4393fa2cc63218eef9e725b511880db1e4f59cc2b40c7f85dae2abaf88aad8edfb99cf9a79cf0faa599c0030f51bb0e2173b2f72c89ec5b02dca0c4100bf7ede64b728751d11ca566820471671a5c4e3472d670f0038c01f77ed3a9e3e6d151a851ce65bf08005000", @ANYRES32=r2, @ANYBLOB="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", @ANYRES32=r2, @ANYRESOCT=r4], 0x1920}}, 0x40088c4) 01:21:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfc00, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:39 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x1200) 01:21:39 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x500, 0x0) 01:21:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x8000000, 0x0, 0x0, 0x0, 0x0) 01:21:39 executing program 7 (fault-call:1 fault-nth:56): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:21:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xc0fe, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1042.951298] FAULT_INJECTION: forcing a failure. [ 1042.951298] name failslab, interval 1, probability 0, space 0, times 0 [ 1042.953659] CPU: 0 PID: 7684 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1042.954990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1042.957210] Call Trace: [ 1042.957725] dump_stack+0x107/0x163 [ 1042.958434] should_fail.cold+0x5/0xa [ 1042.959208] ? io_schedule_timeout+0x140/0x140 [ 1042.960067] ? create_object.isra.0+0x3a/0xa20 [ 1042.960962] should_failslab+0x5/0x10 [ 1042.961681] kmem_cache_alloc+0x5b/0x350 [ 1042.962471] create_object.isra.0+0x3a/0xa20 [ 1042.963341] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1042.964318] kmem_cache_alloc+0x159/0x350 [ 1042.965126] anon_vma_clone+0xdc/0x580 [ 1042.965882] anon_vma_fork+0x82/0x630 [ 1042.966614] ? __vm_enough_memory+0x184/0x360 [ 1042.967507] dup_mm+0x861/0x1110 [ 1042.968179] ? vm_area_dup+0x290/0x290 [ 1042.968937] ? __raw_spin_lock_init+0x34/0x100 [ 1042.969822] copy_process+0x2409/0x6650 [ 1042.970617] ? __cleanup_sighand+0xb0/0xb0 [ 1042.971469] ? __bpf_prog_run32+0x8f/0xd0 [ 1042.972274] ? perf_trace_lock+0xac/0x490 [ 1042.973093] kernel_clone+0xe7/0xa20 [ 1042.973802] ? copy_init_mm+0x20/0x20 [ 1042.974574] ? lock_downgrade+0x6d0/0x6d0 [ 1042.975392] ? find_held_lock+0x2c/0x110 [ 1042.976181] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1042.977184] ? __seccomp_filter+0x236/0x1470 [ 1042.978042] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1042.978976] __do_sys_clone+0xc8/0x110 [ 1042.979731] ? __do_sys_vfork+0xd0/0xd0 [ 1042.980540] ? __secure_computing+0xb4/0x290 [ 1042.981405] do_syscall_64+0x33/0x40 [ 1042.982202] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1042.983234] RIP: 0033:0x466609 [ 1042.983854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1042.987411] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1042.988875] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1042.990252] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1042.991646] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1042.993020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1042.994388] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:21:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe803, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:39 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x1300) 01:21:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000016002d0200000000932696a89e3ce47a929d845830a8db532e68cf760795371500000000000000f7"], 0x14}, 0x1, 0x8100}, 0x0) r3 = dup3(r2, r2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001700)="1f05a06fe6c6331b5b7a798952c8f2a6d333f8d03a5cccf8143d9f4bcf7cf04c641e7a99fb78ccceb5044b8a0d1767d9e9afe8cbb742844dfa7cc13c1292ab5cd8b4efb80d23576ae1f4f96f7fef1e08c5a03894d092fcf598b767f4c96cbbfb96f4344c0d250cb20b6ed212695c7a4d6239bd1c489328579c8ec5938b9a45dc320428437a2980a7aa8ac775e77d080ad52d30d6b7de089f00ea72d7d6e4ef4fd353cf2446a385110033e4e338bd146f0a0019ff641f47b5f07cf5ea42070555ab40478f29a041e02c3c56942ebdddc2ef03d4e3b1ff6067a5fff1651392d5f3362ee2106ddcf3d78b4b27999220cb507299c67f35676f3966b96dc0570c06a2c734dca094dad57b405b659aac4e0a6116b05e59dd46a7a1fa75bfafcca18ce730608d9d05428d06b02d24fc7d536801980ff3bccae987eb858aefce0ad95a91dcf7a961771e9b0f88411a3080a6a68c5cb02be596a0d851642f986355f295e387bdbb2026b77a778ecb8bfcbf0d6948cc67ce2f3632f568cdf19e62e59b7ba3aa88897f31f9091c7dc648d733e8cf8075054d67b7b6cc824ab19bbe0912b3b75c559987f46f23380f4f7cc84b691126146d3b786eaa1fae7b0d8584ec53b439954e79810b6c07d8519774a976e9ebe3262f703249091686e299d4227650b9fa287216f6e6ed438cb6eeccf690d18f258d063af79fa1c7d6f0b2ecdf106085632c8e6c4bd83b187b4e79250fc0ea9178e723dd9857cd512accefa9b7489a7aa5bf1ab1ca93ae4308567b35221df060b23308b7cae1e0b74db3b722c06f9c1e25d6027492df2401d7b954ee93cb7e5b3625b7b5f07e517b08b2a1b04260158cc591fd2012accabb34cbdeb8ea2b48996816808ef67cf3af8eb52d175b78b059cd664601c9a80300aa6c187bab794c756453935441c2b64603993e035a6ade45a83465bd5a8b0e21ad7743211aae271b785794ea691af065bcf0774345340664a81b49ba489d7a5c2a1d4d20efe066a11672526ac21433c3a366172a0044bcc61ee84f72ea5bcab0c111a90fbb9f7e5b8f275948cdd4ef8d437728c6a3db7f2163795d2b819b24b2c709d495249c25d09063458dd16b20f008f843646817c63f3db82fb2073898ae7e672384d875265d69a993fe62caf416e80747e048b5f2e497e1161925a7d5b84299db51b4e13bec91bf9d81a9fa4f5d67902615459fd120226a01574aca54cdbc63173c5c906b76a275ef56fe59536cb5a98a8e858bb730c9c9a31e93390af960bcd92a94afe1b2f2dc5903ccb32fee86355ce78584d4de525bfdf4cb5f5dc6ce44b36f8300106aa159604a54fa635f85dd0fa6760d430aa33613b410219467f3877c7303539d4f3110e979f07a92e2291bbbb0058b5b0a4c9ffbd29bbb1e50416aaeee5de8133c3b2335b629a1284dfa72ac6818ce5235b7e4c0e13c3cf8289d93f3f0120ceda636d0b5d59a2cbad32ed58f588278515e65deddc7993d72f8429f6cecdb5202aa666c2861fc104f1f90173b45fb292e2085dcbf8ae44f0e81ccd7d43e70194418729d1c0db8c66faca8f585bb6214679e191f2be85ae412caabe1b635d62f31490845489aae171c7e99ac0ccf84f70b1135bc27baeaac9c5bc230deadab75ec6a63d2816e0074f058ad18de9a9a30cd0689f551ece3f0b406a7db23efb303df0a030911ed731cdb657870f5f6cf998dd5fb9f7972f71eb6982b6396fad1bfa6ac2123c4093104d0231c219ed7ecb4ac6bb57712b321f47b3d4f4297672a5201bf5ddff33c94520121e9806d09593b2dbb71a1e1904238c2d5c43e94c71740eacb8d4cce2afb2ca2b41814d73824197195c17f8afd721488e5f07bf67f38e91967d0b8499fdccc01165f59ca6c3097182192b5df13bdc6c111303a27f7e57a84bd47df258c5ed4dc52f8f49e7719ef3ba791cfc99ea8dd7936b57c8baa5887e5f7025eadfc547ad51bc2ee461e4c9c6f6e0237f74fd347c69ae5bc31e444aa5574bac9ba8984dec385630a1027629e5a834c79eba615d52c33f1896a937cd51d5ec52676fae7324e1c97cef0688e8423027505615bb7c7e997c98fad52863a0f2f4beaf677cc4a8b6c41b5f21b8689ef6f76c44158423bfd31dff64c3386cd679f480f7bde6650e20172ab2a1cecfe30531b5bd4bf9cf118d0669deff10a69a5cf14d2eb368ba69748b3d3e40ad45a4a8d01a000df4b9094963c9488da8bc268a2a6aaf87b7805f7b201ac2cfb0a94f46606cc8ae55bfa1d42800d48275544d35445c86c09b4e513bc84dca33fc638b03ca207c062c957fc79e5ebe5b0830795717846a463ca63b0a80c45d50e22a9e64ad6df26463ac77318ba2fdb21704f47d5db2a99f460226757b221022c0d73cadb517a539fd9935f905d37488141a7b6cc216887a46d8481d5287744cca8e373367df10fd1dff9fcf9fd4d04c697bfce2c47be9f1073d4468343d55f314a924b45eb72a4e02468a64e9d20639d9172f35341f73341cd3293ab49be91e66453d4f1949afc5ecf1b578adc959add20cc09345c2c4848dc775790405c93bf8a973fa06e8e45e255423ec2ac49ceb6ca7b076cb0c6aa31e31cb4b0b7db6b758f382e1e1ab85e1a6ff44347f59813564e0c545245fa091e375c1b07c2ee17a26383ff45f52759ae4177bbd7fa18a3ba7fb0043d887132bc8f6c0b148ebc240acaf59c57f0024416785248a12302c40ef73c10b6021f7f02133bddd272849c0bb88970d98bba3e56ba22339791d918e7a7923112ba7607b273b6e55885fbae62717c4e489bea073081e6bb3752b3219c548dda75952bed634bb414bfe8446c5163062ed1633f0e7257396f2b4075baa4dc9f07060ea6fc29bfe8ed0958ae47c63bebf640cd2d9d4817fa658434b3510dbb81b29a170b94e3911d37ef58cdfd296243ce7e39be87000fc50e2020edaf1afa99c68b8b6406112de0ae80789e65543fbaea7d31f21fec6de14d93a7040ff242f7d8772d9596c56b52f6b6f21fb4ff547f5f6fad1ab9a5104f2c82a4b2df210b08521317e15de454d9bf6eabdf237815ca3d06de89517d4d230248a91697afcd32974202e97ebd1c6f05494d4ffecfa2eca217828d04dafc307d5de0baacf14f8cddb6a1f7c3f33ccedeb8733519df2057ced31a7bd8d1097030cb436aac326907edc68e3f4ed193328ec87c27c143453ad7b055bb72272abfcdcfeec365dda0aadc09fbfc336e95be90224d42a1c817a77b58806245d6bc1f784a41a12f886df2b818a954d10acd99cf8efb7980f9f12fb8308b27dc74dd8e17353d5c9395e93170153cd9cefad4564952f67f1ff9ac45dfb2fd30452a79d32e4ba1dc3bf7c7330d2c756433ed1f008d965138ea734617e86c112af466e0c2dcd34b8dfdd4cb5db3bc9bf562951c68e06dde387169b84ba9c1a25cc3b226939b6cb87995edf31d36edcc88ba359a01d4ba24148b27e8fb50b2fb6003eeb260b6fae160a64cdbf63ee8118cab3c371738404cf75c0f744fd1d3ddfaa6056af8a6d9d017f0998f249556454c37673d1584be8767747627065eddc9d356c624dbd3b2ca4136b98055f1dad0d4bd856308913f548ace1e66118367c43a53ee91c95622fc662a495a48b935ce8814b98ca177fd46ef04a005bc3a5302b08552f188d022411d15d586cba44e5b798b2829f24dff79a9adf69c1702d3554a4b2534448289c7b124fb99b44cee58fa59041367dd87f9e8a277e3bd74db5a12ac4be78585c24aa245a6f4f8b1ff78a60d868418b235a049b7601899dced7a23f5725b2b89005b8d536b037ed63526a86df193d513140a1eced5a7de9b67e0ec752816e7947bbe3307ce1ec0727e4892256e40a816a91a9560facc3b66ec03cb31bc8c649addf22b186818c763e8b43adffbde2a6652b8f38f0563cc2a74df96ca848a3f5d2ed51f1741a9bf4960c74891733629242002c910d9a5226d7467d5afbab6e16671fa007c1eaa44c8255f882d90bc7081ca5815454aa0291cd4b0a6591d29bc6dbb68f3226ea8f283c9935181188480504d4a03615a105e7cf90acda1b6e7f6c13cc2df864ea07821fed089b9e0e4c466cfcc697a3ba3140ccd509ed016248cb21e28297110699bd51d2f2b1d7ae4b713813bcb9c36d5ad283d27541aea149b4eef9133dfa09188af18c6481dcac8a57e80807a8700b1e331d4656bd3e6c4c121b5f146159509b50b10cc13da9429a47ee6b3a9a64de5062d84a83cf806311c7b6136176a2b587ff701e165604e256cd179156395d0b3c189054478ed068e7a961fcb4ee183229abaf7fd9acb64865ef982426147ff3dfa7144c1ca3643d3ec240680a816eccfe40b7f001311e6d2ee21b2685710f16d7b17a520058d9888634a51e148aed46f367f6120e80d9632ae7bf422dc69497406d04d9ce917a6f457321b8f80bde1b001394dcec85305be783516c691fded6024e0e53824774ba93ae76235f7b2d4845d4ada5565585cb89b89f80e2dca76cda3eed8cdb57e0e02b5da559e50a023027afb84b7b27d43dc619bc8983f2a7cb8935c0563126e520f4a2e4631a47621b4fdd189cebf70e64ea1481a9e94bdf8527d906522785fc119ae67c889f94f9b469706a52ab6c27c1fe3511babee7783c5346c7224d7d8bc7aae6d2c0769cf984f89f7b0adb16980dca28ea13e9a238961bd029be472c2e24b1bd9b8b54a3065c0b079b9d7e73876ebe9963e9ce0a3e22736d00e4a32d09d4a6ccc13dd80c028b9d164cbe0ff006bc3efb50244714d12a199ab5ff7eb6d98d590dc50143a1e1309be6797952e5c4dd0197835e49f5963041d75a1227e820ae624e9301643b0a831284a3f6e66b434bb2a043f787a4153fea031fb81ae8281192556f2eb309b7269516c81294fcd028e53022458ffabb0817f7406525968643a9e9d5da71f8ecbf5da922c8e1df253177619fbb0ace01a35c1ca22289fd5947200c071440fa52794289ac0903ff243792c30a293253025486fd52df944a0d7186dd2e34f8b8e090b744d32bb42a2a061f92eeea78e6a807b805d5d1c80982d42fd5780e7542f2d3e6dceceafbe06ec86ca028d615c98156ced3421f6cfed6a93664bcd56060cfb611e37b274ab80f5091ce5e177725173ea42d6a844cd068fe5590e815126f470ac5c90a8fac24ff3f7cf121fb25b3a5b0e7a032861cc712f3af41ff9defa8b29470f9d76b5336454f907d7528727341e2349cd6a45fbfe3c97057ce688274fb18a7e0152e38f45b52f941a79ce557a1079399e096b41f5c15ac16e92a415e15bb1bbcc43cea65e26dd70b564efa50ceef0d5c0cb5006689c8dfed94ff263806477809c1f8780fc8d30fcf8ce9e0e8672ca830168750f4ef5f85381cef3344933a044f38cdf76887d38b3356a237a07479d687ab0442a94b2eb903f60921eb01f7d4d0a2c1c8c67e6cf8b18f514a54c82abcfd2f0470e801f9aed938b86b1f7dead72935ed7b94c0d4de582f7bbce8ad12fce915c894c67fba47749ed4b460ba0fde1f2845aad4ee23274fa4d1b75af562eaef7741abda59b0fd087c869e2c1fa0b8734da0f9a425d19d033bbd981dcb25f181de7a885d0afc0c51bb5d2474feeef8815ae6a4666c12b4c08c158d539f14a35ddf93d51281a450ce52eb3ed6983cfe0d13438c78ec5dad2f65231fd79e579275cefc150b1444bc6a0cba89f4d3e173a152e31053a24c7923e51ca34b67f04a97b1dce0a0215b387eee4ff3a81f0c437042bb74311dd48fb78dace9ee4cbb2144a46e5", 0x1000}, {&(0x7f0000000180)="1cd611dd8ab145fc212f9408ce377dab28058cf00c7338e5e0487032cbf221d9e790fc5c05b9cce1aa459063303a52f94cca9027b1b6d6404d82a08da37890657a1fc8d28249d895467c014d9f2cedc9f4d365f07cb6c687215b3e0e04f3db90df89f4e2a14aa2eec3fc7ca63320a92b65115ee82401f82de840a92aaafd04d6c4649e89c2e67c3ed197ca9293297bdacca6a7932824bb3931c630597c71d54c1b3acd59e74d46e64edbddd8bb8d451fea582b988aed4877fed2093301a9f7c9bafa", 0xc2}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="f4169d122226a4ab4b221828f3ddbe7187e5a55a293041d22a4479c6791ae540fd05fb5fad13c031aacd00bd3a794afb296341706cad046c9eb68d1cf0affa96867f5718ec446eb832d13b018396a036d1e1fbe50e37d40baa01547e538dd7af667c68f8b3c78051d5e05e9b6b8c2c9764abae05727f2f4a4dcd99845bfae97685410f80042bf6c819b08aeb4c899075fdc02d467733ded8593433f80e2cd544d52b885b9b6cdaab1bf87f0887eecc4dbe96edc3b5b3404419f99ce49a1ce0a6a0", 0xc1}, {&(0x7f00000003c0)="e3f60a52bb465b59584cb7ac0c63f354defb241f511593f3d933c4b91b244a8b06ca5308c01687e8ce97a375954650f795602954f07120957b4be854fe32ad18ce4306109aedb5a5562a7086d912fe4597f3d5657167d8eb6f42cbadf99c930fa090f26c1e3205d19cb20b3075daff39b0d52e053d90fcb3aaa3fd1adbfa977937", 0x81}], 0x5}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfe80, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:39 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xf401, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1052.782956] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:21:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000016002d0200000000932696a89e3ce47a929d845830a8db532e68cf760795371500000000000000f7"], 0x14}, 0x1, 0x8100}, 0x0) r3 = dup3(r2, r2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000000180)="1cd611dd8ab145fc212f9408ce377dab28058cf00c7338e5e0487032cbf221d9e790fc5c05b9cce1aa459063303a52f94cca9027b1b6d6404d82a08da37890657a1fc8d28249d895467c014d9f2cedc9f4d365f07cb6c687215b3e0e04f3db90df89f4e2a14aa2eec3fc7ca63320a92b65115ee82401f82de840a92aaafd04d6c4649e89c2e67c3ed197ca9293297bdacca6a7932824bb3931c630597c71d54c1b3acd59e74d46e64edbddd8bb8d451fea582b988aed4877fed2093301a9f7c9bafa", 0xc2}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="f4169d122226a4ab4b221828f3ddbe7187e5a55a293041d22a4479c6791ae540fd05fb5fad13c031aacd00bd3a794afb296341706cad046c9eb68d1cf0affa96867f5718ec446eb832d13b018396a036d1e1fbe50e37d40baa01547e538dd7af667c68f8b3c78051d5e05e9b6b8c2c9764abae05727f2f4a4dcd99845bfae97685410f80042bf6c819b08aeb4c899075fdc02d467733ded8593433f80e2cd544d52b885b9b6cdaab1bf87f0887eecc4dbe96edc3b5b3404419f99ce49a1ce0a6a0", 0xc1}, {&(0x7f00000003c0)="e3f60a52bb465b59584cb7ac0c63f354defb241f511593f3d933c4b91b244a8b06ca5308c01687e8ce97a375954650f795602954f07120957b4be854fe32ad18ce4306109aedb5a5562a7086d912fe4597f3d5657167d8eb6f42cbadf99c930fa090f26c1e3205d19cb20b3075daff39b0d52e053d90fcb3aaa3fd1adbfa977937", 0x81}], 0x5}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfec0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:55 executing program 7 (fault-call:1 fault-nth:57): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:21:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, '\x00', 0x9, 0x0}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:55 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x600, 0x0) 01:21:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x10000200, 0x0, 0x0, 0x0, 0x0) 01:21:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfc00, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:55 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x1402) [ 1059.351331] FAULT_INJECTION: forcing a failure. [ 1059.351331] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.352694] CPU: 1 PID: 7727 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1059.353464] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1059.354751] Call Trace: [ 1059.355053] dump_stack+0x107/0x163 [ 1059.355487] should_fail.cold+0x5/0xa [ 1059.355936] ? anon_vma_clone+0xdc/0x580 [ 1059.356397] should_failslab+0x5/0x10 [ 1059.356820] kmem_cache_alloc+0x5b/0x350 [ 1059.357288] anon_vma_clone+0xdc/0x580 [ 1059.357737] anon_vma_fork+0x82/0x630 [ 1059.358171] ? __vm_enough_memory+0x184/0x360 [ 1059.358682] dup_mm+0x861/0x1110 [ 1059.359086] ? vm_area_dup+0x290/0x290 [ 1059.359541] ? __raw_spin_lock_init+0x34/0x100 [ 1059.360067] copy_process+0x2409/0x6650 [ 1059.360545] ? __cleanup_sighand+0xb0/0xb0 [ 1059.361026] ? __bpf_prog_run32+0x8f/0xd0 [ 1059.361500] ? perf_trace_lock+0xac/0x490 [ 1059.361988] kernel_clone+0xe7/0xa20 [ 1059.362412] ? copy_init_mm+0x20/0x20 [ 1059.362850] ? lock_downgrade+0x6d0/0x6d0 [ 1059.363318] ? find_held_lock+0x2c/0x110 [ 1059.363789] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1059.364380] ? __seccomp_filter+0x236/0x1470 [ 1059.364895] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1059.365429] __do_sys_clone+0xc8/0x110 [ 1059.365877] ? __do_sys_vfork+0xd0/0xd0 [ 1059.366349] ? __secure_computing+0xb4/0x290 [ 1059.366857] do_syscall_64+0x33/0x40 [ 1059.367284] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1059.367889] RIP: 0033:0x466609 [ 1059.368255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1059.370346] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1059.371220] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1059.372050] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1059.372875] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1059.373692] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1059.374496] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:21:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff00, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:55 executing program 7 (fault-call:1 fault-nth:58): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:21:55 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x700, 0x0) [ 1059.461134] FAULT_INJECTION: forcing a failure. [ 1059.461134] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.462469] CPU: 1 PID: 7748 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1059.463253] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1059.464543] Call Trace: [ 1059.464854] dump_stack+0x107/0x163 [ 1059.465276] should_fail.cold+0x5/0xa [ 1059.465724] ? create_object.isra.0+0x3a/0xa20 [ 1059.466246] should_failslab+0x5/0x10 [ 1059.466680] kmem_cache_alloc+0x5b/0x350 [ 1059.467145] ? mark_held_locks+0x9e/0xe0 [ 1059.467606] create_object.isra.0+0x3a/0xa20 [ 1059.468116] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1059.468708] kmem_cache_alloc+0x159/0x350 [ 1059.469192] anon_vma_clone+0xdc/0x580 [ 1059.469645] anon_vma_fork+0x82/0x630 [ 1059.470099] ? __vm_enough_memory+0x184/0x360 [ 1059.470597] dup_mm+0x861/0x1110 [ 1059.470999] ? vm_area_dup+0x290/0x290 [ 1059.471471] ? __raw_spin_lock_init+0x34/0x100 [ 1059.472003] copy_process+0x2409/0x6650 [ 1059.472477] ? __cleanup_sighand+0xb0/0xb0 [ 1059.472966] ? __bpf_prog_run32+0x8f/0xd0 [ 1059.473454] ? perf_trace_lock+0xac/0x490 [ 1059.473938] kernel_clone+0xe7/0xa20 [ 1059.474374] ? copy_init_mm+0x20/0x20 [ 1059.474822] ? lock_downgrade+0x6d0/0x6d0 [ 1059.475280] ? find_held_lock+0x2c/0x110 [ 1059.475771] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1059.476366] ? __seccomp_filter+0x236/0x1470 [ 1059.476889] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1059.477404] __do_sys_clone+0xc8/0x110 [ 1059.477854] ? __do_sys_vfork+0xd0/0xd0 [ 1059.478311] ? __secure_computing+0xb4/0x290 [ 1059.478842] do_syscall_64+0x33/0x40 [ 1059.479256] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1059.479860] RIP: 0033:0x466609 [ 1059.480234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1059.482286] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1059.483180] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1059.484011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1059.484836] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1059.485652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1059.486497] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:21:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000016002d0200000000932696a89e3ce47a929d845830a8db532e68cf760795371500000000000000f7"], 0x14}, 0x1, 0x8100}, 0x0) r3 = dup3(r2, r2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000000180)="1cd611dd8ab145fc212f9408ce377dab28058cf00c7338e5e0487032cbf221d9e790fc5c05b9cce1aa459063303a52f94cca9027b1b6d6404d82a08da37890657a1fc8d28249d895467c014d9f2cedc9f4d365f07cb6c687215b3e0e04f3db90df89f4e2a14aa2eec3fc7ca63320a92b65115ee82401f82de840a92aaafd04d6c4649e89c2e67c3ed197ca9293297bdacca6a7932824bb3931c630597c71d54c1b3acd59e74d46e64edbddd8bb8d451fea582b988aed4877fed2093301a9f7c9bafa", 0xc2}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="f4169d122226a4ab4b221828f3ddbe7187e5a55a293041d22a4479c6791ae540fd05fb5fad13c031aacd00bd3a794afb296341706cad046c9eb68d1cf0affa96867f5718ec446eb832d13b018396a036d1e1fbe50e37d40baa01547e538dd7af667c68f8b3c78051d5e05e9b6b8c2c9764abae05727f2f4a4dcd99845bfae97685410f80042bf6c819b08aeb4c899075fdc02d467733ded8593433f80e2cd544d52b885b9b6cdaab1bf87f0887eecc4dbe96edc3b5b3404419f99ce49a1ce0a6a0", 0xc1}, {&(0x7f00000003c0)="e3f60a52bb465b59584cb7ac0c63f354defb241f511593f3d933c4b91b244a8b06ca5308c01687e8ce97a375954650f795602954f07120957b4be854fe32ad18ce4306109aedb5a5562a7086d912fe4597f3d5657167d8eb6f42cbadf99c930fa090f26c1e3205d19cb20b3075daff39b0d52e053d90fcb3aaa3fd1adbfa977937", 0x81}], 0x5}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfe80, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x11000000, 0x0, 0x0, 0x0, 0x0) 01:21:56 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfec0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000080)=0x40, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$mouse(&(0x7f00000001c0), 0x7, 0x10000) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="73797a31fe62fd1d34510e20edb4c187d53fb324d1257804afbaa9337e6435f8c2ac57483b1a40b162c44852e4707cbc448b5f7010b7c7152c2f1573f69053879b8668cc451d280d0f4119595bffde55b55765388dfa77a127578c7390b0c6ef61c4dcd18871b25a0643d3cb828ce22ccbe4eb7c6cb1944d67f4b0e608d3c0ff9c0627002aff0fc184e58f1464eed7ddf4f2cefa267febd81b713eb195825331e450a00c41b70799cf000000000000000000"], 0xc2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0x2a}}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=ANY=[@ANYBLOB="f00000001a0001000000000000000000ac1414bb000000000000000000000000000000000040000000000000000004000000000000000000684e00a000000000", @ANYRES32, @ANYRES16, @ANYBLOB="ff01000000000000000000000000000100000000000000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00"/168], 0xf0}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in6=@mcast2, {}, {0x0, 0x0, 0x71dd}, {}, 0x0, 0x0, 0xa, 0xb6cd2ec623cad4e0, 0x0, 0x4}}, 0xf0}, 0x1, 0x0, 0x0, 0x800}, 0x0) pread64(r4, &(0x7f0000000480)=""/149, 0x95, 0x4) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000340)={'security\x00', 0x22, "bdc9989f2042bc955129d89d4994998d080f6ca57f51022edeab09bf4b58443ad905"}, &(0x7f00000003c0)=0x46) read(r3, &(0x7f0000000100)=""/178, 0xb2) accept$inet6(r0, &(0x7f0000000400), &(0x7f0000000440)=0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff0f, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:56 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x1800) 01:21:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff00, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:21:56 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff00, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:21:56 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xf0) 01:21:56 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xf00, 0x0) [ 1072.198357] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:22:15 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x700, 0x0) 01:22:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x1e549000, 0x0, 0x0, 0x0, 0x0) 01:22:15 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x3f00) 01:22:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x34000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:22:15 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x1100, 0x0) 01:22:15 executing program 7 (fault-call:1 fault-nth:59): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:15 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff0f, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) sendmsg$inet6(r1, &(0x7f00000003c0)={&(0x7f0000000080)={0xa, 0x4e24, 0x3, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x1}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000100)="e6c952198666ec11f42a2cc79d832f4d23fd6fd2edcd70f4305629148cde4079972bd1e7b4293833bda0cc8a221210c42edbef6a73899b2e6fc1ba0d5cd4de996fa74c648892debc52a7adfce7c57bdbc16ff5a8f15de1d5e667e984571829f98fe8a3cd73c65d33bbaf191710062d1fc4269b368261e5b857f5ecf13be10a841463bb1e81be2059afb38bfb56e8882aa83f90b3e8aee925021ca92287963d6aa0c4e23811e0b4cf961c45561a9f17fafc665db4ed5a65431da955959b4d9c6e301bc014c4f0b100120cec3a934a68863a2426bba634db709f63af6872552d41fa5bdf8c82c8c825a98b13a2f014", 0xee}, {&(0x7f0000000200)="c0d6428f1db302a2e1d91d662ea9608714b0651c254b5b329e32e1d27b917cccbd8b157606e076d830edf4a9a1aaf80d5c6eb5e981e8a419aa11dc3ed96fb2b33a37034d8a9b8bf61d638399f3b79d94d058fbb1b48b403f70c8527b77b6dcb39edb5b88eae282cbffee2bf0a05ed7d8db78303f8d3798515c30ca330d75e18e86404f93eb733fa9515c691184c1f26fdca04063c1fd1ec2051a9d906a19694af52e88e50c0a5d48e37020", 0xab}, {&(0x7f00000002c0)="eada627663d4482b00e73d10528cfa47cf9784f71cda996afb40ddb0131a755fca6974c3ee9f6999dd271a88dc42f7b89bd7fcc45ed3faf81e69957e40e63e08b9f2364682b3c724e1b375d920eff69bb8cb7c72aa7e01758dc05c5349b69253fb10255d0adff3874d1d678127ea3daa798f719e2894aed2ab8eb1ca703678142cdec2680404c8d602a977f8ed564bceb1a628e9edfd7174", 0x98}], 0x3, &(0x7f0000001700)=[@rthdrdstopts={{0xb8, 0x29, 0x37, {0xd7, 0x13, '\x00', [@hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @enc_lim={0x4, 0x1, 0x5a}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0xfb}, @generic={0x2, 0x73, "870c0d606ef479cb1e31df76db7f7c2149efcd5e4713cafff06de07d1376716f038911975ab71ac4c85c05f6e058e63c75595ad00b67c0b61e1168d0c2686bb5f3d6b73b516ae338cc25aa5af4c119479524f104ab46508421f0d2130cc3be4c7ccdfe931b451df353a8d1f490d4286e69b1f8"}]}}}, @hopopts_2292={{0x60, 0x29, 0x36, {0x5c, 0x8, '\x00', [@calipso={0x7, 0x40, {0x3, 0xe, 0x8, 0x803, [0x20, 0xbfd7, 0x2, 0x2, 0x6, 0x49, 0x0]}}]}}}, @dstopts_2292={{0x18, 0x29, 0x4, {0x3c}}}, @rthdr={{0x98, 0x29, 0x39, {0x0, 0x10, 0x1, 0x6, 0x0, [@empty, @private2, @mcast2, @ipv4={'\x00', '\xff\xff', @private=0xa010102}, @empty, @local, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1]}}}, @hopopts={{0x38, 0x29, 0x36, {0xc, 0x3, '\x00', [@calipso={0x7, 0x10, {0x0, 0x2, 0x4, 0x81, [0x7]}}, @ra={0x5, 0x2, 0x1}, @jumbo={0xc2, 0x4, 0x1f}]}}}, @dstopts_2292={{0x18}}, @tclass={{0x14, 0x29, 0x43, 0x8}}, @hoplimit={{0x14, 0x29, 0x34, 0x1}}], 0x248}, 0x400c005) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r1, &(0x7f0000000400)=""/69, 0x45, 0x40002020, &(0x7f0000000480)={0xa, 0x4e23, 0x0, @mcast2, 0x7ff}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1078.679682] FAULT_INJECTION: forcing a failure. [ 1078.679682] name failslab, interval 1, probability 0, space 0, times 0 [ 1078.681047] CPU: 1 PID: 7809 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1078.681772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1078.682991] Call Trace: [ 1078.683280] dump_stack+0x107/0x163 [ 1078.683675] should_fail.cold+0x5/0xa [ 1078.684091] ? anon_vma_fork+0xed/0x630 [ 1078.684521] should_failslab+0x5/0x10 [ 1078.684930] kmem_cache_alloc+0x5b/0x350 [ 1078.685372] anon_vma_fork+0xed/0x630 [ 1078.685780] ? __vm_enough_memory+0x184/0x360 [ 1078.686275] dup_mm+0x861/0x1110 [ 1078.686649] ? vm_area_dup+0x290/0x290 [ 1078.687071] ? __raw_spin_lock_init+0x34/0x100 [ 1078.687570] copy_process+0x2409/0x6650 [ 1078.688029] ? __cleanup_sighand+0xb0/0xb0 [ 1078.688481] ? __bpf_prog_run32+0x8f/0xd0 [ 1078.688933] ? perf_trace_lock+0xac/0x490 [ 1078.689406] kernel_clone+0xe7/0xa20 [ 1078.689810] ? copy_init_mm+0x20/0x20 [ 1078.690238] ? lock_downgrade+0x6d0/0x6d0 [ 1078.690676] ? find_held_lock+0x2c/0x110 [ 1078.691139] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1078.691720] ? __seccomp_filter+0x236/0x1470 [ 1078.692209] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1078.692733] __do_sys_clone+0xc8/0x110 [ 1078.693172] ? __do_sys_vfork+0xd0/0xd0 [ 1078.693624] ? __secure_computing+0xb4/0x290 [ 1078.694125] do_syscall_64+0x33/0x40 [ 1078.694539] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1078.695106] RIP: 0033:0x466609 [ 1078.695469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1078.697519] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1078.698383] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1078.699166] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1078.699974] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1078.700764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1078.701567] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 1089.594915] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:22:32 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000080)={0x2f, 0x2, '\x00', [@calipso={0x7, 0x10, {0x0, 0x2, 0x4, 0xf582, [0x1]}}]}, 0x20) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:32 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x1402, 0x0) 01:22:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x34000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x11, &(0x7f0000000080)=0x40, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$mouse(&(0x7f00000001c0), 0x7, 0x10000) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="73797a31fe62fd1d34510e20edb4c187d53fb324d1257804afbaa9337e6435f8c2ac57483b1a40b162c44852e4707cbc448b5f7010b7c7152c2f1573f69053879b8668cc451d280d0f4119595bffde55b55765388dfa77a127578c7390b0c6ef61c4dcd18871b25a0643d3cb828ce22ccbe4eb7c6cb1944d67f4b0e608d3c0ff9c0627002aff0fc184e58f1464eed7ddf4f2cefa267febd81b713eb195825331e450a00c41b70799cf000000000000000000"], 0xc2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0x2a}}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=ANY=[@ANYBLOB="f00000001a0001000000000000000000ac1414bb000000000000000000000000000000000040000000000000000004000000000000000000684e00a000000000", @ANYRES32, @ANYRES16, @ANYBLOB="ff01000000000000000000000000000100000000000000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00"/168], 0xf0}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in6=@mcast2, {}, {0x0, 0x0, 0x71dd}, {}, 0x0, 0x0, 0xa, 0xb6cd2ec623cad4e0, 0x0, 0x4}}, 0xf0}, 0x1, 0x0, 0x0, 0x800}, 0x0) pread64(r4, &(0x7f0000000480)=""/149, 0x95, 0x4) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000340)={'security\x00', 0x22, "bdc9989f2042bc955129d89d4994998d080f6ca57f51022edeab09bf4b58443ad905"}, &(0x7f00000003c0)=0x46) read(r3, &(0x7f0000000100)=""/178, 0xb2) accept$inet6(r0, &(0x7f0000000400), &(0x7f0000000440)=0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x50000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:22:32 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x8004) 01:22:32 executing program 7 (fault-call:1 fault-nth:60): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:32 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x3f000000, 0x0, 0x0, 0x0, 0x0) [ 1096.312826] audit: type=1400 audit(1629163352.739:15): avc: denied { sys_admin } for pid=7825 comm="syz-executor.4" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 1096.343121] FAULT_INJECTION: forcing a failure. [ 1096.343121] name failslab, interval 1, probability 0, space 0, times 0 [ 1096.345768] CPU: 1 PID: 7838 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1096.347207] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1096.349698] Call Trace: [ 1096.350385] dump_stack+0x107/0x163 [ 1096.351329] should_fail.cold+0x5/0xa [ 1096.352235] ? create_object.isra.0+0x3a/0xa20 [ 1096.353424] should_failslab+0x5/0x10 [ 1096.354277] kmem_cache_alloc+0x5b/0x350 [ 1096.355352] create_object.isra.0+0x3a/0xa20 [ 1096.356307] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1096.357396] kmem_cache_alloc+0x159/0x350 [ 1096.358295] anon_vma_fork+0xed/0x630 [ 1096.359123] ? __vm_enough_memory+0x184/0x360 [ 1096.360098] dup_mm+0x861/0x1110 [ 1096.360835] ? vm_area_dup+0x290/0x290 [ 1096.361679] ? __raw_spin_lock_init+0x34/0x100 [ 1096.362662] copy_process+0x2409/0x6650 [ 1096.363554] ? __cleanup_sighand+0xb0/0xb0 [ 1096.364490] ? __bpf_prog_run32+0x8f/0xd0 [ 1096.365384] ? find_held_lock+0x2c/0x110 [ 1096.366263] kernel_clone+0xe7/0xa20 [ 1096.367066] ? copy_init_mm+0x20/0x20 [ 1096.367890] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1096.369002] ? __seccomp_filter+0x236/0x1470 [ 1096.369943] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1096.370950] ? __switch_to_asm+0x42/0x70 [ 1096.371823] ? __switch_to_asm+0x36/0x70 [ 1096.372705] __do_sys_clone+0xc8/0x110 [ 1096.373523] ? __do_sys_vfork+0xd0/0xd0 [ 1096.374385] ? __secure_computing+0xb4/0x290 [ 1096.375323] do_syscall_64+0x33/0x40 [ 1096.376115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1096.377190] RIP: 0033:0x466609 [ 1096.377874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1096.381742] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1096.383354] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1096.384958] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1096.386530] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1096.388113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1096.389679] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:22:32 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x1b0f61f000, 0x0, 0x0, 0x0, 0x0) 01:22:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x400300, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:22:32 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x50000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:32 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xf000) 01:22:32 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x10000000000, 0x0, 0x0, 0x0, 0x0) 01:22:32 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x8000, 0x0) 01:22:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x1000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:22:33 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x400300, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1108.744697] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:22:51 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x1402, 0x0) 01:22:51 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x1000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:51 executing program 7 (fault-call:1 fault-nth:61): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:51 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x3f00, 0x0) 01:22:51 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x400000000000, 0x0, 0x0, 0x0, 0x0) 01:22:51 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xf0ffff) 01:22:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x2000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:22:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x7, 0x5d}}}}, [@NL80211_ATTR_STA_VLAN={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40) sendmsg$inet6(r1, &(0x7f0000000580)={&(0x7f0000000080)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, '\x00', 0x23}, 0x919}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000100)="36123da10606c576888ed256cabca4d9cf9b60596f062b7466b521950d5fb580966a1d31902bc2c3febf1c919890095314d29469fa1f640f55a12e26f6189a98046a3cbd9e638a63d3d17f0ff16f38e96e638911a8ac49db8c20ee88f789a31ff2502322374ef262bebde5a0d0339f296fc933d193382aa2d9b92c0e37676c0e1814b66b58e3020ad64c815e2b8369bef339c6928c9ae94e61852d634ca8ce518883f31dea50fad80f9171fb5ec0", 0xae}, {&(0x7f00000001c0)="c05449f90f1d180457e943c6699844d3bfe97bac1a9becc4e5c20adedee2d3e0b9e07488f45f4468c893b2cb480c4533bc51a3d46db079c3fc4a2d4a6273224068677f28040f295ec6d3e3897d820479a24bd2c2b4161853b5d0b0e66facaaa5d828f3e316b0ca4644ee6e098ca5a85b337e8350e54c1700590c312101", 0x7d}, {&(0x7f0000000240)="8e917edff6b44ef4613dcc7844444928259da4ac51472e7687ae61ef2e229f23390b2a2ad6108f53df0c2f7c55b8315d6c096d9c5e6e4c0326f2e81eb3a2a331458f5a4363a9281823b7e8223f0160afc404f86bb2", 0x55}, {&(0x7f00000002c0)="cf05396fab0f7bed46db7095531d1e75d1e130eea121efe068ca9cf25547522a255ca48442d517e75ab82e95ffccc6d47696ae0f2205f3e7e1ba2288f0b5d6134b6304ef7aa4c3410a3f5656cc69fa4290293e1f8814d8c105799fdef01db7f154da9c5a6b168df73231722c2e87f86c4823", 0x72}, {&(0x7f0000000340)="330243b4ec998cdeb028d50d496ba950ab808dfdfbaf9d4669ae", 0x1a}], 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="0000f712"], 0x120}, 0x24040010) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1115.366169] FAULT_INJECTION: forcing a failure. [ 1115.366169] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.367483] CPU: 1 PID: 7902 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1115.368218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1115.369484] Call Trace: [ 1115.369788] dump_stack+0x107/0x163 [ 1115.370193] should_fail.cold+0x5/0xa [ 1115.370626] ? anon_vma_fork+0x1dd/0x630 [ 1115.371082] should_failslab+0x5/0x10 [ 1115.371515] kmem_cache_alloc+0x5b/0x350 [ 1115.371974] anon_vma_fork+0x1dd/0x630 [ 1115.372434] dup_mm+0x861/0x1110 [ 1115.372825] ? vm_area_dup+0x290/0x290 [ 1115.373270] ? __raw_spin_lock_init+0x34/0x100 [ 1115.373794] copy_process+0x2409/0x6650 [ 1115.374272] ? __cleanup_sighand+0xb0/0xb0 [ 1115.374755] ? __bpf_prog_run32+0x8f/0xd0 [ 1115.375231] ? perf_trace_lock+0xac/0x490 [ 1115.375712] kernel_clone+0xe7/0xa20 [ 1115.376138] ? copy_init_mm+0x20/0x20 [ 1115.376572] ? lock_downgrade+0x6d0/0x6d0 [ 1115.377032] ? find_held_lock+0x2c/0x110 [ 1115.377486] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1115.378060] ? __seccomp_filter+0x236/0x1470 [ 1115.378556] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1115.379080] __do_sys_clone+0xc8/0x110 [ 1115.379515] ? __do_sys_vfork+0xd0/0xd0 [ 1115.379976] ? __secure_computing+0xb4/0x290 [ 1115.380486] do_syscall_64+0x33/0x40 [ 1115.380904] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1115.381476] RIP: 0033:0x466609 [ 1115.381841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1115.383847] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1115.384707] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1115.385507] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1115.386275] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1115.387061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1115.387844] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:22:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x3000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:22:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) r1 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000100)={0x58db38a3, 0x20, '\x00', 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0]}) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:51 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x7f41dfd20000, 0x0, 0x0, 0x0, 0x0) 01:22:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000600)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x7, 0x5d}}}}, [@NL80211_ATTR_STA_VLAN={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x40) sendmsg$inet6(r1, &(0x7f0000000580)={&(0x7f0000000080)={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, '\x00', 0x23}, 0x919}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000100)="36123da10606c576888ed256cabca4d9cf9b60596f062b7466b521950d5fb580966a1d31902bc2c3febf1c919890095314d29469fa1f640f55a12e26f6189a98046a3cbd9e638a63d3d17f0ff16f38e96e638911a8ac49db8c20ee88f789a31ff2502322374ef262bebde5a0d0339f296fc933d193382aa2d9b92c0e37676c0e1814b66b58e3020ad64c815e2b8369bef339c6928c9ae94e61852d634ca8ce518883f31dea50fad80f9171fb5ec0", 0xae}, {&(0x7f00000001c0)="c05449f90f1d180457e943c6699844d3bfe97bac1a9becc4e5c20adedee2d3e0b9e07488f45f4468c893b2cb480c4533bc51a3d46db079c3fc4a2d4a6273224068677f28040f295ec6d3e3897d820479a24bd2c2b4161853b5d0b0e66facaaa5d828f3e316b0ca4644ee6e098ca5a85b337e8350e54c1700590c312101", 0x7d}, {&(0x7f0000000240)="8e917edff6b44ef4613dcc7844444928259da4ac51472e7687ae61ef2e229f23390b2a2ad6108f53df0c2f7c55b8315d6c096d9c5e6e4c0326f2e81eb3a2a331458f5a4363a9281823b7e8223f0160afc404f86bb2", 0x55}, {&(0x7f00000002c0)="cf05396fab0f7bed46db7095531d1e75d1e130eea121efe068ca9cf25547522a255ca48442d517e75ab82e95ffccc6d47696ae0f2205f3e7e1ba2288f0b5d6134b6304ef7aa4c3410a3f5656cc69fa4290293e1f8814d8c105799fdef01db7f154da9c5a6b168df73231722c2e87f86c4823", 0x72}, {&(0x7f0000000340)="330243b4ec998cdeb028d50d496ba950ab808dfdfbaf9d4669ae", 0x1a}], 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="0000f712"], 0x120}, 0x24040010) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:51 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x1000000) 01:22:52 executing program 7 (fault-call:1 fault-nth:62): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:22:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x2000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:52 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x4000, 0x0) [ 1115.612846] FAULT_INJECTION: forcing a failure. [ 1115.612846] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.614172] CPU: 1 PID: 7927 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1115.614906] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1115.616134] Call Trace: [ 1115.616433] dump_stack+0x107/0x163 [ 1115.616843] should_fail.cold+0x5/0xa [ 1115.617268] ? anon_vma_fork+0x1dd/0x630 [ 1115.617708] should_failslab+0x5/0x10 [ 1115.618119] kmem_cache_alloc+0x5b/0x350 [ 1115.618557] anon_vma_fork+0x1dd/0x630 [ 1115.618992] dup_mm+0x861/0x1110 [ 1115.619363] ? vm_area_dup+0x290/0x290 [ 1115.619791] ? __raw_spin_lock_init+0x34/0x100 [ 1115.620287] copy_process+0x2409/0x6650 [ 1115.620768] ? __cleanup_sighand+0xb0/0xb0 [ 1115.621217] ? __bpf_prog_run32+0x8f/0xd0 [ 1115.621668] ? perf_trace_lock+0xac/0x490 [ 1115.622121] kernel_clone+0xe7/0xa20 [ 1115.622529] ? copy_init_mm+0x20/0x20 [ 1115.622933] ? lock_downgrade+0x6d0/0x6d0 [ 1115.623379] ? find_held_lock+0x2c/0x110 [ 1115.623820] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1115.624375] ? __seccomp_filter+0x236/0x1470 [ 1115.624871] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1115.625375] __do_sys_clone+0xc8/0x110 [ 1115.625792] ? __do_sys_vfork+0xd0/0xd0 [ 1115.626225] ? __secure_computing+0xb4/0x290 [ 1115.626714] do_syscall_64+0x33/0x40 [ 1115.627150] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1115.627710] RIP: 0033:0x466609 [ 1115.628070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1115.630080] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1115.630903] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1115.631662] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1115.632448] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1115.633212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1115.633986] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:22:52 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x2000000) 01:22:52 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x3000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:22:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40080, 0xa6) getpeername$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000140)=0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x3000000) 01:23:05 executing program 7 (fault-call:1 fault-nth:63): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:23:05 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x8000, 0x0) 01:23:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x1000000) 01:23:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x4000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={'vlan0\x00', {0x2, 0x0, @local}}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000001700)='./file0\x00', 0x84800, 0x2) recvfrom$inet6(r0, &(0x7f0000000080)=""/49, 0x31, 0x1, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x4}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) r1 = dup(r0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000440)=0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x20, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB=',dfltgid=', @ANYRESHEX=r3, @ANYBLOB=',access=any,access=', @ANYRESDEC, @ANYBLOB=',cache=loose,euid>', @ANYRESDEC=r4, @ANYBLOB=',measure,uid=', @ANYRESDEC=r5, @ANYBLOB=',euid>', @ANYRESDEC=r6, @ANYBLOB="2c70b38dca6972656374696f2c657569643d00000000", @ANYRESDEC=r7, @ANYBLOB=',\x00']) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x4000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0xd2df417f0000, 0x0, 0x0, 0x0, 0x0) [ 1128.949635] FAULT_INJECTION: forcing a failure. [ 1128.949635] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.951575] CPU: 0 PID: 7969 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1128.952689] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1128.954534] Call Trace: [ 1128.954958] dump_stack+0x107/0x163 [ 1128.955535] should_fail.cold+0x5/0xa [ 1128.956139] ? vm_area_dup+0x78/0x290 [ 1128.956770] should_failslab+0x5/0x10 [ 1128.957377] kmem_cache_alloc+0x5b/0x350 [ 1128.958024] vm_area_dup+0x78/0x290 [ 1128.958629] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 1128.959380] ? lock_downgrade+0x6d0/0x6d0 [ 1128.960025] ? copy_page_range+0x242d/0x3810 [ 1128.960747] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1128.961480] ? avc_has_extended_perms+0xec0/0xec0 [ 1128.962260] ? vm_area_alloc+0x110/0x110 [ 1128.962965] ? selinux_vm_enough_memory+0x10f/0x170 [ 1128.963763] ? selinux_sb_statfs+0x250/0x250 [ 1128.964494] ? percpu_counter_add_batch+0x8b/0x130 [ 1128.965309] ? __vm_enough_memory+0x184/0x360 [ 1128.966044] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1128.966863] dup_mm+0x44d/0x1110 [ 1128.967409] ? vm_area_dup+0x290/0x290 [ 1128.968025] ? __raw_spin_lock_init+0x34/0x100 [ 1128.968763] copy_process+0x2409/0x6650 [ 1128.969423] ? __cleanup_sighand+0xb0/0xb0 [ 1128.970115] ? __bpf_prog_run32+0x8f/0xd0 [ 1128.970793] ? perf_trace_lock+0xac/0x490 [ 1128.971485] kernel_clone+0xe7/0xa20 [ 1128.972093] ? copy_init_mm+0x20/0x20 [ 1128.972722] ? lock_downgrade+0x6d0/0x6d0 [ 1128.973398] ? find_held_lock+0x2c/0x110 [ 1128.974061] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1128.974872] ? __seccomp_filter+0x236/0x1470 [ 1128.975584] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1128.976356] __do_sys_clone+0xc8/0x110 [ 1128.977022] ? __do_sys_vfork+0xd0/0xd0 [ 1128.977693] ? __secure_computing+0xb4/0x290 [ 1128.978417] do_syscall_64+0x33/0x40 [ 1128.979027] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1128.979889] RIP: 0033:0x466609 [ 1128.980428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1128.983475] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1128.984728] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1128.985874] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1128.987041] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1128.988190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1128.989328] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:23:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x2001000000000, 0x0, 0x0, 0x0, 0x0) 01:23:05 executing program 7 (fault-call:1 fault-nth:64): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:23:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) r2 = dup(r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000200)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) recvfrom$inet6(r1, &(0x7f0000000100)=""/200, 0xc8, 0x20, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @private2, 0x9cb}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) fcntl$dupfd(r3, 0x406, r2) r4 = socket$inet6(0xa, 0x3, 0x7) sendmsg$inet6(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x1000000) 01:23:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x5000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 1129.136988] FAULT_INJECTION: forcing a failure. [ 1129.136988] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.139048] CPU: 1 PID: 7991 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1129.140075] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1129.141827] Call Trace: [ 1129.142240] dump_stack+0x107/0x163 [ 1129.142803] should_fail.cold+0x5/0xa [ 1129.143393] ? create_object.isra.0+0x3a/0xa20 [ 1129.144104] should_failslab+0x5/0x10 [ 1129.144705] kmem_cache_alloc+0x5b/0x350 [ 1129.145340] create_object.isra.0+0x3a/0xa20 [ 1129.146019] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1129.146805] kmem_cache_alloc+0x159/0x350 [ 1129.147449] vm_area_dup+0x78/0x290 [ 1129.148021] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 1129.148758] ? lock_downgrade+0x6d0/0x6d0 [ 1129.149394] ? copy_page_range+0x242d/0x3810 [ 1129.150095] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1129.150815] ? avc_has_extended_perms+0xec0/0xec0 [ 1129.151560] ? vm_area_alloc+0x110/0x110 [ 1129.152192] ? selinux_vm_enough_memory+0x10f/0x170 [ 1129.152968] ? selinux_sb_statfs+0x250/0x250 [ 1129.153653] ? percpu_counter_add_batch+0x8b/0x130 [ 1129.154415] ? __vm_enough_memory+0x184/0x360 [ 1129.155111] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1129.155900] dup_mm+0x44d/0x1110 [ 1129.156432] ? vm_area_dup+0x290/0x290 [ 1129.157037] ? __raw_spin_lock_init+0x34/0x100 [ 1129.157748] copy_process+0x2409/0x6650 [ 1129.158386] ? __cleanup_sighand+0xb0/0xb0 [ 1129.159026] ? __bpf_prog_run32+0x8f/0xd0 [ 1129.159671] ? perf_trace_lock+0xac/0x490 [ 1129.160301] kernel_clone+0xe7/0xa20 [ 1129.160913] ? copy_init_mm+0x20/0x20 [ 1129.161497] ? lock_downgrade+0x6d0/0x6d0 [ 1129.162125] ? find_held_lock+0x2c/0x110 [ 1129.162742] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1129.163536] ? __seccomp_filter+0x236/0x1470 [ 1129.164229] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1129.164962] __do_sys_clone+0xc8/0x110 [ 1129.165566] ? __do_sys_vfork+0xd0/0xd0 [ 1129.166198] ? __secure_computing+0xb4/0x290 [ 1129.166882] do_syscall_64+0x33/0x40 [ 1129.167458] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1129.168246] RIP: 0033:0x466609 [ 1129.168769] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:23:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x4000000) [ 1129.171603] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1129.173008] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1129.174100] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1129.175222] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1129.176306] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1129.177412] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:23:05 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x8004, 0x0) 01:23:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x6000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x2020000000000, 0x0, 0x0, 0x0, 0x0) 01:23:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x6000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 1139.787516] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:23:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x6000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:23 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x5000000) 01:23:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x8000000000000, 0x0, 0x0, 0x0, 0x0) 01:23:23 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xf000, 0x0) 01:23:23 executing program 7 (fault-call:1 fault-nth:65): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:23:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @local, 0x8}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000280), 0x200, 0x100) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24, 0x3, @local, 0x3}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r3, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r3, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) bind$inet6(r3, &(0x7f0000000300)={0xa, 0x4e20, 0x7fffffff, @dev={0xfe, 0x80, '\x00', 0xb}, 0xffffffff}, 0x1c) sendmsg$inet6(r2, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r2, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) sendmsg$inet6(r2, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x4e20, 0x2, @local, 0x7e4b1271}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000000100)="577b3d7a6c6380de7d6f58a1a766a9e763e8c52c4c351121a031eb7fc30f74336b5f61a9bf0a8fdd20b7f852d354d5c5413b50ce71ca5c04957e36ff306ee1579eb130d46fb674d42ae1828bb2d0c1b3ecdc30e29c7a24a3485e21ce0486602a7e56bea866725515302aa031538c927dcdd22102cb7fa8d607f1eb3cf59d3b1eba6d74e12edb2ff41c07fcce88a293fe8a6bbfdb897a26285215ea3bcbf0f9f4ba8820df", 0xa4}, {&(0x7f0000002700)="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", 0x1000}, {&(0x7f00000001c0)="6dc4bc92a851bee08fbd5553a3a7b607f6e879bd1ca9d6b271", 0x19}], 0x4, &(0x7f0000004e00)=ANY=[@ANYBLOB="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"], 0x1618}, 0x14) [ 1147.343159] FAULT_INJECTION: forcing a failure. [ 1147.343159] name failslab, interval 1, probability 0, space 0, times 0 [ 1147.345601] CPU: 0 PID: 8035 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1147.347071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1147.349593] Call Trace: [ 1147.350188] dump_stack+0x107/0x163 [ 1147.350995] should_fail.cold+0x5/0xa [ 1147.351852] ? anon_vma_clone+0xdc/0x580 [ 1147.352772] should_failslab+0x5/0x10 [ 1147.353594] kmem_cache_alloc+0x5b/0x350 [ 1147.354507] anon_vma_clone+0xdc/0x580 [ 1147.355378] anon_vma_fork+0x82/0x630 [ 1147.356219] ? __vm_enough_memory+0x184/0x360 [ 1147.357225] dup_mm+0x861/0x1110 [ 1147.357945] ? vm_area_dup+0x290/0x290 [ 1147.358796] ? __raw_spin_lock_init+0x34/0x100 [ 1147.359730] copy_process+0x2409/0x6650 [ 1147.360621] ? __cleanup_sighand+0xb0/0xb0 [ 1147.361566] ? __bpf_prog_run32+0x8f/0xd0 [ 1147.362472] ? perf_trace_lock+0xac/0x490 [ 1147.363411] kernel_clone+0xe7/0xa20 [ 1147.364190] ? copy_init_mm+0x20/0x20 [ 1147.364972] ? lock_downgrade+0x6d0/0x6d0 [ 1147.365831] ? find_held_lock+0x2c/0x110 [ 1147.366652] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1147.367693] ? __seccomp_filter+0x236/0x1470 [ 1147.368587] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1147.369547] __do_sys_clone+0xc8/0x110 [ 1147.370333] ? __do_sys_vfork+0xd0/0xd0 [ 1147.371160] ? __secure_computing+0xb4/0x290 [ 1147.372058] do_syscall_64+0x33/0x40 [ 1147.372812] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1147.373871] RIP: 0033:0x466609 [ 1147.374521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1147.378231] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1147.379756] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1147.381201] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1147.382634] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1147.384067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1147.385502] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:23:23 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x8000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:23 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x6000000) 01:23:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x8000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000080)={0xa, 0x4e24, 0x1, @mcast1, 0x7fffffff}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000100)="2ed3d9669abaae45fa6ce036ed8191afadc2719f5e2f0352cce574a3e26583ac1ec642bd74dbbe110a6fa8e25a26f40864e3c91fe4ebff614debdafaebbe2499ffd2edd2607c9e93b25b6b40cd03ba6cf09f9df53b00703b8260e5534777d8460f4f310917f229fd0aa8f39548dc8be27b2173ee9bc04dc21416f180b5939684c0c291cb07553d415f6d31092e532eaf85d3349b34e7e33955e9ed6afb8567692d8808a10087d88b60a1076711933dbb23f23c8f41f7e900abb8cb3d8a3e3d1dc9553c93a4efaba309d7a6615780e4dabf1e06f816a926991b851c904a500b", 0xdf}, {&(0x7f0000000200)="0e432b8e944565156e1cb0f1ace0618f2ce1e027262acf58745fabcbeaab22de5ed8a1b5e061b1b425cff1465fc9e858036db917ff47a232a2e36c2a72f0048b2e045fbe60ecb1160d1036f5c5e0b43cd12751286cc0408ff70600cb322f554dc8bdff11b9008b3c90af9a9f368c4bda6900c610a3b14d80814df2d9f76d3ad019aab1b8c02ce6720933c029a9218d9f0327414a313cfb92b11b8aa9edb9a2ef28f207e523ba0cce17ae186ad2103e329606fb974c29c027ca9b508ebe6f38cd7915c707a094a68f24a3af568c97db9c735213535283bf691750c7ada93626f0f5ffd536bb86ce", 0xe7}], 0x2, &(0x7f0000000340)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @local}}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xfffffffa}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x4, 0x2, '\x00', [@hao={0xc9, 0x10, @loopback}]}}}, @tclass={{0x14, 0x29, 0x43, 0x6}}, @hopopts={{0x98, 0x29, 0x36, {0x89, 0xf, '\x00', [@hao={0xc9, 0x10, @local}, @calipso={0x7, 0x38, {0x1, 0xc, 0xbe, 0x0, [0x8, 0x3, 0x9, 0xffffffffdc909407, 0x4, 0x400]}}, @calipso={0x7, 0x18, {0x1, 0x4, 0x1, 0x40, [0xfffffffffffffffb, 0x0]}}, @ra={0x5, 0x2, 0x1}, @calipso={0x7, 0x10, {0x1, 0x2, 0x81, 0x0, [0x100]}}]}}}, @tclass={{0x14, 0x29, 0x43, 0x7}}], 0x138}, 0x4004) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f0000001700)={0x198, 0x2e, 0x400, 0x70bd28, 0x25dfdbfb, {0x18}, [@generic="2c05f682992bfe842b67989e0bfbae0fd5c2b415384222f48ce36b1a879d9ce60da58a453c515c2cb2ff602d528f245799df91c022f8cf9cbf070b3ddc613e9c3b2a218b0cfed6d4df2d24024c438deb4e1440ac80932cfd84bdefd1053cba31442fea8ba73a18067f4c111c773e956d44e27385363edc05c372efa41af09c4dc68b1a4b7affbd0a1cb06284b644122b4682f400d8c3ab66b2ffc47c0851919ee378be7f0bf21c0b1a8f93dc9fc8dc7269fdcc76181b8c3ab6a77448ee2ce93d87559470f879514a0608d409496067bd6392fa1abbbcf8d0c111239940748d315eb0d0", @generic="bca31e6b4de15e238a04b9f6aea06fc19ccaa4aa76d674af079f65290d1e9706d2ad369663a3a3c84ead4c2dcb07264b787f06785a719679357f287f746dd5642895febfa495c3a82a3ce935e7d576794cefddce8a091a0b3213808be776e3dd059eb46e1f7510eda071324125b8d735bffe9e7a7db3c0bc7c5a6463dc484c1539bb22276c465e9c1857a597433dde2afa821ed014bfc5ad64866344b8a940bc0d"]}, 0x198}, 0x1, 0x0, 0x0, 0x2000000}, 0x10060841) 01:23:23 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x10000000000000, 0x0, 0x0, 0x0, 0x0) 01:23:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @local, 0x8}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000280), 0x200, 0x100) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24, 0x3, @local, 0x3}, 0x1c) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r3, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r3, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) bind$inet6(r3, &(0x7f0000000300)={0xa, 0x4e20, 0x7fffffff, @dev={0xfe, 0x80, '\x00', 0xb}, 0xffffffff}, 0x1c) sendmsg$inet6(r2, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r2, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) sendmsg$inet6(r2, &(0x7f0000000240)={&(0x7f0000000080)={0xa, 0x4e20, 0x2, @local, 0x7e4b1271}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000001700)="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", 0x1000}, {&(0x7f0000000100)="577b3d7a6c6380de7d6f58a1a766a9e763e8c52c4c351121a031eb7fc30f74336b5f61a9bf0a8fdd20b7f852d354d5c5413b50ce71ca5c04957e36ff306ee1579eb130d46fb674d42ae1828bb2d0c1b3ecdc30e29c7a24a3485e21ce0486602a7e56bea866725515302aa031538c927dcdd22102cb7fa8d607f1eb3cf59d3b1eba6d74e12edb2ff41c07fcce88a293fe8a6bbfdb897a26285215ea3bcbf0f9f4ba8820df", 0xa4}, {&(0x7f0000002700)="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", 0x1000}, {&(0x7f00000001c0)="6dc4bc92a851bee08fbd5553a3a7b607f6e879bd1ca9d6b271", 0x19}], 0x4, &(0x7f0000004e00)=ANY=[@ANYBLOB="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"], 0x1618}, 0x14) 01:23:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:24 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x100000, 0x0) 01:23:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto(r0, &(0x7f0000000100)="2fa4f64a0aa76613c09f1b84481be6b6e2b4e223f0232cefa0540adb3f5c56a0f19bba4324ab9c52684aed0e579af74ac2c450277ded2f4d2e86095e355d4260a6f008e99f5d5103e49422aef79dd2d78492204026be2de80b90f981fb22082873ee4fe83f5dc36aa5357446dffa3ca9e1efa0592a78627683abe959e76c8b90fa996138e831b226f065e81009ba6ca89d228c6aedbd5483ec67b8db5b78e2d0cc7629c4bfe3d6b9ea65361889ae6fcc521d1978158a6f0ac59f8e42f3e3fb8225fd2fdc7f8e3a57ad817efd664fea05", 0xd0, 0x20000000, &(0x7f0000000200)=@hci={0x1f, 0x3, 0x3}, 0x80) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x10100000000000, 0x0, 0x0, 0x0, 0x0) [ 1159.602837] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:23:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x60000000000000, 0x0, 0x0, 0x0, 0x0) 01:23:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x18020000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x7000000) 01:23:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) listen(r0, 0x4) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x18020000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:41 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x200000, 0x0) 01:23:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x8000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:41 executing program 7 (fault-call:1 fault-nth:66): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1165.575515] FAULT_INJECTION: forcing a failure. [ 1165.575515] name failslab, interval 1, probability 0, space 0, times 0 [ 1165.577126] CPU: 0 PID: 8100 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1165.578030] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1165.579524] Call Trace: [ 1165.579888] dump_stack+0x107/0x163 [ 1165.580393] should_fail.cold+0x5/0xa [ 1165.580927] ? create_object.isra.0+0x3a/0xa20 [ 1165.581900] should_failslab+0x5/0x10 [ 1165.582816] kmem_cache_alloc+0x5b/0x350 [ 1165.583800] create_object.isra.0+0x3a/0xa20 [ 1165.584884] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1165.586132] kmem_cache_alloc+0x159/0x350 [ 1165.587141] anon_vma_clone+0xdc/0x580 [ 1165.588098] anon_vma_fork+0x82/0x630 [ 1165.589000] ? __vm_enough_memory+0x184/0x360 [ 1165.590089] dup_mm+0x861/0x1110 [ 1165.590918] ? vm_area_dup+0x290/0x290 [ 1165.591869] ? __raw_spin_lock_init+0x34/0x100 [ 1165.592965] copy_process+0x2409/0x6650 [ 1165.593981] ? __cleanup_sighand+0xb0/0xb0 [ 1165.594976] ? __bpf_prog_run32+0x8f/0xd0 [ 1165.595976] ? perf_trace_lock+0xac/0x490 [ 1165.596971] kernel_clone+0xe7/0xa20 [ 1165.597903] ? copy_init_mm+0x20/0x20 [ 1165.598711] ? lock_downgrade+0x6d0/0x6d0 [ 1165.599615] ? find_held_lock+0x2c/0x110 [ 1165.600497] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1165.601602] ? __seccomp_filter+0x236/0x1470 [ 1165.602578] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1165.603561] __do_sys_clone+0xc8/0x110 [ 1165.604430] ? __do_sys_vfork+0xd0/0xd0 [ 1165.605298] ? __secure_computing+0xb4/0x290 [ 1165.606271] do_syscall_64+0x33/0x40 [ 1165.607058] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1165.608188] RIP: 0033:0x466609 [ 1165.608869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1165.613051] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1165.614785] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1165.616408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1165.618037] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1165.619654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1165.621304] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:23:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x805e0000000000, 0x0, 0x0, 0x0, 0x0) 01:23:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:55 executing program 2: pread64(0xffffffffffffffff, &(0x7f0000000100)=""/233, 0xe9, 0x708) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x40000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:55 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x8000000) 01:23:55 executing program 7 (fault-call:1 fault-nth:67): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:23:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x3a3362f1, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:55 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x400000, 0x0) 01:23:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x0, r3) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), r2) sendmsg$DEVLINK_CMD_TRAP_SET(r3, &(0x7f0000000640)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x98, r4, 0x800, 0x20, 0x25dfdbfe, {}, [{@pci={{0x8}, {0x11}}, {0x1c}, {0x5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}, {0x5}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4040080}, 0x8010) fcntl$dupfd(r2, 0x0, r2) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x6c, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x35}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2c2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x3c7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1e}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xffff}]]}, 0x6c}, 0x1, 0x0, 0x0, 0x1}, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000100)) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="b5ee14", 0x3}], 0x1}, 0x40000) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1178.974154] FAULT_INJECTION: forcing a failure. [ 1178.974154] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.977213] CPU: 1 PID: 8137 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1178.979002] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1178.981485] Call Trace: [ 1178.982180] dump_stack+0x107/0x163 [ 1178.982993] should_fail.cold+0x5/0xa [ 1178.983825] ? down_write+0xe0/0x150 [ 1178.984635] ? anon_vma_clone+0xdc/0x580 [ 1178.985535] should_failslab+0x5/0x10 [ 1178.986363] kmem_cache_alloc+0x5b/0x350 [ 1178.987255] anon_vma_clone+0xdc/0x580 [ 1178.988117] anon_vma_fork+0x82/0x630 [ 1178.988948] ? __vm_enough_memory+0x184/0x360 [ 1178.989543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8155 comm=syz-executor.2 [ 1178.989945] dup_mm+0x861/0x1110 [ 1178.992745] ? vm_area_dup+0x290/0x290 [ 1178.993622] ? __raw_spin_lock_init+0x34/0x100 [ 1178.994625] copy_process+0x2409/0x6650 [ 1178.995527] ? __cleanup_sighand+0xb0/0xb0 [ 1178.996449] ? __bpf_prog_run32+0x8f/0xd0 [ 1178.997362] ? perf_trace_lock+0xac/0x490 [ 1178.998296] kernel_clone+0xe7/0xa20 [ 1178.999115] ? copy_init_mm+0x20/0x20 [ 1178.999946] ? lock_downgrade+0x6d0/0x6d0 [ 1179.000843] ? find_held_lock+0x2c/0x110 [ 1179.001751] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1179.002880] ? __seccomp_filter+0x236/0x1470 [ 1179.003848] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1179.004875] __do_sys_clone+0xc8/0x110 [ 1179.005744] ? __do_sys_vfork+0xd0/0xd0 [ 1179.006639] ? __secure_computing+0xb4/0x290 [ 1179.007614] do_syscall_64+0x33/0x40 [ 1179.008430] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1179.009556] RIP: 0033:0x466609 [ 1179.010269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1179.014262] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1179.015910] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1179.017470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1179.019018] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1179.020572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1179.022132] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:23:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x40000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x40020000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:55 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x90541e00000000, 0x0, 0x0, 0x0, 0x0) 01:23:55 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x600000, 0x0) 01:23:55 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x9000000) 01:23:55 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x7000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback, 0xfffffffc}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:55 executing program 7 (fault-call:1 fault-nth:68): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:23:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x40020000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:55 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x2001000000000, 0x0, 0x0, 0x0, 0x0) [ 1179.343444] FAULT_INJECTION: forcing a failure. [ 1179.343444] name failslab, interval 1, probability 0, space 0, times 0 [ 1179.346012] CPU: 1 PID: 8187 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1179.347479] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1179.349871] Call Trace: [ 1179.350447] dump_stack+0x107/0x163 [ 1179.351212] should_fail.cold+0x5/0xa [ 1179.352046] ? create_object.isra.0+0x3a/0xa20 [ 1179.353016] should_failslab+0x5/0x10 [ 1179.353847] kmem_cache_alloc+0x5b/0x350 [ 1179.354713] create_object.isra.0+0x3a/0xa20 [ 1179.355663] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1179.356725] kmem_cache_alloc+0x159/0x350 [ 1179.357650] anon_vma_clone+0xdc/0x580 [ 1179.358482] anon_vma_fork+0x82/0x630 [ 1179.359309] ? __vm_enough_memory+0x184/0x360 [ 1179.360257] dup_mm+0x861/0x1110 [ 1179.361009] ? vm_area_dup+0x290/0x290 [ 1179.361848] ? __raw_spin_lock_init+0x34/0x100 [ 1179.362844] copy_process+0x2409/0x6650 [ 1179.363723] ? __cleanup_sighand+0xb0/0xb0 [ 1179.364640] ? __bpf_prog_run32+0x8f/0xd0 [ 1179.365542] ? perf_trace_lock+0xac/0x490 [ 1179.366461] kernel_clone+0xe7/0xa20 [ 1179.367267] ? copy_init_mm+0x20/0x20 [ 1179.368086] ? lock_downgrade+0x6d0/0x6d0 [ 1179.368977] ? find_held_lock+0x2c/0x110 [ 1179.369873] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1179.370989] ? __seccomp_filter+0x236/0x1470 [ 1179.371944] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1179.372955] __do_sys_clone+0xc8/0x110 [ 1179.373802] ? __do_sys_vfork+0xd0/0xd0 [ 1179.374667] ? __secure_computing+0xb4/0x290 [ 1179.375629] do_syscall_64+0x33/0x40 [ 1179.376433] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1179.377512] RIP: 0033:0x466609 [ 1179.378209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1179.382413] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1179.384181] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1179.385836] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1179.387492] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1179.389141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1179.390802] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:23:55 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xa000000) 01:23:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x446002ff, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:23:55 executing program 2: sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xac, 0x0, 0x1, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x10001, 0x2d}}}}, [@mon_options=[@NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "b4c381fbb030c4986690824daa0b09ad483642eab5a2931b"}, @NL80211_ATTR_MNTR_FLAGS={0x18, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_CONTROL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}, @NL80211_MNTR_FLAG_PLCPFAIL={0x4}]}, @NL80211_ATTR_MU_MIMO_FOLLOW_MAC_ADDR={0xa, 0xe8, @broadcast}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "d963106f605fb7afa4c77e8c240196ac72c7a06310629fcd"}], @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x1}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x8}, @NL80211_ATTR_4ADDR={0x5}]}, 0xac}, 0x1, 0x0, 0x0, 0x2800c000}, 0x400c810) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:23:55 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x50000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:08 executing program 7 (fault-call:1 fault-nth:69): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:24:08 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x91ffffff, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0xf0610f1b000000, 0x0, 0x0, 0x0, 0x0) 01:24:08 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x80ffff, 0x0) 01:24:08 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xb000000) 01:24:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x4d1091e9, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:24:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x446002ff, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:24:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000002f40)={'ip_vti0\x00', &(0x7f0000002ec0)={'gretap0\x00', 0x0, 0x0, 0x20, 0x9, 0x2, {{0xf, 0x4, 0x3, 0x9, 0x3c, 0x66, 0x0, 0x9, 0x2f, 0x0, @private=0xa010101, @local, {[@timestamp={0x44, 0x28, 0xc9, 0x0, 0x4, [0xaa8e, 0xff, 0x400, 0x8001, 0x3, 0x5e, 0x8f3c, 0x5, 0x81]}]}}}}}) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000002fc0)={&(0x7f0000002b00)={0xa, 0x4e21, 0xfa, @empty, 0x7e000000}, 0x1c, &(0x7f0000002d00)=[{&(0x7f0000002b40)="53bbde324eb06f077bf4e42215bdf0b1ac5cb9879b07e0eb8cf826acf552cd4ff3fda63302a5156c73115dbefa1fde80220fcf0580fbba4efb4527d55f5dc91d5a3c79ccb2b99e03206c4c411468f754e231d27600bcaac9ef518451716b6b5d6d21c47624f98a4d781aa33b7f7dd6db79622d6994d653d3cb0f46be6f98cb6b8e5402fffaf57f586c6a6a56a31009d19022726522ac6eb9c99b90150d0d", 0x9e}, {&(0x7f0000002c00)="be2b9f99ce0bb9feea2377eb28fbfc85a6e7e3a97f81622d3081673395f5d82b6f0b3f0e4585c14b133161cd1eb1c09d1df6b5e5e936bd5b2913a84aae26f55057fa764b5342e758c2d4a0a4a36087ad5af29068c791dbcbbbd12f9df86ae86faafe7096516451e72d203cf41ba339895df8f82b46be180ded33f198d2a81f58f0888008818db5e9551e77dd0c1d58e18b7d3036fba3bfb30e23f30a47beba5ec923ec42bb1dab11b9f258ecc0dcc465bb2865006c4d268cadd1888777e5ac086bed29835fa22ea8cfde13a2b8b2cece55551407a90123bcef69e2", 0xdb}], 0x2, &(0x7f0000002f80)=[@pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, r1}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}], 0x40}, 0x20048845) pipe(&(0x7f0000000140)={0xffffffffffffffff}) statx(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1000, 0x800, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x1000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache}, {@noextend}, {@loose}, {@aname={'aname', 0x3d, '!'}}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@dfltgid}], [{@fsmagic={'fsmagic', 0x3d, 0x5}}, {@uid_eq={'uid', 0x3d, r4}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_type={'obj_type', 0x3d, '\x0e'}}, {@euid_eq={'euid', 0x3d, r5}}, {@euid_eq}, {@euid_lt={'euid<', 0xee00}}]}}) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) r6 = syz_mount_image$iso9660(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x4, 0x9, &(0x7f0000002940)=[{&(0x7f0000000480)="9b221ad3b38bfdceb0590c0c648bf6c9", 0x10, 0x5}, {&(0x7f00000004c0)="e9ccf50dda4efb080c4cd99476fb6739bcfb11243b7558be7de4432f804dc6d2a40d47413dac85620604506d059aa4b2366a09", 0x33, 0xa784}, {&(0x7f0000000580)="6b3f8ff94b6d426297ee0f58426498d4b3fcb872d796c7f495ef6c8c6489b0e02b9d05ab629e35d337900352cbfdfc6bf55562fad0ec82b9633078c003a335a602fd37b0ddd8ea743265486dc8196d248a19c10bccb2869df368c9b86eb5f07d0c8c5bebde9502ccc64d7ef52a5bcc", 0x6f, 0xee8856c}, {&(0x7f0000000600)="f7d0113ca627b7fd56e0a3739cfae3b0a9ee6d0508cca922036e7205627eb03b563e9af7ed1d0c180c03c04f5d26038a1f4e46d75029c83662e9a7f608cdebc211e02da32830c18bfe662cbbc87b6f16c7f2f342bcd143374681807bbb2d3f70f2a5e105dc4004e67479e8028361a94f44f279a04d03efd2a81a82d0ac688741795ae5f7caf34a74e6736d9d2d45051ddcaa1e7eb949451c2e9da7d2dd8a641e0296632bae443ddcebe95edf9a51a98d034281ccd11decb010", 0xb9, 0xfffffffffffffff9}, {&(0x7f0000000500)="cefd0113ef388dd151a8d6", 0xb, 0x7ff}, {&(0x7f0000001700)="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", 0x1000, 0x7}, {&(0x7f0000002700)="3901c69a7ac9a685d73fdf6b23bb6c3b349a88a4f467c6f7ac835098c5d2d6433954e1bb5e9d1c9f6ac8868ed0d2233bae1c6ec6f49af021660fd7eaedae766efc5abff48d0e68be87c2683800574ded12fad970fae274c12c7d69578f0d579eb81d293b428762c9eafb2c42dc2fb7ebedd6abf46c901af5e08b86e623241cdd1adc48bc74fc875e46a3b17376fa", 0x8e, 0x40}, {&(0x7f00000027c0)="fea4b7d1b10714a417567dd0cdbe1070f211092a79270b56d8fddb875c058a34eb7e1ecd293ce346b16e2cbd8b7b45d233fccee919297242f6423b679fa437b892220d08936a57455394e37230b5", 0x4e, 0x7}, {&(0x7f0000002840)="e5598d67ba4a9984d2e3b9776938f77dac467543c32eba72cca066281fa3b23dc43779cd38257f31931fa766c2a97f0cfaf0d6b39f3363e607e860ab2e2d086aae47a1b988572844e0d096239563123d503b9d361ab3a95f570e262022730d8a7c44dc0045f4fbd4d294427d6de03884db7268286c3a3cfa58f06ddfdf6eb9eafe1a73288814cf50b1ee6fd8f9c514010faaeffbaa134b70514c2c11df33a9fe3d955d1dbb897b674e5193f220fbd5d187c7c94bfe8c9c5ed10bfe8defd336fc3d5b75e70f942388f6faac261f264da7fac36744", 0xd4, 0x100000000}], 0x203040, &(0x7f0000002a40)={[], [{@euid_lt={'euid<', r4}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, r4}}, {@smackfstransmute={'smackfstransmute', 0x3d, '+'}}, {@hash}, {@obj_role={'obj_role', 0x3d, 'aname'}}]}) mknodat$null(r6, &(0x7f0000002ac0)='./file0\x00', 0x4, 0x103) 01:24:08 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x90541e00000000, 0x0, 0x0, 0x0, 0x0) [ 1191.662153] FAULT_INJECTION: forcing a failure. [ 1191.662153] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.663503] CPU: 1 PID: 8228 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1191.664277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1191.665571] Call Trace: [ 1191.665888] dump_stack+0x107/0x163 [ 1191.666313] should_fail.cold+0x5/0xa [ 1191.666754] ? anon_vma_clone+0xdc/0x580 [ 1191.667223] should_failslab+0x5/0x10 [ 1191.667657] kmem_cache_alloc+0x5b/0x350 [ 1191.668125] anon_vma_clone+0xdc/0x580 [ 1191.668576] anon_vma_fork+0x82/0x630 [ 1191.669016] ? __vm_enough_memory+0x184/0x360 [ 1191.669534] dup_mm+0x861/0x1110 [ 1191.669938] ? vm_area_dup+0x290/0x290 [ 1191.670393] ? __raw_spin_lock_init+0x34/0x100 [ 1191.670918] copy_process+0x2409/0x6650 [ 1191.671391] ? __cleanup_sighand+0xb0/0xb0 [ 1191.671876] ? __bpf_prog_run32+0x8f/0xd0 [ 1191.672353] ? perf_trace_lock+0xac/0x490 [ 1191.672835] kernel_clone+0xe7/0xa20 [ 1191.673263] ? copy_init_mm+0x20/0x20 [ 1191.673717] ? lock_downgrade+0x6d0/0x6d0 [ 1191.674190] ? find_held_lock+0x2c/0x110 [ 1191.674656] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1191.675246] ? __seccomp_filter+0x236/0x1470 [ 1191.675755] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1191.676297] __do_sys_clone+0xc8/0x110 [ 1191.676743] ? __do_sys_vfork+0xd0/0xd0 [ 1191.677210] ? __secure_computing+0xb4/0x290 [ 1191.677728] do_syscall_64+0x33/0x40 [ 1191.678151] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1191.678736] RIP: 0033:0x466609 [ 1191.679109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.681214] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1191.682103] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1191.682918] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1191.683729] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1191.684542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1191.685359] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:24:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x100000000000000, 0x0, 0x0, 0x0, 0x0) 01:24:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x400, @loopback, 0x4000000}, 0x1c) socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000100)=0x617a) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}]}, 0x34}}, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000140)={@local, @rand_addr=0x64010101, r5}, 0xc) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080)=0x3ff, 0x4) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x50000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 1203.403978] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:24:27 executing program 7 (fault-call:1 fault-nth:70): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:24:27 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xc000000) 01:24:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xb04a2adb, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x91ffffff, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:24:27 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xc0ffff, 0x0) 01:24:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback, 0xfffffffc}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000100)=""/192, 0xc0, 0x20, &(0x7f0000000080)={0xa, 0x4e24, 0xfffffeff, @private0, 0x91c}, 0x1c) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) sendmsg$inet6(r1, &(0x7f0000000480)={&(0x7f00000000c0)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x2000753}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000001c0)="25d62e1a8acff1e2978c10d1d0bad1076d141825c6874d24ac3383b9149c03a59988a28a3dad3175af520a3f20d5c3f15dc5251a", 0x34}, {&(0x7f0000000200)="aad56a168cd7f54689e449", 0xb}, {&(0x7f0000000240)="bf455ae4e985761f4fd0025abd7840e85df627f0a544ef9adced4d90299fbe2fb54ed4d26a1ef58bf8b34ba1a3ebb6836a02a825a8c6914206584a147a68777b6015beea9856cfbf18d365620360e3", 0x4f}, {&(0x7f00000002c0)="8ae86cfcb84cc6d533303425c78e909f46fb4bc4344b3b3ba0e1cd4debcd3995c17621784018cf4fde0a7f2b1695129e3749f94ed4d0949b4fdb1de6620c959187b8790d83be60215d3f5cafb9a98b876acec6040ed97e641e02", 0x5a}, {&(0x7f0000000340)="5da38ef9c45d1cd3e4ad0a518d4fed561064cbed516a292a7f41297eb198b0f35defc51ae5f1a8f0617c75b626388f65639113e56dccf99baaaf18aa47e4dd8c28dbb333864ddcdc00a28ed8458b832458de09379fbcb58459e7defb9a37f4cee66753660b683a6af9561847454663997f151c460b1f9ea81b862f8e51a0b83ff9f4631046f179a2505057b80eb99758108fdb", 0x93}], 0x5, &(0x7f0000001700)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}, @rthdrdstopts={{0x150, 0x29, 0x37, {0x32, 0x26, '\x00', [@enc_lim, @generic={0x2, 0x6d, "0cb32f801f8effbef6d72a1c7e316a8a8a12bfe1d5c0c9335b8f9f934cbe426d61f2bdcc85c2479ad4ccc950b8b63bf470f07967ff09f68a0c5fefd06b97e54ae616453d4b9d10751e302b51e0892317339045c85c7ef43b6b3de540351ddf8f127f601726c35726631a763d49"}, @jumbo={0xc2, 0x4, 0x6}, @generic={0x4b, 0x2d, "acfbce78b4243d78ae0e876b72f2e3fd4b842aa30496fd1fa0e68be459d090b7787045f326c0358cbaa24041bc"}, @enc_lim={0x4, 0x1, 0x6}, @hao={0xc9, 0x10, @remote}, @generic={0x4, 0x6c, "a3c8d08aefaa00c32dd41c536b773d8cb2805934c92182111251a3c95d0cdc8fe7969559d2cc063df5a9084ada890c6bd7474523fd4e6768162884ffd2dd0d5c143d4345b0cd75268dc7bf3980d26f588d6d43f0fcc521cdb6e2cf920420d141aa44f7bae180cf1e62f7c491"}, @ra={0x5, 0x2, 0x3}, @enc_lim={0x4, 0x1, 0x65}]}}}], 0x168}, 0x4000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:27 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x800000000000000, 0x0, 0x0, 0x0, 0x0) 01:24:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0xfffffffd, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="00000043916f428a412eb2b908422a8c54a0d7fb9cb3837e8277c9acd2b75106e1b5a36cc171c56016098986bb80b377d5239edc3309f8c985c6db92c59722eaa93fe7bddcc0a5331a8a392af56ae14f9a752667a47a0b9ca478435bfe7e66c1e14b22c7349e719d3762791e340eacc387141986d830ebf40e9272ad9106bee7ee6b842ab49bf7898a3012d5425387eed29d3aa769eebea9917b82c7e45224b8c09043b7895311", 0xa7}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1211.578259] FAULT_INJECTION: forcing a failure. [ 1211.578259] name failslab, interval 1, probability 0, space 0, times 0 [ 1211.579742] CPU: 1 PID: 8276 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1211.580525] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1211.581847] Call Trace: [ 1211.582170] dump_stack+0x107/0x163 [ 1211.582599] should_fail.cold+0x5/0xa [ 1211.583044] ? create_object.isra.0+0x3a/0xa20 [ 1211.583586] should_failslab+0x5/0x10 [ 1211.584030] kmem_cache_alloc+0x5b/0x350 [ 1211.584507] ? mark_held_locks+0x9e/0xe0 [ 1211.584990] create_object.isra.0+0x3a/0xa20 [ 1211.585500] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1211.586149] kmem_cache_alloc+0x159/0x350 [ 1211.586640] anon_vma_clone+0xdc/0x580 [ 1211.587103] anon_vma_fork+0x82/0x630 [ 1211.587549] ? __vm_enough_memory+0x184/0x360 [ 1211.588075] dup_mm+0x861/0x1110 [ 1211.588476] ? vm_area_dup+0x290/0x290 [ 1211.588934] ? __raw_spin_lock_init+0x34/0x100 [ 1211.589468] copy_process+0x2409/0x6650 [ 1211.589920] ? __cleanup_sighand+0xb0/0xb0 [ 1211.590414] ? __bpf_prog_run32+0x8f/0xd0 [ 1211.590859] ? perf_trace_lock+0xac/0x490 [ 1211.591301] kernel_clone+0xe7/0xa20 [ 1211.591698] ? copy_init_mm+0x20/0x20 [ 1211.592100] ? lock_downgrade+0x6d0/0x6d0 [ 1211.592540] ? find_held_lock+0x2c/0x110 [ 1211.592974] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1211.593532] ? __seccomp_filter+0x236/0x1470 [ 1211.594023] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1211.594545] __do_sys_clone+0xc8/0x110 [ 1211.594963] ? __do_sys_vfork+0xd0/0xd0 [ 1211.595401] ? __secure_computing+0xb4/0x290 [ 1211.595876] do_syscall_64+0x33/0x40 [ 1211.596275] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1211.596825] RIP: 0033:0x466609 [ 1211.597175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1211.599202] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1211.600066] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1211.600812] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1211.601569] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1211.602406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1211.603213] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 1223.257310] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:24:47 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xf0ffff, 0x0) 01:24:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @local, 0x80}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000140)={&(0x7f0000000000)={0xa, 0xe22, 0xfffff156, @loopback, 0x3}, 0x1c, 0x0, 0x1a}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000100)={0x20, 0xbf4, 0x2, 0x80, 0x5714}, 0x14) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20, 0x8, @local, 0x40}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:47 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xd000000) 01:24:47 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x100000000000000, 0x0, 0x0, 0x0, 0x0) 01:24:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x1100000000000000, 0x0, 0x0, 0x0, 0x0) 01:24:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xdb2a4ab0, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe8030000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:24:47 executing program 7 (fault-call:1 fault-nth:71): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1231.208404] FAULT_INJECTION: forcing a failure. [ 1231.208404] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.210767] CPU: 1 PID: 8311 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1231.212058] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1231.214240] Call Trace: [ 1231.214758] dump_stack+0x107/0x163 [ 1231.215461] should_fail.cold+0x5/0xa [ 1231.216191] ? create_object.isra.0+0x3a/0xa20 [ 1231.217064] should_failslab+0x5/0x10 [ 1231.217787] kmem_cache_alloc+0x5b/0x350 [ 1231.218591] ? mark_held_locks+0x9e/0xe0 [ 1231.219369] create_object.isra.0+0x3a/0xa20 [ 1231.220196] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1231.221164] kmem_cache_alloc+0x159/0x350 [ 1231.221960] anon_vma_clone+0xdc/0x580 [ 1231.222752] anon_vma_fork+0x82/0x630 [ 1231.223481] ? __vm_enough_memory+0x184/0x360 [ 1231.224350] dup_mm+0x861/0x1110 [ 1231.225013] ? vm_area_dup+0x290/0x290 [ 1231.225778] ? __raw_spin_lock_init+0x34/0x100 [ 1231.226661] copy_process+0x2409/0x6650 [ 1231.227463] ? __cleanup_sighand+0xb0/0xb0 [ 1231.228269] ? __bpf_prog_run32+0x8f/0xd0 [ 1231.229055] ? perf_trace_lock+0xac/0x490 [ 1231.229845] kernel_clone+0xe7/0xa20 [ 1231.230561] ? copy_init_mm+0x20/0x20 [ 1231.231276] ? lock_downgrade+0x6d0/0x6d0 [ 1231.232046] ? find_held_lock+0x2c/0x110 [ 1231.232820] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1231.233800] ? __seccomp_filter+0x236/0x1470 [ 1231.234671] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1231.235563] __do_sys_clone+0xc8/0x110 [ 1231.236304] ? __do_sys_vfork+0xd0/0xd0 [ 1231.237071] ? __secure_computing+0xb4/0x290 [ 1231.237890] do_syscall_64+0x33/0x40 [ 1231.238621] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1231.239598] RIP: 0033:0x466609 [ 1231.240217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1231.243733] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1231.245181] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1231.246545] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1231.247899] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1231.249238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1231.250564] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:24:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x91ffffff, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 01:24:47 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe8030000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x34}}, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x4e23, 0x1, @private0, 0x80000000}, 0x1c) sendmsg$inet6(r1, &(0x7f0000000440)={&(0x7f0000000080)={0xa, 0x4e22, 0x2, @private2, 0x2}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000100)="e360a4123394e544ed412f8461ad9ce53fddc58f45065461248eb472dc97ca374f798a5fb2ebca365b8982a5167a0cc8282055025b4b03937a553731ae189d2be6e4ba424b2a12995961c02c79c3c8cc5ae68d6830976dc2bb374d059491822ff3bd36c52bc2b66072ff8b57d3be9db1ec21c7eeae57089818e83149123488cf2f5cf00a7c66907d49b89946c92b08498a4ac3dff0049b3419b4d7b1e4d7bd42", 0xa0}], 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="24000000000000002900000032000000fe8000000000000000000000000000aa", @ANYRES32=r2, @ANYBLOB="0000000024000000000000002900000032000000fc010000000000000000ddfcffff0001", @ANYRES32=r6, @ANYBLOB="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"/510], 0x1e0}, 0x200c040) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:47 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x1000000, 0x0) 01:24:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe991104d, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:24:47 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x3000000) 01:24:47 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) 01:24:47 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xe000000) 01:24:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xf4010000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:24:47 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xf000000) 01:24:48 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x2000000, 0x0) 01:24:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe991104d, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:24:48 executing program 7 (fault-call:1 fault-nth:72): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:24:48 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xf162333a, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:24:48 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x10000000) 01:24:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xf5ffffff, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 1231.667504] FAULT_INJECTION: forcing a failure. [ 1231.667504] name failslab, interval 1, probability 0, space 0, times 0 [ 1231.669049] CPU: 0 PID: 8369 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1231.669923] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1231.671273] Call Trace: [ 1231.671647] dump_stack+0x107/0x163 [ 1231.672150] should_fail.cold+0x5/0xa [ 1231.672685] ? create_object.isra.0+0x3a/0xa20 [ 1231.673279] should_failslab+0x5/0x10 [ 1231.673798] kmem_cache_alloc+0x5b/0x350 [ 1231.674369] create_object.isra.0+0x3a/0xa20 [ 1231.674983] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1231.675673] kmem_cache_alloc+0x159/0x350 [ 1231.676249] anon_vma_fork+0xed/0x630 [ 1231.676761] ? __vm_enough_memory+0x184/0x360 [ 1231.677376] dup_mm+0x861/0x1110 [ 1231.677852] ? vm_area_dup+0x290/0x290 [ 1231.678400] ? __raw_spin_lock_init+0x34/0x100 [ 1231.679018] copy_process+0x2409/0x6650 [ 1231.679587] ? __cleanup_sighand+0xb0/0xb0 [ 1231.680167] ? __bpf_prog_run32+0x8f/0xd0 [ 1231.680733] ? perf_trace_lock+0xac/0x490 [ 1231.681303] kernel_clone+0xe7/0xa20 [ 1231.681816] ? copy_init_mm+0x20/0x20 [ 1231.682355] ? lock_downgrade+0x6d0/0x6d0 [ 1231.682909] ? find_held_lock+0x2c/0x110 [ 1231.683468] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1231.684162] ? __seccomp_filter+0x236/0x1470 [ 1231.684766] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1231.685403] __do_sys_clone+0xc8/0x110 [ 1231.685932] ? __do_sys_vfork+0xd0/0xd0 [ 1231.686508] ? __secure_computing+0xb4/0x290 [ 1231.686992] do_syscall_64+0x33/0x40 [ 1231.687402] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1231.687957] RIP: 0033:0x466609 [ 1231.688312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1231.690304] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1231.691284] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1231.692233] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1231.693167] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1231.694117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1231.695080] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:24:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) fcntl$addseals(r1, 0x409, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1242.230648] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:25:05 executing program 7 (fault-call:1 fault-nth:73): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:25:05 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000080)={0x5, 0x7f}) socket$inet_tcp(0x2, 0x1, 0x0) 01:25:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x200080, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000001700)={{r0}, "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"}) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:25:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xe8030000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:25:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xf4010000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:25:05 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x3000000, 0x0) 01:25:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfc000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:25:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x11000000) [ 1248.779085] FAULT_INJECTION: forcing a failure. [ 1248.779085] name failslab, interval 1, probability 0, space 0, times 0 [ 1248.780872] CPU: 1 PID: 8407 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1248.781899] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1248.783587] Call Trace: [ 1248.783988] dump_stack+0x107/0x163 [ 1248.784530] should_fail.cold+0x5/0xa [ 1248.785096] ? anon_vma_fork+0x1dd/0x630 [ 1248.785696] should_failslab+0x5/0x10 [ 1248.786259] kmem_cache_alloc+0x5b/0x350 [ 1248.786877] anon_vma_fork+0x1dd/0x630 [ 1248.787469] dup_mm+0x861/0x1110 [ 1248.787994] ? vm_area_dup+0x290/0x290 [ 1248.788585] ? __raw_spin_lock_init+0x34/0x100 [ 1248.789282] copy_process+0x2409/0x6650 [ 1248.789892] ? __cleanup_sighand+0xb0/0xb0 [ 1248.790529] ? __bpf_prog_run32+0x8f/0xd0 [ 1248.791169] ? perf_trace_lock+0xac/0x490 [ 1248.791833] kernel_clone+0xe7/0xa20 [ 1248.792410] ? copy_init_mm+0x20/0x20 [ 1248.793008] ? lock_downgrade+0x6d0/0x6d0 [ 1248.793649] ? find_held_lock+0x2c/0x110 [ 1248.794291] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1248.795117] ? __seccomp_filter+0x236/0x1470 [ 1248.795787] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1248.796500] __do_sys_clone+0xc8/0x110 [ 1248.797087] ? __do_sys_vfork+0xd0/0xd0 [ 1248.797705] ? __secure_computing+0xb4/0x290 [ 1248.798364] do_syscall_64+0x33/0x40 [ 1248.798928] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1248.799688] RIP: 0033:0x466609 [ 1248.800179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1248.802963] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1248.804124] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1248.805179] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1248.806152] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1248.807122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1248.808098] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:25:05 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x12000000) 01:25:05 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xf5ffffff, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:25:05 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x7f41dfd20000, 0x0, 0x0, 0x0, 0x0) 01:25:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000280)={@empty, @dev, 0x0}, &(0x7f00000002c0)=0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x34}}, 0x0) sendmsg$inet6(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="aa24dd2e5d32a22a43dfdb2074751dcd4242b52843e9761f3ec11a77ad13b01960f982250b4fb41676ffe784335bbf51ef1185d342474bc9f5ee6767f28c6b78040701fb2f", 0x45}, {&(0x7f0000000180)="bf70c7f7a55634e56d415f99c1b55b7abf963b8f0717477dbae692d9540aeb72b0b8805e6ad29f615fceaef6d46d7c55601049a9d4a81f434ccd3dba759abc0a9e56e0a3ea4dfa181ef58a70c44d9049fab3aa580af5631d2866235ed4a9e53eb033d1f155a7011e41e3e58724f2fc7b69dcc332b2a761977033e422eaeb02221ee1fd903d", 0x85}], 0x2, &(0x7f0000000300)=[@dstopts_2292={{0x50, 0x29, 0x4, {0x1d, 0x6, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x1d}}, @hao={0xc9, 0x10, @mcast2}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r2}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r6}}}, @tclass={{0x14, 0x29, 0x43, 0x1f}}, @dstopts_2292={{0x130, 0x29, 0x4, {0x88, 0x22, '\x00', [@generic={0x0, 0xf4, "c4848c620416c8e6a1d318c229ae8beb0a854e1d3cf6a51e2412c9b522e487cd5395a3c18601499dc3ceb29853a42abe66125f053d9c98871453106ff566e9fd3f7b0de02757ee498d96509224c9c52bdd2f0a4aab950f6e4a422d5a13543231e65f184a791eeb985a65b6fa45f9d14390bf2f4f89274e086fd862ac8412a136234a3ef6ff66e5326f0c4e960ae1159b61f5e9ce9f49a8c5165da3f21f05db2fac4a42f4c39bdf521cdf7e8bac6d4d9cd3757389027391d4dc5e0a5010519e4719f9e90840ec2b1dfd6a3b034a3a40b66ae617eeac7c7a28415709b3e5dc347fda09f2048bef12a040d312e839667455606606ff"}, @hao={0xc9, 0x10, @private0}, @jumbo={0xc2, 0x4, 0x3ff}, @enc_lim={0x4, 0x1, 0x1f}]}}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x1d, 0x3, '\x00', [@enc_lim={0x4, 0x1, 0x2}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @ra={0x5, 0x2, 0x7}, @ra={0x5, 0x2, 0x5}]}}}], 0x220}, 0xc000) 01:25:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfe800000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:25:05 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f0000001640)="99972712683053b6d05cf72d31edc58f40ec245b16a386595372e9596382f5ffbedda8e2a0546a9785d17ece02f2fafac00e84aad3afe1dec9a174995097826566de57dc9f103e8046042f95674882edf9c42e07cd7b1de70950c18f53d272d0a4b859e475ef6fc4c407905dd0f5b9aabd19b2d64d593693f0ea8d51118c2829cff2bde196b8b61c", 0x88) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:25:05 executing program 7 (fault-call:1 fault-nth:74): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1249.049682] FAULT_INJECTION: forcing a failure. [ 1249.049682] name failslab, interval 1, probability 0, space 0, times 0 [ 1249.052287] CPU: 0 PID: 8435 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1249.053735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1249.056190] Call Trace: [ 1249.056762] dump_stack+0x107/0x163 [ 1249.057553] should_fail.cold+0x5/0xa [ 1249.058377] ? create_object.isra.0+0x3a/0xa20 [ 1249.059375] should_failslab+0x5/0x10 [ 1249.060194] kmem_cache_alloc+0x5b/0x350 [ 1249.061082] create_object.isra.0+0x3a/0xa20 [ 1249.062022] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1249.063146] kmem_cache_alloc+0x159/0x350 [ 1249.064047] anon_vma_fork+0x1dd/0x630 [ 1249.064897] dup_mm+0x861/0x1110 [ 1249.065641] ? vm_area_dup+0x290/0x290 [ 1249.066513] ? __raw_spin_lock_init+0x34/0x100 [ 1249.067505] copy_process+0x2409/0x6650 [ 1249.068388] ? __cleanup_sighand+0xb0/0xb0 [ 1249.069295] ? __bpf_prog_run32+0x8f/0xd0 [ 1249.070193] ? perf_trace_lock+0xac/0x490 [ 1249.071114] kernel_clone+0xe7/0xa20 [ 1249.071921] ? copy_init_mm+0x20/0x20 [ 1249.072739] ? lock_downgrade+0x6d0/0x6d0 [ 1249.073626] ? find_held_lock+0x2c/0x110 [ 1249.074496] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1249.075609] ? __seccomp_filter+0x236/0x1470 [ 1249.076557] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1249.077562] __do_sys_clone+0xc8/0x110 [ 1249.078394] ? __do_sys_vfork+0xd0/0xd0 [ 1249.079286] ? __secure_computing+0xb4/0x290 [ 1249.080238] do_syscall_64+0x33/0x40 [ 1249.081037] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1249.082133] RIP: 0033:0x466609 [ 1249.082832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1249.086766] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1249.088396] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1249.089922] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1249.091464] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1249.092991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1249.094517] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 1260.380353] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:25:24 executing program 7 (fault-call:1 fault-nth:75): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:25:24 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x4000000, 0x0) 01:25:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000009a40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {r4}, {}, {}, {0x0, r5}, {}, {r6}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000001700)={r4, 0xfffffffffffffffd}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r10}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r12}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000002e40)={r12, r3, "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", "22b6b876b447b1ecbda2c4fb37267718ea26c388ff83d5a41b9932c4e5135a42cb9a09f651a40f26dbd22265e437c0f26f0eedeb4d0056c8ae323eab5737aec506be6f66034a4f74fff216e641edf2645f3c9ad403d59bada555ae2ccfecf65efe0710d6bf73f02e29caa19620d6b882e5f9f27c2ec05d484bd9decec086f48fd176297c6ca9827e15b45a4c14c10d39a4dd287011cde064336368075a00ddf4d20b8d91e0d40eef7361f77dca313ff9d31a478b941afd9942f6fe332db2a63be7a9ef2ea3763a5bf062a2e19e19c9267d7102f4cf50730a342c6b918993ad532b67802af34a39559a5803b8abedab1b76186209aaa7ff7e704333d9e7af60a452f556efc5f9d654aa426980b97c024990115346eee25d85e82f88b6de60878a725025a2243ee42c7bdd5682091b1b16786843aa3e7ab64184ec1af557f8386418bd1c3b3dad1daf514507a993a2f356c10df1b24e72e6e4c0d8b9f52fb8bbf79f3297e395f71a55825d2d23fc6844c27a7559e84377c9b74dd5fe528450b5ed609a97ad71d34baf482e539e09f1fe4fd87f37541a9dc0f32b3f46dd65ce7d6a931f5d9d2cddb0cb57bc22f910c4669a355fa75533775d8c7ffc05ef8c291d3b48139eef717ae5efaa7b02e99e8ab5765471c4c6df4ec0a4b154b8d16f5995b6e00a91b235b0a1db7033418f098347f0a9479afe3dea090a26e6b984f7cfa03652a933ce6e9629c3249b796849d54d4d8c349c569130c8660577866ca520675ce75433dcdcdab0f0305dee4fee75f91cffdc75a61a2ff376e0efa144f46be0731f9195838c027f782235555be95c60948e1122f2c65fe1df92124e9b55936b160d7983a6faff5fa38785d3f01ca6d1a61d63bb96666a9b36eeb522133656ab0f5d836bab8c529da58a6f3ae389454325fc4e85e5adc89cfae187daaad5b8b7040e48e53b9f6911c0e5412687cb5832dda62ef36173c88b562106e9f1e5072365a2463667c923a68657219226c645ab02353b90cdb0cfc230c8894ac370931986ed7eed316f61cdd5580ca0cc937d933a93087ba3801615d43fd83b9c8fe7781afb37d97bd24cda7d6c1e6383b636c973519934c8e96c306bb922cfa71bef1034f77b623fcdcb8cb9c8a75925856f47e4ceea49022c4fe4e41d9cee78e39bc92483800768f054858ecfe3a84c32a087578c829a402a8b81f0bb550f3c0a4900b38ae500e7ec9cb48b22fb92071758dcfc2861c07288578548d2103cb251a33144f74205dfd54b96171445382c2e526c2378a02ea92543942291a56591dbc1aa5be2188ac392cb77ed3fe8306e4dc90f781200fa34ad854ed2999e365540864fd20f3d1188588e1d0eb44e2ae55a2ac99ddafc2f79de93dbf35b567317777b330b9dcce801a1fb7e0b5f1c2753b56ee3f20525d308ce3054f8159eea069b10e72659f1a6a88031e16d9162d14b61f681ad7aa38d0df22fd95979720defacd3711287ef89a642cf5bdae7bc0c6e31d06665a5bc42418d8d703e0d8178c87f1b2527ef609c7fb3cd2b55175f2bf8fb2b8b726c1e7e4552fa5fac7488689f1cd2d6d900bf5109d7534fa58c34be581157968ce8263c9218b503b902a96737287fb5c3505b3e9d4c3848b6a5c1602a284ac031216ce8200fc9c27707b58a2d980fc68cb40e23baaca5bbb657e7004eee3c56386d040b502373ab0aff8e838601b8df1cf296a7f4340d29d6576d8f52fc112d6c35cad477f2f4c50bc3d761613c0539272145a7bbcc7c3865639539fc5cbaa12f5a22b196c93df55f923ac7fd0c6c73f23aeb607272e0f13a393c26b55fcdee8d554d521a700c8803747a53b753845b24f4b00a563099b6317a0c98d33457d5a74d18bd39760500246331807c014b5653e493eeb1a35a63c84aae4d0b461256b8306b031d95c9a26a2d52fcbadf734687a9469951912c78cbcad80c1ed5e646277335873b7507bf09c75bdcda48228c8e084b65095ea46ecb605bceeda76f6383ae9a5e6aec311d6552933943c6f16f44b128d4d9759458915ab002bccd1f67520f4f4e4e462d95760c67230b98eff0e01e6decf7edd7ffcd0592959bdedeb4077eb3082f4cb955fce6941fe0f62d5624af3baaaac2890cd951fb0390b3a928b2c74fefcdff609eca0ac92715be07168348e4e64461412b3548c3a814c61be585f2351f0ef8c0b28bd87091663caea0fecb66d5aaa88d1a3c519f60aee11d2235202329e8e90c8d1287ee23104f67637273361a5e35f51060408b8535ebe53d5c79b79cbde2f853786735b4e91c2d39b0a9d713844e773633cdff9e5db16121c02a36538c816b86f23dd7c7b8f147f9ce17fcdcca0ad1e1a6c5d3c90dabae88324a4a8df397cee27b4cd9244d09cc9753e44a191138178634c57d8b356e5263dc62306d27d4d440cd1ac24f1f8fa3f86812605826a295d221abcbc035622e7bd8075b0004adf09001766dc9bd1a93a20563bc5055689470fabe46bf482bb65e7790985bb9748500138fdb289ba07a36ddc0eb099b72ba17f6b10b18165215408387543509b80c4b2bc3cc49a9cca638d71b992a541c22960af868c38e78691bd5c9a0dec89e6d99de13b3009db31b44437bc7def5652171f1a7c1eb80cbf097bd9525cce39c2b55a39a078891a25fd77747d92a0e9dd4338db48dea14b70abb8efdfcf18390d67aabae21b7f1e20c851570358d8425389c01fed6abfc0fc7ef46e7d43652cf0af645d84650cb5802026cc638fc314efa962d299ae56a605f85c7bfe767aedbdb82b487c1386ba9b4d90d23fc82ff544c9f0aa526e12505d6cb6c9d9a9bce2d629e9a7c88a50858efbd84236d645ea81bbbf15d455b712d7e17509fc1273c8786fac28ef78a85399bfa10a06572d14ecc165ac49198f6ba07cc452c0f3950c90731235dd516b00542f65ef1734c22e0b7da51bd5967278881aeb78b24c9760e711e7c9e1849b9bcce8dca11734aa151ab47eada1744b446dccd0b936a95de5503ec7cbacfd6a987e173e0a27c6a2d25c7609d67421b4fad88e4caac67e823ce4f5f0cfd46f327c3570886f4d2a69a11ab13cc4a0fcf980e0542a538991d7690b34a23ef22e6fb64733a627c01326c47df6a36d05d7c3cb0965e7b2462f5de29a273fe62de8302979a0f2e9ed36cb625120f4fb4261fe9ccca7404447688036adb3fdce26ddfd36dfea5e2697964a5a00f09646e469550b7e12107ceb160fc2c8b9708cb8193653dc4d2fb9ab9d360540dbbc0401a2df9d89d785d400e8c46a58e9a311d13b02899b36fdfa58535dce59c29ddee1d0a79df801bfdb9f178f91271b951bf871782bb2a871174db79320b7e6cdcc35d60756f1b461e636c2dbf2652bfd6c602b2e52e7cb98ef69d0607986df99d87d2e529bfc765fb34d785223a71f2246ab0ece8f6e6600063d6bb044565595774c0d56c90de2cd126d39a4508aa8926804aac83b35248bd6d178f829802a4f2e5daa3b1ebfc31d08849e5ce979c83043e59ef1e9b880da6554f7093b35d2f288b4df33a0c52280d2a9057fc8ca0bdbd706b1701f651e0e539d1faae3c06dc3eb28e6aee9a5c458cb69fcc33b09654e1aabf11ee52ba4de740cae2aff7c2b8c0a3b1ebf4c5c28c91e30267ae3bd6c242817986d6aeb1aa9b59c20de19344993f58fe39b6ff651f0d7a4153623e8436a665942663689c053f6a1e4f2114cd6316971af84401d27a27d29b1800b80641fbd44de299106a2be683d53e7b8b3dad83685ff96dedfbc1e69d30edcf0fca9057729d83ea6bb526566f80f966d915c2b07dd2d8746aa49deb252d4dc97663e2f86fbd79913a1ea93d457174ecf04f94633ec4fff25f815edb2802f5e586847e5fc2bb842b935fdcd44cf2760a96f83aea4759a89ca68052ba0d3d723fe312692c6e7f74b69215d91de0d12a68a8a06c07cd4003260738f7197e57488b62862acc609989ce62d5bfc28ee90b13131bcd253f26fbc285b136724a36a90c516ac01b9f26b3838ed4f12b644fb88dc04a267669a16352a123b6ef12e2c678bcd2217cad37d2a6b4a4478887dee7f47147e8a5ecfbe4dd448aa3d3f0cb1b7bacacd62f972a803509d3cd15e0a5fc6c0e73c681160146ba3789c76cf5101be30a256eca96188792215dda676bd20dd36b38a77f747d16626b86b3e047e77a0bd7936681379454939ef1b611c79f605848e240a555d032e9ac813d0daa72309a3eaf265b66f0aa2d6f190f55792e0a8e527f220532a7e543f2f85a11abd114b17c891ca49b34429f830680b691c942b7a43d69dded44eb0595bee700f07a17321231c6ec5279c3b7794ff665310ddae18d06780fa6034b75ca93a5470b73b8a3b0971f0b7e2e45964a93578bc1bac95c6980934c689261c0d5b6e21cbbbc4c452e7d0897e280a259a48108f0c00c91027f9810d40a17266c02fa31fd285312978ac6299364fee937989272e49ed27a123e656c79e0821e45f89565b11747543743d1b648fb9cd7f56ce224202e02f1ae27a365c6c9d0cf86f7416a55a8bf344b57a2de0c139be07ffe70c61dfe97098ed93ba9fd9c30d95566191889addfa0185e89de14f3386a4353d868c0e2e8edbcd7eb338eba5f5e972830ffac8666fe1958e2d794a3b59250f9194fca92a537eec63e399a7674a9ac4320f2a6e3df93b81b8635d99b67d525243ffc2d7165670882a79505b1516c2239d72b1f6826f260650b653acb2b2eded4a767f139827e4e9bea82676527cbec169c4d65c933f9ad6fd2ad01cbdd48f4d6afd4c2eee524f4e59a85d5d7e6a7a9919b9a86470997f389a964716e94e58841c1bcbfe7346726b257ec68ba5fc06fe8ce04bc1a48decc7dff800ca09305ac1aeac0ca00d0d514826a481fe95eee781823d13603f57bad81491f12fd9b76842b3fcaf2338fb3a6934047cb07f7792409a244b6e81913b53baf6a40281d65e229332ef82fa94caf8c250bf4153af3a1cc1b445dd1feccf7e245b6caa741f27ff403986b7e93396a51ff614c11ba17fed7acf997b10cb10f812cc0712fcb08489efa32b9454437db9a5b2c8aaace5182a7614ca79fa2ffa5b8a802fcf55b7fdb3c492da44e72b544e0881197e2b06f21d72fb813c34e33fad8b78f1d9ca7c64ef39752df2f0beb9eead8b09b46b6e2deb2bdafc53d05183725ac87d84f9a9e20f98801cc9421ea25fa02b90b74b909b01be709c8329fd717bdd2636a9600f60a023f59c676e4a5484d104ce89f0253db63fc067c864c1603918a012aa08cb793fa2013924395f8fa46911d2a292308797e5d3df34546273e6dbcd4acc9f12e11b77b86e389632c521ba7284ac347625e788fe5464083e19080436d0691ed2f5f83f13b7360c3acf49b470c809a76c8eac15f5840"}) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:25:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfc000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:25:24 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x13000000) 01:25:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfec00000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:25:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) 01:25:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfe800000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 1267.947959] FAULT_INJECTION: forcing a failure. [ 1267.947959] name failslab, interval 1, probability 0, space 0, times 0 [ 1267.949655] CPU: 0 PID: 8453 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1267.950627] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1267.952241] Call Trace: [ 1267.952627] dump_stack+0x107/0x163 [ 1267.953160] should_fail.cold+0x5/0xa [ 1267.953710] ? vm_area_dup+0x78/0x290 [ 1267.954311] should_failslab+0x5/0x10 [ 1267.954851] kmem_cache_alloc+0x5b/0x350 [ 1267.955447] ? lock_downgrade+0x6d0/0x6d0 [ 1267.956033] vm_area_dup+0x78/0x290 [ 1267.956569] ? _cond_resched+0x12/0x80 [ 1267.957128] ? copy_page_range+0x242d/0x3810 [ 1267.957816] ? vm_area_alloc+0x110/0x110 [ 1267.958388] ? up_write+0x191/0x550 [ 1267.958894] ? vm_iomap_memory+0x190/0x190 [ 1267.959507] ? downgrade_write+0x3a0/0x3a0 [ 1267.960083] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1267.960810] ? __vma_link_rb+0x540/0x700 [ 1267.961361] dup_mm+0x44d/0x1110 [ 1267.961828] ? vm_area_dup+0x290/0x290 [ 1267.962342] ? __raw_spin_lock_init+0x34/0x100 [ 1267.963036] copy_process+0x2409/0x6650 [ 1267.964037] ? __cleanup_sighand+0xb0/0xb0 [ 1267.965173] ? __bpf_prog_run32+0x8f/0xd0 [ 1267.966283] ? perf_trace_lock+0xac/0x490 [ 1267.967318] kernel_clone+0xe7/0xa20 [ 1267.968170] ? copy_init_mm+0x20/0x20 [ 1267.968979] ? lock_downgrade+0x6d0/0x6d0 [ 1267.969981] ? find_held_lock+0x2c/0x110 [ 1267.971031] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1267.972339] ? __seccomp_filter+0x236/0x1470 [ 1267.973542] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1267.974665] __do_sys_clone+0xc8/0x110 [ 1267.975657] ? __do_sys_vfork+0xd0/0xd0 [ 1267.976638] ? __secure_computing+0xb4/0x290 [ 1267.977733] do_syscall_64+0x33/0x40 [ 1267.978685] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1267.979967] RIP: 0033:0x466609 [ 1267.980796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1267.985163] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1267.986850] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1267.988587] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1267.990151] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1267.991710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1267.993270] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:25:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000280)={@empty, @dev, 0x0}, &(0x7f00000002c0)=0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x34}}, 0x0) sendmsg$inet6(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="aa24dd2e5d32a22a43dfdb2074751dcd4242b52843e9761f3ec11a77ad13b01960f982250b4fb41676ffe784335bbf51ef1185d342474bc9f5ee6767f28c6b78040701fb2f", 0x45}, {&(0x7f0000000180)="bf70c7f7a55634e56d415f99c1b55b7abf963b8f0717477dbae692d9540aeb72b0b8805e6ad29f615fceaef6d46d7c55601049a9d4a81f434ccd3dba759abc0a9e56e0a3ea4dfa181ef58a70c44d9049fab3aa580af5631d2866235ed4a9e53eb033d1f155a7011e41e3e58724f2fc7b69dcc332b2a761977033e422eaeb02221ee1fd903d", 0x85}], 0x2, &(0x7f0000000300)=[@dstopts_2292={{0x50, 0x29, 0x4, {0x1d, 0x6, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x1d}}, @hao={0xc9, 0x10, @mcast2}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r2}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r6}}}, @tclass={{0x14, 0x29, 0x43, 0x1f}}, @dstopts_2292={{0x130, 0x29, 0x4, {0x88, 0x22, '\x00', [@generic={0x0, 0xf4, "c4848c620416c8e6a1d318c229ae8beb0a854e1d3cf6a51e2412c9b522e487cd5395a3c18601499dc3ceb29853a42abe66125f053d9c98871453106ff566e9fd3f7b0de02757ee498d96509224c9c52bdd2f0a4aab950f6e4a422d5a13543231e65f184a791eeb985a65b6fa45f9d14390bf2f4f89274e086fd862ac8412a136234a3ef6ff66e5326f0c4e960ae1159b61f5e9ce9f49a8c5165da3f21f05db2fac4a42f4c39bdf521cdf7e8bac6d4d9cd3757389027391d4dc5e0a5010519e4719f9e90840ec2b1dfd6a3b034a3a40b66ae617eeac7c7a28415709b3e5dc347fda09f2048bef12a040d312e839667455606606ff"}, @hao={0xc9, 0x10, @private0}, @jumbo={0xc2, 0x4, 0x3ff}, @enc_lim={0x4, 0x1, 0x1f}]}}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x1d, 0x3, '\x00', [@enc_lim={0x4, 0x1, 0x2}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @ra={0x5, 0x2, 0x7}, @ra={0x5, 0x2, 0x5}]}}}], 0x220}, 0xc000) 01:25:24 executing program 7 (fault-call:1 fault-nth:76): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:25:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfe800000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:25:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff000000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:25:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) r1 = signalfd(r0, &(0x7f0000000240)={[0x1]}, 0x8) recvfrom$inet6(r1, &(0x7f0000000700)=""/4096, 0x1000, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r3, 0x200, 0x70bd25, 0x25dfdbfc, {}, [@ETHTOOL_A_COALESCE_USE_ADAPTIVE_TX={0x5, 0xc, 0x1}, @ETHTOOL_A_COALESCE_STATS_BLOCK_USECS={0x8, 0xa, 0x8}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_RX={0x5, 0xb, 0x1}, @ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES={0x8, 0x7, 0x7f}, @ETHTOOL_A_COALESCE_PKT_RATE_HIGH={0x8, 0x12, 0xef}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES={0x8, 0x3, 0x9e02}, @ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8, 0x4, 0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000000}, 0x40040) 01:25:24 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x5000000, 0x0) 01:25:24 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x14020000) [ 1268.191638] FAULT_INJECTION: forcing a failure. [ 1268.191638] name failslab, interval 1, probability 0, space 0, times 0 [ 1268.193010] CPU: 1 PID: 8482 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1268.193787] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1268.195111] Call Trace: [ 1268.195442] dump_stack+0x107/0x163 [ 1268.195870] should_fail.cold+0x5/0xa [ 1268.196312] ? create_object.isra.0+0x3a/0xa20 [ 1268.196843] should_failslab+0x5/0x10 [ 1268.197282] kmem_cache_alloc+0x5b/0x350 [ 1268.197755] create_object.isra.0+0x3a/0xa20 [ 1268.198251] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1268.198840] kmem_cache_alloc+0x159/0x350 [ 1268.199369] vm_area_dup+0x78/0x290 [ 1268.199803] ? _cond_resched+0x12/0x80 [ 1268.200265] ? copy_page_range+0x242d/0x3810 [ 1268.200789] ? vm_area_alloc+0x110/0x110 [ 1268.201252] ? up_write+0x191/0x550 [ 1268.201673] ? vm_iomap_memory+0x190/0x190 [ 1268.202154] ? downgrade_write+0x3a0/0x3a0 [ 1268.202645] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1268.203301] ? __vma_link_rb+0x540/0x700 [ 1268.203779] dup_mm+0x44d/0x1110 [ 1268.204180] ? vm_area_dup+0x290/0x290 [ 1268.204638] ? __raw_spin_lock_init+0x34/0x100 [ 1268.205173] copy_process+0x2409/0x6650 [ 1268.205648] ? __cleanup_sighand+0xb0/0xb0 [ 1268.206138] ? perf_trace_lock+0xac/0x490 [ 1268.206634] kernel_clone+0xe7/0xa20 [ 1268.207088] ? copy_init_mm+0x20/0x20 [ 1268.207541] ? lock_downgrade+0x6d0/0x6d0 [ 1268.208021] ? find_held_lock+0x2c/0x110 [ 1268.208502] ? ksys_write+0x12d/0x250 [ 1268.208949] __do_sys_clone+0xc8/0x110 [ 1268.209399] ? __do_sys_vfork+0xd0/0xd0 [ 1268.209859] ? rcu_read_lock_any_held+0x69/0x90 [ 1268.210405] ? vfs_write+0x354/0xa20 [ 1268.210839] ? lockdep_hardirqs_on_prepare+0x273/0x3e0 [ 1268.211477] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1268.212088] do_syscall_64+0x33/0x40 [ 1268.212533] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1268.213142] RIP: 0033:0x466609 [ 1268.213511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1268.215673] RSP: 002b:00007f8e17fc1188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1268.216559] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 0000000000466609 [ 1268.217394] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1268.218225] RBP: 00007f8e17fc11d0 R08: 0000000000000000 R09: 0000000000000000 [ 1268.219066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1268.219892] R13: 00007ffe398f16cf R14: 00007f8e17fc1300 R15: 0000000000022000 01:25:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000280)={@empty, @dev, 0x0}, &(0x7f00000002c0)=0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x34}}, 0x0) sendmsg$inet6(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="aa24dd2e5d32a22a43dfdb2074751dcd4242b52843e9761f3ec11a77ad13b01960f982250b4fb41676ffe784335bbf51ef1185d342474bc9f5ee6767f28c6b78040701fb2f", 0x45}, {&(0x7f0000000180)="bf70c7f7a55634e56d415f99c1b55b7abf963b8f0717477dbae692d9540aeb72b0b8805e6ad29f615fceaef6d46d7c55601049a9d4a81f434ccd3dba759abc0a9e56e0a3ea4dfa181ef58a70c44d9049fab3aa580af5631d2866235ed4a9e53eb033d1f155a7011e41e3e58724f2fc7b69dcc332b2a761977033e422eaeb02221ee1fd903d", 0x85}], 0x2, &(0x7f0000000300)=[@dstopts_2292={{0x50, 0x29, 0x4, {0x1d, 0x6, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x1d}}, @hao={0xc9, 0x10, @mcast2}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r2}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r6}}}, @tclass={{0x14, 0x29, 0x43, 0x1f}}, @dstopts_2292={{0x130, 0x29, 0x4, {0x88, 0x22, '\x00', [@generic={0x0, 0xf4, "c4848c620416c8e6a1d318c229ae8beb0a854e1d3cf6a51e2412c9b522e487cd5395a3c18601499dc3ceb29853a42abe66125f053d9c98871453106ff566e9fd3f7b0de02757ee498d96509224c9c52bdd2f0a4aab950f6e4a422d5a13543231e65f184a791eeb985a65b6fa45f9d14390bf2f4f89274e086fd862ac8412a136234a3ef6ff66e5326f0c4e960ae1159b61f5e9ce9f49a8c5165da3f21f05db2fac4a42f4c39bdf521cdf7e8bac6d4d9cd3757389027391d4dc5e0a5010519e4719f9e90840ec2b1dfd6a3b034a3a40b66ae617eeac7c7a28415709b3e5dc347fda09f2048bef12a040d312e839667455606606ff"}, @hao={0xc9, 0x10, @private0}, @jumbo={0xc2, 0x4, 0x3ff}, @enc_lim={0x4, 0x1, 0x1f}]}}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x1d, 0x3, '\x00', [@enc_lim={0x4, 0x1, 0x2}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @ra={0x5, 0x2, 0x7}, @ra={0x5, 0x2, 0x5}]}}}], 0x220}, 0xc000) [ 1280.048776] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:25:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff026044, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:25:43 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xfd, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x43bb98c, 0x200000) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000140)=0x1e) 01:25:43 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x18000000) 01:25:43 executing program 7 (fault-call:1 fault-nth:77): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:25:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfec00000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:25:43 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x6000000, 0x0) 01:25:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) r1 = request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='%0,[@-\x00', 0xfffffffffffffffb) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) sendmsg$nl_generic(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x16, 0x22d}, 0x14}, 0x1, 0x8100}, 0x0) getsockopt$inet_mreqsrc(r3, 0x0, 0x27, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, &(0x7f0000000080)=0x7, 0x4) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000080), 0x0, r1) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:25:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000280)={@empty, @dev, 0x0}, &(0x7f00000002c0)=0xc) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r4, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}]}, 0x34}}, 0x0) sendmsg$inet6(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="aa24dd2e5d32a22a43dfdb2074751dcd4242b52843e9761f3ec11a77ad13b01960f982250b4fb41676ffe784335bbf51ef1185d342474bc9f5ee6767f28c6b78040701fb2f", 0x45}, {&(0x7f0000000180)="bf70c7f7a55634e56d415f99c1b55b7abf963b8f0717477dbae692d9540aeb72b0b8805e6ad29f615fceaef6d46d7c55601049a9d4a81f434ccd3dba759abc0a9e56e0a3ea4dfa181ef58a70c44d9049fab3aa580af5631d2866235ed4a9e53eb033d1f155a7011e41e3e58724f2fc7b69dcc332b2a761977033e422eaeb02221ee1fd903d", 0x85}], 0x2, &(0x7f0000000300)=[@dstopts_2292={{0x50, 0x29, 0x4, {0x1d, 0x6, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x1d}}, @hao={0xc9, 0x10, @mcast2}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r2}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty, r6}}}, @tclass={{0x14, 0x29, 0x43, 0x1f}}, @dstopts_2292={{0x130, 0x29, 0x4, {0x88, 0x22, '\x00', [@generic={0x0, 0xf4, "c4848c620416c8e6a1d318c229ae8beb0a854e1d3cf6a51e2412c9b522e487cd5395a3c18601499dc3ceb29853a42abe66125f053d9c98871453106ff566e9fd3f7b0de02757ee498d96509224c9c52bdd2f0a4aab950f6e4a422d5a13543231e65f184a791eeb985a65b6fa45f9d14390bf2f4f89274e086fd862ac8412a136234a3ef6ff66e5326f0c4e960ae1159b61f5e9ce9f49a8c5165da3f21f05db2fac4a42f4c39bdf521cdf7e8bac6d4d9cd3757389027391d4dc5e0a5010519e4719f9e90840ec2b1dfd6a3b034a3a40b66ae617eeac7c7a28415709b3e5dc347fda09f2048bef12a040d312e839667455606606ff"}, @hao={0xc9, 0x10, @private0}, @jumbo={0xc2, 0x4, 0x3ff}, @enc_lim={0x4, 0x1, 0x1f}]}}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x1d, 0x3, '\x00', [@enc_lim={0x4, 0x1, 0x2}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @ra={0x5, 0x2, 0x7}, @ra={0x5, 0x2, 0x5}]}}}], 0x220}, 0xc000) [ 1286.701342] FAULT_INJECTION: forcing a failure. [ 1286.701342] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.702715] CPU: 0 PID: 8514 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1286.703473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1286.704707] Call Trace: [ 1286.705004] dump_stack+0x107/0x163 [ 1286.705405] should_fail.cold+0x5/0xa [ 1286.705838] ? vm_area_dup+0x78/0x290 [ 1286.706270] should_failslab+0x5/0x10 [ 1286.706692] kmem_cache_alloc+0x5b/0x350 [ 1286.707144] vm_area_dup+0x78/0x290 [ 1286.707558] ? avc_has_perm_noaudit+0x1ca/0x3a0 [ 1286.708070] ? lock_downgrade+0x6d0/0x6d0 [ 1286.708526] ? perf_trace_lock+0xac/0x490 [ 1286.708982] ? copy_page_range+0x242d/0x3810 [ 1286.709481] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1286.710055] ? __lockdep_reset_lock+0x180/0x180 [ 1286.710576] ? avc_has_perm_noaudit+0x1f8/0x3a0 [ 1286.711091] ? avc_has_extended_perms+0xec0/0xec0 [ 1286.711647] ? dup_mm+0x631/0x1110 [ 1286.712037] ? vm_area_alloc+0x110/0x110 [ 1286.712499] ? selinux_vm_enough_memory+0x10f/0x170 [ 1286.713044] ? selinux_sb_statfs+0x250/0x250 [ 1286.713520] ? up_write+0x191/0x550 [ 1286.713927] ? percpu_counter_add_batch+0x8b/0x130 [ 1286.714477] ? __vm_enough_memory+0x184/0x360 [ 1286.714973] ? security_vm_enough_memory_mm+0x8b/0xc0 [ 1286.715545] dup_mm+0x44d/0x1110 [ 1286.715920] ? vm_area_dup+0x290/0x290 [ 1286.716351] ? __raw_spin_lock_init+0x34/0x100 [ 1286.716850] copy_process+0x2409/0x6650 [ 1286.717301] ? __cleanup_sighand+0xb0/0xb0 [ 1286.717768] ? __bpf_prog_run32+0x8f/0xd0 [ 1286.718234] ? perf_trace_lock+0xac/0x490 [ 1286.718696] kernel_clone+0xe7/0xa20 [ 1286.719136] ? copy_init_mm+0x20/0x20 [ 1286.719565] ? lock_downgrade+0x6d0/0x6d0 [ 1286.720008] ? find_held_lock+0x2c/0x110 [ 1286.720453] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1286.721015] ? __seccomp_filter+0x236/0x1470 [ 1286.721507] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1286.722021] __do_sys_clone+0xc8/0x110 [ 1286.722458] ? __do_sys_vfork+0xd0/0xd0 [ 1286.722919] ? __secure_computing+0xb4/0x290 [ 1286.723419] do_syscall_64+0x33/0x40 [ 1286.723826] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1286.724386] RIP: 0033:0x466609 [ 1286.724745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1286.726766] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1286.727612] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1286.728391] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1286.729176] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1286.729954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1286.730742] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:25:43 executing program 7 (fault-call:1 fault-nth:78): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:25:43 executing program 4: ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x20) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000000c0)={0x2ac4000, 0x1000, 0x6, 0x59, 0x2, "9b68b6eedd67bd92bcf0a16a6210340019e781"}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:25:43 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xfd, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x43bb98c, 0x200000) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000140)=0x1e) 01:25:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff0f0000, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:25:43 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x7000000, 0x0) 01:25:43 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff000000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1286.883851] FAULT_INJECTION: forcing a failure. [ 1286.883851] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.886391] CPU: 1 PID: 8543 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1286.887926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1286.890366] Call Trace: [ 1286.890937] dump_stack+0x107/0x163 [ 1286.891737] should_fail.cold+0x5/0xa [ 1286.892562] ? create_object.isra.0+0x3a/0xa20 [ 1286.893558] should_failslab+0x5/0x10 [ 1286.894373] kmem_cache_alloc+0x5b/0x350 [ 1286.895317] create_object.isra.0+0x3a/0xa20 [ 1286.896337] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1286.897433] kmem_cache_alloc+0x159/0x350 [ 1286.898348] vm_area_dup+0x78/0x290 [ 1286.899154] ? _cond_resched+0x12/0x80 [ 1286.899998] ? copy_page_range+0x242d/0x3810 [ 1286.900990] ? vm_area_alloc+0x110/0x110 [ 1286.901868] ? up_write+0x191/0x550 [ 1286.902654] ? vm_iomap_memory+0x190/0x190 [ 1286.903595] ? downgrade_write+0x3a0/0x3a0 [ 1286.904629] ? anon_vma_interval_tree_insert+0x277/0x450 [ 1286.905933] ? __vma_link_rb+0x540/0x700 [ 1286.906911] dup_mm+0x44d/0x1110 [ 1286.907730] ? vm_area_dup+0x290/0x290 [ 1286.908578] ? __raw_spin_lock_init+0x34/0x100 [ 1286.909553] copy_process+0x2409/0x6650 [ 1286.910446] ? __cleanup_sighand+0xb0/0xb0 [ 1286.911405] ? __bpf_prog_run32+0x8f/0xd0 [ 1286.912312] ? perf_trace_lock+0xac/0x490 [ 1286.913251] kernel_clone+0xe7/0xa20 [ 1286.914071] ? copy_init_mm+0x20/0x20 [ 1286.914933] ? lock_downgrade+0x6d0/0x6d0 [ 1286.915845] ? find_held_lock+0x2c/0x110 [ 1286.916766] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1286.917891] ? __seccomp_filter+0x236/0x1470 [ 1286.918858] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1286.919910] __do_sys_clone+0xc8/0x110 [ 1286.920759] ? __do_sys_vfork+0xd0/0xd0 [ 1286.921648] ? __secure_computing+0xb4/0x290 [ 1286.922617] do_syscall_64+0x33/0x40 [ 1286.923449] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1286.924564] RIP: 0033:0x466609 [ 1286.925273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1286.929308] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1286.930956] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1286.932522] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1286.934079] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1286.935644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1286.937196] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 [ 1297.599979] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:26:00 executing program 7 (fault-call:1 fault-nth:79): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:26:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xff0f0000, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_open_dev$rtc(&(0x7f0000000080), 0xe75, 0x200000) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r2, 0x8008f511, &(0x7f0000000100)) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f00000000c0)={r1, 0xfff, 0x5, 0x6}) clone(0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 01:26:00 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x3f000000) 01:26:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xfd, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x43bb98c, 0x200000) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000140)=0x1e) 01:26:00 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xf000000, 0x0) 01:26:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xffffff91, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:26:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x6}, 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000001a00)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000540)={'geneve0\x00'}) r3 = openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x109001, 0x1, 0xc}, 0x18) recvfrom$inet6(r0, &(0x7f0000001900)=""/193, 0xc1, 0x1, &(0x7f00000006c0)={0xa, 0x4e24, 0x7, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x20}}, 0x80}, 0x1c) sendmsg$inet6(r3, &(0x7f0000001bc0)={&(0x7f0000000140)={0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0x1c, &(0x7f0000001840)=[{&(0x7f0000000180)="27a549e425546fbfcc2bb466617b304bb1e1cf0a033695a7e28d6ffecf8c276a051779760821ac9230fbdadee11a608e1943466e94459200ca0e284b8078d9536b022db27686d954b8e243aa2512a8877479e63d2fb8d55520b435ccfc34ad725dae2d784b27", 0x66}, {&(0x7f0000000200)="b5f4c06c16e5a856f1cb89bfe53b5226ab8b91aa2316cb4856519b8ad237067b9fd69e8b3709fa11e7e1fe7d2bdad2e6385c7da4cd30477c6a6b54ee12a3b22545d2c3cf22a03a427a39ec55c8f752c0922a4ccc7dfac446dea9a14ea89b0eb7bc1aff3c6458956bdc3427dc198ac0751eb765a87ffb448a1f3322504e6dec1205d67e826a", 0x85}, {&(0x7f00000002c0)="2d883e2ab34814f41f64daae47c570e5ce368e07dadb582e94f1453bb1a570564716ac7ad9e251d8d92fe46a273a771cfc61782968b6ab41fe2ecb65154e09072eb8e831f22e32b1920467951afdac4ebf38cd74d5ac43b675b512d4601e0bf6f871c10b59c4ecd6be28834de27b5f1a32c97c099a3fa0bb7cd5d7", 0x7b}, {&(0x7f0000000340)="600c1714120cde9c2c68cc901f44ec56b95cf6a4ee463743cc0f08e7ea030f6c837fc399a798da8dc9c4bfd5d32f1bd5303e818ada7fcce8b33b61855b7b429488e0f68792106e4a79ad95ff02f0b18d7442ab29d51cc0f68e5e22fef550254bf1e22c2631f249bbd8a7e927d3e94fd8c8031ea6a30ab4236b8568a376dba635411f64dcfb66db7ed05ab9bfe8d2fc0fd625ba8a9d07899dc6c99f2302fdb5f57ff7b1a7", 0xa4}, {&(0x7f0000000400)="4a77e9ea15a1b22d31f3b31c1a6ddeab87f5da68f0d949e7e4707d323e531379f902a8212aed10140410596fdbe91eb3e1e887d5fde1e4d221bc0f1b6e029854a10f04b1015e9bfec746b03fdc96167a1890188b2589fe7e2d2c40ea3ccdb39f41222d2b7ba5647544a978858e1d33b870cd2843ab7139a57b70fca3643934d8370edb38536762dd63d886ad760f2e722f46ac076afbe5d8a34aaa24bfba9354220968712e828f29b5f236", 0xab}, {&(0x7f0000000580)="ba9eedd02ea2556b19d65ae4660d34e8bb57121c3aeab3a81866f0944734c8b0042a4f36777e88b20bf349e9afe51c23cee58709a4e2e647440beeb1ac8ab8cb0e098da3162c7c8e0b733651505fa7e065ffdb5e59f4ebef7ff8793c5ea152f529bdba013304e951050ac39dcfe743f786686cfd1491ce9858442c6e90b0558fa281660c077fa0ac58e7b8803de2ad059c66c7d507ecb0ac29aa43078a45aa76dc73adcfa4f6f73c10406f1d8dc7eb5670f8cbf069486f8fb139f54a29a16266356a4b83205cf7e0bab27e4cd8316dc01062", 0xd2}, {&(0x7f00000004c0)="2caa418c3751c92f3570d80ee01ced83904b28c881e959d0f76f8168f25e0505d58bb7dd6137be7c73a1c855d2f4de853d487b5c338ac10a4b207ab056ca569cbfc19a57708fb6db0afc7a1fff23212421d5b7b885ea7057e1dc608b91f314", 0x5f}, {&(0x7f0000001700)="b7cee023886b3abf9bf0b799c36b2a3d618ad993cea8331dc93958823b39152f6d4099e778fc7934c3a05c8d3a8057e93c14cae95c6984d2453fe49662eb5bd8d3a1ded2c6bb768a4eabaad4f165b708a9", 0x51}, {&(0x7f0000001a40)="4bd36dacbb6a2052c0c5c66873a967bede3bc87fb58f3a2d91752beead611e2a3bb831c6cd2127ea97b9b998a96a4234223aa734ca02f8eea6595a22b87795aa727c67f575df2f6cf4a54b4907f5bfc2d7bbb31a8c73f14a72f75d0d8e14aef360e59d37082db0f0219e85efe6268fc79999ad8d85fc818277902a5e89360b8e78a8b9415568", 0x86}, {&(0x7f0000000680)="0a00e3acf0a1dd0246986954322124f2994831fb3fd3e08b5a40443153560dff5a78", 0x22}], 0xa, &(0x7f0000001e80)=ANY=[@ANYBLOB="28000000000000002900000039000000000202bd00000000fe880000000000000000000000000101780000000000000029000000390000003c0c00090000000000000000000000000000000000000000fe8000000000000000000000000000bb00000000000000000000000000000000ff0100000000000000000000000000010000000000000000000000000000000100000000000000000000ffffffffffff2400000000000000290000003200000020010000000000000000000000000002", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRESDEC=r3], 0x288}, 0x0) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1304.289436] FAULT_INJECTION: forcing a failure. [ 1304.289436] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.292783] CPU: 0 PID: 8574 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1304.294724] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1304.298011] Call Trace: [ 1304.298756] dump_stack+0x107/0x163 [ 1304.299837] should_fail.cold+0x5/0xa [ 1304.300891] ? anon_vma_clone+0xdc/0x580 [ 1304.301982] should_failslab+0x5/0x10 [ 1304.303014] kmem_cache_alloc+0x5b/0x350 [ 1304.304125] anon_vma_clone+0xdc/0x580 [ 1304.305200] anon_vma_fork+0x82/0x630 [ 1304.306224] ? __vm_enough_memory+0x184/0x360 [ 1304.307499] dup_mm+0x861/0x1110 [ 1304.308474] ? vm_area_dup+0x290/0x290 [ 1304.309590] ? __raw_spin_lock_init+0x34/0x100 [ 1304.310891] copy_process+0x2409/0x6650 [ 1304.312078] ? __cleanup_sighand+0xb0/0xb0 [ 1304.313259] ? __bpf_prog_run32+0x8f/0xd0 [ 1304.314412] ? perf_trace_lock+0xac/0x490 [ 1304.315611] kernel_clone+0xe7/0xa20 [ 1304.316669] ? copy_init_mm+0x20/0x20 [ 1304.317732] ? lock_downgrade+0x6d0/0x6d0 [ 1304.318857] ? find_held_lock+0x2c/0x110 [ 1304.319968] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1304.321353] ? __seccomp_filter+0x236/0x1470 [ 1304.322544] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1304.323879] __do_sys_clone+0xc8/0x110 [ 1304.324964] ? __do_sys_vfork+0xd0/0xd0 [ 1304.326134] ? __secure_computing+0xb4/0x290 [ 1304.327407] do_syscall_64+0x33/0x40 [ 1304.328489] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1304.329943] RIP: 0033:0x466609 [ 1304.330851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.336054] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1304.338204] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1304.340230] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1304.342232] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1304.344268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1304.346272] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:26:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xfd, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x43bb98c, 0x200000) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000140)=0x1e) 01:26:00 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x80040000) 01:26:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xffffff91, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffff5, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:26:00 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:26:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24, 0x2, @mcast1, 0x80000001}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000080)={0x21}, 0x8) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:00 executing program 7 (fault-call:1 fault-nth:80): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:26:01 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x11000000, 0x0) [ 1304.649097] FAULT_INJECTION: forcing a failure. [ 1304.649097] name failslab, interval 1, probability 0, space 0, times 0 [ 1304.650479] CPU: 1 PID: 8610 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1304.651236] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1304.652460] Call Trace: [ 1304.652752] dump_stack+0x107/0x163 [ 1304.653154] should_fail.cold+0x5/0xa [ 1304.653564] ? create_object.isra.0+0x3a/0xa20 [ 1304.654068] should_failslab+0x5/0x10 [ 1304.654474] kmem_cache_alloc+0x5b/0x350 [ 1304.654929] create_object.isra.0+0x3a/0xa20 [ 1304.655399] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1304.655962] kmem_cache_alloc+0x159/0x350 [ 1304.656410] anon_vma_clone+0xdc/0x580 [ 1304.656847] anon_vma_fork+0x82/0x630 [ 1304.657269] ? __vm_enough_memory+0x184/0x360 [ 1304.657768] dup_mm+0x861/0x1110 [ 1304.658153] ? vm_area_dup+0x290/0x290 [ 1304.658592] ? __raw_spin_lock_init+0x34/0x100 [ 1304.659116] copy_process+0x2409/0x6650 [ 1304.659589] ? __cleanup_sighand+0xb0/0xb0 [ 1304.660063] ? __bpf_prog_run32+0x8f/0xd0 [ 1304.660518] ? perf_trace_lock+0xac/0x490 [ 1304.660975] kernel_clone+0xe7/0xa20 [ 1304.661379] ? copy_init_mm+0x20/0x20 [ 1304.661782] ? lock_downgrade+0x6d0/0x6d0 [ 1304.662230] ? find_held_lock+0x2c/0x110 [ 1304.662660] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1304.663219] ? __seccomp_filter+0x236/0x1470 [ 1304.663698] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1304.664200] __do_sys_clone+0xc8/0x110 [ 1304.664616] ? __do_sys_vfork+0xd0/0xd0 [ 1304.665066] ? __secure_computing+0xb4/0x290 [ 1304.665541] do_syscall_64+0x33/0x40 [ 1304.665958] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1304.666504] RIP: 0033:0x466609 [ 1304.666879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1304.669042] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1304.669927] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1304.670761] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1304.671599] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1304.672424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1304.673261] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:26:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x2}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 1315.454212] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:26:24 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x14020000, 0x0) 01:26:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xfd, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) syz_open_dev$vcsa(&(0x7f0000000000), 0x43bb98c, 0x200000) 01:26:24 executing program 7 (fault-call:1 fault-nth:81): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:26:24 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x8cffffff) 01:26:24 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0xfffffff5, @loopback}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:24 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:26:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, '\x00', 0x2d}, 0x8}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x3}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) [ 1328.277114] audit: type=1326 audit(1629163584.703:16): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8638 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 01:26:24 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xe5ffffff) [ 1328.303998] FAULT_INJECTION: forcing a failure. [ 1328.303998] name failslab, interval 1, probability 0, space 0, times 0 [ 1328.307296] CPU: 1 PID: 8641 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1328.309203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1328.312396] Call Trace: [ 1328.313138] dump_stack+0x107/0x163 [ 1328.314165] should_fail.cold+0x5/0xa [ 1328.315245] ? down_write+0xe0/0x150 [ 1328.316331] ? anon_vma_clone+0xdc/0x580 [ 1328.317492] should_failslab+0x5/0x10 [ 1328.318575] kmem_cache_alloc+0x5b/0x350 [ 1328.319748] anon_vma_clone+0xdc/0x580 [ 1328.320894] anon_vma_fork+0x82/0x630 [ 1328.321937] ? __vm_enough_memory+0x184/0x360 [ 1328.323206] dup_mm+0x861/0x1110 [ 1328.324227] ? vm_area_dup+0x290/0x290 [ 1328.325353] ? __raw_spin_lock_init+0x34/0x100 [ 1328.326664] copy_process+0x2409/0x6650 [ 1328.327857] ? __cleanup_sighand+0xb0/0xb0 [ 1328.329068] ? __bpf_prog_run32+0x8f/0xd0 [ 1328.330260] ? perf_trace_lock+0xac/0x490 [ 1328.331465] kernel_clone+0xe7/0xa20 [ 1328.332543] ? copy_init_mm+0x20/0x20 [ 1328.333620] ? lock_downgrade+0x6d0/0x6d0 [ 1328.334812] ? find_held_lock+0x2c/0x110 [ 1328.335987] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1328.337457] ? __seccomp_filter+0x236/0x1470 [ 1328.338719] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1328.340076] __do_sys_clone+0xc8/0x110 [ 1328.341202] ? __do_sys_vfork+0xd0/0xd0 [ 1328.342383] ? __secure_computing+0xb4/0x290 [ 1328.343673] do_syscall_64+0x33/0x40 [ 1328.344756] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1328.346234] RIP: 0033:0x466609 [ 1328.347149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1328.352443] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1328.354631] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1328.356683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1328.358728] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1328.360803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1328.362858] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:26:24 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xfd, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) [ 1329.096090] audit: type=1326 audit(1629163585.523:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8638 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 01:26:41 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) clone(0x80000, &(0x7f0000000080)="16e587e25672c8166547ed4f87944cd19c32521175a4071e9b28e88243b449c485b51ab2ed6250ccc4ca1d40ebd32c91ba5e8130958d10dd3a34fdc093b180e2ca2c85913ab48d9a2eafcf2be369f648d5db0e2c177b5541e28c8dc4db47abd7e456a658d7236551ac296e4523", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="f2147c9d275190d950c9896d2663c2d72f5281044297782147ba") 01:26:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:26:41 executing program 7 (fault-call:1 fault-nth:82): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:26:41 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x3f000000, 0x0) 01:26:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xf6ffffff) 01:26:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x2}}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:41 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0xfd, 0x7fffffff}]}) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) 01:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x7ff, @dev={0xfe, 0x80, '\x00', 0x1b}, 0x8}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r1, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) fallocate(r0, 0x14, 0x6, 0x5) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r2, 0x11, 0x67, &(0x7f0000000080)=0x6, 0x4) sendmsg$inet6(r2, &(0x7f0000000880)={&(0x7f0000000000)={0xa, 0xe22, 0x0, @loopback}, 0x1c, 0x0}, 0x8801) sendmmsg$inet6(r2, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}], 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f00000001c0)={'sit0\x00', &(0x7f0000000140)={'ip6tnl0\x00', 0x0, 0x2f, 0xe6, 0xc8, 0x100, 0x43, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, @local, 0x80, 0x8000, 0x7, 0x2}}) sendmmsg$inet6(r1, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, 0x0}}], 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8000}, 0x1c) [ 1344.646988] FAULT_INJECTION: forcing a failure. [ 1344.646988] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.648733] CPU: 0 PID: 8684 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1344.649749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1344.651396] Call Trace: [ 1344.651803] dump_stack+0x107/0x163 [ 1344.652358] should_fail.cold+0x5/0xa [ 1344.652937] ? create_object.isra.0+0x3a/0xa20 [ 1344.653632] should_failslab+0x5/0x10 [ 1344.654181] kmem_cache_alloc+0x5b/0x350 [ 1344.654796] create_object.isra.0+0x3a/0xa20 [ 1344.655386] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1344.656100] kmem_cache_alloc+0x159/0x350 [ 1344.656734] anon_vma_clone+0xdc/0x580 [ 1344.657343] anon_vma_fork+0x82/0x630 [ 1344.657920] ? __vm_enough_memory+0x184/0x360 [ 1344.658592] dup_mm+0x861/0x1110 [ 1344.659122] ? vm_area_dup+0x290/0x290 [ 1344.659704] ? __raw_spin_lock_init+0x34/0x100 [ 1344.660411] copy_process+0x2409/0x6650 [ 1344.661033] ? __cleanup_sighand+0xb0/0xb0 [ 1344.661668] ? __bpf_prog_run32+0x8f/0xd0 [ 1344.662282] ? perf_trace_lock+0xac/0x490 [ 1344.662887] kernel_clone+0xe7/0xa20 [ 1344.663426] ? copy_init_mm+0x20/0x20 [ 1344.663974] ? lock_downgrade+0x6d0/0x6d0 [ 1344.664605] ? find_held_lock+0x2c/0x110 [ 1344.665192] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1344.665932] ? __seccomp_filter+0x236/0x1470 [ 1344.666558] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1344.667200] __do_sys_clone+0xc8/0x110 [ 1344.667754] ? __do_sys_vfork+0xd0/0xd0 [ 1344.668336] ? __secure_computing+0xb4/0x290 [ 1344.668962] do_syscall_64+0x33/0x40 [ 1344.669485] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1344.670189] RIP: 0033:0x466609 [ 1344.670639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.673242] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1344.674286] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1344.675293] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1344.676298] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.677290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1344.678287] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:26:41 executing program 1: memfd_create(&(0x7f0000000080)='#^\x00', 0x3) 01:26:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) r1 = creat(&(0x7f0000000140)='./file0/file0\x00', 0x2e3) connect$inet6(r1, &(0x7f0000002ac0)={0xa, 0x4e20, 0x10000, @remote, 0xfffffff7}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0xfff, 0x2) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r2, 0xf502, 0x0) 01:26:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x3}}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xfeffffff) 01:26:41 executing program 7 (fault-call:1 fault-nth:83): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:26:41 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x80040000, 0x0) 01:26:41 executing program 1: memfd_create(&(0x7f0000000080)='#^\x00', 0x3) 01:26:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x227b, 0xffffffffffffffff) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x227b, 0xffffffffffffffff) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1344.951974] FAULT_INJECTION: forcing a failure. [ 1344.951974] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.953705] CPU: 1 PID: 8720 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1344.954659] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1344.956217] Call Trace: [ 1344.956515] dump_stack+0x107/0x163 [ 1344.956928] should_fail.cold+0x5/0xa [ 1344.957362] ? anon_vma_clone+0xdc/0x580 [ 1344.957818] should_failslab+0x5/0x10 [ 1344.958239] kmem_cache_alloc+0x5b/0x350 [ 1344.958696] anon_vma_clone+0xdc/0x580 [ 1344.959137] anon_vma_fork+0x82/0x630 [ 1344.959562] ? __vm_enough_memory+0x184/0x360 [ 1344.960048] dup_mm+0x861/0x1110 [ 1344.960451] ? vm_area_dup+0x290/0x290 [ 1344.960891] ? __raw_spin_lock_init+0x34/0x100 [ 1344.961425] copy_process+0x2409/0x6650 [ 1344.961885] ? __cleanup_sighand+0xb0/0xb0 [ 1344.962355] ? __bpf_prog_run32+0x8f/0xd0 [ 1344.962816] ? perf_trace_lock+0xac/0x490 [ 1344.963282] kernel_clone+0xe7/0xa20 [ 1344.963692] ? copy_init_mm+0x20/0x20 [ 1344.964121] ? lock_downgrade+0x6d0/0x6d0 [ 1344.964589] ? find_held_lock+0x2c/0x110 [ 1344.965043] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1344.965599] ? __seccomp_filter+0x236/0x1470 [ 1344.966103] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1344.966632] __do_sys_clone+0xc8/0x110 [ 1344.967075] ? __do_sys_vfork+0xd0/0xd0 [ 1344.967532] ? __secure_computing+0xb4/0x290 [ 1344.968030] do_syscall_64+0x33/0x40 [ 1344.968453] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1344.969022] RIP: 0033:0x466609 [ 1344.969368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.971430] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1344.972254] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1344.973056] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1344.973854] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.974656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1344.975457] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:26:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x6}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:26:41 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xfffff000) 01:26:41 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x4}}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) sendmsg$inet6(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="c293cc43fa8450fc40d45b1144bad9a1b95bba3366d79057f3e559b7c60afb6e6d13749addfedc1c4e0cb8052ca246493293ad1525183f9ba955fb066b5999e85ee594a78021301fa4af7c4d9e10a6a6dbbf6ee5385e5ae2c53ea668d74a0328e1c972a4cea1ca1baf1a2e4f2e226db1115c224e41f108c5d66b9a314bdee07bc3087f5e75e76d56bc44f0f935e4a4ff73d9e91cb8d55e438509336df977e4de3a3e627fbc84e37421c7ed27352e42d734da7fb6b3ad8f47806f54b6bc2665c3a5c3646a8f1c482c2e7be0d96a4264ec656fe2e6b7d3341c16ec31e47b36b6cf7f74e81bca2eef", 0xe7}, {&(0x7f0000000200)="4ca43dcd71f60fb76031b8e8bf4102360cb52c8312bf5d48d0d67830abb68fdb551121cec4c61cd46faeca7599d0dc4773148d7603029c55ebbde1dd8431c2c9a2e4", 0x42}, {&(0x7f0000000280)="763acc095519f99d3363115e444623e615297a1f230ebc3722d12637ff3099e41cb5fac18c85896b4dcc26dc72ba2037a20d9e27ffc0c0c09b873e566b8c3c2436ed4a4987cdc7a70e166350fcbe2eec6b1bc1f08100427794b684b054af68d7c246348ff82af13d42e91e451525b85e2a91f70fe0363153cf1c536649b16d5ba8db287336d54524bbaf6909a185d07fab969db7ac4b8c07ae359ab1214b8fd5d74e92efb7", 0xa5}], 0x3, &(0x7f0000000380)=[@dstopts={{0x68, 0x29, 0x37, {0x2f, 0x9, '\x00', [@calipso={0x7, 0x10, {0x1, 0x2, 0x72, 0x5, [0x8]}}, @calipso={0x7, 0x30, {0x3, 0xa, 0x42, 0xb803, [0x1f0a, 0x88, 0x1, 0x1, 0x7]}}, @jumbo={0xc2, 0x4, 0x7f}]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x89, 0x0, '\x00', [@ra={0x5, 0x2, 0x1}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x82}}, @hoplimit={{0x14, 0x29, 0x34, 0x800000}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x62, 0x2, 0x2, 0xf6, 0x0, [@dev={0xfe, 0x80, '\x00', 0x1b}]}}}, @rthdr={{0x78, 0x29, 0x39, {0x62, 0xc, 0x1, 0x20, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @empty, @loopback, @mcast2, @local, @mcast2]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @dstopts={{0x18, 0x29, 0x37, {0x84}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}], 0x1a0}, 0x880) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f00000005c0)=""/55, 0x37, 0x1, &(0x7f0000000600)={0xa, 0x4e21, 0xffff, @mcast2, 0x1}, 0x1c) 01:26:41 executing program 1: memfd_create(&(0x7f0000000080)='#^\x00', 0x3) 01:26:41 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5, 0x20, 0x1}]}) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x16, 0x22d}, 0x14}, 0x1, 0x8100}, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x27, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r0, 0x3, 0x80000}) [ 1345.082392] audit: type=1326 audit(1629163601.509:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8742 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 1345.917468] audit: type=1326 audit(1629163602.343:19): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=8742 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x466609 code=0x0 [ 1356.281237] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:26:59 executing program 7 (fault-call:1 fault-nth:84): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:26:59 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @local}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:59 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0x8cffffff, 0x0) 01:26:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x7}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:26:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) 01:26:59 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x5}}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:26:59 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xffffff8c) 01:26:59 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x4, 0x5, 0x40, 0x9}, {0x3, 0x1f, 0x7, 0x7f800}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000040)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='cmdline\x00') memfd_create(&(0x7f00000004c0)='((\x90.&:[+-#:}', 0x1) writev(r2, &(0x7f0000000380)=[{&(0x7f0000000040)='1', 0x1}], 0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000640)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000080)={r3, 0x0, r1, 0x400, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000500)) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000040)=0x4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)) r5 = syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') writev(r5, &(0x7f0000000380)=[{&(0x7f0000000040)='1', 0x1}], 0x1) ioctl$KDGETMODE(r5, 0x4b3b, &(0x7f0000000580)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000080)={r6, 0x0, r4, 0x400, 0x80000}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000100)=r6) [ 1363.503616] FAULT_INJECTION: forcing a failure. [ 1363.503616] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.507089] CPU: 0 PID: 8761 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1363.509015] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1363.512176] Call Trace: [ 1363.512939] dump_stack+0x107/0x163 [ 1363.513978] should_fail.cold+0x5/0xa [ 1363.515057] ? create_object.isra.0+0x3a/0xa20 [ 1363.516341] should_failslab+0x5/0x10 [ 1363.517420] kmem_cache_alloc+0x5b/0x350 [ 1363.518584] create_object.isra.0+0x3a/0xa20 [ 1363.519818] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1363.521289] kmem_cache_alloc+0x159/0x350 [ 1363.522491] anon_vma_clone+0xdc/0x580 [ 1363.523616] anon_vma_fork+0x82/0x630 [ 1363.524710] ? __vm_enough_memory+0x184/0x360 [ 1363.525988] dup_mm+0x861/0x1110 [ 1363.526977] ? vm_area_dup+0x290/0x290 [ 1363.528087] ? __raw_spin_lock_init+0x34/0x100 [ 1363.529414] copy_process+0x2409/0x6650 01:26:59 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) [ 1363.530592] ? __cleanup_sighand+0xb0/0xb0 [ 1363.531932] ? __bpf_prog_run32+0x8f/0xd0 [ 1363.532986] ? perf_trace_lock+0xac/0x490 [ 1363.534021] kernel_clone+0xe7/0xa20 [ 1363.534938] ? copy_init_mm+0x20/0x20 [ 1363.535881] ? lock_downgrade+0x6d0/0x6d0 [ 1363.536905] ? find_held_lock+0x2c/0x110 [ 1363.537903] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1363.539187] ? __seccomp_filter+0x236/0x1470 [ 1363.540268] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1363.541258] __do_sys_clone+0xc8/0x110 [ 1363.541815] ? __do_sys_vfork+0xd0/0xd0 [ 1363.542397] ? __secure_computing+0xb4/0x290 [ 1363.543074] do_syscall_64+0x33/0x40 [ 1363.543617] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1363.544363] RIP: 0033:0x466609 [ 1363.544832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.547554] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1363.548722] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1363.549789] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1363.550836] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1363.551899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1363.552937] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:27:00 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) 01:27:00 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x6}}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:27:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x8}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:27:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x10) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1374.901431] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 01:27:17 executing program 7 (fault-call:1 fault-nth:85): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) 01:27:17 executing program 2: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x20000001) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x2, @loopback, 0x4}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x501200, 0x0) sendmsg$inet6(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000240)="d27380bea50b06987ccf3ecf4152b0b410c02abc9ab978e2120a8272616b0ae82f320b23c919220ad2c7b42831b3513d49f2e947b6ce1edcac39c5ddc752a953b126d1353a168a6d2578361f30cb053fef05b9c74e", 0x55}, {&(0x7f00000002c0)="a0d7ed1fb3ad7b4e80a5d0244b36e46ce35a45ed74c846a0a2797bdecf5d66280ed42c1936d0baeee6d2c5b70d972ca980de7668be1a6ceed1155e170eb7a03dd9b5023539eca337c9a223cc82e66014dbd64e9e1917c1d957c0326f89951aefbc309e385e977e6896cce30aedccfa9a29033c84d81bbed98c0e5a0a2ef9821c06d50f18fa15aac21a3ee7ccb34565d711cb6058a6d956004dfc56676d1ae97069bf7c0ee932f8296bb9", 0xaa}, {&(0x7f0000000380)="d6ec5629052b857f04c83343a241bf82811e566caca29184c532e2f1c0fa605f78c5ae48697e0e24aaa1de900811a74a2e958f6e3997aa32769511a09de2e34c305271986a315c779997b380115fadd2b635bb765622dc812461420487354f259556b95d0d326ef931d141b38dc0ce0aaa8a9b6b047d24347b415b5043fe957f697c530de1a58ec97df16caa9b652bbf3d01930b1a631f45c6e84415d773cb83e6c9a0dae1b52fd09250d280435a0f4f09a236afe454fc15503d9b50be70900cdb8e55dcf7468540c162a2e4fca4d25bbb3dc0b680df648a5a09ae6c44", 0xdd}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000000480)="f6d4a99b1236b1130c495f62313f3fa48b4330a7dd727b2e74ac335665a84ed3fdd036f0f65f35324423bf0d64ce96b340e36c5dbf34317beab673263b42442ddab9185fbc25bebf485c7fb8dde6697b9bdf33cd283fbba0d89068038e86a402381fea29fda82fab673347", 0x6b}], 0x5}, 0x4000045) r2 = syz_io_uring_complete(0x0) recvfrom$inet6(r2, &(0x7f0000000080)=""/53, 0x35, 0x40000100, &(0x7f0000000100)={0xa, 0x4e20, 0x80, @mcast1, 0x8}, 0x1c) recvfrom$inet6(r0, &(0x7f00000000c0)=""/48, 0x30, 0x100, &(0x7f0000000180)={0xa, 0x4e22, 0x6, @loopback, 0x80}, 0x1c) r3 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={[0x80]}, 0x8, 0x800) recvfrom$inet6(r3, &(0x7f0000000700)=""/4103, 0x20001700, 0x12101, 0x0, 0xfffffffffffffe9c) 01:27:17 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xffffffe5) 01:27:17 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xe5ffffff, 0x0) 01:27:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) 01:27:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:27:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) getgid() clone(0x100000, &(0x7f0000000080)="43ea9a58c23666295283d179f4a61a3c8f7b1593862ac7ba92e88036fb538cb4e042d9518b951d92d697bf95828909bb354de788f2248fadeea62a50bbcada1a65c2e5d4500ad3de01bad6c8dd04a93e9c6e69e115141baab6d7ec376fa6432895fbf8cbb2796f61d1f857077e8bc913dfe1f5f210c7bdd5dd67bf94398693364394f0d645a65b63abb83cc3d453ab7941b1df20500e69cd7f18775bc0fb09dded4b24c04bee973f5a2422714889534e91439390398eecf972dd96b3892e2e860f212cdf", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="81c90c3067ebe954b2897e83621f67e34d297f6069dfb8b283ec5ba0448f0cadffcdb3b1923fe73ea49bc2b0d6c1d3cde1a8c61b5fd9ee1ab1fadb12854a74191cce61e87b7a91e130ecdb359547e433a42454ded08625f135554a2a76375473ed7d3d553c4a655ef2bdd5ec3b4040aae56c37da8d29f5ffed023bc96c626628d138860720f0f88027be211c37ccb53b867733153436d1512f7a0f78852008ac472ae3d3d83a7f3b8f8d92d389df1a6c596b") 01:27:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x7}}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:27:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x8}}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1381.310387] FAULT_INJECTION: forcing a failure. [ 1381.310387] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.311767] CPU: 0 PID: 8827 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1381.312530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1381.313829] Call Trace: [ 1381.314138] dump_stack+0x107/0x163 [ 1381.314566] should_fail.cold+0x5/0xa [ 1381.315018] ? anon_vma_fork+0xed/0x630 [ 1381.315490] should_failslab+0x5/0x10 [ 1381.315946] kmem_cache_alloc+0x5b/0x350 [ 1381.316419] anon_vma_fork+0xed/0x630 [ 1381.316860] ? __vm_enough_memory+0x184/0x360 [ 1381.317376] dup_mm+0x861/0x1110 [ 1381.317751] ? vm_area_dup+0x290/0x290 [ 1381.318215] ? __raw_spin_lock_init+0x34/0x100 [ 1381.318736] copy_process+0x2409/0x6650 [ 1381.319191] ? __cleanup_sighand+0xb0/0xb0 [ 1381.319657] ? __bpf_prog_run32+0x8f/0xd0 [ 1381.320124] ? perf_trace_lock+0xac/0x490 [ 1381.320584] kernel_clone+0xe7/0xa20 [ 1381.321018] ? copy_init_mm+0x20/0x20 [ 1381.321432] ? lock_downgrade+0x6d0/0x6d0 [ 1381.321904] ? find_held_lock+0x2c/0x110 [ 1381.322384] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1381.322978] ? __seccomp_filter+0x236/0x1470 [ 1381.323501] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1381.324044] __do_sys_clone+0xc8/0x110 [ 1381.324482] ? __do_sys_vfork+0xd0/0xd0 [ 1381.324945] ? __secure_computing+0xb4/0x290 [ 1381.325454] do_syscall_64+0x33/0x40 [ 1381.325880] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1381.326455] RIP: 0033:0x466609 [ 1381.326823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1381.328900] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1381.329777] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1381.330603] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1381.331440] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1381.332274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1381.333098] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:27:17 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0x0) mknod(&(0x7f0000000280)='./file0/../file0/file0\x00', 0xf6ffffff, 0x0) 01:27:17 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xfffffff6) 01:27:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) 01:27:17 executing program 2: fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22, 0x8, @private2, 0x7fffffff}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:27:17 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xe}}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:27:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0xbf, 0x0, 0x7fffffff}]}) clone(0x88001100, 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000000)='\x00', 0x5) 01:27:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x50}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:27:17 executing program 7 (fault-call:1 fault-nth:86): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 1381.473370] FAULT_INJECTION: forcing a failure. [ 1381.473370] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.474822] CPU: 0 PID: 8843 Comm: syz-executor.7 Not tainted 5.10.56 #1 [ 1381.475601] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 1381.476957] Call Trace: [ 1381.477274] dump_stack+0x107/0x163 [ 1381.477698] should_fail.cold+0x5/0xa [ 1381.478140] ? create_object.isra.0+0x3a/0xa20 [ 1381.478670] should_failslab+0x5/0x10 [ 1381.479113] kmem_cache_alloc+0x5b/0x350 [ 1381.479593] create_object.isra.0+0x3a/0xa20 [ 1381.480115] ? __kasan_kmalloc.constprop.0+0xc2/0xd0 [ 1381.480691] kmem_cache_alloc+0x159/0x350 [ 1381.481189] anon_vma_fork+0xed/0x630 [ 1381.481633] ? __vm_enough_memory+0x184/0x360 [ 1381.482154] dup_mm+0x861/0x1110 [ 1381.482537] ? vm_area_dup+0x290/0x290 [ 1381.482988] ? __raw_spin_lock_init+0x34/0x100 [ 1381.483496] copy_process+0x2409/0x6650 [ 1381.483968] ? __cleanup_sighand+0xb0/0xb0 [ 1381.484438] ? __bpf_prog_run32+0x8f/0xd0 [ 1381.484931] ? perf_trace_lock+0xac/0x490 [ 1381.485413] kernel_clone+0xe7/0xa20 [ 1381.485842] ? copy_init_mm+0x20/0x20 [ 1381.486280] ? lock_downgrade+0x6d0/0x6d0 [ 1381.486748] ? find_held_lock+0x2c/0x110 [ 1381.487214] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 1381.487802] ? __seccomp_filter+0x236/0x1470 [ 1381.488312] ? seccomp_notify_ioctl+0xda0/0xda0 [ 1381.488914] __do_sys_clone+0xc8/0x110 [ 1381.489375] ? __do_sys_vfork+0xd0/0xd0 [ 1381.489913] ? __secure_computing+0xb4/0x290 [ 1381.490422] do_syscall_64+0x33/0x40 [ 1381.490912] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1381.491508] RIP: 0033:0x466609 [ 1381.491906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1381.494236] RSP: 002b:00007f8e17fe2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1381.495234] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 0000000000466609 [ 1381.496155] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1381.497096] RBP: 00007f8e17fe21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1381.498024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1381.498951] R13: 00007ffe398f16cf R14: 00007f8e17fe2300 R15: 0000000000022000 01:27:17 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) memfd_create(&(0x7f0000000080)='#^\x00', 0x3) 01:27:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) recvmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x101, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0xfc}}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 01:27:18 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x3}, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback={0x50}}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) 01:27:18 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000080)=0x8000, 0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(&(0x7f0000000240)='\x00', 0x5) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001680)=@updsa={0xf0, 0x1a, 0x1, 0x0, 0x0, {{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0, 0x0, 0x0, 0xee00}, {@in6=@mcast1}, @in=@loopback, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000200)={'wlan0\x00'}) r3 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000100)=0x10) r4 = timerfd_create(0x5, 0x800) ppoll(&(0x7f0000000140)=[{r1, 0x80}, {r0, 0x380}, {r0, 0x1200}, {r3, 0x410}, {r0, 0x40}, {0xffffffffffffffff, 0x80}, {r4, 0x100}], 0x7, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x1ff]}, 0x8) 01:27:18 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="601c6d6b646f736606ecb500080801000440040000f801", 0x17}], 0x0, &(0x7f00000000c0)) openat$incfs(r0, &(0x7f0000000240)='.pending_reads\x00', 0x140, 0xfffffffe) 01:27:18 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x121241, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000100)=0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="7adb50", 0x3}], 0x1}, 0x10044001) recvfrom$inet6(r1, &(0x7f0000000700)=""/4096, 0x20001700, 0x0, 0x0, 0x0) [ 1394.495101] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88800cdd9c00 (size 512): comm "syz-executor.4", pid 8824, jiffies 4296048248 (age 21.674s) hex dump (first 32 bytes): 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................ 00 84 dd 0c 80 88 ff ff 00 f0 75 00 00 c9 ff ff ..........u..... backtrace: [<00000000be95ba29>] do_seccomp+0x2d5/0x25f0 [<00000000e5cb95e2>] do_syscall_64+0x33/0x40 [<00000000363a451a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffffc9000075f000 (size 4096): comm "syz-executor.4", pid 8824, jiffies 4296048248 (age 21.674s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 05 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000080dbb6b7>] __vmalloc_node_range+0x574/0x9e0 [<000000006237a3b1>] __vmalloc_node+0xb5/0x100 [<00000000101a7aeb>] bpf_prog_alloc_no_stats+0x32/0x2b0 [<00000000e77a3ded>] bpf_prog_alloc+0x2c/0x230 [<000000005ae95acd>] bpf_prog_create_from_user+0xad/0x2e0 [<00000000c871b94c>] do_seccomp+0x31a/0x25f0 [<00000000e5cb95e2>] do_syscall_64+0x33/0x40 [<00000000363a451a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: memory leak unreferenced object 0xffff888023432800 (size 1024): comm "syz-executor.4", pid 8824, jiffies 4296048248 (age 21.674s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000f89dfcd1>] bpf_prog_alloc_no_stats+0xb9/0x2b0 [<00000000e77a3ded>] bpf_prog_alloc+0x2c/0x230 [<000000005ae95acd>] bpf_prog_create_from_user+0xad/0x2e0 [<00000000c871b94c>] do_seccomp+0x31a/0x25f0 [<00000000e5cb95e2>] do_syscall_64+0x33/0x40 [<00000000363a451a>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 BUG: leak checking failed VM DIAGNOSIS: 01:27:39 Registers: info registers vcpu 0 RAX=ffffffff83c5d7f0 RBX=ffffffff84c32280 RCX=ffffffff83c45788 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83c5db9f RBP=fffffbfff0986450 RSP=ffffffff84c07e40 R8 =0000000000000001 R9 =ffff88806ce33feb R10=ffffed100d9c67fd R11=0000000000000001 R12=0000000000000000 R13=ffffffff8544fb48 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83c5d7fe RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ffed306c710 CR3=000000000c52e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=cc80000000000000 4007 FPR6=cc80000000000000 4007 FPR7=cdc0000000000000 4008 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=532e29646d432a282e636578652f736f XMM03=00000000000000000000000000000000 XMM04=6b61656c2079726f6d656d203a475542 XMM05=202020200a3066353278302f61313378 XMM06=35396263356530303030303030303c5b XMM07=5f6c6c61637379735f6f64205d3e3265 XMM08=2020200a303478302f333378302b3436 XMM09=346133363330303030303030303c5b20 XMM10=435359535f7972746e65205d3e613135 XMM11=6677685f72657466615f34365f4c4c41 XMM12=0a0a396178302f343478302b656d6172 XMM13=6574616469646e616320636578650e00 XMM14=617473657220726f7475636578651100 XMM15=00007a7a756620636578650900737472 info registers vcpu 1 RAX=ffffffff83c5d7f0 RBX=ffff88800852b280 RCX=ffffffff83c45788 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83c5db9f RBP=ffffed10010a5650 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf33feb R10=ffffed100d9e67fd R11=0000000000000001 R12=0000000000000001 R13=ffffffff8544fb48 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83c5d7fe RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000003e000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe000003c000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000000000970020 CR3=000000000c52e000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=cc80000000000000 4007 FPR6=cc80000000000000 4007 FPR7=cdc0000000000000 4008 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041530f1e00000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000