neric={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0xc, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @private0}, &(0x7f00000000c0)=0x80, 0x80800) r1 = syz_genetlink_get_family_id$mptcp(0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000005100)=ANY=[@ANYBLOB="d37f9372467344811c000000", @ANYRES16=r1, @ANYBLOB="04002dbd7000fcdbdf25060000000800020006000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f00000050c0)={&(0x7f0000004fc0)={0x10, 0x0, 0x0, 0x18aa4}, 0xc, &(0x7f0000005080)={&(0x7f0000005000)={0x4c, r1, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8804}, 0x24040800) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x0, 0x0, 0x149}) r4 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0xf, r3, 0x812}) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000005140)={0x5, 0x9, 0x3585, 0x9, "97aee56f5916f8f3c6386dc1b0e72e95c38cacfc2bb3d234244996876e87624e"}) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f0000004f80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000004f40)={&(0x7f0000000140)={0x4df4, 0x7, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_ID={0x8, 0x9, 0x1, 0x0, 0x3}, @NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_RULE_EXPRESSIONS={0x111c, 0x4, 0x0, 0x1, [{0x58, 0x1, 0x0, 0x1, [@dup_ipv4={{0x8, 0x1, 'dup\x00'}, @void}, @tproxy={{0xb, 0x1, 'tproxy\x00'}, @void}, @payload={{0xc, 0x1, 'payload\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_CSUM_TYPE={0x8, 0x6, 0x1, 0x0, 0x1}, @NFTA_PAYLOAD_OFFSET={0x8, 0x3, 0x1, 0x0, 0x5d}, @NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}, @masq={{0x9, 0x1, 'masq\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x4}]}}]}, {0x10a0, 0x1, 0x0, 0x1, [@immediate={{0xe, 0x1, 'immediate\x00'}, @void}, @target={{0xb, 0x1, 'target\x00'}, @val={0x104c, 0x2, 0x0, 0x1, [@NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TARGET_NAME={0x7, 0x1, '[*\x00'}, @NFTA_TARGET_INFO={0x1004, 0x3, "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"}, @NFTA_TARGET_NAME={0x8, 0x1, '}%{\x00'}, @NFTA_TARGET_NAME={0xc, 0x1, ':*-(%*&\x00'}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x6}, @NFTA_TARGET_NAME={0x10, 0x1, '[$&/@-\',^$+\x00'}, @NFTA_TARGET_REV={0x8, 0x2, 0x1, 0x0, 0x2}]}}, @counter={{0xc, 0x1, 'counter\x00'}, @val={0x28, 0x2, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x401}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xcf2b}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xe8}]}}]}, {0x20, 0x1, 0x0, 0x1, [@connlimit={{0xe, 0x1, 'connlimit\x00'}, @void}, @reject={{0xb, 0x1, 'reject\x00'}, @void}]}]}, @NFTA_RULE_EXPRESSIONS={0x3a1c, 0x4, 0x0, 0x1, [{0x3a18, 0x1, 0x0, 0x1, [@match={{0xa, 0x1, 'match\x00'}, @val={0xb8, 0x2, 0x0, 0x1, [@NFTA_MATCH_INFO={0xb4, 0x3, "9b592eb570f0c8a4c36fea29624336c9b1534c8a52073ddc7430a5ce04d72b0ef2a047e6ee9df66dba457e200e9b10cb5ba55d3d9aae65f189da6749d77dbfe45124b9a996b3a4258f183426825e011ba1ccaf76cfeeacb7c87d00de26860d652e7119429552b1a5a834808598aacdb7feadbd2a7ad6a30ee59c54fc2c6e60724dd86e2de2bb3327f52cbd2d1815a961e2e9d30c4bf2e50c1187be0e84ad17c4fe85c35d8f2c64158fca20e16ab785d2"}]}}, @target={{0xb, 0x1, 'target\x00'}, @void}, @masq={{0x9, 0x1, 'masq\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0xd}, @NFTA_MASQ_REG_PROTO_MAX={0x8, 0x3, 0x1, 0x0, 0x10}, @NFTA_MASQ_FLAGS={0x8, 0x1, 0x1, 0x0, 0x5}]}}, @range={{0xa, 0x1, 'range\x00'}, @val={0x38ac, 0x2, 0x0, 0x1, [@NFTA_RANGE_TO_DATA={0xa4, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}]}, @NFTA_RANGE_TO_DATA={0x2c, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8}]}]}, @NFTA_RANGE_OP={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_RANGE_FROM_DATA={0x1d8, 0x3, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0xcc, 0x1, "f6350d2fe00f3c5a3319518c9cdc1f663ce2096313805944c193ef4b4d09de9fb4dfda1eced73524a45ae1e4659c3cce685dd6ea3870d9c1e74da355a21aa20c31bc4911d9085a7dbe57843467bac0c8b7decc03b2caddefe4ce37ab0241f149cce9e05fc663af1e3837187c9189b560b97d1250d74bf4acac08cf4906428fdf6dfe9f8187bc44ba97b7a3899de8aee7a874b107f694ba11bfe41cd489c4224646f9391b6b800405c9670cc805612e285be502ea0c397ef552524bc0a746ac3b4506d2ae702db9ff"}, @NFTA_DATA_VALUE={0xb9, 0x1, "271d62dcae0bf63b2533bfd60ecf593ca354f3e1221549c7639d2ceddbed48dc6d4e9bfb039be3f9fce60fadb69b3d796d787e556d4d4001881ac4940363e6e1acde42cdd81c147d643986a179c3d9744b4c49f8163059403e875dd63d502d36ddebeba7c4e62f569643a95171a6e3eb5f995d95c1ec7a0290bb2b9fd376d3c1002b34bdbe7bccdae5f203644a46b05bc6a556283aa1423a893e11b547f230a9b13fb27f928d34cde0cba9f76a77a0f08c4fc217b9"}]}, @NFTA_RANGE_TO_DATA={0x20b0, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x34, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VERDICT={0x70, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_RANGE_TO_DATA={0x35c, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x103, 0x1, "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"}, @NFTA_DATA_VALUE={0x94, 0x1, "ed4b75ab684139bedd363e3d7f77b3a5b489ce2af87f00a7609ac3e6d4808ccf374b76e1b47e64e371588d96110a9e5b6943a39dcf3dfa148e6ef658e978246cd3db3a1a760480dd1205771af3d90d85db3130bcfa1f112caf56b5d9c07dbdecadf8cde764c682c0a255f86830ebd7f4d913bf54a17c27fa1d98731c81bc226ccd8d62c37fc7554d7e73a8054858f99a"}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x98, 0x1, "a0f4f2ac41924ab5be6367a5f652b6aedc266ba091cdb78ca958db0ba56e43b4ac863bfe3905cf098b9263291d4b9b9bc7834fbbceddbad622f0e5911409a42bf724032fe2c0430fd5577fd93ff8dd8b89f3d2b8cc58b18f2157e07dcf8125e970e661117d95a1eec6e66fc325e7eee8ca3a6dd63eecd29cea05fd742d7198245613fc439429434f2a82b4b58ff23b7f069d54b8"}, @NFTA_DATA_VALUE={0x54, 0x1, "da0d19e65a7ac2c7c52bb546c213add5b6cedb613425bfbf40f72574b2e7a99d19f17426ce4147956191f7b5dabda29008faf44aa2899b13593b029e985f2f2e086d7229de3129c310dd62ae5224e9da"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}]}]}, @NFTA_RANGE_TO_DATA={0x58, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}, @NFTA_RANGE_TO_DATA={0x1194, 0x4, 0x0, 0x1, [@NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0xc6, 0x1, "fa8cdf2e7b595f1dc6969ac21dd559c9914084571f0fa2562937c25ea74d1da04ffc0c55937b703eee1d66ee902ad531bd136d5e6c22507356e1f0fc07c76c89d9a633e1aa93c657525e2f3693940c4b102755087cf22c152890eadb57d5cd3c46a91fcf988906e68ad58145516e15f6d0e6f270d45795e6d8d8ed5102eaeb5af928a1b2b17ba3c74f95c7c984b8abcd58835abbcbfcbb6b31f2f1337ea736b8e3ab064bbf9048bd71489c98236ebd2935cf2d7fbb231d8bd0d795676c4d349d2b9d"}, @NFTA_DATA_VALUE={0x72, 0x1, "920a4321e97cec93f439cc4133a0d77dca7ea2591a367f88647420930689089911f97a1f88719484384857bfb4560bb92d2151f049eef7d473ef5fdbd3d3b79508f6725b7ca3611b5445429d92e3fe55707c4476e98875eb9648cd2eaffb1a47c46cec6fe5e24b56a61e0698e7f6"}, @NFTA_DATA_VERDICT={0xc, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x38, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}]}}, @lookup={{0xb, 0x1, 'lookup\x00'}, @void}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_TTL={0x5}, @NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_OSF_TTL={0x5, 0x2, 0x42}, @NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_FLAGS={0x8}]}}, @ct={{0x7, 0x1, 'ct\x00'}, @void}, @flow_offload={{0x11, 0x1, 'flow_offload\x00'}, @void}]}]}, @NFTA_RULE_EXPRESSIONS={0x278, 0x4, 0x0, 0x1, [{0x194, 0x1, 0x0, 0x1, [@ct={{0x7, 0x1, 'ct\x00'}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xd}, @NFTA_CT_DIRECTION={0x5, 0x3, 0x1}, @NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0x11}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0xa}, @NFTA_CT_SREG={0x8, 0x4, 0x1, 0x0, 0x11}]}}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_OSF_FLAGS={0x8}, @NFTA_OSF_FLAGS={0x8}]}}, @match={{0xa, 0x1, 'match\x00'}, @val={0x100, 0x2, 0x0, 0x1, [@NFTA_MATCH_NAME={0x5, 0x1, '\x00'}, @NFTA_MATCH_INFO={0xe1, 0x3, "74117deb51487c02bce481ca40a8e0c0a810ddda5c6b7bafa36da1ee7caf7375e6725a2c65517566e2e6df34da286f93a5a7c7283606e42b1ff209dc3fc3c8bbd37c7f8f30f667d20c592c1e20ce227af1df5de6c77c848db0092ec3df17d054eaf281b5f653a91f5030f111fb10291ac9e8d6a209c8464e6f671787f4b55ef37d1dc6e07e2956750dbc9e9aa9b013b752954f937f6c5a6bd4fbb0a6da565fd8ba77c167a72c7c1294b371e738c743c786d51a79f10a201d498b4a97011685a73f5bb1f3061c7f4ef431ec2652367879324ddd964270c404a6fa732fa4"}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_MATCH_NAME={0x6, 0x1, '(\x00'}]}}, @osf={{0x8, 0x1, 'osf\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_OSF_FLAGS={0x8}]}}, @reject={{0xb, 0x1, 'reject\x00'}, @void}, @fib={{0x8, 0x1, 'fib\x00'}, @void}, @hash={{0x9, 0x1, 'hash\x00'}, @void}]}, {0x24, 0x1, 0x0, 0x1, [@xfrm={{0x9, 0x1, 'xfrm\x00'}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_XFRM_DREG={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x3}]}}]}, {0x44, 0x1, 0x0, 0x1, [@connlimit={{0xe, 0x1, 'connlimit\x00'}, @void}, @tunnel={{0xb, 0x1, 'tunnel\x00'}, @void}, @immediate={{0xe, 0x1, 'immediate\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x8}]}}, @osf={{0x8, 0x1, 'osf\x00'}, @void}]}, {0x78, 0x1, 0x0, 0x1, [@socket={{0xb, 0x1, 'socket\x00'}, @void}, @ct={{0x7, 0x1, 'ct\x00'}, @void}, @reject={{0xb, 0x1, 'reject\x00'}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_REJECT_TYPE={0x8}, @NFTA_REJECT_TYPE={0x8}, @NFTA_REJECT_TYPE={0x8, 0x1, 0x1, 0x0, 0x1}]}}, @dup_ipv6={{0x8, 0x1, 'dup\x00'}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_DUP_SREG_DEV={0x8, 0x2, 0x1, 0x0, 0x16}]}}, @dup_ipv6={{0x8, 0x1, 'dup\x00'}, @void}, @synproxy={{0xd, 0x1, 'synproxy\x00'}, @void}, @payload={{0xc, 0x1, 'payload\x00'}, @void}]}]}]}, 0x4df4}, 0x1, 0x0, 0x0, 0x4040004}, 0x20000000) [ 1436.934457][T11877] FAULT_INJECTION: forcing a failure. [ 1436.934457][T11877] name failslab, interval 1, probability 0, space 0, times 0 [ 1436.947123][T11877] CPU: 0 PID: 11877 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1436.957257][T11877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1436.967300][T11877] Call Trace: [ 1436.970580][T11877] dump_stack+0x1b0/0x21e [ 1436.974924][T11877] ? devkmsg_release+0x11c/0x11c [ 1436.979899][T11877] ? show_regs_print_info+0x12/0x12 [ 1436.985091][T11877] ? cred_has_capability+0x18c/0x3f0 [ 1436.990364][T11877] ? cred_has_capability+0x2b2/0x3f0 [ 1436.995635][T11877] should_fail+0x6fb/0x860 [ 1437.000025][T11877] ? setup_fault_attr+0x2b0/0x2b0 [ 1437.005045][T11877] ? slab_free_freelist_hook+0xd0/0x150 [ 1437.010565][T11877] ? cap_capable+0x23f/0x280 [ 1437.015144][T11877] ? proc_pid_stack+0x1d5/0x1f0 [ 1437.019968][T11877] ? proc_pid_stack+0x8e/0x1f0 [ 1437.024719][T11877] should_failslab+0x5/0x20 [ 1437.029209][T11877] kmem_cache_alloc_trace+0x39/0x270 [ 1437.034469][T11877] proc_pid_stack+0x8e/0x1f0 [ 1437.039033][T11877] proc_single_show+0xd3/0x130 [ 1437.043774][T11877] seq_read+0x4aa/0xd30 [ 1437.047909][T11877] do_iter_read+0x43b/0x550 [ 1437.052390][T11877] do_preadv+0x1f4/0x330 [ 1437.056607][T11877] ? do_writev+0x560/0x560 [ 1437.061002][T11877] ? security_file_permission+0x128/0x300 [ 1437.066694][T11877] ? __sb_end_write+0xa4/0xf0 [ 1437.071343][T11877] ? vfs_write+0x427/0x4f0 [ 1437.075736][T11877] do_syscall_64+0xcb/0x150 [ 1437.080216][T11877] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1437.086079][T11877] RIP: 0033:0x45d5b9 [ 1437.089948][T11877] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1437.109530][T11877] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1437.117932][T11877] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1437.125879][T11877] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0xe6a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:42 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1437.133829][T11877] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1437.141776][T11877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000021 [ 1437.149832][T11877] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:42 executing program 5: getdents(0xffffffffffffff9c, &(0x7f0000000000)=""/84, 0x54) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0xc, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000100)=r0) 04:42:42 executing program 5: syz_emit_ethernet(0x32, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb0800490000240000000000009078ac1e00010a010101830bcc09000000000000000704000300"], 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) io_setup(0x401, &(0x7f0000000100)) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, &(0x7f0000000080)={0x3}) timer_delete(r0) 04:42:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:42 executing program 0 (fault-call:15 fault-nth:34): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x13aa}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:42 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0xc, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f00000000c0)="59bc618570c8a8f22d002c07ebeb507690ab446c528280e1581cd9e6e2596ac892387e39c79168ad18b9d5117c0ed5fef0556c45684c0c2a58960158ea123239624ea13b9a4f9382655685fe702d7daebce7355c85353319", 0x58}, {&(0x7f0000000140)="b4059b7ca1f6ad2241c1067f445c01fb727d83aa861b07efdd6ce382c70dcc1d6f389763bb0c60856eae4df5f4904a5801142a85e3d519874f10eb94d3d4c456d53ac838fb78a988bd310a7b40288ac2e2fee17133f88053db411980903906b5", 0x60, 0xde}, {&(0x7f00000001c0)="1588eb14199eda13ebaafc009e8272992e4a1094102fbce9508d98ef455b426b58fa9f9992b4b6b56e1ea38dfb7b96db1a6f1302905bcd42c2ef44053f9f07f0ff125e68349e834ae1ced05a4c51f0c9bf1cfe64a285489e611455d75b2d4cb98e66c505ae8bb1ef5e29d57e2528f9710c3cbd002ed696b83e95391a8502b6461208074c276dbaa160c5ff33cd05ef201e141bcf7200cdbe9de33551f2416d7d6afa8ae9ef125ce9128f623c6b6f1a371bb8baf83be7d23f0e7cef326d23385574a0c191fbd10984038e1917f303fe4b34ab3b7f9e8c9e034f699d3158a34bddbf49d13c3c78ae03d6cb", 0xea, 0x9}], 0x1090040, &(0x7f0000000340)={[{@shortname_lower='shortname=lower'}, {@numtail='nonumtail=0'}, {@nonumtail='nnonumtail=1'}], [{@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x51, 0x61, 0x32, 0x35, 0x34, 0x38, 0x36], 0x2d, [0x61, 0x39, 0x65, 0x31], 0x2d, [0x65, 0x32, 0x32, 0x39], 0x2d, [0x66, 0x31, 0x4, 0x55], 0x2d, [0x30, 0x61, 0x31, 0x37, 0x64, 0x36, 0x64, 0x5a]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, '(&+^-!'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@subj_type={'subj_type'}}, {@permit_directio='permit_directio'}, {@seclabel='seclabel'}]}) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x0, 0x0, 0x149}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000480)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) [ 1437.470171][T11919] FAULT_INJECTION: forcing a failure. [ 1437.470171][T11919] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.482975][T11919] CPU: 0 PID: 11919 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1437.494088][T11919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1437.504123][T11919] Call Trace: [ 1437.507400][T11919] dump_stack+0x1b0/0x21e [ 1437.511711][T11919] ? devkmsg_release+0x11c/0x11c [ 1437.516634][T11919] ? show_regs_print_info+0x12/0x12 [ 1437.521813][T11919] ? cred_has_capability+0x18c/0x3f0 [ 1437.527084][T11919] ? cred_has_capability+0x2b2/0x3f0 [ 1437.532346][T11919] should_fail+0x6fb/0x860 [ 1437.536740][T11919] ? setup_fault_attr+0x2b0/0x2b0 [ 1437.541739][T11919] ? slab_free_freelist_hook+0xd0/0x150 [ 1437.547261][T11919] ? cap_capable+0x23f/0x280 [ 1437.551825][T11919] ? proc_pid_stack+0x1d5/0x1f0 [ 1437.556669][T11919] ? proc_pid_stack+0x8e/0x1f0 [ 1437.561420][T11919] should_failslab+0x5/0x20 [ 1437.565901][T11919] kmem_cache_alloc_trace+0x39/0x270 [ 1437.571161][T11919] proc_pid_stack+0x8e/0x1f0 [ 1437.575724][T11919] proc_single_show+0xd3/0x130 [ 1437.580469][T11919] seq_read+0x4aa/0xd30 [ 1437.584603][T11919] do_iter_read+0x43b/0x550 [ 1437.589083][T11919] do_preadv+0x1f4/0x330 [ 1437.593302][T11919] ? do_writev+0x560/0x560 [ 1437.597699][T11919] ? security_file_permission+0x128/0x300 [ 1437.603390][T11919] ? __sb_end_write+0xa4/0xf0 [ 1437.608042][T11919] ? vfs_write+0x427/0x4f0 [ 1437.612443][T11919] do_syscall_64+0xcb/0x150 [ 1437.616940][T11919] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1437.622806][T11919] RIP: 0033:0x45d5b9 [ 1437.626676][T11919] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1437.646439][T11919] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1437.654830][T11919] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1437.662781][T11919] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1437.670734][T11919] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1437.678682][T11919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000022 [ 1437.686631][T11919] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:42 executing program 5: syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0xb, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private=0xa010101, {[@generic={0x7, 0x11, "930c5fa61ab7be138bb13484535b59"}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000080}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8008080}, 0x10) 04:42:42 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x18ea}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:42 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaabb43a1e9499d54b63dde27ec462d81bbbbbbbbbb080048000020000000afef0a015770830cccae1e00010704000300fafa06e028179d95d5aac68e6f8f48c9b0a879c77707bc823c8e92af294a639e50eb6903a1af490027b8c60086b411a035987c800879db97af12f15040ca1239e6530e5f12883ae17efc36a0ad1d6dd5d570ba8f77baeff9ee8cca11417c7298e44e9faa7e6e25ca880e579a1d8d4878589f72a56dd052cdbf657061da1d9509de0d1f8a9f5100"/197], 0x0) 04:42:42 executing program 0 (fault-call:15 fault-nth:35): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1437.953895][T11937] FAULT_INJECTION: forcing a failure. [ 1437.953895][T11937] name failslab, interval 1, probability 0, space 0, times 0 [ 1437.966545][T11937] CPU: 0 PID: 11937 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1437.976761][T11937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1437.986901][T11937] Call Trace: [ 1437.990191][T11937] dump_stack+0x1b0/0x21e [ 1437.994500][T11937] ? devkmsg_release+0x11c/0x11c [ 1437.999416][T11937] ? show_regs_print_info+0x12/0x12 [ 1438.004593][T11937] ? cred_has_capability+0x18c/0x3f0 [ 1438.010649][T11937] ? cred_has_capability+0x2b2/0x3f0 [ 1438.015915][T11937] should_fail+0x6fb/0x860 [ 1438.020310][T11937] ? setup_fault_attr+0x2b0/0x2b0 [ 1438.025315][T11937] ? slab_free_freelist_hook+0xd0/0x150 [ 1438.030839][T11937] ? cap_capable+0x23f/0x280 [ 1438.036099][T11937] ? proc_pid_stack+0x1d5/0x1f0 [ 1438.040938][T11937] ? proc_pid_stack+0x8e/0x1f0 [ 1438.046225][T11937] should_failslab+0x5/0x20 [ 1438.050748][T11937] kmem_cache_alloc_trace+0x39/0x270 [ 1438.056165][T11937] proc_pid_stack+0x8e/0x1f0 [ 1438.060739][T11937] proc_single_show+0xd3/0x130 [ 1438.065505][T11937] seq_read+0x4aa/0xd30 [ 1438.069649][T11937] do_iter_read+0x43b/0x550 [ 1438.074131][T11937] do_preadv+0x1f4/0x330 [ 1438.078350][T11937] ? do_writev+0x560/0x560 [ 1438.082748][T11937] ? security_file_permission+0x128/0x300 [ 1438.088469][T11937] ? __sb_end_write+0xa4/0xf0 [ 1438.093135][T11937] ? vfs_write+0x427/0x4f0 [ 1438.097539][T11937] do_syscall_64+0xcb/0x150 [ 1438.102027][T11937] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1438.107900][T11937] RIP: 0033:0x45d5b9 [ 1438.111796][T11937] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1438.131385][T11937] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1438.139865][T11937] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:42:43 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:43 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = pidfd_open(r0, 0x0) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0xc, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) fcntl$getown(r1, 0x9) 04:42:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x1e2a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1438.148079][T11937] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1438.156035][T11937] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1438.164001][T11937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000023 [ 1438.171969][T11937] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:43 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x105580, 0x40) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) 04:42:43 executing program 5: syz_emit_ethernet(0xc4, &(0x7f00000000c0)={@local, @multicast, @void, {@llc_tr={0x11, {@llc={0x0, 0xe231148777b03387, "1a27", "0ce29b57417f5bd43bc9c59e8e85036140623e74c7499fbfd4a541af422dc37ff644b54894cd9cdcfbd7180c03338718b5b79995d1c387a6f0acc7c45d68122a402a796332cec9a9cdea7af6fcf432c951e33ed5f61925626b7fe581beaef541e25aaba76828daf9c3da241698bd74cce0d18b8f937a22362fbc3a08b675ef1af2ddbe52907f032759436658a13aa0b4cca1a2fe186c2a3c05dc51a23f42b51b0a3cd32d145744de270f506ee68f108331cc"}}}}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x8008f511, &(0x7f0000000040)) 04:42:43 executing program 0 (fault-call:15 fault-nth:36): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:43 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa000000000000927894dd00041603009281000000c7cd7338c5be18ff7a4bc2d45789ef0ee4a3372b2167fe2bad79bb"], 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r1, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x0, 0x0, 0x149}) r2 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0xf, r1, 0x812}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @dev={0xac, 0x14, 0x14, 0xc}, @loopback}, 0xc) 04:42:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x236a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1438.394471][T11973] FAULT_INJECTION: forcing a failure. [ 1438.394471][T11973] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.407213][T11973] CPU: 0 PID: 11973 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1438.418509][T11973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1438.428856][T11973] Call Trace: [ 1438.433147][T11973] dump_stack+0x1b0/0x21e [ 1438.437452][T11973] ? devkmsg_release+0x11c/0x11c [ 1438.442363][T11973] ? show_regs_print_info+0x12/0x12 [ 1438.448153][T11973] ? cred_has_capability+0x18c/0x3f0 [ 1438.453877][T11973] ? cred_has_capability+0x2b2/0x3f0 [ 1438.459219][T11973] should_fail+0x6fb/0x860 [ 1438.465200][T11973] ? setup_fault_attr+0x2b0/0x2b0 [ 1438.470227][T11973] ? slab_free_freelist_hook+0xd0/0x150 [ 1438.475757][T11973] ? cap_capable+0x23f/0x280 [ 1438.480346][T11973] ? proc_pid_stack+0x1d5/0x1f0 [ 1438.485192][T11973] ? proc_pid_stack+0x8e/0x1f0 [ 1438.489943][T11973] should_failslab+0x5/0x20 [ 1438.494432][T11973] kmem_cache_alloc_trace+0x39/0x270 [ 1438.499713][T11973] proc_pid_stack+0x8e/0x1f0 [ 1438.504283][T11973] proc_single_show+0xd3/0x130 [ 1438.509041][T11973] seq_read+0x4aa/0xd30 [ 1438.513172][T11973] do_iter_read+0x43b/0x550 [ 1438.517652][T11973] do_preadv+0x1f4/0x330 [ 1438.521877][T11973] ? do_writev+0x560/0x560 [ 1438.526284][T11973] ? security_file_permission+0x128/0x300 [ 1438.531990][T11973] ? __sb_end_write+0xa4/0xf0 [ 1438.537350][T11973] ? vfs_write+0x427/0x4f0 [ 1438.541741][T11973] do_syscall_64+0xcb/0x150 [ 1438.546251][T11973] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1438.552116][T11973] RIP: 0033:0x45d5b9 [ 1438.556002][T11973] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1438.576219][T11973] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1438.585482][T11973] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:42:43 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0xc, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r1 = creat(&(0x7f0000002300)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) ioctl$CHAR_RAW_DISCARD(r1, 0x1277, &(0x7f00000000c0)=0x5) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x0, 0x0, 0x149}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) [ 1438.593471][T11973] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1438.601429][T11973] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1438.609377][T11973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000024 [ 1438.617363][T11973] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:43 executing program 0 (fault-call:15 fault-nth:37): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1438.885420][T11987] FAULT_INJECTION: forcing a failure. [ 1438.885420][T11987] name failslab, interval 1, probability 0, space 0, times 0 [ 1438.901757][T11987] CPU: 0 PID: 11987 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1438.911897][T11987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1438.922049][T11987] Call Trace: [ 1438.925329][T11987] dump_stack+0x1b0/0x21e [ 1438.929659][T11987] ? devkmsg_release+0x11c/0x11c [ 1438.934576][T11987] ? show_regs_print_info+0x12/0x12 [ 1438.939758][T11987] ? cred_has_capability+0x18c/0x3f0 [ 1438.946509][T11987] ? cred_has_capability+0x2b2/0x3f0 [ 1438.951808][T11987] should_fail+0x6fb/0x860 [ 1438.956218][T11987] ? setup_fault_attr+0x2b0/0x2b0 [ 1438.961224][T11987] ? slab_free_freelist_hook+0xd0/0x150 [ 1438.966753][T11987] ? cap_capable+0x23f/0x280 [ 1438.971325][T11987] ? proc_pid_stack+0x1d5/0x1f0 [ 1438.976414][T11987] ? proc_pid_stack+0x8e/0x1f0 [ 1438.981441][T11987] should_failslab+0x5/0x20 [ 1438.986025][T11987] kmem_cache_alloc_trace+0x39/0x270 [ 1438.991322][T11987] proc_pid_stack+0x8e/0x1f0 [ 1438.995903][T11987] proc_single_show+0xd3/0x130 [ 1439.000672][T11987] seq_read+0x4aa/0xd30 [ 1439.004826][T11987] do_iter_read+0x43b/0x550 [ 1439.009325][T11987] do_preadv+0x1f4/0x330 [ 1439.013551][T11987] ? do_writev+0x560/0x560 [ 1439.017953][T11987] ? security_file_permission+0x128/0x300 [ 1439.023653][T11987] ? __sb_end_write+0xa4/0xf0 [ 1439.028327][T11987] ? vfs_write+0x427/0x4f0 [ 1439.032734][T11987] do_syscall_64+0xcb/0x150 [ 1439.037220][T11987] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1439.043097][T11987] RIP: 0033:0x45d5b9 [ 1439.047077][T11987] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1439.066670][T11987] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1439.075065][T11987] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:42:44 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:44 executing program 5: syz_emit_ethernet(0x10da, &(0x7f00000001c0)={@local, @remote, @void, {@ipv4={0x800, @igmp={{0x31, 0x4, 0x2, 0x8, 0x10cc, 0x65, 0x0, 0x1b, 0x2, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x40}, {[@cipso={0x86, 0x6b, 0x7fffffffffffffff, [{0x6, 0xc, "64846228a2ccf1de9cb3"}, {0x5, 0xd, "08004abe2a3d864a960b39"}, {0x0, 0xb, "95323e28e29b29bfe5"}, {0x0, 0xd, "3f8191c12a8a3d4a1ca09e"}, {0xc11334a7ea879096, 0x4, '[%'}, {0x0, 0xc, "d8bd16ee5867ef8ec8ff"}, {0x6, 0xf, "16e39973357c64bf42052593cf"}, {0x2, 0xf, "31b5c2694a2ac7a0ba7d6a76f3"}, {0x2, 0x6, "15106a7e"}]}, @timestamp_prespec={0x44, 0xc, 0x3c, 0x3, 0x3, [{@empty, 0x8}]}, @end, @timestamp_addr={0x44, 0x1c, 0xbb, 0x1, 0x3, [{@rand_addr=0x64010102}, {@loopback}, {@private=0xa010102, 0x4}]}, @ra={0x94, 0x4}, @generic={0x7, 0x12, "d8706a026cec0464a506adccac7d7c0a"}, @ra={0x94, 0x4}]}}, {0x15, 0x1f, 0x0, @local, "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"}}}}}, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./bus\x00', 0xffffffffffffffff, 0x3, &(0x7f0000001400)=[{&(0x7f00000012c0)="4c6724473f779f78ccf4c408d3a02cbb4d122c14d62f95541c3d0d8bfacf79e9c7a824d0adad8d1b06c19036cd0b1df764f943d3bd5b1b4a7e943dfb34a3b249d6648cf8ec6f2e4854676d5d629346480a7571f8", 0x54, 0x10001}, {&(0x7f0000001340)="387bb8b0c698a362692eb8c532b43931298e5995984089b50cb902f19a6298b23f44ef958f13b0ad7e4a64736204726492ce3b4ecd2e32351217892919de9d656d0656722b38505420a9", 0x4a, 0x853}, {&(0x7f00000013c0)="7027a37ac8cbb90a91b430c3a579183eef2fe8da15caab4637c655a3f91deb601f49", 0x22, 0x20}], 0x10208b9, &(0x7f0000001480)={[{@fat=@dmask={'dmask', 0x3d, 0x2}}, {@uni_xlateno='uni_xlate=0'}, {@fat=@flush='flush'}, {@shortname_lower='shortname=lower'}, {@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@dont_measure='dont_measure'}, {@subj_user={'subj_user', 0x3d, ':'}}]}) readv(r0, &(0x7f0000001640)=[{&(0x7f0000001500)=""/76, 0x4c}, {&(0x7f0000001580)=""/22, 0x16}, {&(0x7f00000015c0)=""/80, 0x50}], 0x3) r1 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) write$FUSE_BMAP(r1, 0x0, 0x0) getsockopt$sock_timeval(r1, 0x1, 0x5d, &(0x7f0000000000), &(0x7f0000000040)=0x10) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$RTC_UIE_OFF(0xffffffffffffffff, 0x7004) 04:42:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x28aa}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:44 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x7, 0x4, 0x0, 0x0, 0x1c, 0x68, 0x0, 0x0, 0x2e, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0x7, 0xcc, [@private=0xa010100]}, @end]}}}}}}, 0x0) [ 1439.083019][T11987] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1439.091239][T11987] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1439.099213][T11987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000025 [ 1439.107175][T11987] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:44 executing program 0 (fault-call:15 fault-nth:38): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:44 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbb8b3dcefd4800ac1e00010a010101830cccac1e00010704000300a4ffc5b52400a56f6f105d9c32506300b64943"], 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f00000000c0)=""/156) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r1 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) fallocate(r1, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x0, 0x0, 0x149}) r2 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0xf, r1, 0x812}) ioctl$F2FS_IOC_FLUSH_DEVICE(r2, 0x4008f50a, &(0x7f0000000000)={0x3, 0x401}) [ 1439.296132][T12017] FAULT_INJECTION: forcing a failure. [ 1439.296132][T12017] name failslab, interval 1, probability 0, space 0, times 0 [ 1439.308754][T12017] CPU: 0 PID: 12017 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1439.318978][T12017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1439.329127][T12017] Call Trace: [ 1439.332408][T12017] dump_stack+0x1b0/0x21e [ 1439.336758][T12017] ? devkmsg_release+0x11c/0x11c [ 1439.341686][T12017] ? show_regs_print_info+0x12/0x12 [ 1439.346980][T12017] ? cred_has_capability+0x18c/0x3f0 [ 1439.352678][T12017] ? cred_has_capability+0x2b2/0x3f0 [ 1439.357958][T12017] should_fail+0x6fb/0x860 [ 1439.362468][T12017] ? setup_fault_attr+0x2b0/0x2b0 [ 1439.367485][T12017] ? slab_free_freelist_hook+0xd0/0x150 [ 1439.373035][T12017] ? cap_capable+0x23f/0x280 [ 1439.377595][T12017] ? proc_pid_stack+0x1d5/0x1f0 [ 1439.382433][T12017] ? proc_pid_stack+0x8e/0x1f0 [ 1439.387176][T12017] should_failslab+0x5/0x20 [ 1439.391678][T12017] kmem_cache_alloc_trace+0x39/0x270 [ 1439.396950][T12017] proc_pid_stack+0x8e/0x1f0 [ 1439.401539][T12017] proc_single_show+0xd3/0x130 [ 1439.406280][T12017] seq_read+0x4aa/0xd30 [ 1439.410441][T12017] do_iter_read+0x43b/0x550 [ 1439.414916][T12017] do_preadv+0x1f4/0x330 [ 1439.419794][T12017] ? do_writev+0x560/0x560 [ 1439.424210][T12017] ? security_file_permission+0x128/0x300 [ 1439.429931][T12017] ? __sb_end_write+0xa4/0xf0 [ 1439.434610][T12017] ? vfs_write+0x427/0x4f0 [ 1439.439021][T12017] do_syscall_64+0xcb/0x150 [ 1439.443497][T12017] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1439.449388][T12017] RIP: 0033:0x45d5b9 [ 1439.453272][T12017] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1439.472862][T12017] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1439.481261][T12017] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1439.489221][T12017] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:44 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0xc, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 04:42:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x2dea}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1439.497172][T12017] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1439.505135][T12017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000026 [ 1439.513260][T12017] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:44 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaeaabbbbbbbbbbbb0800480000200000000000009078ac1e00010a010101830cccac1e00010704000300"], 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="04a732e24483fa2212367f6c4e8d7ce6", 0x10) 04:42:44 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaa8afea4ecbbbbbbbb0800068d3bbc010101830cccac1b00010704000300"/46], 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f00000000c0)=r0) 04:42:45 executing program 0 (fault-call:15 fault-nth:39): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:45 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:45 executing program 5: r0 = socket(0x11, 0x3, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r0, &(0x7f00000016c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="be8f7f173c23a8e6aec20b95b096d386e3da1c72541b42b5efea7387a012607612f337e877bcae6bab00964c099914c8b9e010d3e80ae573377e010631a87d092e0dfbec2a0f92ca1a2c005a7870d7ab3daeaa55ae11e4e785cd", 0x5a, 0x42010, &(0x7f00000000c0)={0x11, 0xf7, r2, 0x1, 0xc6, 0x6, @broadcast}, 0x14) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0xc, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) 04:42:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x332a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1440.076114][T12052] FAULT_INJECTION: forcing a failure. [ 1440.076114][T12052] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.089004][T12052] CPU: 1 PID: 12052 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1440.099239][T12052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.109373][T12052] Call Trace: [ 1440.112672][T12052] dump_stack+0x1b0/0x21e [ 1440.117015][T12052] ? devkmsg_release+0x11c/0x11c [ 1440.121933][T12052] ? show_regs_print_info+0x12/0x12 [ 1440.127640][T12052] ? cred_has_capability+0x18c/0x3f0 [ 1440.132908][T12052] ? cred_has_capability+0x2b2/0x3f0 [ 1440.138193][T12052] should_fail+0x6fb/0x860 [ 1440.142610][T12052] ? setup_fault_attr+0x2b0/0x2b0 [ 1440.147637][T12052] ? slab_free_freelist_hook+0xd0/0x150 [ 1440.153180][T12052] ? cap_capable+0x23f/0x280 [ 1440.157776][T12052] ? proc_pid_stack+0x1d5/0x1f0 [ 1440.162605][T12052] ? proc_pid_stack+0x8e/0x1f0 [ 1440.167362][T12052] should_failslab+0x5/0x20 [ 1440.171848][T12052] kmem_cache_alloc_trace+0x39/0x270 [ 1440.177223][T12052] proc_pid_stack+0x8e/0x1f0 [ 1440.181803][T12052] proc_single_show+0xd3/0x130 [ 1440.186820][T12052] seq_read+0x4aa/0xd30 [ 1440.190959][T12052] do_iter_read+0x43b/0x550 [ 1440.195442][T12052] do_preadv+0x1f4/0x330 [ 1440.199661][T12052] ? do_writev+0x560/0x560 [ 1440.204092][T12052] ? security_file_permission+0x128/0x300 [ 1440.210002][T12052] ? __sb_end_write+0xa4/0xf0 [ 1440.214684][T12052] ? vfs_write+0x427/0x4f0 [ 1440.219094][T12052] do_syscall_64+0xcb/0x150 [ 1440.223669][T12052] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1440.229728][T12052] RIP: 0033:0x45d5b9 [ 1440.233619][T12052] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1440.253217][T12052] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1440.261610][T12052] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:42:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x386a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:45 executing program 5: ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000040)={0xa, 0x6, 0x6}) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0xc, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) r0 = creat(&(0x7f0000002300)='./bus\x00', 0x0) ftruncate(r0, 0x12081ff) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000000)={0x76, 0x2}) [ 1440.269840][T12052] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1440.277806][T12052] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1440.285843][T12052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000027 [ 1440.293892][T12052] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:45 executing program 5: ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f0000000000)={0x0, 0x2, [0x10001, 0x2, 0x3, 0x7097, 0x1, 0x1000000]}) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @private=0xa010101, {[@lsrr={0x83, 0x7, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) 04:42:45 executing program 5: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @generic={{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@lsrr={0x83, 0x7, 0xcc, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000000c0)={0x1, &(0x7f0000000000)="8c20b515f334e0931a7b008258", &(0x7f0000000040)=""/22}, 0x20) 04:42:45 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="6c000000d52acc5677983c73f82d0d4ac2ec6d31d147721a8a39bbaf1919bdba2ed468d7d20b4aed725b036d9f9221d79dd2b8c5ea4fca2738a4b69aa7478dcbb05f9580d2a41924c6cdfec9f806d100872d0472bdbbfe746ce4afdb7fbcad994b5dde5489d7061a140c437ca77f6811a3bb7ec08d75217983d558038bfd74d72a9be1daa82ec73e3fcf2a4b146d0869bafc38eef82316bb66df296b3256a99c45a3bfa578e53e90e35435add4cf27fcda04f07e2703a74dad4ffc4973e825559a4366137a5f32bfb926480c09c0f8c8cfab6f7fd5fddb6bc144eebe9d1a79d455c652ef230800000000000000f5fc6914d509c33552", @ANYRES16=r1, @ANYBLOB="6ffe000000000000000003000000580001800d0001007564703a73797a310000000044000400200002000a0000000000000000000068000000140000ffffac1e000100000000200002000a00000000004000fe8000000000000000000000000000bb00000000"], 0x6c}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r1, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4004000) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x60000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="a3cc224c35f0fd099084145ebd9d022381af6ef8456a103f0b60129e626accbeec8ce4873611776ea8195d339690e3fd2792e8b7e7af8354e7187956a376e52d10251d448c1232f05acee5e28e7c2ced8b3d80f9cc83a8b898a0a9bbd4a3da08851746", @ANYRES16, @ANYBLOB="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"], 0x154}}, 0x8004800) syz_emit_ethernet(0x2e, &(0x7f0000000080)=ANY=[@ANYRES16], 0x0) 04:42:45 executing program 0 (fault-call:15 fault-nth:40): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:45 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r1, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x4000000, 0x0, 0x149}) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000000)={0x0, 0x3, [0x1, 0x20, 0x8, 0x31cb, 0x6, 0x5]}) r2 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) write$FUSE_BMAP(r2, 0x0, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000040)={0x2000000, 0x2, 0x9b, 0x400, 0x0, "cb4e79d3a537bef9e017f8a4c642b50e1c0f19"}) syz_emit_ethernet(0x2e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaa0e11aaaaaabbbbbbbbbbbb070048050020f948019100009078ac1e000300001e00"/48], 0x0) 04:42:45 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x3daa}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1440.628312][T12080] FAULT_INJECTION: forcing a failure. [ 1440.628312][T12080] name failslab, interval 1, probability 0, space 0, times 0 [ 1440.640993][T12080] CPU: 0 PID: 12080 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1440.651137][T12080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1440.661178][T12080] Call Trace: [ 1440.664468][T12080] dump_stack+0x1b0/0x21e [ 1440.668952][T12080] ? devkmsg_release+0x11c/0x11c [ 1440.673869][T12080] ? show_regs_print_info+0x12/0x12 [ 1440.679046][T12080] ? cred_has_capability+0x18c/0x3f0 [ 1440.684308][T12080] ? cred_has_capability+0x2b2/0x3f0 [ 1440.689578][T12080] should_fail+0x6fb/0x860 [ 1440.693981][T12080] ? setup_fault_attr+0x2b0/0x2b0 [ 1440.699018][T12080] ? slab_free_freelist_hook+0xd0/0x150 [ 1440.704542][T12080] ? cap_capable+0x23f/0x280 [ 1440.709111][T12080] ? proc_pid_stack+0x1d5/0x1f0 [ 1440.713934][T12080] ? proc_pid_stack+0x8e/0x1f0 [ 1440.718680][T12080] should_failslab+0x5/0x20 [ 1440.723162][T12080] kmem_cache_alloc_trace+0x39/0x270 [ 1440.728424][T12080] proc_pid_stack+0x8e/0x1f0 [ 1440.733004][T12080] proc_single_show+0xd3/0x130 [ 1440.737745][T12080] seq_read+0x4aa/0xd30 [ 1440.741889][T12080] do_iter_read+0x43b/0x550 [ 1440.746456][T12080] do_preadv+0x1f4/0x330 [ 1440.750685][T12080] ? do_writev+0x560/0x560 [ 1440.755332][T12080] ? security_file_permission+0x128/0x300 [ 1440.761053][T12080] ? __sb_end_write+0xa4/0xf0 [ 1440.765708][T12080] ? vfs_write+0x427/0x4f0 [ 1440.770104][T12080] do_syscall_64+0xcb/0x150 [ 1440.774599][T12080] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1440.780489][T12080] RIP: 0033:0x45d5b9 [ 1440.784460][T12080] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1440.804045][T12080] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1440.812441][T12080] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1440.820408][T12080] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:45 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1440.828362][T12080] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1440.836312][T12080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000028 [ 1440.845570][T12080] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x42ea}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:46 executing program 5 (fault-call:5 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:46 executing program 0 (fault-call:15 fault-nth:41): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$CHAR_RAW_IOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000000)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0), 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x5000f4) ioctl$TCSBRK(r2, 0x5409, 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) [ 1441.035935][T12112] FAULT_INJECTION: forcing a failure. [ 1441.035935][T12112] name failslab, interval 1, probability 0, space 0, times 0 [ 1441.048685][T12112] CPU: 1 PID: 12112 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1441.058827][T12112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.068866][T12112] Call Trace: [ 1441.072166][T12112] dump_stack+0x1b0/0x21e [ 1441.076489][T12112] ? devkmsg_release+0x11c/0x11c [ 1441.081413][T12112] ? show_regs_print_info+0x12/0x12 [ 1441.086596][T12112] ? cred_has_capability+0x18c/0x3f0 [ 1441.091866][T12112] ? cred_has_capability+0x2b2/0x3f0 [ 1441.097138][T12112] should_fail+0x6fb/0x860 [ 1441.101540][T12112] ? setup_fault_attr+0x2b0/0x2b0 [ 1441.106552][T12112] ? slab_free_freelist_hook+0xd0/0x150 [ 1441.112084][T12112] ? cap_capable+0x23f/0x280 [ 1441.116663][T12112] ? proc_pid_stack+0x1d5/0x1f0 [ 1441.121501][T12112] ? proc_pid_stack+0x8e/0x1f0 [ 1441.126254][T12112] should_failslab+0x5/0x20 [ 1441.130750][T12112] kmem_cache_alloc_trace+0x39/0x270 [ 1441.136028][T12112] proc_pid_stack+0x8e/0x1f0 [ 1441.140632][T12112] proc_single_show+0xd3/0x130 [ 1441.145388][T12112] seq_read+0x4aa/0xd30 [ 1441.149558][T12112] do_iter_read+0x43b/0x550 [ 1441.154052][T12112] do_preadv+0x1f4/0x330 [ 1441.158283][T12112] ? do_writev+0x560/0x560 [ 1441.162690][T12112] ? security_file_permission+0x128/0x300 [ 1441.168392][T12112] ? __sb_end_write+0xa4/0xf0 [ 1441.173051][T12112] ? vfs_write+0x427/0x4f0 [ 1441.177459][T12112] do_syscall_64+0xcb/0x150 [ 1441.181942][T12112] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1441.187893][T12112] RIP: 0033:0x45d5b9 [ 1441.191766][T12112] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1441.211358][T12112] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1441.219743][T12112] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1441.227689][T12112] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x482a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:46 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x20, 0x0, 0x5000f4) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, &(0x7f0000000040)={0x1, 'veth0_to_hsr\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x42201, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r4, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r3, 0x0, 0x0, 0x149}) r5 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0xf, r4, 0x812}) ioctl$TCSETS2(r5, 0x402c542b, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x8, "36cfe9537217829ae3c72a476a4c0665b17110", 0x4000}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='ip6erspan0\x00') dup3(r2, r1, 0x0) [ 1441.235722][T12112] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1441.243668][T12112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000029 [ 1441.251615][T12112] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:46 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:46 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r1, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x0, 0x0, 0x149}) r2 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0xf, r1, 0x812}) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r3, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r3, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r4, r3, 0x0) unshare(0x10800) 04:42:46 executing program 0 (fault-call:15 fault-nth:42): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x4d6a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$FIONCLEX(r0, 0x5450) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:46 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x52aa}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1441.836919][T12160] FAULT_INJECTION: forcing a failure. [ 1441.836919][T12160] name failslab, interval 1, probability 0, space 0, times 0 [ 1441.849694][T12160] CPU: 1 PID: 12160 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1441.859828][T12160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1441.870041][T12160] Call Trace: [ 1441.873335][T12160] dump_stack+0x1b0/0x21e [ 1441.877648][T12160] ? devkmsg_release+0x11c/0x11c [ 1441.882653][T12160] ? show_regs_print_info+0x12/0x12 [ 1441.887830][T12160] ? cred_has_capability+0x18c/0x3f0 [ 1441.893105][T12160] ? cred_has_capability+0x2b2/0x3f0 [ 1441.898380][T12160] should_fail+0x6fb/0x860 [ 1441.902795][T12160] ? setup_fault_attr+0x2b0/0x2b0 [ 1441.907807][T12160] ? slab_free_freelist_hook+0xd0/0x150 [ 1441.913330][T12160] ? cap_capable+0x23f/0x280 [ 1441.917895][T12160] ? proc_pid_stack+0x1d5/0x1f0 [ 1441.922718][T12160] ? proc_pid_stack+0x8e/0x1f0 [ 1441.927466][T12160] should_failslab+0x5/0x20 [ 1441.931946][T12160] kmem_cache_alloc_trace+0x39/0x270 [ 1441.937206][T12160] proc_pid_stack+0x8e/0x1f0 [ 1441.941770][T12160] proc_single_show+0xd3/0x130 [ 1441.946507][T12160] seq_read+0x4aa/0xd30 [ 1441.950643][T12160] do_iter_read+0x43b/0x550 [ 1441.955121][T12160] do_preadv+0x1f4/0x330 [ 1441.959348][T12160] ? do_writev+0x560/0x560 [ 1441.963743][T12160] ? security_file_permission+0x128/0x300 [ 1441.969434][T12160] ? __sb_end_write+0xa4/0xf0 [ 1441.974099][T12160] ? vfs_write+0x427/0x4f0 [ 1441.978495][T12160] do_syscall_64+0xcb/0x150 [ 1441.982981][T12160] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1441.988846][T12160] RIP: 0033:0x45d5b9 [ 1441.992722][T12160] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1442.012313][T12160] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1442.020699][T12160] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1442.028662][T12160] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1442.036609][T12160] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1442.044553][T12160] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002a [ 1442.052506][T12160] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x5000f4) syz_open_pts(r1, 0x204200) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x1, 0x0, 0x0, 0x0, "fca8825900"}) r3 = socket$xdp(0x2c, 0x3, 0x0) dup3(r3, r0, 0x0) 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) socket$xdp(0x2c, 0x3, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) syz_open_pts(r1, 0x44042) dup3(r1, r0, 0x0) 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = creat(&(0x7f0000002300)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r2, r0, 0x0) 04:42:47 executing program 0 (fault-call:15 fault-nth:43): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1442.322945][T12181] FAULT_INJECTION: forcing a failure. [ 1442.322945][T12181] name failslab, interval 1, probability 0, space 0, times 0 [ 1442.335548][T12181] CPU: 1 PID: 12181 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1442.345670][T12181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.355825][T12181] Call Trace: [ 1442.359106][T12181] dump_stack+0x1b0/0x21e [ 1442.363676][T12181] ? devkmsg_release+0x11c/0x11c [ 1442.368582][T12181] ? show_regs_print_info+0x12/0x12 [ 1442.373765][T12181] ? cred_has_capability+0x18c/0x3f0 [ 1442.379033][T12181] ? cred_has_capability+0x2b2/0x3f0 [ 1442.385614][T12181] should_fail+0x6fb/0x860 [ 1442.390022][T12181] ? setup_fault_attr+0x2b0/0x2b0 [ 1442.395043][T12181] ? slab_free_freelist_hook+0xd0/0x150 [ 1442.400568][T12181] ? cap_capable+0x23f/0x280 [ 1442.405138][T12181] ? proc_pid_stack+0x1d5/0x1f0 [ 1442.409973][T12181] ? proc_pid_stack+0x8e/0x1f0 [ 1442.414717][T12181] should_failslab+0x5/0x20 [ 1442.419217][T12181] kmem_cache_alloc_trace+0x39/0x270 [ 1442.424475][T12181] proc_pid_stack+0x8e/0x1f0 [ 1442.429057][T12181] proc_single_show+0xd3/0x130 [ 1442.433795][T12181] seq_read+0x4aa/0xd30 [ 1442.437925][T12181] do_iter_read+0x43b/0x550 [ 1442.442402][T12181] do_preadv+0x1f4/0x330 [ 1442.446629][T12181] ? do_writev+0x560/0x560 [ 1442.451019][T12181] ? security_file_permission+0x128/0x300 [ 1442.456739][T12181] ? __sb_end_write+0xa4/0xf0 [ 1442.461386][T12181] ? vfs_write+0x427/0x4f0 [ 1442.465776][T12181] do_syscall_64+0xcb/0x150 [ 1442.470249][T12181] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1442.476111][T12181] RIP: 0033:0x45d5b9 [ 1442.479984][T12181] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1442.499583][T12181] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1442.507973][T12181] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1442.516006][T12181] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:47 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000000)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x57ea}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1442.523965][T12181] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1442.531910][T12181] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002b [ 1442.539878][T12181] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:47 executing program 0 (fault-call:15 fault-nth:44): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r1 = creat(&(0x7f0000002300)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES64=r1], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) socket(0x6, 0xc393378d767dbb47, 0x75) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) close(r2) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r2, r0, 0x0) 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x13, "fca8ff7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0xc1) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f0000000040)={@dev}, &(0x7f0000000140)=0x14) dup3(r1, r0, 0x0) 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x80000) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000000)={0x40000000, 0x4, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000140)="d1982de412e7904d4d987eda1533b00ab5c0b0e59238b8e5be81dc7f36c4c7f51000567a587eba38bf3056e52a8bd6e2d5381623c3a06fe7a8a1ceab", 0x3c, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r1, 0x2) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000180)={0x0, 0x8, 0x0, 0x0, 0x0, "36cfe91000", 0x8, 0xa}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r3 = dup3(r2, r0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={&(0x7f0000000200)="6b3ed1132f96a03ba29f9fc1f3efc481977ad17bfa678306ec3e5b19f485040e99594387552d10bcc598232f49ebe472e041dee096b71a90debbd0a6b5213abd59de6eca68dc5779a7d8590401df432ee216b19ca64160e61aac9f2904aa9a04d0007b2201deafcb367c7db14628836a4a3562add1b19b7227b916fa764c7a0d1b629b6ca567ac41a0f386a838466b3d648c9673fbe3a8058143ddfbc180c068fb1dc94a355301ab50c7ce9b", &(0x7f00000002c0)=""/195, &(0x7f00000003c0)="bdf6a7ae72ce82c0f908dc5b9d7612358aac47a0a21bae0824d1f2128e609b74639f4d0c65693e6f658542ca38be1f1063c0296e1b442b506af664f8ac053ac4544a191414f272200ea43f2e4ab246108c6a946f149d73d434432a40363928b55306c9ed5cd7ea75655baabcd09ae5642ccf4087b79d10004b7c35d73a0461fdead3169a0b8fdb67eacf0269256fa3cb429b5fac39a569558729a331367d24", &(0x7f00000004c0)="96b18b1e536f507bc4ee052692c3446764e27278df1e232cb3ce7aae9b194a7141a3673f54ae33bebf8259d0e500774cfed28067a8d6ae270221eae301756ee323e92d1fd3ab65b1d7334cc8dac0258a8b3632283a9bd18437ecc4b8a25a5f8520ff7167b91864ab4a", 0xab7, r3}, 0x38) 04:42:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = creat(&(0x7f0000002300)='./bus\x00', 0x0) ftruncate(r1, 0x10001) ioctl$KDDISABIO(r1, 0x4b37) r2 = syz_open_pts(r0, 0x0) r3 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0x7}) write$FUSE_BMAP(r3, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000002, 0x4000010, r3, 0x12f03000) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r2, r0, 0x0) [ 1442.706244][T12219] FAULT_INJECTION: forcing a failure. [ 1442.706244][T12219] name failslab, interval 1, probability 0, space 0, times 0 [ 1442.718961][T12219] CPU: 0 PID: 12219 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1442.729092][T12219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1442.739136][T12219] Call Trace: [ 1442.742407][T12219] dump_stack+0x1b0/0x21e [ 1442.746714][T12219] ? devkmsg_release+0x11c/0x11c [ 1442.751626][T12219] ? show_regs_print_info+0x12/0x12 [ 1442.756799][T12219] ? cred_has_capability+0x18c/0x3f0 [ 1442.762057][T12219] ? cred_has_capability+0x2b2/0x3f0 [ 1442.767318][T12219] should_fail+0x6fb/0x860 [ 1442.771720][T12219] ? setup_fault_attr+0x2b0/0x2b0 [ 1442.776730][T12219] ? file_ns_capable+0x1d/0x80 [ 1442.781480][T12219] ? cap_capable+0x23f/0x280 [ 1442.786046][T12219] ? proc_pid_stack+0x8e/0x1f0 [ 1442.790787][T12219] should_failslab+0x5/0x20 [ 1442.795267][T12219] kmem_cache_alloc_trace+0x39/0x270 [ 1442.800526][T12219] proc_pid_stack+0x8e/0x1f0 [ 1442.805092][T12219] proc_single_show+0xd3/0x130 [ 1442.809855][T12219] seq_read+0x4aa/0xd30 [ 1442.814004][T12219] do_iter_read+0x43b/0x550 [ 1442.818497][T12219] do_preadv+0x1f4/0x330 [ 1442.822716][T12219] ? do_writev+0x560/0x560 [ 1442.827112][T12219] ? security_file_permission+0x128/0x300 [ 1442.832805][T12219] ? __sb_end_write+0xa4/0xf0 [ 1442.837455][T12219] ? vfs_write+0x427/0x4f0 [ 1442.841853][T12219] do_syscall_64+0xcb/0x150 [ 1442.846345][T12219] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1442.852225][T12219] RIP: 0033:0x45d5b9 [ 1442.856095][T12219] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1442.875676][T12219] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1442.884062][T12219] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1442.892375][T12219] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1442.900320][T12219] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1442.908263][T12219] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002c [ 1442.916207][T12219] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000200)={0xe4, 0x29, 0x2, {0x6, [{{0x2, 0x4}, 0x1000, 0x38, 0x7, './file0'}, {{0x40, 0x0, 0x7}, 0x5, 0x1, 0x7, './file0'}, {{0x1, 0x4, 0x3}, 0x9, 0xf0, 0x7, './file0'}, {{0x0, 0x4, 0x8}, 0x5, 0xc0, 0x7, './file0'}, {{0x14, 0x0, 0x1}, 0x3, 0x9f, 0x7, './file0'}, {{0x79153deb66dd5f21, 0x0, 0x7}, 0xb95c, 0x95, 0x7, './file0'}, {{0x20, 0x1, 0x1}, 0xfb, 0x44, 0x7, './file0'}]}}, 0xe4) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:48 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x5d2a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:48 executing program 0 (fault-call:15 fault-nth:45): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_pts(r1, 0x48982) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x6, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa0802c}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00082abd7000fcdbdf251500000008000300", @ANYRES32=0x0, @ANYBLOB="36fdb9cbdc43bfedd020e0ecd3b8d1176c4551c66e492e41210fb3821de610093a0c4613c74c637c69f8f1750fa71d8bb9b4a9c53b27d5182d07bdf96f8102eeadf44560d8bd4a337ecd0d428425"], 0x1c}, 0x1, 0x0, 0x0, 0x4040810}, 0x8814) dup3(r1, r0, 0x0) 04:42:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='.)\x00') ioctl$VT_DISALLOCATE(r2, 0x5608) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000200)=0x4) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) uname(&(0x7f0000000140)=""/102) 04:42:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x40000, 0x2, 0x3, 0x1, 0xd1d}, &(0x7f0000000380)=0x20) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000010240)=0x6e) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) open(&(0x7f00000103c0)='./file0/file0\x00', 0x161140, 0x0) write$binfmt_aout(r1, &(0x7f0000010600)=ANY=[@ANYRES32, @ANYRES32, @ANYRESDEC=r1, @ANYRESOCT=r0, @ANYRES32=r0, @ANYRES16=r2, @ANYRES64, @ANYBLOB="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"], 0x4) openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/bsg\x00', 0x41001, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0xffffffff}) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="fff50d224dd838bb45aa298bfa783127121f32277fe9fb6978d25938c9de5e5b99b4479c94ddb416ea81fe291abb20f385654cfb50caeb4771a86781628eee999d227fc7560536e405572353cfe51bd41da1a73d5323d3f3ab9f6990f5a2336942c1b070ec88bd7d1e71fcebb92f3a5b0c758885617872afc4061d41d5e2226c70432288", 0x84, 0x10, &(0x7f0000000000)={0xa, 0x4e22, 0x7c000, @loopback, 0x1000}, 0x1c) readv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) ioctl$BTRFS_IOC_SPACE_INFO(r3, 0xc0109414, &(0x7f00000004c0)={0xa8d, 0x1000, [[], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], [], []]}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) readv(r4, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/140, 0x8c}], 0x1) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000040)={0x13, 0x65, 0xffff, 0x100, 0x6, '9P2000'}, 0x13) dup3(r3, r0, 0x0) [ 1443.528154][T12262] FAULT_INJECTION: forcing a failure. [ 1443.528154][T12262] name failslab, interval 1, probability 0, space 0, times 0 [ 1443.540918][T12262] CPU: 0 PID: 12262 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1443.551055][T12262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1443.561098][T12262] Call Trace: [ 1443.564386][T12262] dump_stack+0x1b0/0x21e [ 1443.568725][T12262] ? devkmsg_release+0x11c/0x11c [ 1443.573650][T12262] ? show_regs_print_info+0x12/0x12 [ 1443.578837][T12262] ? cred_has_capability+0x18c/0x3f0 [ 1443.584117][T12262] ? cred_has_capability+0x2b2/0x3f0 [ 1443.589395][T12262] should_fail+0x6fb/0x860 [ 1443.593818][T12262] ? setup_fault_attr+0x2b0/0x2b0 [ 1443.598834][T12262] ? slab_free_freelist_hook+0xd0/0x150 [ 1443.604396][T12262] ? cap_capable+0x23f/0x280 [ 1443.608994][T12262] ? proc_pid_stack+0x1d5/0x1f0 [ 1443.613832][T12262] ? proc_pid_stack+0x8e/0x1f0 [ 1443.618585][T12262] should_failslab+0x5/0x20 [ 1443.623078][T12262] kmem_cache_alloc_trace+0x39/0x270 [ 1443.628365][T12262] proc_pid_stack+0x8e/0x1f0 [ 1443.632990][T12262] proc_single_show+0xd3/0x130 [ 1443.637753][T12262] seq_read+0x4aa/0xd30 [ 1443.641906][T12262] do_iter_read+0x43b/0x550 [ 1443.646408][T12262] do_preadv+0x1f4/0x330 [ 1443.650643][T12262] ? do_writev+0x560/0x560 [ 1443.655056][T12262] ? security_file_permission+0x128/0x300 [ 1443.660766][T12262] ? __sb_end_write+0xa4/0xf0 [ 1443.665433][T12262] ? vfs_write+0x427/0x4f0 [ 1443.669841][T12262] do_syscall_64+0xcb/0x150 [ 1443.674338][T12262] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1443.680222][T12262] RIP: 0033:0x45d5b9 [ 1443.684113][T12262] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1443.703695][T12262] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1443.712093][T12262] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1443.720069][T12262] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x626a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1443.728021][T12262] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1443.735980][T12262] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002d [ 1443.743931][T12262] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:49 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(0xffffffffffffffff, r0, 0x0) 04:42:49 executing program 0 (fault-call:15 fault-nth:46): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x67aa}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1444.338551][T12304] FAULT_INJECTION: forcing a failure. [ 1444.338551][T12304] name failslab, interval 1, probability 0, space 0, times 0 [ 1444.351297][T12304] CPU: 1 PID: 12304 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1444.361430][T12304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.371466][T12304] Call Trace: [ 1444.374741][T12304] dump_stack+0x1b0/0x21e [ 1444.379051][T12304] ? devkmsg_release+0x11c/0x11c [ 1444.384226][T12304] ? show_regs_print_info+0x12/0x12 [ 1444.389405][T12304] ? cred_has_capability+0x18c/0x3f0 [ 1444.394943][T12304] ? cred_has_capability+0x2b2/0x3f0 [ 1444.400310][T12304] should_fail+0x6fb/0x860 [ 1444.404901][T12304] ? setup_fault_attr+0x2b0/0x2b0 [ 1444.409912][T12304] ? slab_free_freelist_hook+0xd0/0x150 [ 1444.415437][T12304] ? cap_capable+0x23f/0x280 [ 1444.420021][T12304] ? proc_pid_stack+0x1d5/0x1f0 [ 1444.424857][T12304] ? proc_pid_stack+0x8e/0x1f0 [ 1444.429597][T12304] should_failslab+0x5/0x20 [ 1444.434081][T12304] kmem_cache_alloc_trace+0x39/0x270 [ 1444.439604][T12304] proc_pid_stack+0x8e/0x1f0 [ 1444.444184][T12304] proc_single_show+0xd3/0x130 [ 1444.448924][T12304] seq_read+0x4aa/0xd30 [ 1444.453064][T12304] do_iter_read+0x43b/0x550 [ 1444.457545][T12304] do_preadv+0x1f4/0x330 [ 1444.461793][T12304] ? do_writev+0x560/0x560 [ 1444.466187][T12304] ? security_file_permission+0x128/0x300 [ 1444.471881][T12304] ? __sb_end_write+0xa4/0xf0 [ 1444.476534][T12304] ? vfs_write+0x427/0x4f0 [ 1444.480929][T12304] do_syscall_64+0xcb/0x150 [ 1444.485411][T12304] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1444.491279][T12304] RIP: 0033:0x45d5b9 [ 1444.495171][T12304] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1444.514762][T12304] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1444.523155][T12304] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1444.531646][T12304] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1444.539602][T12304] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1444.547562][T12304] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002e [ 1444.555518][T12304] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000002e40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000440)=""/125, 0x7d}], 0x1}, 0x4}, {{&(0x7f0000000680)=@phonet, 0x80, 0x0, 0x0, &(0x7f00000019c0)=""/206, 0xce}, 0x101}, {{&(0x7f0000001ac0)=@hci, 0x80, &(0x7f0000002d40)=[{&(0x7f0000001c40)=""/219, 0xdb}, {&(0x7f0000001d40)=""/4096, 0x1000}], 0x2, &(0x7f0000002d80)=""/148, 0x94}, 0x7fffffff}], 0x3, 0x41, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00002bbd7000fbdbdf2514000000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00f7ffffff06001100ffff000008001500050000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000300000008000b0040000000060011000900000008001500090000000e0001006e657464657673696d0000000f0002006e657464657673696d300000080003000000000008000b007f00000006001100200000000800150000000000080001007063690011000200303030303a30303a31302e3000000000080003000200000008000b00a872000006001100c1ff00000800150000000040080001007063690011000200303030303a30303a31302e3000000000080003000300000008000b0000040000060011000100000008001500ef030000080001007063690011000200303030303a30303a31302e3000000000080003000100000008000b00e8000000060011000600000008001500000000000e0001006e65746465"], 0x1c4}, 0x1, 0x0, 0x0, 0x2000c801}, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0x88, r3, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x8e, 0x3}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}]}, 0x88}, 0x1, 0x0, 0x0, 0x4850}, 0x80) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:49 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x6cea}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:49 executing program 5: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r0 = syz_open_pts(0xffffffffffffffff, 0x4c000) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f825900"}) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000040)=0xa5, 0x4) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000200)={0x6, "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"}) ioctl$F2FS_IOC_FLUSH_DEVICE(0xffffffffffffffff, 0x4008f50a, &(0x7f0000000000)={0x370, 0x69}) dup3(r0, 0xffffffffffffffff, 0x0) 04:42:49 executing program 0 (fault-call:15 fault-nth:47): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) socketpair(0x21, 0xa, 0x3, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000280)={{0x2b, @remote, 0x4e21, 0x0, 'dh\x00', 0x14, 0x5185, 0x55}, {@multicast1, 0x4e21, 0x10000, 0x1ff, 0x1, 0xaab}}, 0x44) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x4000000, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0x261fb0e8, 0x14, 0x1}) dup3(r1, r0, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r4, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r3, 0x0, 0x0, 0x149}) r5 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0xf, r4, 0x812}) ioctl$KDGETMODE(r5, 0x4b3b, &(0x7f0000000000)) [ 1444.815639][T12326] FAULT_INJECTION: forcing a failure. [ 1444.815639][T12326] name failslab, interval 1, probability 0, space 0, times 0 [ 1444.828645][T12326] CPU: 0 PID: 12326 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1444.839010][T12326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1444.849055][T12326] Call Trace: [ 1444.852344][T12326] dump_stack+0x1b0/0x21e [ 1444.856663][T12326] ? devkmsg_release+0x11c/0x11c [ 1444.861578][T12326] ? show_regs_print_info+0x12/0x12 [ 1444.866756][T12326] ? cred_has_capability+0x18c/0x3f0 [ 1444.872288][T12326] ? cred_has_capability+0x2b2/0x3f0 [ 1444.877555][T12326] should_fail+0x6fb/0x860 [ 1444.881954][T12326] ? setup_fault_attr+0x2b0/0x2b0 [ 1444.886985][T12326] ? slab_free_freelist_hook+0xd0/0x150 [ 1444.892512][T12326] ? cap_capable+0x23f/0x280 [ 1444.897084][T12326] ? proc_pid_stack+0x1d5/0x1f0 [ 1444.901915][T12326] ? proc_pid_stack+0x8e/0x1f0 [ 1444.906663][T12326] should_failslab+0x5/0x20 [ 1444.911147][T12326] kmem_cache_alloc_trace+0x39/0x270 [ 1444.916439][T12326] proc_pid_stack+0x8e/0x1f0 [ 1444.921115][T12326] proc_single_show+0xd3/0x130 [ 1444.926465][T12326] seq_read+0x4aa/0xd30 [ 1444.930610][T12326] do_iter_read+0x43b/0x550 [ 1444.935685][T12326] do_preadv+0x1f4/0x330 [ 1444.939947][T12326] ? do_writev+0x560/0x560 [ 1444.944367][T12326] ? security_file_permission+0x128/0x300 [ 1444.950065][T12326] ? __sb_end_write+0xa4/0xf0 [ 1444.954728][T12326] ? vfs_write+0x427/0x4f0 [ 1444.959144][T12326] do_syscall_64+0xcb/0x150 [ 1444.963630][T12326] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1444.969501][T12326] RIP: 0033:0x45d5b9 [ 1444.973381][T12326] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1444.992985][T12326] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1445.001384][T12326] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:42:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:50 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1445.009336][T12326] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1445.017291][T12326] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.025249][T12326] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002f [ 1445.033202][T12326] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:50 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x722a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:50 executing program 0 (fault-call:15 fault-nth:48): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000140)=0xc32d) r1 = syz_open_pts(r0, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x5000f4) ioctl$TIOCCONS(r2, 0x541d) r3 = signalfd(r0, &(0x7f0000000000)={[0xb9]}, 0x8) r4 = creat(&(0x7f0000002300)='./bus\x00', 0x0) ftruncate(r4, 0x12081ff) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x26}}, {0x2, 0x4e23, @local}, {0x2, 0x4e24, @private=0xa010102}, 0x1, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x9, 0x401, 0x4c63}) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/mdstat\x00', 0x0, 0x0) write$cgroup_netprio_ifpriomap(r5, &(0x7f0000000380)=ANY=[@ANYBLOB="694c9c6cf6fd8611a38ab3545c9b5b553cc54d51072942c32eb3aa73e916e2bff3df0edf11fa9cdf7bdb78df938af85d4e33abcba8cba9697a73986121597844e271ca42190a52e94a53615e1243626e99c8cd8d120e9d9040b4514d50886319dde820f359878055fec9cd9570f405d1e934456e2232bc67829a0773f7d5f2a51fdd7eef67cc18848b266521296cf3dd980f6ab560717d9ce48c80aab71eea263b0584d162119a86680b9c268cd73d66708e543b1289f1bf79ec4778b44d334600"/204], 0xa) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x40, 0x20}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) [ 1445.263160][T12356] FAULT_INJECTION: forcing a failure. [ 1445.263160][T12356] name failslab, interval 1, probability 0, space 0, times 0 [ 1445.275913][T12356] CPU: 1 PID: 12356 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1445.286179][T12356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1445.296743][T12356] Call Trace: [ 1445.300019][T12356] dump_stack+0x1b0/0x21e [ 1445.304326][T12356] ? devkmsg_release+0x11c/0x11c [ 1445.309236][T12356] ? show_regs_print_info+0x12/0x12 [ 1445.314410][T12356] ? cred_has_capability+0x18c/0x3f0 [ 1445.319760][T12356] ? cred_has_capability+0x2b2/0x3f0 [ 1445.325020][T12356] should_fail+0x6fb/0x860 [ 1445.329412][T12356] ? setup_fault_attr+0x2b0/0x2b0 [ 1445.334412][T12356] ? slab_free_freelist_hook+0xd0/0x150 [ 1445.339945][T12356] ? cap_capable+0x23f/0x280 [ 1445.344529][T12356] ? proc_pid_stack+0x1d5/0x1f0 [ 1445.349358][T12356] ? proc_pid_stack+0x8e/0x1f0 [ 1445.354098][T12356] should_failslab+0x5/0x20 [ 1445.358577][T12356] kmem_cache_alloc_trace+0x39/0x270 [ 1445.363840][T12356] proc_pid_stack+0x8e/0x1f0 [ 1445.368408][T12356] proc_single_show+0xd3/0x130 [ 1445.373161][T12356] seq_read+0x4aa/0xd30 [ 1445.377298][T12356] do_iter_read+0x43b/0x550 [ 1445.381966][T12356] do_preadv+0x1f4/0x330 [ 1445.386183][T12356] ? do_writev+0x560/0x560 [ 1445.390577][T12356] ? security_file_permission+0x128/0x300 [ 1445.396267][T12356] ? __sb_end_write+0xa4/0xf0 [ 1445.400923][T12356] ? vfs_write+0x427/0x4f0 [ 1445.405319][T12356] do_syscall_64+0xcb/0x150 [ 1445.409800][T12356] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1445.415668][T12356] RIP: 0033:0x45d5b9 [ 1445.419543][T12356] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1445.439137][T12356] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1445.447525][T12356] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1445.455558][T12356] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) ioctl$BTRFS_IOC_DEV_REPLACE(r1, 0xca289435, &(0x7f00000004c0)={0x1, 0x6, @start={0x0, 0x0, "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", "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"}, [0x2, 0xb07, 0x200, 0x80, 0x4, 0x8, 0x7fffffff, 0x1, 0x153, 0x1bc, 0x400, 0xfffffffffffffffe, 0x1, 0x1, 0x8, 0x2bf, 0x80000000, 0x7fff, 0x1, 0x8, 0x1000000000000000, 0x5, 0x4, 0x3, 0x1, 0x101, 0x8, 0x1, 0x6dfdf98e, 0xffff, 0xffffffff, 0x7, 0x0, 0x6, 0x80000000, 0x3, 0x8, 0x1, 0x7, 0x101, 0x419, 0xfff, 0x3, 0xfff, 0x8, 0x9, 0x6, 0x2, 0x800, 0x7ff, 0x5, 0x2, 0xffb, 0x6, 0x4, 0x8, 0x4, 0x5, 0x8, 0xc6, 0x600f54bc, 0x5e8, 0xdf2ec47, 0x2]}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) clone3(&(0x7f00000003c0)={0x32012080, &(0x7f0000000040), &(0x7f0000000200), &(0x7f0000000240)=0x0, {0x11}, &(0x7f0000000280)=""/211, 0xd3, &(0x7f00000004c0)=""/4096, &(0x7f0000000380)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x58) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x80, 0x1f, 0x80, 0x0, 0x40, 0x40000, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x6, @perf_bp={&(0x7f0000000000), 0xb}, 0x9004, 0x7, 0x6f91a03d, 0x0, 0x9, 0x10000, 0x1}, r2, 0x7, 0xffffffffffffffff, 0xb) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r3 = dup3(r1, r0, 0x0) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f00000014c0)={'filter\x00'}, &(0x7f0000000440)=0x78) 04:42:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x2]}, &(0x7f0000000140), &(0x7f0000000200)={r2, r3+10000000}, 0x8) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) sendmsg$DEVLINK_CMD_TRAP_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80040000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x98, 0x0, 0x8, 0x70bd29, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}]}, 0x98}, 0x1, 0x0, 0x0, 0x840}, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:50 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x776a}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1445.463514][T12356] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.471463][T12356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000030 [ 1445.479411][T12356] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:50 executing program 0 (fault-call:15 fault-nth:49): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1445.678197][T12387] FAULT_INJECTION: forcing a failure. [ 1445.678197][T12387] name failslab, interval 1, probability 0, space 0, times 0 [ 1445.690878][T12387] CPU: 0 PID: 12387 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1445.701012][T12387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1445.711041][T12387] Call Trace: [ 1445.714308][T12387] dump_stack+0x1b0/0x21e [ 1445.718609][T12387] ? devkmsg_release+0x11c/0x11c [ 1445.723518][T12387] ? show_regs_print_info+0x12/0x12 [ 1445.728687][T12387] ? cred_has_capability+0x18c/0x3f0 [ 1445.733955][T12387] ? cred_has_capability+0x2b2/0x3f0 [ 1445.739209][T12387] should_fail+0x6fb/0x860 [ 1445.743613][T12387] ? setup_fault_attr+0x2b0/0x2b0 [ 1445.748629][T12387] ? slab_free_freelist_hook+0xd0/0x150 [ 1445.754147][T12387] ? cap_capable+0x23f/0x280 [ 1445.758714][T12387] ? proc_pid_stack+0x1d5/0x1f0 [ 1445.763562][T12387] ? proc_pid_stack+0x8e/0x1f0 [ 1445.768308][T12387] should_failslab+0x5/0x20 [ 1445.772791][T12387] kmem_cache_alloc_trace+0x39/0x270 [ 1445.778066][T12387] proc_pid_stack+0x8e/0x1f0 [ 1445.782635][T12387] proc_single_show+0xd3/0x130 [ 1445.787398][T12387] seq_read+0x4aa/0xd30 [ 1445.791537][T12387] do_iter_read+0x43b/0x550 [ 1445.796019][T12387] do_preadv+0x1f4/0x330 [ 1445.800237][T12387] ? do_writev+0x560/0x560 [ 1445.804641][T12387] ? security_file_permission+0x128/0x300 [ 1445.810349][T12387] ? __sb_end_write+0xa4/0xf0 [ 1445.815013][T12387] ? vfs_write+0x427/0x4f0 [ 1445.819409][T12387] do_syscall_64+0xcb/0x150 [ 1445.823917][T12387] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1445.829787][T12387] RIP: 0033:0x45d5b9 [ 1445.833659][T12387] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1445.853242][T12387] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1445.861630][T12387] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1445.869579][T12387] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:51 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x7caa}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1445.877537][T12387] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1445.885483][T12387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000031 [ 1445.893430][T12387] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:51 executing program 0 (fault-call:15 fault-nth:50): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80e0}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1446.096801][T12407] FAULT_INJECTION: forcing a failure. [ 1446.096801][T12407] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.109487][T12407] CPU: 0 PID: 12407 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1446.120272][T12407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1446.130314][T12407] Call Trace: [ 1446.133578][T12407] dump_stack+0x1b0/0x21e [ 1446.137879][T12407] ? devkmsg_release+0x11c/0x11c [ 1446.142983][T12407] ? show_regs_print_info+0x12/0x12 [ 1446.148166][T12407] ? cred_has_capability+0x18c/0x3f0 [ 1446.153418][T12407] ? cred_has_capability+0x2b2/0x3f0 [ 1446.158671][T12407] should_fail+0x6fb/0x860 [ 1446.163065][T12407] ? setup_fault_attr+0x2b0/0x2b0 [ 1446.168070][T12407] ? slab_free_freelist_hook+0xd0/0x150 [ 1446.173601][T12407] ? cap_capable+0x23f/0x280 [ 1446.178175][T12407] ? proc_pid_stack+0x1d5/0x1f0 [ 1446.183009][T12407] ? proc_pid_stack+0x8e/0x1f0 [ 1446.187745][T12407] should_failslab+0x5/0x20 [ 1446.192231][T12407] kmem_cache_alloc_trace+0x39/0x270 [ 1446.197507][T12407] proc_pid_stack+0x8e/0x1f0 [ 1446.202084][T12407] proc_single_show+0xd3/0x130 [ 1446.206850][T12407] seq_read+0x4aa/0xd30 [ 1446.210992][T12407] do_iter_read+0x43b/0x550 [ 1446.215480][T12407] do_preadv+0x1f4/0x330 [ 1446.219699][T12407] ? do_writev+0x560/0x560 [ 1446.224108][T12407] ? security_file_permission+0x128/0x300 [ 1446.229812][T12407] ? __sb_end_write+0xa4/0xf0 [ 1446.234472][T12407] ? vfs_write+0x427/0x4f0 [ 1446.238866][T12407] ? do_syscall_64+0x80/0x150 [ 1446.243528][T12407] do_syscall_64+0xcb/0x150 [ 1446.248022][T12407] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1446.253890][T12407] RIP: 0033:0x45d5b9 [ 1446.257758][T12407] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1446.277465][T12407] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1446.286099][T12407] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1446.294046][T12407] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1446.302005][T12407] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.309948][T12407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000032 [ 1446.317906][T12407] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:51 executing program 0 (fault-call:15 fault-nth:51): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x5000f4) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r3, 0x0, 0x0, 0x4003fe) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="0a000082", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf25060000000800020003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x4008041) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x0, 0x0, 0x149}) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x2000000, 0x0, 0x4, 0x4, 0x3, "8991e4b70000000000000000001e00"}) r4 = syz_open_pts(0xffffffffffffffff, 0xcc202) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r5 = dup3(r4, r0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f00000004c0)={0x8, {{0xa, 0x4e20, 0x202, @private1, 0x1}}, 0x0, 0x5, [{{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x28}, 0x2}}, {{0xa, 0x4e20, 0x7fffffff, @private2={0xfc, 0x2, [], 0x1}, 0x401}}, {{0xa, 0x4e22, 0xc74, @mcast1, 0x1}}, {{0xa, 0x4e21, 0x2, @local, 0xc744}}, {{0xa, 0x4e23, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7fff}}]}, 0x310) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000000)=0x1f) 04:42:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x200093be}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x0, 0x7fff, 0x0, 0x0, 0x0, "360200000000000004004c067ab9711000", 0x800, 0x7}) readv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4, 0x3, "01b9ac7f6a4d33b26cb3fc43eab7af20268259"}) dup3(r2, r0, 0x0) [ 1446.553726][T12430] FAULT_INJECTION: forcing a failure. [ 1446.553726][T12430] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.566584][T12430] CPU: 1 PID: 12430 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1446.576947][T12430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1446.586992][T12430] Call Trace: [ 1446.590633][T12430] dump_stack+0x1b0/0x21e [ 1446.594970][T12430] ? devkmsg_release+0x11c/0x11c [ 1446.599907][T12430] ? show_regs_print_info+0x12/0x12 [ 1446.605115][T12430] ? cred_has_capability+0x18c/0x3f0 [ 1446.610399][T12430] ? cred_has_capability+0x2b2/0x3f0 [ 1446.615683][T12430] should_fail+0x6fb/0x860 [ 1446.620095][T12430] ? setup_fault_attr+0x2b0/0x2b0 [ 1446.625105][T12430] ? slab_free_freelist_hook+0xd0/0x150 [ 1446.630647][T12430] ? cap_capable+0x23f/0x280 [ 1446.635234][T12430] ? proc_pid_stack+0x1d5/0x1f0 [ 1446.640074][T12430] ? proc_pid_stack+0x8e/0x1f0 [ 1446.645253][T12430] should_failslab+0x5/0x20 [ 1446.649738][T12430] kmem_cache_alloc_trace+0x39/0x270 [ 1446.655009][T12430] proc_pid_stack+0x8e/0x1f0 [ 1446.659581][T12430] proc_single_show+0xd3/0x130 [ 1446.664326][T12430] seq_read+0x4aa/0xd30 [ 1446.668552][T12430] do_iter_read+0x43b/0x550 [ 1446.673033][T12430] do_preadv+0x1f4/0x330 [ 1446.677255][T12430] ? do_writev+0x560/0x560 [ 1446.681654][T12430] ? security_file_permission+0x128/0x300 [ 1446.687357][T12430] ? __sb_end_write+0xa4/0xf0 [ 1446.692017][T12430] ? vfs_write+0x427/0x4f0 [ 1446.696412][T12430] do_syscall_64+0xcb/0x150 [ 1446.700900][T12430] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1446.706767][T12430] RIP: 0033:0x45d5b9 [ 1446.710640][T12430] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1446.730232][T12430] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1446.742044][T12430] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:42:51 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1446.751273][T12430] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1446.760485][T12430] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.769935][T12430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000033 [ 1446.779830][T12430] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) fdatasync(r0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x1, 0x4, 0x3, 0x2, 0x11, "2abfc6a1b55692b503e731825d9e7c4f0c256d"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x100, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000140)) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:51 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0xfc}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:51 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x7fffeeb2}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:52 executing program 0 (fault-call:15 fault-nth:52): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000000)={0x72, 0x1, 0x1ff, 0x800, 0x2}) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x0, 0x0, 0x149}) r4 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0xf, r3, 0x812}) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0xa) 04:42:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0f22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1447.026703][T12469] FAULT_INJECTION: forcing a failure. [ 1447.026703][T12469] name failslab, interval 1, probability 0, space 0, times 0 [ 1447.039354][T12469] CPU: 1 PID: 12469 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1447.049509][T12469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1447.059551][T12469] Call Trace: [ 1447.062857][T12469] dump_stack+0x1b0/0x21e [ 1447.067195][T12469] ? devkmsg_release+0x11c/0x11c [ 1447.072150][T12469] ? show_regs_print_info+0x12/0x12 [ 1447.077341][T12469] ? cred_has_capability+0x18c/0x3f0 [ 1447.082617][T12469] ? cred_has_capability+0x2b2/0x3f0 [ 1447.087890][T12469] should_fail+0x6fb/0x860 [ 1447.092407][T12469] ? setup_fault_attr+0x2b0/0x2b0 [ 1447.097408][T12469] ? slab_free_freelist_hook+0xd0/0x150 [ 1447.102982][T12469] ? cap_capable+0x23f/0x280 [ 1447.107577][T12469] ? proc_pid_stack+0x1d5/0x1f0 [ 1447.112432][T12469] ? proc_pid_stack+0x8e/0x1f0 [ 1447.117344][T12469] should_failslab+0x5/0x20 [ 1447.121857][T12469] kmem_cache_alloc_trace+0x39/0x270 [ 1447.127145][T12469] proc_pid_stack+0x8e/0x1f0 [ 1447.131725][T12469] proc_single_show+0xd3/0x130 [ 1447.136484][T12469] seq_read+0x4aa/0xd30 [ 1447.140631][T12469] do_iter_read+0x43b/0x550 [ 1447.145143][T12469] do_preadv+0x1f4/0x330 [ 1447.149416][T12469] ? do_writev+0x560/0x560 [ 1447.153848][T12469] ? security_file_permission+0x128/0x300 [ 1447.159610][T12469] ? __sb_end_write+0xa4/0xf0 [ 1447.164296][T12469] ? vfs_write+0x427/0x4f0 [ 1447.168729][T12469] do_syscall_64+0xcb/0x150 [ 1447.173232][T12469] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1447.179103][T12469] RIP: 0033:0x45d5b9 [ 1447.182981][T12469] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1447.202579][T12469] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1447.210998][T12469] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1447.218982][T12469] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1447.226935][T12469] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1447.234910][T12469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000034 [ 1447.242890][T12469] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="e022fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:52 executing program 0 (fault-call:15 fault-nth:53): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1447.535368][T12489] FAULT_INJECTION: forcing a failure. [ 1447.535368][T12489] name failslab, interval 1, probability 0, space 0, times 0 [ 1447.552267][T12489] CPU: 0 PID: 12489 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1447.562403][T12489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1447.572456][T12489] Call Trace: [ 1447.575734][T12489] dump_stack+0x1b0/0x21e [ 1447.580046][T12489] ? devkmsg_release+0x11c/0x11c [ 1447.585480][T12489] ? show_regs_print_info+0x12/0x12 [ 1447.590658][T12489] ? cred_has_capability+0x18c/0x3f0 [ 1447.595932][T12489] ? cred_has_capability+0x2b2/0x3f0 [ 1447.601211][T12489] should_fail+0x6fb/0x860 [ 1447.605604][T12489] ? setup_fault_attr+0x2b0/0x2b0 [ 1447.610607][T12489] ? slab_free_freelist_hook+0xd0/0x150 [ 1447.616132][T12489] ? cap_capable+0x23f/0x280 [ 1447.620699][T12489] ? proc_pid_stack+0x1d5/0x1f0 [ 1447.625525][T12489] ? proc_pid_stack+0x8e/0x1f0 [ 1447.630265][T12489] should_failslab+0x5/0x20 [ 1447.634838][T12489] kmem_cache_alloc_trace+0x39/0x270 [ 1447.640465][T12489] proc_pid_stack+0x8e/0x1f0 [ 1447.645138][T12489] proc_single_show+0xd3/0x130 [ 1447.649884][T12489] seq_read+0x4aa/0xd30 [ 1447.654023][T12489] do_iter_read+0x43b/0x550 [ 1447.658507][T12489] do_preadv+0x1f4/0x330 [ 1447.662727][T12489] ? do_writev+0x560/0x560 [ 1447.667142][T12489] ? security_file_permission+0x128/0x300 [ 1447.672866][T12489] ? __sb_end_write+0xa4/0xf0 [ 1447.677536][T12489] ? vfs_write+0x427/0x4f0 [ 1447.681934][T12489] do_syscall_64+0xcb/0x150 [ 1447.686427][T12489] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1447.692301][T12489] RIP: 0033:0x45d5b9 [ 1447.696176][T12489] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1447.717802][T12489] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1447.726194][T12489] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:42:52 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:52 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c17fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1447.734148][T12489] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1447.742293][T12489] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1447.750252][T12489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000035 [ 1447.758196][T12489] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:52 executing program 0 (fault-call:15 fault-nth:54): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1447.981560][T12510] FAULT_INJECTION: forcing a failure. [ 1447.981560][T12510] name failslab, interval 1, probability 0, space 0, times 0 [ 1447.994234][T12510] CPU: 0 PID: 12510 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1448.004370][T12510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1448.014672][T12510] Call Trace: [ 1448.017949][T12510] dump_stack+0x1b0/0x21e [ 1448.022259][T12510] ? devkmsg_release+0x11c/0x11c [ 1448.027175][T12510] ? show_regs_print_info+0x12/0x12 [ 1448.032352][T12510] ? cred_has_capability+0x18c/0x3f0 [ 1448.037609][T12510] ? cred_has_capability+0x2b2/0x3f0 [ 1448.042882][T12510] should_fail+0x6fb/0x860 [ 1448.047279][T12510] ? setup_fault_attr+0x2b0/0x2b0 [ 1448.052285][T12510] ? slab_free_freelist_hook+0xd0/0x150 [ 1448.057818][T12510] ? cap_capable+0x23f/0x280 [ 1448.062385][T12510] ? proc_pid_stack+0x1d5/0x1f0 [ 1448.067656][T12510] ? proc_pid_stack+0x8e/0x1f0 [ 1448.072401][T12510] should_failslab+0x5/0x20 [ 1448.077350][T12510] kmem_cache_alloc_trace+0x39/0x270 [ 1448.082617][T12510] proc_pid_stack+0x8e/0x1f0 [ 1448.087210][T12510] proc_single_show+0xd3/0x130 [ 1448.091961][T12510] seq_read+0x4aa/0xd30 [ 1448.096105][T12510] do_iter_read+0x43b/0x550 [ 1448.100589][T12510] do_preadv+0x1f4/0x330 [ 1448.106252][T12510] ? do_writev+0x560/0x560 [ 1448.110657][T12510] ? security_file_permission+0x128/0x300 [ 1448.116354][T12510] ? __sb_end_write+0xa4/0xf0 [ 1448.121008][T12510] ? vfs_write+0x427/0x4f0 [ 1448.125419][T12510] do_syscall_64+0xcb/0x150 [ 1448.129905][T12510] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1448.135774][T12510] RIP: 0033:0x45d5b9 [ 1448.139645][T12510] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1448.159239][T12510] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1448.167629][T12510] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:42:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc3e0e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1448.175594][T12510] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1448.183553][T12510] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1448.191504][T12510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000036 [ 1448.199454][T12510] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd2258b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:53 executing program 0 (fault-call:15 fault-nth:55): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1448.510352][T12527] FAULT_INJECTION: forcing a failure. [ 1448.510352][T12527] name failslab, interval 1, probability 0, space 0, times 0 [ 1448.522992][T12527] CPU: 0 PID: 12527 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1448.533145][T12527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1448.543182][T12527] Call Trace: [ 1448.546461][T12527] dump_stack+0x1b0/0x21e [ 1448.550786][T12527] ? devkmsg_release+0x11c/0x11c [ 1448.555721][T12527] ? show_regs_print_info+0x12/0x12 [ 1448.560906][T12527] ? cred_has_capability+0x18c/0x3f0 [ 1448.566178][T12527] ? cred_has_capability+0x2b2/0x3f0 [ 1448.571438][T12527] should_fail+0x6fb/0x860 [ 1448.575849][T12527] ? setup_fault_attr+0x2b0/0x2b0 [ 1448.580847][T12527] ? slab_free_freelist_hook+0xd0/0x150 [ 1448.586380][T12527] ? cap_capable+0x23f/0x280 [ 1448.590949][T12527] ? proc_pid_stack+0x1d5/0x1f0 [ 1448.595785][T12527] ? proc_pid_stack+0x8e/0x1f0 [ 1448.600523][T12527] should_failslab+0x5/0x20 [ 1448.605005][T12527] kmem_cache_alloc_trace+0x39/0x270 [ 1448.610267][T12527] proc_pid_stack+0x8e/0x1f0 [ 1448.614832][T12527] proc_single_show+0xd3/0x130 [ 1448.619573][T12527] seq_read+0x4aa/0xd30 [ 1448.623721][T12527] do_iter_read+0x43b/0x550 [ 1448.628200][T12527] do_preadv+0x1f4/0x330 [ 1448.632417][T12527] ? do_writev+0x560/0x560 [ 1448.636813][T12527] ? security_file_permission+0x128/0x300 [ 1448.642505][T12527] ? __sb_end_write+0xa4/0xf0 [ 1448.647158][T12527] ? vfs_write+0x427/0x4f0 [ 1448.651571][T12527] do_syscall_64+0xcb/0x150 [ 1448.656068][T12527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1448.661954][T12527] RIP: 0033:0x45d5b9 [ 1448.665833][T12527] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1448.685422][T12527] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1448.693812][T12527] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1448.701848][T12527] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:53 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1448.709812][T12527] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1448.717758][T12527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000037 [ 1448.725724][T12527] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:53 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cde058b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:54 executing program 0 (fault-call:15 fault-nth:56): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b03e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1449.289738][T12560] FAULT_INJECTION: forcing a failure. [ 1449.289738][T12560] name failslab, interval 1, probability 0, space 0, times 0 [ 1449.303019][T12560] CPU: 1 PID: 12560 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1449.313155][T12560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1449.323197][T12560] Call Trace: [ 1449.326474][T12560] dump_stack+0x1b0/0x21e [ 1449.330782][T12560] ? devkmsg_release+0x11c/0x11c [ 1449.335699][T12560] ? show_regs_print_info+0x12/0x12 [ 1449.340893][T12560] ? cred_has_capability+0x18c/0x3f0 [ 1449.346156][T12560] ? cred_has_capability+0x2b2/0x3f0 [ 1449.351423][T12560] should_fail+0x6fb/0x860 [ 1449.355819][T12560] ? setup_fault_attr+0x2b0/0x2b0 [ 1449.360828][T12560] ? slab_free_freelist_hook+0xd0/0x150 [ 1449.366360][T12560] ? cap_capable+0x23f/0x280 [ 1449.370923][T12560] ? proc_pid_stack+0x1d5/0x1f0 [ 1449.375749][T12560] ? proc_pid_stack+0x8e/0x1f0 [ 1449.380490][T12560] should_failslab+0x5/0x20 [ 1449.384986][T12560] kmem_cache_alloc_trace+0x39/0x270 [ 1449.390862][T12560] proc_pid_stack+0x8e/0x1f0 [ 1449.395430][T12560] proc_single_show+0xd3/0x130 [ 1449.400171][T12560] seq_read+0x4aa/0xd30 [ 1449.404307][T12560] do_iter_read+0x43b/0x550 [ 1449.408785][T12560] do_preadv+0x1f4/0x330 [ 1449.413006][T12560] ? do_writev+0x560/0x560 [ 1449.417400][T12560] ? security_file_permission+0x128/0x300 [ 1449.423091][T12560] ? __sb_end_write+0xa4/0xf0 [ 1449.427744][T12560] ? vfs_write+0x427/0x4f0 [ 1449.432152][T12560] do_syscall_64+0xcb/0x150 [ 1449.436635][T12560] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1449.442511][T12560] RIP: 0033:0x45d5b9 [ 1449.446385][T12560] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1449.465966][T12560] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1449.474353][T12560] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1449.482299][T12560] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1449.490245][T12560] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1449.498203][T12560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000038 [ 1449.506162][T12560] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:54 executing program 0 (fault-call:15 fault-nth:57): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:54 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:54 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b08e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1449.748617][T12580] FAULT_INJECTION: forcing a failure. [ 1449.748617][T12580] name failslab, interval 1, probability 0, space 0, times 0 [ 1449.761539][T12580] CPU: 0 PID: 12580 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1449.771694][T12580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1449.781759][T12580] Call Trace: [ 1449.785052][T12580] dump_stack+0x1b0/0x21e [ 1449.789365][T12580] ? devkmsg_release+0x11c/0x11c [ 1449.795409][T12580] ? show_regs_print_info+0x12/0x12 [ 1449.800585][T12580] ? cred_has_capability+0x18c/0x3f0 [ 1449.805847][T12580] ? cred_has_capability+0x2b2/0x3f0 [ 1449.811110][T12580] should_fail+0x6fb/0x860 [ 1449.815501][T12580] ? setup_fault_attr+0x2b0/0x2b0 [ 1449.820510][T12580] ? slab_free_freelist_hook+0xd0/0x150 [ 1449.826033][T12580] ? cap_capable+0x23f/0x280 [ 1449.830604][T12580] ? proc_pid_stack+0x1d5/0x1f0 [ 1449.835429][T12580] ? proc_pid_stack+0x8e/0x1f0 [ 1449.840168][T12580] should_failslab+0x5/0x20 [ 1449.844663][T12580] kmem_cache_alloc_trace+0x39/0x270 [ 1449.849924][T12580] proc_pid_stack+0x8e/0x1f0 [ 1449.854491][T12580] proc_single_show+0xd3/0x130 [ 1449.859249][T12580] seq_read+0x4aa/0xd30 [ 1449.863406][T12580] do_iter_read+0x43b/0x550 [ 1449.867887][T12580] do_preadv+0x1f4/0x330 [ 1449.872106][T12580] ? do_writev+0x560/0x560 [ 1449.876494][T12580] ? vfs_write+0x3ea/0x4f0 [ 1449.880884][T12580] ? vfs_write+0x3f7/0x4f0 [ 1449.885277][T12580] ? __sb_end_write+0xa4/0xf0 [ 1449.889928][T12580] ? vfs_write+0x427/0x4f0 [ 1449.894322][T12580] do_syscall_64+0xcb/0x150 [ 1449.898801][T12580] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1449.904667][T12580] RIP: 0033:0x45d5b9 [ 1449.908549][T12580] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1449.928130][T12580] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1449.936515][T12580] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1449.944463][T12580] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1449.952413][T12580] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1449.960373][T12580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000039 [ 1449.968319][T12580] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573be0e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:55 executing program 0 (fault-call:15 fault-nth:58): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:55 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55504a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1450.435321][T12602] FAULT_INJECTION: forcing a failure. [ 1450.435321][T12602] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.448179][T12602] CPU: 0 PID: 12602 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1450.458587][T12602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.468819][T12602] Call Trace: [ 1450.472111][T12602] dump_stack+0x1b0/0x21e [ 1450.476433][T12602] ? devkmsg_release+0x11c/0x11c [ 1450.481362][T12602] ? show_regs_print_info+0x12/0x12 [ 1450.486545][T12602] ? cred_has_capability+0x18c/0x3f0 [ 1450.491812][T12602] ? cred_has_capability+0x2b2/0x3f0 [ 1450.497089][T12602] should_fail+0x6fb/0x860 [ 1450.501592][T12602] ? setup_fault_attr+0x2b0/0x2b0 [ 1450.506618][T12602] ? slab_free_freelist_hook+0xd0/0x150 [ 1450.512167][T12602] ? cap_capable+0x23f/0x280 [ 1450.516743][T12602] ? proc_pid_stack+0x1d5/0x1f0 [ 1450.521571][T12602] ? proc_pid_stack+0x8e/0x1f0 [ 1450.526313][T12602] should_failslab+0x5/0x20 [ 1450.530804][T12602] kmem_cache_alloc_trace+0x39/0x270 [ 1450.536080][T12602] proc_pid_stack+0x8e/0x1f0 [ 1450.540666][T12602] proc_single_show+0xd3/0x130 [ 1450.545417][T12602] seq_read+0x4aa/0xd30 [ 1450.549569][T12602] do_iter_read+0x43b/0x550 [ 1450.554050][T12602] do_preadv+0x1f4/0x330 [ 1450.558284][T12602] ? do_writev+0x560/0x560 [ 1450.562686][T12602] ? security_file_permission+0x128/0x300 [ 1450.568383][T12602] ? __sb_end_write+0xa4/0xf0 [ 1450.573155][T12602] ? vfs_write+0x427/0x4f0 [ 1450.577557][T12602] do_syscall_64+0xcb/0x150 [ 1450.582041][T12602] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1450.587911][T12602] RIP: 0033:0x45d5b9 [ 1450.591795][T12602] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1450.611393][T12602] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1450.619797][T12602] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1450.627743][T12602] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:55 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1450.635695][T12602] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1450.643672][T12602] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003a [ 1450.651628][T12602] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:55 executing program 0 (fault-call:15 fault-nth:59): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1450.933101][T12624] FAULT_INJECTION: forcing a failure. [ 1450.933101][T12624] name failslab, interval 1, probability 0, space 0, times 0 [ 1450.945917][T12624] CPU: 1 PID: 12624 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1450.956055][T12624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1450.966093][T12624] Call Trace: [ 1450.969377][T12624] dump_stack+0x1b0/0x21e [ 1450.973676][T12624] ? devkmsg_release+0x11c/0x11c [ 1450.978593][T12624] ? __schedule+0x8ae/0xe30 04:42:56 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b555e0a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1450.983151][T12624] ? show_regs_print_info+0x12/0x12 [ 1450.988334][T12624] ? cred_has_capability+0x18c/0x3f0 [ 1450.993616][T12624] ? cred_has_capability+0x2b2/0x3f0 [ 1450.998886][T12624] should_fail+0x6fb/0x860 [ 1451.003288][T12624] ? setup_fault_attr+0x2b0/0x2b0 [ 1451.008300][T12624] ? cap_capable+0x23f/0x280 [ 1451.012880][T12624] ? preempt_schedule_notrace+0x110/0x110 [ 1451.018589][T12624] ? proc_pid_stack+0x8e/0x1f0 [ 1451.023338][T12624] should_failslab+0x5/0x20 [ 1451.027832][T12624] kmem_cache_alloc_trace+0x39/0x270 [ 1451.033106][T12624] proc_pid_stack+0x8e/0x1f0 [ 1451.037697][T12624] proc_single_show+0xd3/0x130 [ 1451.042451][T12624] seq_read+0x4aa/0xd30 [ 1451.046600][T12624] do_iter_read+0x43b/0x550 [ 1451.051087][T12624] do_preadv+0x1f4/0x330 [ 1451.055313][T12624] ? do_writev+0x560/0x560 [ 1451.059744][T12624] ? security_file_permission+0x128/0x300 [ 1451.065464][T12624] ? __sb_end_write+0xa4/0xf0 [ 1451.070128][T12624] ? vfs_write+0x427/0x4f0 [ 1451.074528][T12624] do_syscall_64+0xcb/0x150 [ 1451.079013][T12624] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1451.084887][T12624] RIP: 0033:0x45d5b9 [ 1451.088761][T12624] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1451.108446][T12624] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1451.116841][T12624] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1451.124816][T12624] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1451.132770][T12624] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1451.140724][T12624] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003b [ 1451.148678][T12624] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:56 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503e08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:56 executing program 0 (fault-call:15 fault-nth:60): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, 0x0, 0x0, 0x0, 0x0) 04:42:56 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1451.554510][T12639] FAULT_INJECTION: forcing a failure. [ 1451.554510][T12639] name failslab, interval 1, probability 0, space 0, times 0 [ 1451.567240][T12639] CPU: 1 PID: 12639 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1451.577814][T12639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1451.587843][T12639] Call Trace: [ 1451.591116][T12639] dump_stack+0x1b0/0x21e [ 1451.595435][T12639] ? devkmsg_release+0x11c/0x11c [ 1451.600609][T12639] ? show_regs_print_info+0x12/0x12 [ 1451.605783][T12639] ? cred_has_capability+0x18c/0x3f0 [ 1451.611054][T12639] ? cred_has_capability+0x2b2/0x3f0 [ 1451.616317][T12639] should_fail+0x6fb/0x860 [ 1451.620708][T12639] ? setup_fault_attr+0x2b0/0x2b0 [ 1451.625708][T12639] ? slab_free_freelist_hook+0xd0/0x150 [ 1451.631231][T12639] ? cap_capable+0x23f/0x280 [ 1451.635795][T12639] ? proc_pid_stack+0x1d5/0x1f0 [ 1451.640618][T12639] ? proc_pid_stack+0x8e/0x1f0 [ 1451.645356][T12639] should_failslab+0x5/0x20 [ 1451.649837][T12639] kmem_cache_alloc_trace+0x39/0x270 [ 1451.655107][T12639] proc_pid_stack+0x8e/0x1f0 [ 1451.659689][T12639] proc_single_show+0xd3/0x130 [ 1451.664432][T12639] seq_read+0x4aa/0xd30 [ 1451.668568][T12639] do_iter_read+0x43b/0x550 [ 1451.673062][T12639] do_preadv+0x1f4/0x330 [ 1451.677292][T12639] ? do_writev+0x560/0x560 [ 1451.681685][T12639] ? security_file_permission+0x128/0x300 [ 1451.687387][T12639] ? __sb_end_write+0xa4/0xf0 [ 1451.692043][T12639] ? vfs_write+0x427/0x4f0 [ 1451.696439][T12639] do_syscall_64+0xcb/0x150 [ 1451.700918][T12639] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1451.706783][T12639] RIP: 0033:0x45d5b9 [ 1451.710672][T12639] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1451.730250][T12639] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1451.738649][T12639] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1451.746594][T12639] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1451.754547][T12639] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1451.762490][T12639] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003c [ 1451.770536][T12639] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:56 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc202e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:57 executing program 0 (fault-call:15 fault-nth:61): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc203e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1452.137321][T12668] FAULT_INJECTION: forcing a failure. [ 1452.137321][T12668] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.150119][T12668] CPU: 0 PID: 12668 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1452.160255][T12668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1452.170296][T12668] Call Trace: [ 1452.173576][T12668] dump_stack+0x1b0/0x21e [ 1452.177894][T12668] ? devkmsg_release+0x11c/0x11c [ 1452.182817][T12668] ? show_regs_print_info+0x12/0x12 [ 1452.188006][T12668] ? cred_has_capability+0x18c/0x3f0 [ 1452.193310][T12668] ? cred_has_capability+0x2b2/0x3f0 [ 1452.198607][T12668] should_fail+0x6fb/0x860 [ 1452.203018][T12668] ? setup_fault_attr+0x2b0/0x2b0 [ 1452.208050][T12668] ? slab_free_freelist_hook+0xd0/0x150 [ 1452.213584][T12668] ? cap_capable+0x23f/0x280 [ 1452.218161][T12668] ? proc_pid_stack+0x1d5/0x1f0 [ 1452.222999][T12668] ? proc_pid_stack+0x8e/0x1f0 [ 1452.227775][T12668] should_failslab+0x5/0x20 [ 1452.232269][T12668] kmem_cache_alloc_trace+0x39/0x270 [ 1452.237544][T12668] proc_pid_stack+0x8e/0x1f0 [ 1452.242147][T12668] proc_single_show+0xd3/0x130 [ 1452.246989][T12668] seq_read+0x4aa/0xd30 [ 1452.251137][T12668] do_iter_read+0x43b/0x550 [ 1452.255633][T12668] do_preadv+0x1f4/0x330 [ 1452.259892][T12668] ? do_writev+0x560/0x560 [ 1452.264298][T12668] ? security_file_permission+0x128/0x300 [ 1452.270025][T12668] ? __sb_end_write+0xa4/0xf0 [ 1452.274715][T12668] ? vfs_write+0x427/0x4f0 [ 1452.279120][T12668] do_syscall_64+0xcb/0x150 [ 1452.283608][T12668] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1452.289487][T12668] RIP: 0033:0x45d5b9 [ 1452.293365][T12668] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1452.312977][T12668] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1452.321391][T12668] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:42:57 executing program 5: r0 = socket(0x3, 0x6, 0x6f0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r1, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x440d4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r3, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x4, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x440d4) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="01042abd7100fddbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x200040c4}, 0x85) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r5, &(0x7f0000000040)=ANY=[], 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0xfffffffc}) r6 = syz_open_pts(r5, 0x0) ioctl$TCSETS2(r5, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r6, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r5, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r6, r5, 0x0) 04:42:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e22, @loopback}}) r1 = syz_open_pts(r0, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x5000f4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000140)={'syztnl0\x00', 0x0, 0x93b13802cfc6e3ab, 0x8, 0x5, 0xd0, 0x2c, @private1, @loopback, 0x10, 0x40, 0x4, 0x3}}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, 0x0, 0x20, 0x70bd28, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xfffffffc}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x20}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xc92}]}, 0x64}, 0x1, 0x0, 0x0, 0x4004000}, 0x20000000) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) [ 1452.329335][T12668] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1452.338495][T12668] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1452.346474][T12668] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003d [ 1452.354492][T12668] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc205e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x9, 0x1f, 0x4000, 0x0, "36cfe9537217829ac3c72a476a4c0665b17110", 0x1, 0x2}) r2 = signalfd(r1, &(0x7f0000000040)={[0x100]}, 0x8) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000140)={0x7ff, 0xfff, 0x7, 0x1, 0x18, "06cc52b944333513726140dbd7f33af68b4a99"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x5, 0x0, 0x0, 0x0, 0xfc, "fca8ac7f7a4d33b29b41632eeab7af20268259"}) getcwd(&(0x7f0000000000), 0x0) dup3(r1, r0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000000)={0x2, 0x0, [0x4, 0xca, 0xfff, 0x5a5, 0x9], 0x3409}) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x30) 04:42:57 executing program 0 (fault-call:15 fault-nth:62): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r1 = socket$inet_icmp(0x2, 0x2, 0x1) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r2, r0, 0x0) [ 1452.588031][T12695] FAULT_INJECTION: forcing a failure. [ 1452.588031][T12695] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.600707][T12695] CPU: 0 PID: 12695 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1452.610876][T12695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1452.620908][T12695] Call Trace: [ 1452.624183][T12695] dump_stack+0x1b0/0x21e [ 1452.628491][T12695] ? devkmsg_release+0x11c/0x11c [ 1452.633427][T12695] ? show_regs_print_info+0x12/0x12 [ 1452.639732][T12695] ? cred_has_capability+0x18c/0x3f0 [ 1452.644997][T12695] ? cred_has_capability+0x2b2/0x3f0 [ 1452.650348][T12695] should_fail+0x6fb/0x860 [ 1452.654758][T12695] ? setup_fault_attr+0x2b0/0x2b0 [ 1452.659783][T12695] ? slab_free_freelist_hook+0xd0/0x150 [ 1452.665338][T12695] ? cap_capable+0x23f/0x280 [ 1452.670170][T12695] ? proc_pid_stack+0x1d5/0x1f0 [ 1452.675026][T12695] ? proc_pid_stack+0x8e/0x1f0 [ 1452.679774][T12695] should_failslab+0x5/0x20 [ 1452.684258][T12695] kmem_cache_alloc_trace+0x39/0x270 [ 1452.689609][T12695] proc_pid_stack+0x8e/0x1f0 [ 1452.694177][T12695] proc_single_show+0xd3/0x130 [ 1452.698937][T12695] seq_read+0x4aa/0xd30 [ 1452.703076][T12695] do_iter_read+0x43b/0x550 [ 1452.707555][T12695] do_preadv+0x1f4/0x330 [ 1452.711789][T12695] ? do_writev+0x560/0x560 [ 1452.716475][T12695] ? security_file_permission+0x128/0x300 [ 1452.722184][T12695] ? __sb_end_write+0xa4/0xf0 [ 1452.726859][T12695] ? vfs_write+0x427/0x4f0 [ 1452.731277][T12695] do_syscall_64+0xcb/0x150 [ 1452.735764][T12695] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1452.741639][T12695] RIP: 0033:0x45d5b9 [ 1452.745513][T12695] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1452.765118][T12695] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1452.773527][T12695] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1452.781676][T12695] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:57 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000280)={{0xa, 0x4e24, 0x400, @rand_addr=' \x01\x00', 0x40}, {0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, 0x19, [0x8, 0x7, 0x8, 0x361, 0x4, 0x4, 0x8, 0x3]}, 0x5c) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r3 = dup2(r2, r2) sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000004c0)={0x370, 0x0, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x50000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x15c1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffff00}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb05}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x114, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'vcan0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x400, @mcast1, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x20, @mcast2, 0x6}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @private=0xa010101}}, {0x14, 0x2, @in={0x2, 0x4e23, @broadcast}}}}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffc00}]}, @TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfee}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe5f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK={0xcc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x200}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xf41b}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x65}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1800}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfa}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4000006}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xcaf}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1a82fe70}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x28}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}]}, @TIPC_NLA_PUBL={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xaa}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x3b813f8f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80000000}]}]}, 0x370}, 0x1, 0x0, 0x0, 0x4000811}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000300)={{0x3, 0x0, 0xa75, 0x7, 0x2}, 0x9, 0xffffffffffffff5a, 0x64b}) sendmsg$SMC_PNETID_GET(r4, &(0x7f0000003b00)={&(0x7f0000003a00)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003ac0)={&(0x7f0000003a40)={0x48, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'bond0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6gretap0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x8014}, 0x840) r5 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0xf, 0xffffffffffffffff, 0x812}) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, &(0x7f0000000380)=0x7, 0x4) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$EVIOCSFF(r6, 0x40304580, &(0x7f0000000040)={0x53, 0x3, 0x80, {0x3f, 0x7}, {0x1, 0x2}, @rumble={0x1, 0x3f}}) dup3(r2, r0, 0x0) 04:42:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc2e0e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1452.789976][T12695] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1452.797975][T12695] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003e [ 1452.805953][T12695] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0xd4, 0x0, 0x2, 0x0, 0x7, "36cff953725435d301264c0665b1711000", 0x0, 0x1fe}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r2 = dup3(r1, r0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x8000, 0xdc, 0xaa3e, 0x2b2, r2, 0x7, [], 0x0, r2, 0x4, 0x5, 0x1}, 0x40) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0xffffffffffffffe0, 0x20, 0x5, 0x4}) 04:42:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) write(r0, &(0x7f0000000200)="d04bc72a2384c67c3347ee96120d86579a2adee14e8a3d9dbf8eeb3f65856c0af5bb45bc98903a1755f8b44599663e478531e936223efa692a2d8e34de350c8577072106778016626b9918589851371a54212a3033a2f863cfc5ad3a155d03935189c1aeb4d28c344710e7233f038ac72bfa44a0f1a433d5d5e59c5be1ea9ef5f7abda04497e963f951c01e711e29ca5a6aab8ed6f31417dc55033bba05086f58b20077e8ba9", 0xa6) 04:42:58 executing program 0 (fault-call:15 fault-nth:63): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x6, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110", 0x688d}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:42:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) [ 1453.073535][T12741] FAULT_INJECTION: forcing a failure. [ 1453.073535][T12741] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.086358][T12741] CPU: 0 PID: 12741 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1453.096533][T12741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.106576][T12741] Call Trace: [ 1453.109858][T12741] dump_stack+0x1b0/0x21e [ 1453.114176][T12741] ? devkmsg_release+0x11c/0x11c [ 1453.119105][T12741] ? show_regs_print_info+0x12/0x12 [ 1453.124430][T12741] ? cred_has_capability+0x18c/0x3f0 [ 1453.129705][T12741] ? cred_has_capability+0x2b2/0x3f0 [ 1453.134979][T12741] should_fail+0x6fb/0x860 [ 1453.139399][T12741] ? setup_fault_attr+0x2b0/0x2b0 [ 1453.144427][T12741] ? slab_free_freelist_hook+0xd0/0x150 [ 1453.151026][T12741] ? cap_capable+0x23f/0x280 [ 1453.155849][T12741] ? proc_pid_stack+0x1d5/0x1f0 [ 1453.160895][T12741] ? proc_pid_stack+0x8e/0x1f0 [ 1453.165919][T12741] should_failslab+0x5/0x20 [ 1453.170506][T12741] kmem_cache_alloc_trace+0x39/0x270 [ 1453.175909][T12741] proc_pid_stack+0x8e/0x1f0 [ 1453.180661][T12741] proc_single_show+0xd3/0x130 [ 1453.185517][T12741] seq_read+0x4aa/0xd30 [ 1453.190131][T12741] do_iter_read+0x43b/0x550 [ 1453.195415][T12741] do_preadv+0x1f4/0x330 [ 1453.199643][T12741] ? do_writev+0x560/0x560 [ 1453.204043][T12741] ? __schedule+0x8ae/0xe30 [ 1453.208543][T12741] do_syscall_64+0xcb/0x150 [ 1453.213038][T12741] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1453.218924][T12741] RIP: 0033:0x45d5b9 [ 1453.222819][T12741] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1453.242586][T12741] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1453.250996][T12741] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1453.259242][T12741] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:42:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9e0c654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x9, 0x1f, 0x4000, 0x0, "36cfe9537217829ac3c72a476a4c0665b17110", 0x1, 0x2}) r2 = signalfd(r1, &(0x7f0000000040)={[0x100]}, 0x8) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000140)={0x7ff, 0xfff, 0x7, 0x1, 0x18, "06cc52b944333513726140dbd7f33af68b4a99"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x5, 0x0, 0x0, 0x0, 0xfc, "fca8ac7f7a4d33b29b41632eeab7af20268259"}) getcwd(&(0x7f0000000000), 0x0) dup3(r1, r0, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000000)={0x2, 0x0, [0x4, 0xca, 0xfff, 0x5a5, 0x9], 0x3409}) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, &(0x7f0000000180), &(0x7f0000000200)=0x30) [ 1453.268682][T12741] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1453.276638][T12741] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000003f [ 1453.284590][T12741] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:58 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x149}) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f0000000040)) fallocate(r2, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x0, 0x0, 0x149}) r3 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0xf, r2, 0x812}) ioctl$KDSKBENT(r3, 0x4b47, &(0x7f0000000000)={0x6, 0x81, 0x800}) r4 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r4, r0, 0x0) 04:42:58 executing program 0 (fault-call:15 fault-nth:64): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:58 executing program 2 (fault-call:12 fault-nth:0): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:58 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b82210a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1453.787838][T12779] FAULT_INJECTION: forcing a failure. [ 1453.787838][T12779] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1453.788847][T12778] FAULT_INJECTION: forcing a failure. [ 1453.788847][T12778] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.802146][T12779] CPU: 1 PID: 12779 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1453.824647][T12779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1453.834772][T12779] Call Trace: [ 1453.838431][T12779] dump_stack+0x1b0/0x21e [ 1453.842744][T12779] ? devkmsg_release+0x11c/0x11c [ 1453.847757][T12779] ? show_regs_print_info+0x12/0x12 [ 1453.852936][T12779] ? stack_trace_save+0x1e0/0x1e0 [ 1453.858046][T12779] ? __kernel_text_address+0x93/0x110 [ 1453.863395][T12779] should_fail+0x6fb/0x860 [ 1453.867794][T12779] ? setup_fault_attr+0x2b0/0x2b0 [ 1453.872802][T12779] __alloc_pages_nodemask+0x1ee/0x7c0 [ 1453.878241][T12779] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 1453.883765][T12779] ? kstrtouint_from_user+0x1cb/0x230 [ 1453.889129][T12779] ? kstrtol_from_user+0x180/0x180 [ 1453.894228][T12779] ? __kasan_slab_free+0x1e2/0x220 [ 1453.899436][T12779] ? slab_free_freelist_hook+0xd0/0x150 [ 1453.906178][T12779] ? kmem_cache_free+0xac/0x5c0 [ 1453.911182][T12779] ? do_sys_open+0x60f/0x7a0 [ 1453.915769][T12779] ? __rcu_read_lock+0x50/0x50 [ 1453.920521][T12779] kmalloc_order_trace+0x2a/0xf0 [ 1453.925441][T12779] __kmalloc+0x268/0x2c0 [ 1453.929671][T12779] kmalloc_array+0x2b/0x50 [ 1453.934069][T12779] rw_copy_check_uvector+0x8a/0x310 [ 1453.939245][T12779] import_iovec+0xd4/0x340 [ 1453.943640][T12779] ? fget_many+0x20/0x20 [ 1453.947992][T12779] ? dup_iter+0x110/0x110 [ 1453.952659][T12779] ? __kernel_write+0x340/0x340 [ 1453.957508][T12779] do_preadv+0x1ba/0x330 [ 1453.961734][T12779] ? do_writev+0x560/0x560 [ 1453.966135][T12779] ? security_file_permission+0x128/0x300 [ 1453.972003][T12779] ? __sb_end_write+0xa4/0xf0 [ 1453.977093][T12779] ? vfs_write+0x427/0x4f0 [ 1453.981681][T12779] ? ksys_write+0x237/0x2a0 [ 1453.986265][T12779] do_syscall_64+0xcb/0x150 [ 1453.990956][T12779] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1453.997026][T12779] RIP: 0033:0x45d5b9 [ 1454.000907][T12779] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1454.020600][T12779] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1454.029692][T12779] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1454.037651][T12779] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1454.045607][T12779] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1454.053579][T12779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1454.061538][T12779] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1454.069526][T12778] CPU: 0 PID: 12778 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1454.079666][T12778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.089713][T12778] Call Trace: [ 1454.093026][T12778] dump_stack+0x1b0/0x21e [ 1454.097366][T12778] ? devkmsg_release+0x11c/0x11c [ 1454.102316][T12778] ? show_regs_print_info+0x12/0x12 [ 1454.107770][T12778] ? cred_has_capability+0x18c/0x3f0 [ 1454.113049][T12778] ? cred_has_capability+0x2b2/0x3f0 [ 1454.118352][T12778] should_fail+0x6fb/0x860 [ 1454.122793][T12778] ? setup_fault_attr+0x2b0/0x2b0 [ 1454.127838][T12778] ? slab_free_freelist_hook+0xd0/0x150 [ 1454.133491][T12778] ? cap_capable+0x23f/0x280 [ 1454.138072][T12778] ? proc_pid_stack+0x1d5/0x1f0 [ 1454.143018][T12778] ? proc_pid_stack+0x8e/0x1f0 [ 1454.147771][T12778] should_failslab+0x5/0x20 [ 1454.152274][T12778] kmem_cache_alloc_trace+0x39/0x270 [ 1454.157554][T12778] proc_pid_stack+0x8e/0x1f0 [ 1454.162151][T12778] proc_single_show+0xd3/0x130 [ 1454.166908][T12778] seq_read+0x4aa/0xd30 [ 1454.171045][T12778] do_iter_read+0x43b/0x550 [ 1454.175528][T12778] do_preadv+0x1f4/0x330 [ 1454.179745][T12778] ? do_writev+0x560/0x560 [ 1454.184152][T12778] ? security_file_permission+0x128/0x300 [ 1454.189843][T12778] ? __sb_end_write+0xa4/0xf0 [ 1454.195016][T12778] ? vfs_write+0x427/0x4f0 [ 1454.199424][T12778] ? do_syscall_64+0x80/0x150 [ 1454.204078][T12778] do_syscall_64+0xcb/0x150 [ 1454.208594][T12778] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1454.214465][T12778] RIP: 0033:0x45d5b9 [ 1454.218342][T12778] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1454.238140][T12778] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1454.246551][T12778] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1454.254939][T12778] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1454.262903][T12778] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1454.270863][T12778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000040 [ 1454.278812][T12778] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:42:59 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b8e010a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:42:59 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 0 (fault-call:15 fault-nth:65): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:59 executing program 2 (fault-call:12 fault-nth:1): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:42:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x0, 0x0, 0x149}) r3 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0xf, r2, 0x812}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x4041) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x48, r4, 0x10, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004084}, 0x82c) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r5 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r5, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r5, r0, 0x0) [ 1454.643855][T12808] FAULT_INJECTION: forcing a failure. [ 1454.643855][T12808] name failslab, interval 1, probability 0, space 0, times 0 [ 1454.650067][T12807] FAULT_INJECTION: forcing a failure. [ 1454.650067][T12807] name failslab, interval 1, probability 0, space 0, times 0 [ 1454.656566][T12808] CPU: 0 PID: 12808 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1454.679554][T12808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.689881][T12808] Call Trace: [ 1454.694048][T12808] dump_stack+0x1b0/0x21e [ 1454.698642][T12808] ? devkmsg_release+0x11c/0x11c [ 1454.703839][T12808] ? __schedule+0x8ae/0xe30 [ 1454.708354][T12808] ? show_regs_print_info+0x12/0x12 [ 1454.713535][T12808] should_fail+0x6fb/0x860 [ 1454.718406][T12808] ? setup_fault_attr+0x2b0/0x2b0 [ 1454.723429][T12808] ? preempt_schedule_irq+0xc7/0x110 [ 1454.728870][T12808] ? kvmalloc_node+0xc2/0x120 [ 1454.733529][T12808] should_failslab+0x5/0x20 [ 1454.738016][T12808] __kmalloc+0x5f/0x2c0 [ 1454.742156][T12808] kvmalloc_node+0xc2/0x120 [ 1454.746648][T12808] seq_read+0x217/0xd30 [ 1454.750788][T12808] ? rw_copy_check_uvector+0x21e/0x310 [ 1454.756250][T12808] ? selinux_file_permission+0x2d0/0x520 [ 1454.762010][T12808] do_iter_read+0x43b/0x550 [ 1454.766622][T12808] do_preadv+0x1f4/0x330 [ 1454.770847][T12808] ? do_writev+0x560/0x560 [ 1454.775267][T12808] ? security_file_permission+0x128/0x300 [ 1454.780965][T12808] ? __sb_end_write+0xa4/0xf0 [ 1454.785624][T12808] ? vfs_write+0x427/0x4f0 [ 1454.790041][T12808] do_syscall_64+0xcb/0x150 [ 1454.794528][T12808] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1454.800401][T12808] RIP: 0033:0x45d5b9 [ 1454.804275][T12808] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1454.823880][T12808] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1454.832451][T12808] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1454.840493][T12808] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1454.848671][T12808] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1454.856638][T12808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1454.864592][T12808] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1454.872553][T12807] CPU: 1 PID: 12807 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1454.882724][T12807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1454.893242][T12807] Call Trace: [ 1454.897223][T12807] dump_stack+0x1b0/0x21e [ 1454.902011][T12807] ? devkmsg_release+0x11c/0x11c [ 1454.907827][T12807] ? show_regs_print_info+0x12/0x12 [ 1454.913013][T12807] ? cred_has_capability+0x18c/0x3f0 [ 1454.918979][T12807] ? cred_has_capability+0x2b2/0x3f0 [ 1454.924364][T12807] should_fail+0x6fb/0x860 [ 1454.928772][T12807] ? setup_fault_attr+0x2b0/0x2b0 [ 1454.933784][T12807] ? slab_free_freelist_hook+0xd0/0x150 [ 1454.939317][T12807] ? cap_capable+0x23f/0x280 [ 1454.943894][T12807] ? proc_pid_stack+0x1d5/0x1f0 [ 1454.948731][T12807] ? proc_pid_stack+0x8e/0x1f0 [ 1454.953501][T12807] should_failslab+0x5/0x20 [ 1454.957991][T12807] kmem_cache_alloc_trace+0x39/0x270 [ 1454.963273][T12807] proc_pid_stack+0x8e/0x1f0 [ 1454.967853][T12807] proc_single_show+0xd3/0x130 [ 1454.972616][T12807] seq_read+0x4aa/0xd30 [ 1454.976801][T12807] do_iter_read+0x43b/0x550 [ 1454.981293][T12807] do_preadv+0x1f4/0x330 [ 1454.985528][T12807] ? do_writev+0x560/0x560 [ 1454.989925][T12807] ? security_file_permission+0x128/0x300 [ 1454.995643][T12807] ? __sb_end_write+0xa4/0xf0 [ 1455.000300][T12807] ? vfs_write+0x427/0x4f0 [ 1455.004698][T12807] do_syscall_64+0xcb/0x150 [ 1455.009182][T12807] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1455.015052][T12807] RIP: 0033:0x45d5b9 [ 1455.018924][T12807] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1455.038507][T12807] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1455.047035][T12807] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1455.055088][T12807] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1455.063051][T12807] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1455.070999][T12807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000041 [ 1455.078958][T12807] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b8170ea9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:00 executing program 2 (fault-call:12 fault-nth:2): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x800, 0x0, 0x2, 0x0, 0xff}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x44, 0x453, 0x200, 0x70bd2d, 0x25dfdbfe, "5a1226adcc42abe32d2b517c234f890ed2f190a4037782ef8a7eebe3f3d1625fde8703bcbc185d9c10f459f2e9142509aee889", ["", "", "", "", ""]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x20) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x10000, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6800) setresuid(0xee01, r3, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000380)={0x1, 0x1, 0x1a, 0x19, 0xbb, &(0x7f00000004c0)}) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000040)) dup3(r1, r0, 0x0) 04:43:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x2, 0xfff, 0x8, 0x2, 0xe, "c00687f97e26df71371a271b62003c8d748414"}) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:00 executing program 0 (fault-call:15 fault-nth:66): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:00 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000200)=""/222, &(0x7f0000000000)=0xde) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1455.381992][T12840] FAULT_INJECTION: forcing a failure. [ 1455.381992][T12840] name failslab, interval 1, probability 0, space 0, times 0 [ 1455.394632][T12840] CPU: 0 PID: 12840 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1455.405222][T12840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1455.415265][T12840] Call Trace: [ 1455.418540][T12840] dump_stack+0x1b0/0x21e [ 1455.422860][T12840] ? devkmsg_release+0x11c/0x11c [ 1455.427926][T12840] ? show_regs_print_info+0x12/0x12 [ 1455.433102][T12840] ? cred_has_capability+0x18c/0x3f0 [ 1455.438806][T12840] ? cred_has_capability+0x2b2/0x3f0 [ 1455.444273][T12840] should_fail+0x6fb/0x860 [ 1455.448689][T12840] ? setup_fault_attr+0x2b0/0x2b0 [ 1455.453705][T12840] ? cap_capable+0x23f/0x280 [ 1455.458357][T12840] ? proc_pid_stack+0x8e/0x1f0 [ 1455.463459][T12840] should_failslab+0x5/0x20 [ 1455.468292][T12840] kmem_cache_alloc_trace+0x39/0x270 [ 1455.473921][T12840] proc_pid_stack+0x8e/0x1f0 [ 1455.478669][T12840] proc_single_show+0xd3/0x130 [ 1455.483407][T12840] seq_read+0x4aa/0xd30 [ 1455.487555][T12840] do_iter_read+0x43b/0x550 [ 1455.492050][T12840] do_preadv+0x1f4/0x330 [ 1455.496288][T12840] ? do_writev+0x560/0x560 [ 1455.500686][T12840] ? security_file_permission+0x128/0x300 [ 1455.508733][T12840] ? __sb_end_write+0xa4/0xf0 [ 1455.513742][T12840] ? vfs_write+0x427/0x4f0 [ 1455.518229][T12840] do_syscall_64+0xcb/0x150 [ 1455.522720][T12840] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1455.528944][T12840] RIP: 0033:0x45d5b9 [ 1455.533160][T12840] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1455.553805][T12840] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1455.562229][T12840] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1455.570188][T12840] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1455.578136][T12840] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1455.586086][T12840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1455.594053][T12840] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1455.613846][T12828] FAULT_INJECTION: forcing a failure. [ 1455.613846][T12828] name failslab, interval 1, probability 0, space 0, times 0 [ 1455.627537][T12828] CPU: 0 PID: 12828 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1455.637676][T12828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1455.647723][T12828] Call Trace: [ 1455.651005][T12828] dump_stack+0x1b0/0x21e [ 1455.655330][T12828] ? devkmsg_release+0x11c/0x11c [ 1455.660277][T12828] ? show_regs_print_info+0x12/0x12 [ 1455.665489][T12828] ? cred_has_capability+0x18c/0x3f0 [ 1455.670767][T12828] ? cred_has_capability+0x2b2/0x3f0 [ 1455.676048][T12828] should_fail+0x6fb/0x860 [ 1455.680460][T12828] ? setup_fault_attr+0x2b0/0x2b0 [ 1455.685510][T12828] ? slab_free_freelist_hook+0xd0/0x150 [ 1455.691050][T12828] ? cap_capable+0x23f/0x280 [ 1455.695633][T12828] ? proc_pid_stack+0x1d5/0x1f0 [ 1455.700473][T12828] ? proc_pid_stack+0x8e/0x1f0 [ 1455.705230][T12828] should_failslab+0x5/0x20 [ 1455.709749][T12828] kmem_cache_alloc_trace+0x39/0x270 [ 1455.715030][T12828] proc_pid_stack+0x8e/0x1f0 [ 1455.719611][T12828] proc_single_show+0xd3/0x130 [ 1455.724461][T12828] seq_read+0x4aa/0xd30 [ 1455.728618][T12828] do_iter_read+0x43b/0x550 [ 1455.733110][T12828] do_preadv+0x1f4/0x330 [ 1455.737340][T12828] ? do_writev+0x560/0x560 [ 1455.741747][T12828] ? security_file_permission+0x128/0x300 [ 1455.747460][T12828] ? __sb_end_write+0xa4/0xf0 [ 1455.752122][T12828] ? vfs_write+0x427/0x4f0 [ 1455.756529][T12828] do_syscall_64+0xcb/0x150 [ 1455.761025][T12828] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1455.766906][T12828] RIP: 0033:0x45d5b9 [ 1455.770787][T12828] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1455.790403][T12828] RSP: 002b:00007f63a8839c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1455.798830][T12828] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1455.806791][T12828] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1455.814777][T12828] RBP: 00007f63a8839ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1455.822729][T12828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000042 04:43:00 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b817e0a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r2 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) write$FUSE_BMAP(r2, 0x0, 0x0) r3 = creat(&(0x7f0000002300)='./bus\x00', 0x0) ftruncate(r3, 0x12081ff) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000003bc0)={0x5, 0x0, 0x0, 0xffffffffffffffff}) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000003c00)={0xa0, 0x18, 0x0, 0xffffffffffffffff}) r6 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) write$FUSE_BMAP(r6, 0x0, 0x0) clone3(&(0x7f0000003ec0)={0x200000, &(0x7f0000003c40)=0xffffffffffffffff, &(0x7f0000003c80), &(0x7f0000003cc0), {0x10001}, &(0x7f0000003d00)=""/126, 0x7e, &(0x7f0000003d80)=""/229, &(0x7f0000003e80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000003f40)=0x0) r9 = getegid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)={0x194, 0x2a, 0x300, 0x70bd25, 0x25dfdbfe, "", [@nested={0xc, 0x36, 0x0, 0x1, [@typed={0x8, 0x65, 0x0, 0x0, @pid}]}, @typed={0x8, 0xa, 0x0, 0x0, @ipv4=@empty}, @nested={0x11d, 0x44, 0x0, 0x1, [@typed={0xed, 0x1, 0x0, 0x0, @binary="cb5fbee9981db4ac0f0f34d760725f9104c928743fbcb2bed316820d2bd201503b3706fe3569554198dec430f32a1b3464e42211dd54a8f1edc36b1cfd38a04635991733de465ab1a40cb20e6c17fd6a9ff9eeb761bb526bcfe0d6231b8b76127cd0cf73c38b17d75e71661b70c41377db2964da963caa8bfbc4cd366dd74b3f3bded2de35c332f6a0571b24b0c2897064963a58448feee9e1d101c2c8bee5ce46492d9a4133f515fbc6a8e4582cfee84e97cb3fecad4f4423d9a0f3c6d68385a45854cb677cc035f1fc788e6455e3bf5dbac7c594d23b58342dff7c1bafae493aa49373eee9c0bfd3"}, @typed={0xe, 0x89, 0x0, 0x0, @str='/dev/ptmx\x00'}, @generic="ca8be0873d44297cf547e898af49730a7b", @typed={0x8, 0x8, 0x0, 0x0, @uid=0xee01}]}, @nested={0xc, 0x2e, 0x0, 0x1, [@typed={0x8, 0x37, 0x0, 0x0, @uid=0xffffffffffffffff}]}, @generic="6ff0489efb55a5125a847cac3df02f5205355b9504ae3b91663bb98f5115fa5692d8ed3961afbc0741152f30bd7c7fbea29b30e6d2833838bc20c8fc5b258190f9789054"]}, 0x194}, {&(0x7f00000004c0)={0x22ac, 0x28, 0x400, 0x70bd2a, 0x25dfdbfc, "", [@generic="12e95c4f90dc8da4f93d4fb85e463a22aa93912e425fa9f588fad663a7eeb7c8f699071dfee3e027ec45fc63f6dc727be6c97dfdc366808d2e2d02e2810d144a77026449c59315db01518d2b0f1cf5044f8b4db9e6b1b5e95aee191a3b87da154192ed09a5a31b353a2e9ad12037c3100b79", @typed={0x99, 0x2c, 0x0, 0x0, @binary="af563ee3e17a2555c170f5f51288ade58e16b1d30d51b3f52cda283059e931225bc582f9781e3333197c54ed5aad4f7f56629ca144b9306bd0135384b053d9fbb2c31ff3b2b95b4aa09a121a01b1a6fe20bb4d2cf5136d8f1ec3225a03bfcdbaf6a89a655028c5d0168051bb27765ae6751c896da8dd3f85b61df1f757bdb2364fb22838dbae05dab832fbbd27660a55110bbd6d2d"}, @typed={0xc, 0x4b, 0x0, 0x0, @u64=0x3}, @nested={0x14, 0x0, 0x0, 0x1, [@typed={0x8, 0x48, 0x0, 0x0, @u32=0x6a7b}, @typed={0x8, 0x8c, 0x0, 0x0, @fd}]}, @nested={0x216b, 0x1e, 0x0, 0x1, [@typed={0xc, 0x15, 0x0, 0x0, @u64=0x80000000}, @generic="2974022a8dcbaf1984ffcfc65f4718c44f761cd2b51dd35a82c1ed10a4c1d1e88a218a9fbdce11861ab4723d8e2b8f031aad8cce020afbd9bb457c19fe2439", @typed={0x8, 0x8, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0x62, 0x0, 0x0, @fd}, @typed={0x8, 0xf, 0x0, 0x0, @uid}, @generic="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", @generic="b8a70eff4012c4f8b21d897d0ec286a0f5198210093ebe0d6ac01f7da1affe067402a24ee33a3ec95505cfab03f909611a9d1fbcb142bd06d38e428d835290513442191100d083d33bfa158a1fcfc6da555ee0563fe5ef7c150d5e60b3954e0642605a04f637bab9e28c146184adf56fd10ca9031647221944366e15b344fc3165d41da8fe18e54c8d356fd9fa39b949ef07a82b8a7d93d8dd6b058b94ef36b406518e9f44bdc06c74c2f684e6ca0e1f84e1c1cddb718a54a582af5e2d313375e773d599f97c703157d78881cb6e58f975176c94ff5339bcedac03c3b06e257d14e395db7fa1f9c513c68af7543cc51880bacf0fba460ab6d4298c5581a8dcaebc2a5904dec5c70b7dfb14dc66bc020b823393894592ca97d6e0f44fa8230acf57baa3217e7d712ea47ea1b51de2fb41ab53477dd64031c6ae1c9f83b2be885c3497932bb588a7104c3dc2e679be78c898e33d54637db0e788e3caff139cf46068a82448c8793c85a1d1047b57906b7b6019bae64ee9deb9aef4c75266f51b203d868c7d46d5b7821dafe5f42d5b21254ba819f7663e338c6b3ea9981e93206c86c5f208c418096686beb9a7640d958735481f29fafeb4183b137eeed857f1330a36c27375cfaa01480c8dc55de1db9490c3747a48308ac7884f133555f5d2316bfbef3ae2f518ce1f88c935f6c2b52144052711e63300b7b86124536f4ede36eae4929311f0178fa06d8a7a3e6c2313fca36f7a7e6c3e8ca99b850e59547d09be6f7312654356cd60cc02422db4074c1b7116dcc7c9ee0c59819605625577c4bedfa7c76bb20f609aeab47484a71441e5b2291550402b8821dfdfa38e898e3070a7e27e66287663051260d8c29a3de97aeab92e878687a746c04fa62a5596df7d03689e218db234be7d9fca4c705736be5c433ec004db8b10603d6946beac566865b919c8e9126e8780c8c968e56e75cb671b32eeb3951e74e51f6c3db314d8e88f4c1561b4b796a54f75039ccdc6c340b339d8bb98e8ee37b72140095a134168ad6b73922d7d18fcf7290d6e0f3ec138132679b875cef63a25135e252c76bc73d2a56bcfa6a0747aaee60a1e7d6e6317abb26d059b45bc1150cbb8ab72e10a87d13c68f7ef9d9663311d507db14ef3202b0372659fff43796490b2b052311b2fb04c967ec18e02d2e478eb42286df77e8dee610d7569e3892740361c6055d16b3fb608da174ca98336bb455f909410630330271131c04d44f96108fccd6995a31e0b37acf9b52c25e8766c8825974233c5813ede525461505d015188d5cc8ccd5288f8c6671527c9d346b627be874439a5b91d9779d19a525280db655c46d61defafe3ac2b3936f0786076fca92e75f2a2769bfe3f6e668a6ca2dbf8b7ed0349cc3180ad731a069e1dac4f9c2b7f5ee981a5d2b1c5bae956a68f47a18e7cc5872b1ceb92c2dc54b5f3cc786bbbb3ab0592fc9f6983bfdb88f89dbe6110b07999da1f283daf9c8dc89e152999870672cefc4b859982b625e6766672464fe2b9ee0f65e6687e6e1fcb439a86756673752056c232c97e784764f737e739215e57dc1121ff522504095014a17fa240745274dbba357419a3f5440844149add99527fd716956b67ff2019463b8ebd03198406b9fad3009b050eadbbeed9c2ffe95521da8cecf0edb3ef4c05d185f89d16b13ef767d838f1ef3707a876d540b5eff7ec1c2420450dddd6acb22a4376a245c0c1d61e376a33d27ff73f1f8acc9388ac785a419828b1732ce42a36ef4b50edac5f8c0af18489ff2b66db86f20e4981e7c4a39b6ebbc334426a1e6ff72c0f04472ca35d0a9e27e0503ad4600a2c80939b3b51a75d542119642bfdfb398c28d3f12dd3b2dbc0269ed445eadf1f83acc86e203a6fddb3179ab31d0f84d58285111acd15891e5b3674a844dfa1bfb2eb23e648c6c291d96af3f2f64a015664a78476038e7f279b97e216591ccc4cf1834afb23b144b12512af07266159c2c6e8d0ba7d834a7c356aaa7884aaf9ebe0ee1e4935534f78948f9dd8f326a630012ff768e30f3c9a625ad13d168d3beee64e6e82f0f5ff42f0849a736dc2eed565d4c553fb1c443552055b21cf0dbb2610e037e8decd0eca301f60f7686daca7b063d6bb71f9981feb7c13c48ae67cbfc417ddbafee785d05999b1c9feac92adb1958ebb8d7ec032e88d5d8694ebfad55472e62237dc870935d85ed1c99b4b5db35af6863eb2eda69dc288a4d1cdd9f4f07a2c1cbd5e53604edb2c3df1f1397c4a020bb2f0c60c21a36e00f15aac562564fe4a9946e9001be0388b299c11570d7a6697287945652b1498457ceb9308636615201e5022b6bcd63825aab56f4566d3f7f619f76f37dd33dc38957e8dd49f12a8a2bfc9e369b2faa38a75bc1f306e5253643f9ff78519f70cd601cf2b0de0526087d47a050f8ebf67632151b70cdd2e5aa0e35eaa2b735c9479df7bb1d789b2ff27452a11b2af9c512674680a9b782929643ea2d9a00e66352e0db356466ea799b9f796fde6890d9e6b60c95c6c755cdbc91bb166c0bdc248d0b8717481d263a18d7ad8b19f0640c6630a39bf2e70789933a8f95513f13d08575511e82617f13c066fe07f4a155811ef6dcf07bc2445de268ca9c850d8e94e06921878e447c5cbead0558b35c7e4d7b16b10c9a483356845773ca3f39f42c188c5fefc1b838d0e01d27a21a3ba4d2efc707ae7cc958b39074df203fd77e2750d6b95958ec8129c661653664debf5ce8f55a40262562423c36fd45201c5e86f4bcf545ddee35a753aad0562885e83ebffcc4cd1817288d7d78a62f92caa26a17dbd3e1e03fe617956c495a25c50860b9ba040d5749e7183b9a4c8748de71a46caab1f62f67c6748739991f252349e030e21345a87489e9f029c07d39849e4dedc81ed054b52c3ca5eba11b0a9b1425dbb3d7b5f4ae7a729f588961ce6f10c9be83318f4e63e51b0821275072044109dffc0c2bd90d67bc7f87869799e35926bd579534bc7813c229825742e99a9719a17053fab2696dd5386774f16be1d55425e45560a9ff9f61b8a7d53c3ad2977a0925261495acfde84953f8567c7407cd6d3ce3e53dcbd0fb856c5ac45634c520eb2ff5ccf11d8cb1e4f56dc5f87f059f6bfe902fb27c6556fbc0958d56ee2fd7398e7e0ab6a5949f19eb3f26b8e9df7c967ea605434e788a9f527ad19b603e34c4c322c8484d7f557924d33cc7f902cbea11a2d15758646134283873227878ba5bb86ca50d048d0cb871391170c49417405de4c423ad9a825737ca2166158b047ff2e39fae27aad64aebc653c240545bc3c37ef53e9fde7ce6e1f9949cc82423210503eb46d1068b5ee24eb1616867a3fabb216092c376f34be8e754f03abd4fecb9fd6bfc0235d063e4a8b34ec5bf24253897ac17e89376acd5f28ee1cffe4b84d9705847b179229c383d267b4eb31cff6a43b87614b0be4f375becf7c1f526b43a2d5fa78219b3544ff8dfd1d4d9b59a1cb774116d6a4b5efa5e211276cc80a61cfb3a77e5c2f9be6f9ac4c74b1a3863997e4fc2ff8684ac418d49525dbccf439e2d22de9c02190f7e82bab909878f0b7e2c8ba4d97745c6ee6b481b7755ebc14461c906b9aaa098217d689f70ff6d67410e4a9332abe0a788d751a768f35404151afceb4c3b080b0d675cec188f92e053e4c3cf844f30328435ec18daa11e15c7d0d64f15a81a17337942731e7c80dde2fb33430d458db4f80173d4ab48a8860df0c9d52cad672d1c6610e98e789b180b9a4211283eebbc050fb35e62eb8ae80cee8c5a826b22cf3647b0edf289accec658bebc3ccc7153b398bf3abc588318fb961cb5ddc13035c5cef5d050f8b27e597ed9d7cb444345bb82e26a68fe8b25ee0779dd7f4292b2d3ebba12f7caf2650b7da52a07578ba183abc5a75ec5236d99be03fcb0d7cfd8a497f9cd6a2b29fc27735aeeaf9787855a32d8ff7e2a72bef14b1d99318b6c4b34a453c71116b1da616414457c1096712dbec446bf5838fbe54bb4f027d1c5cbe6bf803b76d589d2ba2a6e3b63d6ca6a75def2bd1a5d5466131c2d114ee9c86505c10de52ba69b2fb8a9282ea376ec324fb69bbaebc8c8493a87f837d009fe0eee19823878c299067ad224777fbf04aee73dcc366492f89dfb9b3879bbfe89c78268d203a2beaf5e67021d1c390f4214c8dad4891225bab1d2a19f9fc2b82b63a274fa179260434e3a6c28d03cd11d292d2abf209da0d57c7bb56adc0d9bb827fe6ed1a8299d23b3bd9a2f5260f5ff78a552cd8a01335fcbd553c556a339e3c3deba27145a7bb48da1422428bd7f270734918fcbc280df5429872adcf862fbc77e3a04bdc933b49f76755c8af37cea569965c6ca8391ccced59bdc0a0865cf060bf2760f50f7cbd27a351eb476bc8e07492011ede8462927ffdcf90a4d8cd638ed30880c44a958c2929ec0f68894a0a6d05ddc853b0767df8181bfe1c9541f1dafa8561cba59201947851b3ae3b0b186d63fb0eb2bccc6ae2167bd60a277ba12064429e4c607734c82cf5abcc8fc211e0d6e81aca4b0d4773f3d4122c44316858e1b4de30593039dbd05e49cd5406d23651659a5504ae6514f0441558d93fe398f3e144da928b8d116bdc6931ae957cd27b1bd3483b475309249e4b1bd93c525b06640c003be021614941ff223148da75c8de4e37ced84b013bdf7f1f9edb4fcc62a61e0b4750f38c2f35ee6213ba8a75a60947dbc4459a2a6e042cbcd962fbe325378ce957606d84c7ac5e351940742b1c1a9d4d4745555807e21df9c4685229f42fd8c091232409b4abba891c502307bc6200636c7685a0da0280281e4dfe55b2414fd9becd1c93395c72bf25fc53ccc73ff0574e35515650c75430cb98c9846566b27c0b5af70d88fa321476ce23fe0f90144321a6d8668afd0a9a6816136ef0b53ad533fd08d20675bf4a9b085663c29d639bbddec4e15b54dc4a6d35f5b3ce74ec267e9415133638bb1048232e5775b7478d0a1c6a46c4f37828194b0da25f9b56ff33312ec42af661db10fa88df084ef52f5ce7fd4b7a423d2aa5e88301c46958743b03bcf1c4c9e24c30706d227855aff8199f17aee3ddf5c81e963a7162c08ce1aeff8173cc642b3b1bd0ec5110fdd8a01e541ec3c01d1791d4557e5fcd8e5f45098f1f697a496df5eb35db9b42f0eb01ce8666bd7b627a40b9d9c806a8073e939fb66decf5a2b1b7f7c3b794b21fe989f68bbb7651fafcf91b165c13f42834ffd30c5cf4a73b0ebff8ab0c5c85844536de9ed9f4dc199e0ae2da5cf60790555ed9add001539a6593e47383184cb809ea4bb0f620ed0591548b8de350e82468082ebe723c330e03175686a258aedd27a9f2e9762c8f0d42e38be94492991303a7053fe4963c70bf07eb2b2ce38b7a66a10c7aa421983d23a60d79536a93e77f4f5f95c2cdaac4109231771fd4675fbf5c23a117ad36d922bc8c14096103bd304283a6b0838b4c0fa45d9a68b58d3509c8290108a612178005776e2bf2b61dfe138040b56804c03f49daaecb473d1cc52e1d54915b49fa690cd03b013e4260fb3351c11395f26ac58efb434e6e10f0e303d939e0dbf1225f8b1af3a7dccc3f0941e9630f8223af2f163a9041792d92757c45296464d7c535d3274ad4008b5d44d65a03a78ea096a3bb5a05e2185808f3c2d55e4eaa03d4c384e1e3c835599b92c8b86844307c5fc4b750df5aaa90d97cb73e7f14c203873eceaf1f0a08bf61593303eaf6ff26c122b9b1aee85423", @typed={0x8, 0x74, 0x0, 0x0, @fd}, @typed={0x8, 0x6c, 0x0, 0x0, @u32=0xff}, @typed={0xf1, 0x1e, 0x0, 0x0, @binary="4953853df039b44ee5f1e96ae0ba6b7e184b4a3a5eeded7576037529f06a3dc850e3343cf957c5339d73f390ff004e3441ab4d5bfa7d8b30aa42ebe4315db090b195900131da4655252c479a7d3d5e7993f15915d3696ff673e833e32435b4b02f9cd191025badad401c5d7b5b0745b8daa4df27950826d09f3a41036cb8ef0f078dd77e0c6493dfae45ba210803e617f1775e125dc0c023f11bd75c94220b8b20979c9278424b434cb58bba4898777b554324885373df952a7958e0ceadf34ed2c4d950c39a74bbfe12473779bc7c8f8c049838d1dddfd319c4cb04940da4f0e4780c30d11edffa09f9daef9a"}]}]}, 0x22ac}, {&(0x7f0000002780)={0x12d4, 0x2e, 0x200, 0x70bd26, 0x25dfdbfb, "", [@generic="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", @generic="3b171e95bf68d278c54aa0bd7ed54b30dd66d411f21ef08bf81dc1e3070444f353445d38a86c0d59358d325620bcd73f47397bc0c8df4dd3030af9f4cea5757641047df6a1d0695f4ca857f6484ef9ce2ea89df3650391bb582ed324004f27aee4d58fa6df11e24f915bc05846e579ae09d5f257589298de86d441eb3f4975342243057f3076c04a7e5a6895b330e17b38842d10e22c7631124598", @nested={0xac, 0x12, 0x0, 0x1, [@generic="52dc7b2d0579ac7840ae30d64de517e912eb5e7c1aca90976806778802a493565ead2a4b5b4ce1d241a0449ed7223317256d2fc7c6c6159c40e76d1140830023106e6301f332aa031f4f5cfa83dd774a6e42b4d88b44d9cd91e1b5d8379a8324df2749cfe548fc585d4c5d5beec0ef741ad0232ddd2cb6fb1e32c5065a0c81eb65464dec1f6aae987661465cc512bb0cf2cf0e4872fe25e6", @typed={0xe, 0x27, 0x0, 0x0, @str='/dev/ptmx\x00'}]}, @generic="2a705e368a92f42a9daf3bdfed9c73a74f0abaa9d73914f85719e4679c101c4ec133f2a7e9afef9171fdb95e81450c24463253ebf7eafafd322cb9ffb7a82e8a65415fd047a80c09cdffeafe4903dfa2c0df3d4016c80362", @generic="e96466eadad073027645c5133b66e2d2bd1aa796dd7d94d76966366970bc23ccb62ac61f511d7b8f85ae1406ad4a7414beca7505847e3333469e4d9d36c5a6b1ee78", @generic="312c859aef4ab63501bcb61cf587a6519ccc8f9d44b74043b535a92d267c1bcbf68244a0b1191caa871139fce99a9e517acdc8a04488107fbce768f0ee97e9fbfa7c0133481a0ad7f756a8a2e78672ea92562cb2682bb5a328acc77f4cb55985f0194762bfd86cb4d3af58c9ccff5dff179342d6fbd532b2a872fa6cbc5371849a6dfb45a2f4faf8ff5b5dd8bae06d55f62e414bdd76e245b12dd5f8a5bac0cdec258027ee01e3efcbd7a12f41bb25242c36aabf1df0ff02521cf9b92cf2a1d307c371f898449c2863571cf0cd39f590bae1555207a1866b814c5b80c7f099ee35"]}, 0x12d4}], 0x3, &(0x7f0000003f80)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r1, 0xffffffffffffffff, r1, r0]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee00}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r1]}}, @rights={{0x2c, 0x1, 0x1, [r2, r3, r4, r5, r1, r6, r7]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r8, r9}}}], 0xf0, 0xc000}, 0x4) dup3(r1, r0, 0x0) 04:43:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x200800, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x0, 0x0, 0x149}) r3 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0xf, r2, 0x5, 0x4000000, 0x7f, 0x3}) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0xba26}) ioctl$TIOCNXCL(r0, 0x540d) r4 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110", 0x9, 0x2}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r4, r0, 0x0) ioctl$TIOCGSOFTCAR(r3, 0x5419, &(0x7f0000000040)) 04:43:00 executing program 0 (fault-call:15 fault-nth:67): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1455.830684][T12828] R13: 00007ffebb13841f R14: 00007f63a883a9c0 R15: 000000000118cf4c 04:43:01 executing program 2 (fault-call:12 fault-nth:3): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:01 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea17eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4, "0000000000000000000000000000000600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) [ 1455.995758][T12866] FAULT_INJECTION: forcing a failure. [ 1455.995758][T12866] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.008433][T12866] CPU: 0 PID: 12866 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1456.018571][T12866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.028607][T12866] Call Trace: [ 1456.031897][T12866] dump_stack+0x1b0/0x21e [ 1456.036212][T12866] ? devkmsg_release+0x11c/0x11c [ 1456.041137][T12866] ? show_regs_print_info+0x12/0x12 [ 1456.046307][T12866] ? cred_has_capability+0x18c/0x3f0 [ 1456.051564][T12866] ? cred_has_capability+0x2b2/0x3f0 [ 1456.056821][T12866] should_fail+0x6fb/0x860 [ 1456.061208][T12866] ? setup_fault_attr+0x2b0/0x2b0 [ 1456.066203][T12866] ? slab_free_freelist_hook+0xd0/0x150 [ 1456.071754][T12866] ? cap_capable+0x23f/0x280 [ 1456.076313][T12866] ? proc_pid_stack+0x1d5/0x1f0 [ 1456.081142][T12866] ? proc_pid_stack+0x8e/0x1f0 [ 1456.086525][T12866] should_failslab+0x5/0x20 [ 1456.091047][T12866] kmem_cache_alloc_trace+0x39/0x270 [ 1456.096397][T12866] proc_pid_stack+0x8e/0x1f0 [ 1456.100962][T12866] proc_single_show+0xd3/0x130 [ 1456.105705][T12866] seq_read+0x4aa/0xd30 [ 1456.109856][T12866] do_iter_read+0x43b/0x550 [ 1456.114962][T12866] do_preadv+0x1f4/0x330 [ 1456.120417][T12866] ? do_writev+0x560/0x560 [ 1456.126327][T12866] ? security_file_permission+0x128/0x300 [ 1456.132041][T12866] ? __sb_end_write+0xa4/0xf0 [ 1456.136702][T12866] ? vfs_write+0x427/0x4f0 [ 1456.141091][T12866] do_syscall_64+0xcb/0x150 [ 1456.145572][T12866] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1456.151446][T12866] RIP: 0033:0x45d5b9 [ 1456.155327][T12866] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.175000][T12866] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1456.183389][T12866] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:01 executing program 1 (fault-call:14 fault-nth:0): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1456.191343][T12866] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1456.199382][T12866] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1456.208142][T12866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000043 [ 1456.216728][T12866] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:01 executing program 5: getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000140)=0x1e) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x140) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:01 executing program 0 (fault-call:15 fault-nth:68): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1456.301191][T12882] FAULT_INJECTION: forcing a failure. [ 1456.301191][T12882] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1456.318905][T12884] FAULT_INJECTION: forcing a failure. [ 1456.318905][T12884] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.331687][T12884] CPU: 1 PID: 12884 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1456.341829][T12884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.351863][T12884] Call Trace: [ 1456.355144][T12884] dump_stack+0x1b0/0x21e [ 1456.359484][T12884] ? devkmsg_release+0x11c/0x11c [ 1456.364421][T12884] ? show_regs_print_info+0x12/0x12 [ 1456.369613][T12884] ? cred_has_capability+0x18c/0x3f0 [ 1456.374900][T12884] ? cred_has_capability+0x2b2/0x3f0 [ 1456.380183][T12884] should_fail+0x6fb/0x860 [ 1456.384583][T12884] ? setup_fault_attr+0x2b0/0x2b0 [ 1456.389800][T12884] ? slab_free_freelist_hook+0xd0/0x150 [ 1456.395355][T12884] ? cap_capable+0x23f/0x280 [ 1456.399926][T12884] ? proc_pid_stack+0x1d5/0x1f0 [ 1456.404933][T12884] ? proc_pid_stack+0x8e/0x1f0 [ 1456.409680][T12884] should_failslab+0x5/0x20 [ 1456.414168][T12884] kmem_cache_alloc_trace+0x39/0x270 [ 1456.419436][T12884] proc_pid_stack+0x8e/0x1f0 [ 1456.424019][T12884] proc_single_show+0xd3/0x130 [ 1456.428790][T12884] seq_read+0x4aa/0xd30 [ 1456.432940][T12884] do_iter_read+0x43b/0x550 [ 1456.438966][T12884] do_preadv+0x1f4/0x330 [ 1456.443202][T12884] ? do_writev+0x560/0x560 [ 1456.447614][T12884] ? security_file_permission+0x128/0x300 [ 1456.453351][T12884] ? __sb_end_write+0xa4/0xf0 [ 1456.458020][T12884] ? vfs_write+0x427/0x4f0 [ 1456.462428][T12884] do_syscall_64+0xcb/0x150 [ 1456.466926][T12884] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1456.471635][T12888] FAULT_INJECTION: forcing a failure. [ 1456.471635][T12888] name failslab, interval 1, probability 0, space 0, times 0 [ 1456.472811][T12884] RIP: 0033:0x45d5b9 [ 1456.489344][T12884] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.509187][T12884] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1456.517596][T12884] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1456.525547][T12884] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1456.533499][T12884] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1456.541446][T12884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 1456.549416][T12884] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1456.557378][T12888] CPU: 0 PID: 12888 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1456.567519][T12888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.577583][T12888] Call Trace: [ 1456.580867][T12888] dump_stack+0x1b0/0x21e [ 1456.585191][T12888] ? devkmsg_release+0x11c/0x11c [ 1456.590116][T12888] ? show_regs_print_info+0x12/0x12 [ 1456.595300][T12888] ? cred_has_capability+0x18c/0x3f0 [ 1456.600848][T12888] ? cred_has_capability+0x2b2/0x3f0 [ 1456.606123][T12888] should_fail+0x6fb/0x860 [ 1456.610530][T12888] ? setup_fault_attr+0x2b0/0x2b0 [ 1456.615549][T12888] ? slab_free_freelist_hook+0xd0/0x150 [ 1456.621085][T12888] ? cap_capable+0x23f/0x280 [ 1456.625660][T12888] ? proc_pid_stack+0x1d5/0x1f0 [ 1456.630498][T12888] ? proc_pid_stack+0x8e/0x1f0 [ 1456.635256][T12888] should_failslab+0x5/0x20 [ 1456.639748][T12888] kmem_cache_alloc_trace+0x39/0x270 [ 1456.645043][T12888] proc_pid_stack+0x8e/0x1f0 [ 1456.649619][T12888] proc_single_show+0xd3/0x130 [ 1456.654376][T12888] seq_read+0x4aa/0xd30 [ 1456.658524][T12888] do_iter_read+0x43b/0x550 [ 1456.663018][T12888] do_preadv+0x1f4/0x330 [ 1456.667333][T12888] ? do_writev+0x560/0x560 [ 1456.671741][T12888] ? security_file_permission+0x128/0x300 [ 1456.677455][T12888] ? __sb_end_write+0xa4/0xf0 [ 1456.682160][T12888] ? vfs_write+0x427/0x4f0 [ 1456.686596][T12888] ? do_syscall_64+0x80/0x150 [ 1456.691266][T12888] do_syscall_64+0xcb/0x150 [ 1456.695763][T12888] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1456.701642][T12888] RIP: 0033:0x45d5b9 [ 1456.705530][T12888] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.725734][T12888] RSP: 002b:00007f63a87d6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1456.734228][T12888] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1456.742188][T12888] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1456.750156][T12888] RBP: 00007f63a87d6ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1456.758139][T12888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000044 [ 1456.766195][T12888] R13: 00007ffebb13841f R14: 00007f63a87d79c0 R15: 000000000118d12c [ 1456.778770][T12882] CPU: 1 PID: 12882 Comm: syz-executor.1 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1456.788916][T12882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1456.798944][T12882] Call Trace: [ 1456.802465][T12882] dump_stack+0x1b0/0x21e [ 1456.806805][T12882] ? devkmsg_release+0x11c/0x11c [ 1456.811716][T12882] ? show_regs_print_info+0x12/0x12 [ 1456.816888][T12882] ? stack_trace_save+0x1e0/0x1e0 [ 1456.821920][T12882] ? __kernel_text_address+0x93/0x110 [ 1456.827261][T12882] should_fail+0x6fb/0x860 [ 1456.831645][T12882] ? setup_fault_attr+0x2b0/0x2b0 [ 1456.836646][T12882] __alloc_pages_nodemask+0x1ee/0x7c0 [ 1456.842015][T12882] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 1456.847724][T12882] ? kstrtouint_from_user+0x1cb/0x230 [ 1456.853066][T12882] ? kstrtol_from_user+0x180/0x180 [ 1456.858152][T12882] ? __kasan_slab_free+0x1e2/0x220 [ 1456.863229][T12882] ? slab_free_freelist_hook+0xd0/0x150 [ 1456.868750][T12882] ? kmem_cache_free+0xac/0x5c0 [ 1456.873578][T12882] ? do_sys_open+0x60f/0x7a0 [ 1456.878148][T12882] ? __rcu_read_lock+0x50/0x50 [ 1456.882968][T12882] kmalloc_order_trace+0x2a/0xf0 [ 1456.887881][T12882] __kmalloc+0x268/0x2c0 [ 1456.892528][T12882] kmalloc_array+0x2b/0x50 [ 1456.897465][T12882] rw_copy_check_uvector+0x8a/0x310 [ 1456.902641][T12882] import_iovec+0xd4/0x340 [ 1456.907022][T12882] ? fget_many+0x20/0x20 [ 1456.911229][T12882] ? dup_iter+0x110/0x110 [ 1456.915534][T12882] ? __kernel_write+0x340/0x340 [ 1456.920347][T12882] do_preadv+0x1ba/0x330 [ 1456.924553][T12882] ? do_writev+0x560/0x560 [ 1456.928934][T12882] ? security_file_permission+0x128/0x300 [ 1456.934615][T12882] ? __sb_end_write+0xa4/0xf0 [ 1456.939256][T12882] ? vfs_write+0x427/0x4f0 [ 1456.943649][T12882] ? ksys_write+0x237/0x2a0 [ 1456.948126][T12882] do_syscall_64+0xcb/0x150 [ 1456.952606][T12882] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1456.958461][T12882] RIP: 0033:0x45d5b9 [ 1456.962320][T12882] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1456.981893][T12882] RSP: 002b:00007f5b603c9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1456.990272][T12882] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:02 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:02 executing program 2 (fault-call:12 fault-nth:4): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1456.998212][T12882] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1457.006160][T12882] RBP: 00007f5b603c9ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1457.014108][T12882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1457.022051][T12882] R13: 00007ffd5aabd60f R14: 00007f5b603ca9c0 R15: 000000000118cfec 04:43:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) r2 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000002340)={0x0, 0x0, "9943c2674e0c960db5304e31e802044ed3f4690dbb8180653ebbdacd8b7c73f3fa3a069055c423ceef7abdef23a3d9fa05cd314b4089e0ffb51d348558b8d34c5067154432bed8b9d35f8643fd13f41a56750d5afa760b9123b5417bcce9c8e87aae58c3fc376c9190b95a72559e701ccdae61903c3ecb1fe750ad34e01207001fb2595e366cadf7a45588ef00d58027590d5c6651c870e3f0abf340b35443ab44107db179b2c62af44d8da5698cf663c86c03f9f2c493afcf490f247e2273a5b0c0c87c5650850b36cc5f81c4cbe1d2c2bbefd47a85a3ee220ffb4cbbb28f6c12d1001be31d108d0600", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f000006b9c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000006bbc0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}], 0xbe, "cbab7ffcace4a6"}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r7 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r7, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x149}) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000140)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000200)={{r5, 0x1f, 0x7, 0x9, 0x2, 0x800, 0x4, 0x2, 0x80000001, 0xfffffffc, 0xfffffffa, 0x2, 0x2, 0xffffffff80000001, 0x5e}, 0x40, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r8 = dup3(r1, r0, 0x0) accept$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) 04:43:02 executing program 5: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={0x0, 0x78, 0xb2}, &(0x7f0000000140)={'enc=', 'oaep', ' hash=', {'cbcmac-aes-ce\x00'}}, &(0x7f0000000200)="a719633b175a1e4ba4e1de29e8b7a44bfae9995ef451017fe4d6660d9dfb96e7eeadb92d8af0d6ec13402a5aec2ee56b6f8b0605899fa5fb1ad666e4964c1325da7e8d4377f7a2772fa25e553636963b85d871d38fbb0a35ce8dac3673f9ece3d6d83fa1348f4bea4f5b39d03e3754f7af6ddce88b00e09d", &(0x7f0000000280)=""/178) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/70, 0x46}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:02 executing program 0 (fault-call:15 fault-nth:69): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1457.224308][T12919] FAULT_INJECTION: forcing a failure. [ 1457.224308][T12919] name failslab, interval 1, probability 0, space 0, times 0 [ 1457.237421][T12919] CPU: 1 PID: 12919 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1457.247581][T12919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.253434][T12920] FAULT_INJECTION: forcing a failure. [ 1457.253434][T12920] name failslab, interval 1, probability 0, space 0, times 0 [ 1457.257626][T12919] Call Trace: [ 1457.257648][T12919] dump_stack+0x1b0/0x21e [ 1457.278550][T12919] ? devkmsg_release+0x11c/0x11c [ 1457.283468][T12919] ? show_regs_print_info+0x12/0x12 [ 1457.288664][T12919] ? cred_has_capability+0x18c/0x3f0 [ 1457.293924][T12919] ? cred_has_capability+0x2b2/0x3f0 [ 1457.299200][T12919] should_fail+0x6fb/0x860 [ 1457.303596][T12919] ? setup_fault_attr+0x2b0/0x2b0 [ 1457.308613][T12919] ? slab_free_freelist_hook+0xd0/0x150 [ 1457.314251][T12919] ? cap_capable+0x23f/0x280 [ 1457.318942][T12919] ? proc_pid_stack+0x1d5/0x1f0 [ 1457.323792][T12919] ? proc_pid_stack+0x8e/0x1f0 [ 1457.328537][T12919] should_failslab+0x5/0x20 [ 1457.333034][T12919] kmem_cache_alloc_trace+0x39/0x270 [ 1457.338307][T12919] proc_pid_stack+0x8e/0x1f0 [ 1457.342879][T12919] proc_single_show+0xd3/0x130 [ 1457.347634][T12919] seq_read+0x4aa/0xd30 [ 1457.351864][T12919] do_iter_read+0x43b/0x550 [ 1457.356365][T12919] do_preadv+0x1f4/0x330 [ 1457.360593][T12919] ? do_writev+0x560/0x560 [ 1457.364987][T12919] ? __sb_start_write+0x9c/0x150 [ 1457.369903][T12919] ? __vfs_write+0x1/0x700 [ 1457.374295][T12919] ? __sb_end_write+0xa4/0xf0 [ 1457.378956][T12919] ? vfs_write+0x427/0x4f0 [ 1457.383371][T12919] do_syscall_64+0xcb/0x150 [ 1457.388154][T12919] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1457.394031][T12919] RIP: 0033:0x45d5b9 [ 1457.397905][T12919] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1457.417498][T12919] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1457.425896][T12919] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1457.433859][T12919] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1457.441815][T12919] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1457.449769][T12919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 1457.457725][T12919] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000140)={0x5, 0x2, 0xfffffffa, 0x0, 0x17, "001000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f0000000000), 0x0) dup2(r1, r1) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, r3, 0x0, 0xfffffffffffffffc, 0x8}) r4 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0xf, r3, 0x812}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x420242, 0x0) ioctl$KDGKBENT(r4, 0x4b46, &(0x7f0000000100)={0x0, 0x1, 0xa}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000000c0)={0x0, 0x400000, 0x0, 0x0, 0x18, "0ea9ac7f6a4d33b29441632eeab7af20268259"}) socket$inet(0x2, 0x2, 0x0) dup3(r1, r0, 0x0) [ 1457.465689][T12920] CPU: 0 PID: 12920 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1457.475839][T12920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.485899][T12920] Call Trace: [ 1457.489199][T12920] dump_stack+0x1b0/0x21e [ 1457.493532][T12920] ? devkmsg_release+0x11c/0x11c [ 1457.498455][T12920] ? show_regs_print_info+0x12/0x12 [ 1457.503663][T12920] ? cred_has_capability+0x18c/0x3f0 [ 1457.508931][T12920] ? cred_has_capability+0x2b2/0x3f0 [ 1457.514201][T12920] should_fail+0x6fb/0x860 [ 1457.518644][T12920] ? setup_fault_attr+0x2b0/0x2b0 04:43:02 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22ebe0accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1457.523661][T12920] ? slab_free_freelist_hook+0xd0/0x150 [ 1457.529197][T12920] ? cap_capable+0x23f/0x280 [ 1457.533793][T12920] ? proc_pid_stack+0x1d5/0x1f0 [ 1457.538628][T12920] ? proc_pid_stack+0x8e/0x1f0 [ 1457.543377][T12920] should_failslab+0x5/0x20 [ 1457.547871][T12920] kmem_cache_alloc_trace+0x39/0x270 [ 1457.553144][T12920] proc_pid_stack+0x8e/0x1f0 [ 1457.557719][T12920] proc_single_show+0xd3/0x130 [ 1457.562472][T12920] seq_read+0x4aa/0xd30 [ 1457.566639][T12920] do_iter_read+0x43b/0x550 [ 1457.571129][T12920] do_preadv+0x1f4/0x330 [ 1457.575361][T12920] ? do_writev+0x560/0x560 [ 1457.579766][T12920] ? security_file_permission+0x128/0x300 [ 1457.585581][T12920] ? __sb_end_write+0xa4/0xf0 [ 1457.590247][T12920] ? vfs_write+0x427/0x4f0 [ 1457.594657][T12920] do_syscall_64+0xcb/0x150 [ 1457.599152][T12920] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1457.605039][T12920] RIP: 0033:0x45d5b9 [ 1457.608927][T12920] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1457.628532][T12920] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1457.636929][T12920] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1457.644887][T12920] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1457.652855][T12920] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1457.660833][T12920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000045 [ 1457.668793][T12920] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:02 executing program 2 (fault-call:12 fault-nth:5): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x80, 0x0) write$P9_RSTATFS(r2, &(0x7f0000000140)={0x43, 0x9, 0x2, {0x800, 0x6, 0x4, 0xda5, 0x7fffffff, 0x3, 0x2, 0xa99, 0x8001}}, 0x43) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:02 executing program 5: socket$inet(0x10, 0x2000000003, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) syz_mount_image$fuse(&(0x7f0000000200)='fuse\x00', &(0x7f0000000240)='./bus\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000280)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1e00}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)="230000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005800ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r3 = creat(&(0x7f0000002300)='./bus\x00', 0x0) ftruncate(r3, 0x12081fe) ioctl$KDENABIO(r3, 0x4b36) ioctl$KDFONTOP_SET(r2, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0xa, 0x1b, 0x17e, &(0x7f00000004c0)="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"}) write$binfmt_aout(r2, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x9, 0x1, 0x81, 0x3}) r4 = syz_open_pts(r2, 0x111002) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r2, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r4, r2, 0x0) r5 = eventfd(0x2) write$binfmt_misc(r5, &(0x7f0000000040)={'syz0', "746c746ba2a76bad46fc08b39612239fffc579a18a513997"}, 0x1c) [ 1457.877834][T12943] fuse: Bad value for 'fd' [ 1457.903357][T12943] fuse: Bad value for 'fd' [ 1457.908693][T12945] FAULT_INJECTION: forcing a failure. [ 1457.908693][T12945] name failslab, interval 1, probability 0, space 0, times 0 [ 1457.921379][T12945] CPU: 1 PID: 12945 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1457.931513][T12945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1457.941541][T12945] Call Trace: [ 1457.944816][T12945] dump_stack+0x1b0/0x21e [ 1457.949645][T12945] ? devkmsg_release+0x11c/0x11c [ 1457.954560][T12945] ? show_regs_print_info+0x12/0x12 [ 1457.959735][T12945] ? cred_has_capability+0x18c/0x3f0 [ 1457.964997][T12945] ? cred_has_capability+0x2b2/0x3f0 [ 1457.970257][T12945] should_fail+0x6fb/0x860 [ 1457.974769][T12945] ? setup_fault_attr+0x2b0/0x2b0 [ 1457.979771][T12945] ? slab_free_freelist_hook+0xd0/0x150 [ 1457.985296][T12945] ? cap_capable+0x23f/0x280 [ 1457.989859][T12945] ? proc_pid_stack+0x1d5/0x1f0 [ 1457.994694][T12945] ? proc_pid_stack+0x8e/0x1f0 [ 1457.999431][T12945] should_failslab+0x5/0x20 [ 1458.003917][T12945] kmem_cache_alloc_trace+0x39/0x270 [ 1458.009181][T12945] proc_pid_stack+0x8e/0x1f0 [ 1458.013871][T12945] proc_single_show+0xd3/0x130 [ 1458.018620][T12945] seq_read+0x4aa/0xd30 [ 1458.022759][T12945] do_iter_read+0x43b/0x550 [ 1458.027255][T12945] do_preadv+0x1f4/0x330 [ 1458.031479][T12945] ? do_writev+0x560/0x560 [ 1458.035878][T12945] ? security_file_permission+0x128/0x300 [ 1458.041571][T12945] ? __sb_end_write+0xa4/0xf0 [ 1458.046225][T12945] ? vfs_write+0x427/0x4f0 [ 1458.050621][T12945] do_syscall_64+0xcb/0x150 [ 1458.055109][T12945] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1458.060978][T12945] RIP: 0033:0x45d5b9 [ 1458.064852][T12945] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1458.084440][T12945] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1458.092922][T12945] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed314b48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:03 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x8, 0x0, 0x0) 04:43:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:03 executing program 0 (fault-call:15 fault-nth:70): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(0xffffffffffffffff, r0, 0x80000) [ 1458.101142][T12945] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1458.109093][T12945] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1458.117043][T12945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1458.124990][T12945] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)={@local, @dev={0xac, 0x14, 0x14, 0x38}}, 0x8) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x0, 0x0, 0x149}) dup3(r1, r2, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x40c140) write$FUSE_NOTIFY_POLL(r4, &(0x7f0000000140)={0x18, 0x1, 0x0, {0x5}}, 0x18) [ 1458.309931][T12966] FAULT_INJECTION: forcing a failure. [ 1458.309931][T12966] name failslab, interval 1, probability 0, space 0, times 0 [ 1458.322722][T12966] CPU: 1 PID: 12966 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1458.332858][T12966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1458.342895][T12966] Call Trace: [ 1458.346165][T12966] dump_stack+0x1b0/0x21e [ 1458.350478][T12966] ? devkmsg_release+0x11c/0x11c [ 1458.355393][T12966] ? show_regs_print_info+0x12/0x12 [ 1458.360567][T12966] ? cred_has_capability+0x18c/0x3f0 [ 1458.365826][T12966] ? cred_has_capability+0x2b2/0x3f0 [ 1458.371087][T12966] should_fail+0x6fb/0x860 [ 1458.375523][T12966] ? setup_fault_attr+0x2b0/0x2b0 [ 1458.380524][T12966] ? cap_capable+0x23f/0x280 [ 1458.385114][T12966] ? proc_pid_stack+0x8e/0x1f0 [ 1458.389852][T12966] should_failslab+0x5/0x20 [ 1458.394332][T12966] kmem_cache_alloc_trace+0x39/0x270 [ 1458.399595][T12966] proc_pid_stack+0x8e/0x1f0 [ 1458.404172][T12966] proc_single_show+0xd3/0x130 [ 1458.408912][T12966] seq_read+0x4aa/0xd30 [ 1458.413047][T12966] do_iter_read+0x43b/0x550 [ 1458.417528][T12966] do_preadv+0x1f4/0x330 [ 1458.421746][T12966] ? do_writev+0x560/0x560 [ 1458.426137][T12966] ? security_file_permission+0x128/0x300 [ 1458.431828][T12966] ? __sb_end_write+0xa4/0xf0 [ 1458.436476][T12966] ? vfs_write+0x427/0x4f0 [ 1458.440870][T12966] do_syscall_64+0xcb/0x150 [ 1458.445368][T12966] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1458.451252][T12966] RIP: 0033:0x45d5b9 [ 1458.455124][T12966] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1458.474704][T12966] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1458.483088][T12966] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1458.491034][T12966] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1458.498982][T12966] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 04:43:03 executing program 2 (fault-call:12 fault-nth:6): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1458.506928][T12966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000046 [ 1458.514875][T12966] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed3e0b48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:03 executing program 0 (fault-call:15 fault-nth:71): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000000)='bridge0\x00') [ 1458.781201][T12990] FAULT_INJECTION: forcing a failure. [ 1458.781201][T12990] name failslab, interval 1, probability 0, space 0, times 0 [ 1458.793860][T12990] CPU: 1 PID: 12990 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1458.804018][T12990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1458.814060][T12990] Call Trace: [ 1458.817368][T12990] dump_stack+0x1b0/0x21e [ 1458.821694][T12990] ? devkmsg_release+0x11c/0x11c [ 1458.826618][T12990] ? show_regs_print_info+0x12/0x12 [ 1458.831809][T12990] ? cred_has_capability+0x18c/0x3f0 [ 1458.837081][T12990] ? cred_has_capability+0x2b2/0x3f0 [ 1458.842356][T12990] should_fail+0x6fb/0x860 [ 1458.846765][T12990] ? setup_fault_attr+0x2b0/0x2b0 [ 1458.851775][T12990] ? slab_free_freelist_hook+0xd0/0x150 [ 1458.852023][T12993] FAULT_INJECTION: forcing a failure. [ 1458.852023][T12993] name failslab, interval 1, probability 0, space 0, times 0 [ 1458.857304][T12990] ? cap_capable+0x23f/0x280 [ 1458.857319][T12990] ? proc_pid_stack+0x1d5/0x1f0 [ 1458.879285][T12990] ? proc_pid_stack+0x8e/0x1f0 [ 1458.884027][T12990] should_failslab+0x5/0x20 [ 1458.888509][T12990] kmem_cache_alloc_trace+0x39/0x270 [ 1458.893772][T12990] proc_pid_stack+0x8e/0x1f0 [ 1458.898341][T12990] proc_single_show+0xd3/0x130 [ 1458.903083][T12990] seq_read+0x4aa/0xd30 [ 1458.907224][T12990] do_iter_read+0x43b/0x550 [ 1458.911721][T12990] do_preadv+0x1f4/0x330 [ 1458.916119][T12990] ? do_writev+0x560/0x560 [ 1458.920519][T12990] ? security_file_permission+0x128/0x300 [ 1458.926215][T12990] ? __sb_end_write+0xa4/0xf0 [ 1458.930871][T12990] ? vfs_write+0x427/0x4f0 [ 1458.935646][T12990] do_syscall_64+0xcb/0x150 [ 1458.940158][T12990] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1458.946032][T12990] RIP: 0033:0x45d5b9 [ 1458.949907][T12990] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1458.969498][T12990] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1458.977914][T12990] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1458.985865][T12990] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1458.993816][T12990] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1459.001764][T12990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 1459.009727][T12990] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1459.017707][T12993] CPU: 0 PID: 12993 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1459.027844][T12993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1459.037889][T12993] Call Trace: [ 1459.041167][T12993] dump_stack+0x1b0/0x21e [ 1459.045503][T12993] ? devkmsg_release+0x11c/0x11c [ 1459.050423][T12993] ? show_regs_print_info+0x12/0x12 [ 1459.055605][T12993] ? cred_has_capability+0x18c/0x3f0 [ 1459.060877][T12993] ? cred_has_capability+0x2b2/0x3f0 [ 1459.066148][T12993] should_fail+0x6fb/0x860 [ 1459.070551][T12993] ? setup_fault_attr+0x2b0/0x2b0 [ 1459.075578][T12993] ? slab_free_freelist_hook+0xd0/0x150 [ 1459.081107][T12993] ? cap_capable+0x23f/0x280 [ 1459.085681][T12993] ? proc_pid_stack+0x1d5/0x1f0 [ 1459.090513][T12993] ? proc_pid_stack+0x8e/0x1f0 [ 1459.095262][T12993] should_failslab+0x5/0x20 [ 1459.099743][T12993] kmem_cache_alloc_trace+0x39/0x270 [ 1459.105025][T12993] proc_pid_stack+0x8e/0x1f0 [ 1459.109580][T12993] proc_single_show+0xd3/0x130 [ 1459.114334][T12993] seq_read+0x4aa/0xd30 [ 1459.118467][T12993] do_iter_read+0x43b/0x550 [ 1459.123042][T12993] do_preadv+0x1f4/0x330 [ 1459.127257][T12993] ? do_writev+0x560/0x560 [ 1459.131642][T12993] ? security_file_permission+0x128/0x300 [ 1459.137340][T12993] ? __sb_end_write+0xa4/0xf0 [ 1459.141995][T12993] ? vfs_write+0x427/0x4f0 [ 1459.146425][T12993] do_syscall_64+0xcb/0x150 [ 1459.150894][T12993] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1459.156758][T12993] RIP: 0033:0x45d5b9 [ 1459.160729][T12993] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:43:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1459.180306][T12993] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1459.188810][T12993] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1459.196761][T12993] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1459.204711][T12993] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1459.212653][T12993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000047 [ 1459.220603][T12993] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:04 executing program 2 (fault-call:12 fault-nth:7): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:04 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) ioctl$CHAR_RAW_RRPART(0xffffffffffffffff, 0x125f, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x0, 0x0, 0x149}) r3 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0xf, r2, 0x812}) pwritev(r2, &(0x7f00000004c0)=[{&(0x7f0000000000)="780e5489d8e3c3459d7bad27b3e2981038d6f0d06c88f93454e2c340610e83af4c031cb8f43b9860c06363343c229237aab90257ce9a95890725b718951adfb6b12afbd6858e", 0x46}, {&(0x7f0000000140)="1baf4487f072", 0x6}, {&(0x7f0000000180)}, {&(0x7f0000000200)="7c4a3e35572e4a749d37ca6b375fae0eff6121577e6337f7d640bbc923636a2b547ba28ee0bc76c69b7f7105d745c2d523a20eac199a78b49d27faa71b87b8abdde42641d575476b9c4c50fb1b56eb30386421fe5daae9f501420695c6f0d2263d39156aed07c6402ac5fbbd07b08e4243e155f2ebfc2bb2e8a67f9b371f8e4e50be00da23ec3a1b1c309e010628af94fb90987a5ced0472d6567ed1743e71fac228e8b219dd7db717e4de4bed7ab23f3d8620c2caef492bbeebc4e6d3ceedff4262dd26836be23b9bbe0d617adaff70", 0xd0}, {&(0x7f0000000300)="be3d5eb5af526e34bf3488cecdecfc41ec819e13ef8307a914ac6a946844ab1b5c45db983f1b513770ffbaa4998ea3fe53b7dec783526135bb5def660eef8c30e588bbf20397586ba9d524b698fe700dedc1db7ed99bb1696be14a1306a2c9726f212f78dcf24e8ccd5db991174a6a60e7d61e089894e5a245abdd26fe52002910e6199a8ec32b3c2661de823feb6786372af7cb9691bbdeaf9dd22ce03ce4de39efc9cca11c1487fd0c8765492d92bb71dc23cc370de8c774f39b285f43e47fe5f098eb9d382695e5b36dc14d", 0xcd}, {&(0x7f0000000400)="2978c241101e7ef2a5da42e161b38f1624e65eb683274d15005cd0e8f37940e54f062ddf79c9412f52d4f147e1c609f15f1c0adc27cf436ac16842e547c463d397ba4db7e172694756e95ad90c53454a4f935fe69851f6d79c58fa6b691c291102601568b15261ca46c5899287", 0x6d}], 0x6, 0x9, 0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r4, r0, 0x0) 04:43:04 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b92e04c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:04 executing program 0 (fault-call:15 fault-nth:72): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0xae, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="18ae9b2cd098273ac492bba900b7c8343f1fee7a707c971ba6f90b68ccfab04bada2499135813e318e38c68e9773850fed81a00cbf059a62ee", 0x39, 0xd1}, {&(0x7f0000000200)="5bde73bef5658f68208e195e42ce5c88ec3b3fd40c55d86a5e0790e2fcac4605446a25545b370488e98822b03b9f9ef9b2d8d4cad361b843522513b996ad681f9bc9f9042bad9fe048220b1cb1ea132cd5ce33d04c32dfc71f49dd6671633f98a0c6e4154c5725f9586e4470ea18d6e1d85ddd3085bebf8e37f13abc945a559b34", 0x81, 0x85e}, {&(0x7f00000004c0)="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", 0x1000, 0x5}], 0x4009, &(0x7f0000000340)={[{@fat=@check_strict='check=strict'}, {@dots='dots'}, {@fat=@nfs='nfs'}], [{@fowner_gt={'fowner>', 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, '({%'}}, {@uid_gt={'uid>', 0xee01}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f0000000400)='./file0\x00', 0x8, 0x3) [ 1459.431232][T13018] FAULT_INJECTION: forcing a failure. [ 1459.431232][T13018] name failslab, interval 1, probability 0, space 0, times 0 [ 1459.443962][T13018] CPU: 1 PID: 13018 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1459.454130][T13018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1459.464170][T13018] Call Trace: [ 1459.467454][T13018] dump_stack+0x1b0/0x21e [ 1459.471772][T13018] ? devkmsg_release+0x11c/0x11c 04:43:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) sendmsg$DEVLINK_CMD_PORT_SPLIT(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000000200)={0xd0, 0x0, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x4}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x4}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x8}}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4}, 0x40041) dup3(r1, r0, 0x0) [ 1459.476718][T13018] ? show_regs_print_info+0x12/0x12 [ 1459.481902][T13018] ? cred_has_capability+0x18c/0x3f0 [ 1459.487172][T13018] ? cred_has_capability+0x2b2/0x3f0 [ 1459.492449][T13018] should_fail+0x6fb/0x860 [ 1459.496854][T13018] ? setup_fault_attr+0x2b0/0x2b0 [ 1459.501858][T13018] ? slab_free_freelist_hook+0xd0/0x150 [ 1459.507375][T13018] ? cap_capable+0x23f/0x280 [ 1459.511942][T13018] ? proc_pid_stack+0x1d5/0x1f0 [ 1459.516776][T13018] ? proc_pid_stack+0x8e/0x1f0 [ 1459.521526][T13018] should_failslab+0x5/0x20 [ 1459.526015][T13018] kmem_cache_alloc_trace+0x39/0x270 [ 1459.531287][T13018] proc_pid_stack+0x8e/0x1f0 [ 1459.532860][T13012] FAULT_INJECTION: forcing a failure. [ 1459.532860][T13012] name failslab, interval 1, probability 0, space 0, times 0 [ 1459.535872][T13018] proc_single_show+0xd3/0x130 [ 1459.535888][T13018] seq_read+0x4aa/0xd30 [ 1459.557306][T13018] do_iter_read+0x43b/0x550 [ 1459.561785][T13018] do_preadv+0x1f4/0x330 [ 1459.566005][T13018] ? do_writev+0x560/0x560 [ 1459.570400][T13018] ? security_file_permission+0x128/0x300 [ 1459.576092][T13018] ? __sb_end_write+0xa4/0xf0 [ 1459.580744][T13018] ? vfs_write+0x427/0x4f0 [ 1459.585143][T13018] do_syscall_64+0xcb/0x150 [ 1459.589634][T13018] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1459.595503][T13018] RIP: 0033:0x45d5b9 [ 1459.599378][T13018] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1459.618958][T13018] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1459.627347][T13018] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1459.635337][T13018] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1459.643287][T13018] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1459.651237][T13018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000007 [ 1459.659199][T13018] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1459.667158][T13012] CPU: 0 PID: 13012 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1459.677287][T13012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1459.687411][T13012] Call Trace: [ 1459.690687][T13012] dump_stack+0x1b0/0x21e [ 1459.695006][T13012] ? devkmsg_release+0x11c/0x11c [ 1459.699972][T13012] ? show_regs_print_info+0x12/0x12 [ 1459.705332][T13012] ? cred_has_capability+0x18c/0x3f0 [ 1459.710632][T13012] ? cred_has_capability+0x2b2/0x3f0 [ 1459.715925][T13012] should_fail+0x6fb/0x860 [ 1459.720327][T13012] ? setup_fault_attr+0x2b0/0x2b0 [ 1459.725336][T13012] ? slab_free_freelist_hook+0xd0/0x150 [ 1459.730865][T13012] ? cap_capable+0x23f/0x280 [ 1459.735437][T13012] ? proc_pid_stack+0x1d5/0x1f0 [ 1459.740272][T13012] ? proc_pid_stack+0x8e/0x1f0 [ 1459.745045][T13012] should_failslab+0x5/0x20 [ 1459.749533][T13012] kmem_cache_alloc_trace+0x39/0x270 [ 1459.754808][T13012] proc_pid_stack+0x8e/0x1f0 [ 1459.759488][T13012] proc_single_show+0xd3/0x130 [ 1459.764242][T13012] seq_read+0x4aa/0xd30 [ 1459.768544][T13012] do_iter_read+0x43b/0x550 [ 1459.773058][T13012] do_preadv+0x1f4/0x330 [ 1459.777288][T13012] ? do_writev+0x560/0x560 [ 1459.781715][T13012] ? security_file_permission+0x128/0x300 [ 1459.787430][T13012] ? __sb_end_write+0xa4/0xf0 [ 1459.792093][T13012] ? vfs_write+0x427/0x4f0 [ 1459.796498][T13012] do_syscall_64+0xcb/0x150 [ 1459.800990][T13012] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1459.806864][T13012] RIP: 0033:0x45d5b9 [ 1459.810767][T13012] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:43:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x0, 0x0, 0x149}) ioctl(r1, 0xd7, &(0x7f0000002680)="b8f91ac9b02290d3513d9aa0dad4b548bcedd99f6a675df1a8ae2d1fc56a355bab9d1d6134dcc2f1bc499a02ece0c90fafd34c5c9386b5e7170bb281872efa38e535a08efb7318769f0a07919568f70639535f54a68c55cfdabb357b94c864") r3 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r3, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r3, r0, 0x0) syz_read_part_table(0x3, 0x8, &(0x7f0000002580)=[{&(0x7f0000000200)="a3e546ca102e56abfec3c734d50167e46279568da6e9a753da99d62c442149abd81f1a457edd55fdd09a7708cde735fc9c4a06d33f8bafb41ad8bb0560e01856f5509aff131aa62647a44904380ebb6c78bcd1924ede383818e29bdacc06634d851cabbc76252edecc6a0f50608e5ae3d305303beb8c33b73de0d88a060a68486772856783e7d099ecb2e5cccdf5f17216", 0x91, 0x20}, {&(0x7f00000002c0)="1b697490e1dda805e284b5603e259279427266abe4b388a2ad5043569d02eab28bbaebe51643d5cd44d0ebd179bf52c8a69cb10b61fd0afa1708b6907c3c14b0eac2b211bb6a4cb558c558d3b4f47d4240a2034529d23c062a4cde61eafc74104b63bd772e8705e60c526646cd18433a9dfb914d55ebc36d406ffeaaecdd2c699513df5912771032eb58e1296327ba2b42b63d5e50840ef05c86dfd7eb9a959a19bc0f", 0xa3, 0x4}, {&(0x7f0000000380)="e94451400fb2163772052016ddc7457b9c199437a730e98383dee4962d89f0d78207d897b75fa4bce7168d4ef07bd6392a8daffa62db13b05160826e5b249fe4ffadfcd872e85f5a588e89feb0d584921a4dac58c49873eed9adbb20926eaf6c0fa1073398597d7b27c1e465d1bc04af763e12f114bd43b9872dfdc28ed049c3fad7e4a26c56f2f6dcd232e87578175517532368711a3b1592f4ad36d10b6bf27bb51b34cf8180da77eee49f3b6de21d95d62b9ad9138a256c2134e844bb73f50750947d8e7790bb64d9c22de27100ffdf075dd834e0d2fa", 0xd8, 0x400}, {&(0x7f00000004c0)="a625a4feb226ae1b63f13996bf52878d5077d690fb07cf5aea87a0e48e78e959b69a9d86123939678435ac2a40fedda066da5dad182d75f42196c4fb249256aaf3c593fb6e64be85ebc24610841696c12a5ab2318d8be9de30c2666d0ac155167f8a8094dae3e097865c1eb861f8df6faf6217b02dedc03a70e57f4f4bd498acc073f4fc0e9dabfc951a33dd6400fd4a47d92016333449818a0f69827c787ad5a41cde5c230da347e110d0c8be0c34502d8e228344e1", 0xb6, 0xb0a}, {&(0x7f0000000000)="e7ed101a56e6080a8367c3d0db540060c10379d7ebeaf46b59cb8ca41df1987dd4fbbd141b86f1d050d4bd8af20cb64ba4527e2f19327ca07b1c97fa26", 0x3d, 0x1}, {&(0x7f0000000580)="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", 0x1000, 0x80}, {&(0x7f0000001580)="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", 0x1000, 0xffff}, {&(0x7f0000000140)="29027506f5bd50d7f10ca64ddbf67c5ec7dd8411130216167246b77417b6d4bfa559e9fae61f81b45ced6fd7f17a52aec9da1b012acae7a748699bc3d98d58ade40194d55d", 0x45, 0x175}]) r4 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) pwritev(r0, &(0x7f0000002980)=[{&(0x7f0000002700)="5d10eb6febaa136fb3447367ea9c8cdef38c5ac4a4e5d07191c08db459de8b59a225c2d0163ad5e2145417e083b25a28a0eb8a215994fd12cf8ff4be38a5125ffe45634603880b36afe4e53cb8de2df2b95b4d01dfc66cc6c566bb8bc194eba21b6ef3fdde62be6760e95f825d7ea1ec4505ca7927252ab4463e36724876cdb85c04ea73d949420095961b9d641b03fafecf6c717809ab75372c32b0ffaa95b9893576b923398e6e55e13f25f36d640bf7a569222ae9aa9868dfe52babfa4e84ee73475f7f6d30820852abf914daaa57b9641be0dafb53ca82906caad35fea5a23d5d47f745bbecae133ece609172b26", 0xf0}, {&(0x7f0000002800)="a7c3773befd7545a310f07", 0xb}, {&(0x7f0000002840)="568a0a7c56c870c849ca68a59113aa03bb5a15de61447c70f77a4e3e0545f670a3e788431328f5cb0a22f026ccfc59ab5dd272d5ae0a607c564b9454301eb3cfe00322e81e5bcaff0f3d039c221604bb23554a4f7210faf8e982b0022ee9adb41d44847cf5446fc853113bf78675b1c3cde2d86ddac6775d05eb9f7e75934c02b0bdc5cfdfd868ff753ff55a3fd5994a77b1b1ffd6be98b1f74cda0840ff505b17d86cdd6714ac39aab3f1e772628882eadf2eca1bb8b95658f598b8bd27fb7b86ae095055d7c659b5ba0eb0805b8c2c88cd6cac163a4aed7eeef4717e4b47b7b5a77234aca2fb2c4a3f", 0xea}, {&(0x7f0000002940)="17e375ec85f61048adfb64820ec09b51d3180026f07205b520e91cf71ac5666bb23c4f4b8a66cd6e13120acb35ab32b540e6", 0x32}], 0x4, 0x3, 0xfffff25c) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000002640)=0x4) 04:43:04 executing program 2 (fault-call:12 fault-nth:8): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1459.830354][T13012] RSP: 002b:00007f63a8839c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1459.838748][T13012] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1459.846706][T13012] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1459.854663][T13012] RBP: 00007f63a8839ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1459.862613][T13012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000048 [ 1459.870562][T13012] R13: 00007ffebb13841f R14: 00007f63a883a9c0 R15: 000000000118cf4c 04:43:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xec}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1460.016832][T13041] FAULT_INJECTION: forcing a failure. [ 1460.016832][T13041] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.029596][T13041] CPU: 0 PID: 13041 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1460.039765][T13041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.049826][T13041] Call Trace: [ 1460.053107][T13041] dump_stack+0x1b0/0x21e [ 1460.057426][T13041] ? devkmsg_release+0x11c/0x11c [ 1460.062349][T13041] ? show_regs_print_info+0x12/0x12 [ 1460.067547][T13041] ? cred_has_capability+0x18c/0x3f0 [ 1460.073818][T13041] ? cred_has_capability+0x2b2/0x3f0 [ 1460.079084][T13041] should_fail+0x6fb/0x860 [ 1460.083492][T13041] ? setup_fault_attr+0x2b0/0x2b0 [ 1460.088510][T13041] ? slab_free_freelist_hook+0xd0/0x150 [ 1460.094601][T13041] ? cap_capable+0x23f/0x280 [ 1460.099526][T13041] ? proc_pid_stack+0x1d5/0x1f0 [ 1460.104844][T13041] ? proc_pid_stack+0x8e/0x1f0 [ 1460.109969][T13041] should_failslab+0x5/0x20 [ 1460.114466][T13041] kmem_cache_alloc_trace+0x39/0x270 [ 1460.119733][T13041] proc_pid_stack+0x8e/0x1f0 [ 1460.124302][T13041] proc_single_show+0xd3/0x130 [ 1460.129060][T13041] seq_read+0x4aa/0xd30 [ 1460.133189][T13041] do_iter_read+0x43b/0x550 [ 1460.137674][T13041] do_preadv+0x1f4/0x330 [ 1460.141891][T13041] ? do_writev+0x560/0x560 [ 1460.146296][T13041] ? retint_kernel+0x1b/0x1b [ 1460.150856][T13041] ? ksys_write+0x21e/0x2a0 [ 1460.155335][T13041] do_syscall_64+0xcb/0x150 [ 1460.159816][T13041] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1460.165687][T13041] RIP: 0033:0x45d5b9 [ 1460.169589][T13041] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1460.189174][T13041] RSP: 002b:00007f4cee122c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1460.197553][T13041] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1460.205504][T13041] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:43:05 executing program 0 (fault-call:15 fault-nth:73): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1460.213446][T13041] RBP: 00007f4cee122ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1460.221391][T13041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008 [ 1460.229333][T13041] R13: 00007ffd8dcf940f R14: 00007f4cee1239c0 R15: 000000000118d12c 04:43:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) r1 = creat(&(0x7f0000002300)='./bus\x00', 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000040)=0x80) ftruncate(r1, 0x12081ff) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x14, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x009\v\x00'}) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r2, r0, 0x0) 04:43:05 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x2, 0x0) 04:43:05 executing program 2 (fault-call:12 fault-nth:9): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:05 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0x20000355}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x8000) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SUBVOL_CREATE(r2, 0x5000940e, &(0x7f00000004c0)={{r3}, "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"}) dup3(r1, r0, 0x0) 04:43:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) [ 1460.502066][T13076] FAULT_INJECTION: forcing a failure. [ 1460.502066][T13076] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.504601][T13075] FAULT_INJECTION: forcing a failure. [ 1460.504601][T13075] name failslab, interval 1, probability 0, space 0, times 0 [ 1460.514783][T13076] CPU: 1 PID: 13076 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1460.538288][T13076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.548323][T13076] Call Trace: [ 1460.551598][T13076] dump_stack+0x1b0/0x21e [ 1460.555906][T13076] ? devkmsg_release+0x11c/0x11c [ 1460.560819][T13076] ? show_regs_print_info+0x12/0x12 [ 1460.565995][T13076] should_fail+0x6fb/0x860 [ 1460.570390][T13076] ? setup_fault_attr+0x2b0/0x2b0 [ 1460.575392][T13076] ? slab_free_freelist_hook+0xd0/0x150 [ 1460.580914][T13076] ? cap_capable+0x23f/0x280 [ 1460.585488][T13076] ? proc_pid_stack+0x1d5/0x1f0 [ 1460.590316][T13076] ? proc_pid_stack+0x8e/0x1f0 [ 1460.595055][T13076] should_failslab+0x5/0x20 [ 1460.599535][T13076] kmem_cache_alloc_trace+0x39/0x270 [ 1460.604797][T13076] proc_pid_stack+0x8e/0x1f0 [ 1460.609366][T13076] proc_single_show+0xd3/0x130 [ 1460.614109][T13076] seq_read+0x4aa/0xd30 [ 1460.618248][T13076] do_iter_read+0x43b/0x550 [ 1460.622732][T13076] do_preadv+0x1f4/0x330 [ 1460.626950][T13076] ? do_writev+0x560/0x560 [ 1460.631348][T13076] ? __schedule+0x8ae/0xe30 [ 1460.635838][T13076] do_syscall_64+0xcb/0x150 [ 1460.640326][T13076] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1460.646196][T13076] RIP: 0033:0x45d5b9 [ 1460.650084][T13076] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1460.669944][T13076] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1460.678342][T13076] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1460.686300][T13076] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1460.694253][T13076] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1460.702207][T13076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000009 [ 1460.710161][T13076] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1460.718130][T13075] CPU: 0 PID: 13075 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1460.728268][T13075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1460.738300][T13075] Call Trace: [ 1460.741571][T13075] dump_stack+0x1b0/0x21e [ 1460.745879][T13075] ? devkmsg_release+0x11c/0x11c [ 1460.750794][T13075] ? show_regs_print_info+0x12/0x12 [ 1460.755971][T13075] ? cred_has_capability+0x18c/0x3f0 [ 1460.761239][T13075] ? cred_has_capability+0x2b2/0x3f0 [ 1460.766501][T13075] should_fail+0x6fb/0x860 [ 1460.770894][T13075] ? setup_fault_attr+0x2b0/0x2b0 [ 1460.775897][T13075] ? slab_free_freelist_hook+0xd0/0x150 [ 1460.781420][T13075] ? cap_capable+0x23f/0x280 [ 1460.785987][T13075] ? proc_pid_stack+0x1d5/0x1f0 [ 1460.790897][T13075] ? proc_pid_stack+0x8e/0x1f0 [ 1460.795647][T13075] should_failslab+0x5/0x20 [ 1460.800126][T13075] kmem_cache_alloc_trace+0x39/0x270 [ 1460.805387][T13075] proc_pid_stack+0x8e/0x1f0 [ 1460.809954][T13075] proc_single_show+0xd3/0x130 [ 1460.814882][T13075] seq_read+0x4aa/0xd30 [ 1460.819024][T13075] do_iter_read+0x43b/0x550 [ 1460.823519][T13075] do_preadv+0x1f4/0x330 [ 1460.828916][T13075] ? do_writev+0x560/0x560 [ 1460.833314][T13075] ? security_file_permission+0x128/0x300 [ 1460.839964][T13075] ? __sb_end_write+0xa4/0xf0 [ 1460.844616][T13075] ? vfs_write+0x427/0x4f0 [ 1460.849006][T13075] do_syscall_64+0xcb/0x150 [ 1460.853486][T13075] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1460.859351][T13075] RIP: 0033:0x45d5b9 [ 1460.863233][T13075] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1460.882815][T13075] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1460.891201][T13075] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0x7fff6db4}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1460.899323][T13075] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1460.907270][T13075] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1460.915215][T13075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000049 [ 1460.923172][T13075] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:06 executing program 0 (fault-call:15 fault-nth:74): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b1c908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:06 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x3, 0x0) 04:43:06 executing program 2 (fault-call:12 fault-nth:10): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1461.211953][T13094] FAULT_INJECTION: forcing a failure. [ 1461.211953][T13094] name failslab, interval 1, probability 0, space 0, times 0 [ 1461.224586][T13094] CPU: 0 PID: 13094 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1461.234719][T13094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.244764][T13094] Call Trace: [ 1461.248049][T13094] dump_stack+0x1b0/0x21e [ 1461.252358][T13094] ? devkmsg_release+0x11c/0x11c [ 1461.257273][T13094] ? show_regs_print_info+0x12/0x12 [ 1461.262449][T13094] ? cred_has_capability+0x18c/0x3f0 [ 1461.267710][T13094] ? cred_has_capability+0x2b2/0x3f0 [ 1461.272970][T13094] should_fail+0x6fb/0x860 [ 1461.277364][T13094] ? setup_fault_attr+0x2b0/0x2b0 [ 1461.282388][T13094] ? slab_free_freelist_hook+0xd0/0x150 [ 1461.287923][T13094] ? cap_capable+0x23f/0x280 [ 1461.292488][T13094] ? proc_pid_stack+0x1d5/0x1f0 [ 1461.297320][T13094] ? proc_pid_stack+0x8e/0x1f0 [ 1461.302062][T13094] should_failslab+0x5/0x20 [ 1461.306544][T13094] kmem_cache_alloc_trace+0x39/0x270 [ 1461.311982][T13094] proc_pid_stack+0x8e/0x1f0 [ 1461.316636][T13094] proc_single_show+0xd3/0x130 [ 1461.321397][T13094] seq_read+0x4aa/0xd30 [ 1461.326082][T13094] do_iter_read+0x43b/0x550 [ 1461.330727][T13094] do_preadv+0x1f4/0x330 [ 1461.334961][T13094] ? do_writev+0x560/0x560 [ 1461.339356][T13094] ? security_file_permission+0x128/0x300 [ 1461.345051][T13094] ? __sb_end_write+0xa4/0xf0 [ 1461.349705][T13094] ? vfs_write+0x427/0x4f0 [ 1461.354100][T13094] do_syscall_64+0xcb/0x150 [ 1461.358596][T13094] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1461.365162][T13094] RIP: 0033:0x45d5b9 [ 1461.369989][T13094] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1461.389832][T13094] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1461.398235][T13094] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1461.406202][T13094] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1461.414149][T13094] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.422271][T13094] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004a [ 1461.430218][T13094] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2], 0x44}, 0x1, 0x0, 0x0, 0x20000001}, 0x4041) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x4044000) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) r3 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) write$FUSE_BMAP(r3, 0x0, 0x0) [ 1461.532963][T13106] FAULT_INJECTION: forcing a failure. [ 1461.532963][T13106] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1461.547017][T13106] CPU: 0 PID: 13106 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1461.557518][T13106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1461.567586][T13106] Call Trace: [ 1461.570889][T13106] dump_stack+0x1b0/0x21e [ 1461.575210][T13106] ? devkmsg_release+0x11c/0x11c [ 1461.580162][T13106] ? show_regs_print_info+0x12/0x12 [ 1461.585356][T13106] ? stack_trace_save+0x111/0x1e0 [ 1461.591238][T13106] ? stack_trace_snprint+0x150/0x150 [ 1461.597113][T13106] ? stack_trace_save+0x111/0x1e0 [ 1461.602113][T13106] should_fail+0x6fb/0x860 [ 1461.606507][T13106] ? setup_fault_attr+0x2b0/0x2b0 [ 1461.611514][T13106] ? __rcu_read_lock+0x50/0x50 [ 1461.616889][T13106] ? __kasan_slab_free+0x1e2/0x220 [ 1461.622610][T13106] ? slab_free_freelist_hook+0xd0/0x150 [ 1461.628148][T13106] __alloc_pages_nodemask+0x1ee/0x7c0 [ 1461.633512][T13106] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 1461.639039][T13106] alloc_slab_page+0x3a/0x390 [ 1461.643713][T13106] ? cred_has_capability+0x2b2/0x3f0 [ 1461.648975][T13106] new_slab+0x97/0x450 [ 1461.653021][T13106] ? should_fail+0x182/0x860 [ 1461.657587][T13106] ___slab_alloc+0x2e0/0x450 [ 1461.662171][T13106] ? proc_pid_stack+0x8e/0x1f0 [ 1461.666915][T13106] ? proc_pid_stack+0x8e/0x1f0 [ 1461.671656][T13106] kmem_cache_alloc_trace+0x24c/0x270 [ 1461.677028][T13106] proc_pid_stack+0x8e/0x1f0 [ 1461.681617][T13106] proc_single_show+0xd3/0x130 [ 1461.686386][T13106] seq_read+0x4aa/0xd30 [ 1461.690542][T13106] do_iter_read+0x43b/0x550 [ 1461.695473][T13106] do_preadv+0x1f4/0x330 [ 1461.699692][T13106] ? do_writev+0x560/0x560 [ 1461.704524][T13106] ? security_file_permission+0x128/0x300 [ 1461.710307][T13106] ? __sb_end_write+0xa4/0xf0 [ 1461.714962][T13106] ? vfs_write+0x427/0x4f0 [ 1461.719373][T13106] do_syscall_64+0xcb/0x150 [ 1461.723899][T13106] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1461.729767][T13106] RIP: 0033:0x45d5b9 [ 1461.733656][T13106] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1461.754041][T13106] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1461.762697][T13106] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1461.770682][T13106] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1461.778635][T13106] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1461.786586][T13106] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000a [ 1461.795154][T13106] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:06 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7be0908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:06 executing program 0 (fault-call:15 fault-nth:75): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) r2 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f0000000040)=0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r2, 0xc0c89425, &(0x7f0000000200)={"6c7e9d518e8096d0f4d45a6ca05e1fc4", r3, 0x0, {0x80000001, 0x7e}, {0x2, 0x8}, 0x2, [0x7ff, 0x7, 0x80000001, 0xff, 0x5888, 0x400, 0x10000, 0x100, 0x40, 0x1, 0x10001, 0x7fffffff, 0x2, 0xcf, 0x1, 0xffffffffd6912da5]}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000200)="d0d8670f3016bea8ffe3d50151288ffb79a50cecb6e11bfa0c2587150259dfb00c015a61a4b96923499aea18c78dbe76aeca33e0b2e5b093f5d6f0993d759d7bf83f0f101f66d416f416aa8cfff91d9b6d71594fcbe46188d8143a302bb14b54e466565fc280549e8066f5f6792475b74ea132fef6baeb4398923ef1336a656aa3ae8991f80950b37d3fca9f2414ffd023dc479ef49b64fc4d69d7aba81db82f56e32bb4e2a7883e652995177f688e37a3e8dfe9aec71a5ef3e196ede9296daca01e56762d2332d8beab174b274d72efba5142b026036df396e480af49afeede5f477b4c3b0b1a67383d5377f72881b2c98d876b7d", 0xf5}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:07 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x4, 0x0) 04:43:07 executing program 5: getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, r0, 0x1, 0x6, 0x6, @random="b383eacbce00"}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wg2\x00', 0x0}) r2 = socket(0x11, 0x3, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r2, &(0x7f00000016c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000800)={'ip6gre0\x00', &(0x7f0000000780)={'ip6tnl0\x00', 0x0, 0x29, 0x20, 0x5, 0x7fff, 0x4, @private1, @ipv4={[], [], @loopback}, 0x8, 0x7800, 0x3f, 0x1}}) sendmsg$ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000840)=ANY=[@ANYBLOB="40010000", @ANYRES16=0x0, @ANYBLOB="00022cbd7000fddbdf250f0000005400018008000300010000000800030002000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002007663616e300000000000000000000000140002007665746831000000000000000000000008000100", @ANYRES32=r0, @ANYBLOB="140001800800030004000000080003000000000034000180140002006272696467655f736c6176655f3000001400020069703667726530000000000000000000080003000100000058000180140002006e72300000000000000000000000000014000200626f6e645f736c6176655f310000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006772653000000000000000000000000008000100", @ANYRES32=r1, @ANYBLOB="08000300010000003800018008000100", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB='(\x00\t\x00', @ANYRES32=r5, @ANYBLOB="140002006970766c616e310000000000000000000800030000000000"], 0x140}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r6, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) r7 = syz_open_pts(r6, 0x0) ioctl$TCSETS2(r6, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) pwritev(r7, &(0x7f0000000680)=[{&(0x7f0000000000)="160c0b9a2fdb21fba39caf1c45bd505f4931cd11b5c215cf02a257cab43b91172868cab19f027a5c99d8e184a16c67bf1afebe0f7fb05888104d9978b56cda02212d4e19bfbbeb020d8b8c13aed7ee52a6eea79c6805c9e83550afcfae775eb2800de135eb23", 0x66}, {&(0x7f0000000200)="e1e2604c9c1a2a072b743d6027251ca9e426c87e2083511767854735b85d923bde48495c267b1cc9a3a0628aa929bdcc5afa1109ec31fd22e22a1a2591fcf577cd649279d9d5f92f29b002709614b4d1f60ece74dcb3431b68797db83fe8d27ccc92ed6872f58f67d60ce7673fc55b7460b87bff9ea631a9aa1590a2b1c34ff304f4f6bc27bb02760da7630373f7ab9a2bd7bcbc2aef9c414e119e53ea", 0x9d}, {&(0x7f0000000140)}, {&(0x7f00000002c0)="7d902caa8885a89e5c8d9fd1c61d888ea2197e5cd59fbc4436db4362474bfc600383e41c894d456a7b921b20f8341b38dc951583e361c168ab38ff657abdf4d76b356a82f1d564b9b4be01e38b035b647abe0805104fed8a726a56f17830c954db9b2d40cd7b1a07bd0126e2e84eeee3baad41d4932a740e2779eeb2db1f92f1fb5fd36902ab5d5c38cef6d32fb7d787596d46e1f0e098b70c16a923db67c86b6a59b7165fabba3e5555bdae40ccb2cae8d99b554dcea916f8660f382a8845af0072d36e2e5e000bbcaa725337e66f4176f96affe01b534bb20763d95b458395c29d93", 0xe3}, {&(0x7f00000003c0)="f87e684d59e107235ad721700a638ab573d0f91af25f39d2cebf9ba6d9b6b7a041f33541d3e5f2ac88b53af4bd4fdc604353b6a7b4ed44b5d8dad1533f81cac935a0c5e624f25026aa43dc4fbfef37f18583bdf28943a1abfda9c04812b7b6dd4eaea89baf68a42d16307b879c808ffd709395d5b9a57f3b1fa022cb1e5137de60a34d87395994cffb7e906db256a9972db90a375dbfbacad29050216d5bd3523af4be8001ff", 0xa6}, {&(0x7f00000004c0)="485dd661f49750c41d1724d1035ebbca855f47bfecd0987c00bcd5ffde738a3676e3c90b382441e1a661de5f5b8f222cfe660303a380c20c0a3d1d82b91d5150c3d084c3ebd5b4a636c41a3cae318030cc67f21634a2807edef5dcc5303455568c81f49bb624c0c01d106443d1ae6bb5d4b0f66a398c3ab8e3670dcfc35648a0439c4fe9f41f301efa321d1350b1859af0272f832525e948", 0x98}, {&(0x7f0000000580)="03284dfc30d8787784e92bdf59d752883518f7441c666b975135fdde5588f6b59e246f7967bad3afe45405c87ca2996420af503b1194c1a7312406379bcc2134a780c308cac2baa027f3f1f322977f90ea80a4912ffe01758a3ca3ef02a84c255855f4d603af2566a551bd95bbe52dbee67cbcf34c047ec75853ca", 0x7b}, {&(0x7f0000000600)="db19075c06ba204444684dcf3bbe23ee6a13c7770f3cdf1212110ad9b33e499ea788c047a97e06e6aca8d797cef5d033832bd05dd9b0424c23a3edc6963311de04baed6b6508088939aed407143a378bf49effa097fcc1c1e5390afb61dffe1573cd12839d60369dad4c4bb8083651b0497745f94b9bf8a1b5", 0x79}], 0x8, 0x5, 0x80000000) readv(r7, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r6, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r8 = dup3(r7, r6, 0x0) r9 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0xffffffffffff7fff, 0x400040) sendfile(r8, r9, &(0x7f0000000180)=0x35c3, 0x81) [ 1461.995596][T13126] FAULT_INJECTION: forcing a failure. [ 1461.995596][T13126] name failslab, interval 1, probability 0, space 0, times 0 [ 1462.011340][T13126] CPU: 0 PID: 13126 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1462.022001][T13126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1462.032070][T13126] Call Trace: [ 1462.035356][T13126] dump_stack+0x1b0/0x21e [ 1462.039703][T13126] ? devkmsg_release+0x11c/0x11c [ 1462.044644][T13126] ? show_regs_print_info+0x12/0x12 [ 1462.049833][T13126] ? cred_has_capability+0x18c/0x3f0 [ 1462.055116][T13126] ? cred_has_capability+0x2b2/0x3f0 [ 1462.060385][T13126] should_fail+0x6fb/0x860 [ 1462.064871][T13126] ? setup_fault_attr+0x2b0/0x2b0 [ 1462.069876][T13126] ? slab_free_freelist_hook+0xd0/0x150 [ 1462.075775][T13126] ? cap_capable+0x23f/0x280 [ 1462.080348][T13126] ? proc_pid_stack+0x1d5/0x1f0 [ 1462.086942][T13126] ? proc_pid_stack+0x8e/0x1f0 [ 1462.092559][T13126] should_failslab+0x5/0x20 [ 1462.097045][T13126] kmem_cache_alloc_trace+0x39/0x270 [ 1462.102470][T13126] proc_pid_stack+0x8e/0x1f0 [ 1462.107498][T13126] proc_single_show+0xd3/0x130 [ 1462.112614][T13126] seq_read+0x4aa/0xd30 [ 1462.116776][T13126] do_iter_read+0x43b/0x550 [ 1462.122752][T13126] do_preadv+0x1f4/0x330 [ 1462.126986][T13126] ? do_writev+0x560/0x560 [ 1462.131382][T13126] ? security_file_permission+0x128/0x300 [ 1462.137598][T13126] ? __sb_end_write+0xa4/0xf0 [ 1462.142253][T13126] ? vfs_write+0x427/0x4f0 [ 1462.146660][T13126] do_syscall_64+0xcb/0x150 [ 1462.151509][T13126] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1462.157380][T13126] RIP: 0033:0x45d5b9 [ 1462.161253][T13126] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1462.180934][T13126] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 04:43:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:07 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2e03c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:07 executing program 2 (fault-call:12 fault-nth:11): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1462.189327][T13126] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1462.197279][T13126] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1462.205232][T13126] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1462.213192][T13126] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004b [ 1462.221142][T13126] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:07 executing program 0 (fault-call:15 fault-nth:76): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) prctl$PR_SET_FP_MODE(0x2d, 0x2) dup3(r1, r0, 0x0) [ 1462.401744][T13155] FAULT_INJECTION: forcing a failure. [ 1462.401744][T13155] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1462.415068][T13155] CPU: 0 PID: 13155 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1462.425217][T13155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1462.435252][T13155] Call Trace: [ 1462.438530][T13155] dump_stack+0x1b0/0x21e [ 1462.442876][T13155] ? devkmsg_release+0x11c/0x11c [ 1462.447816][T13155] ? show_regs_print_info+0x12/0x12 [ 1462.452999][T13155] ? stack_trace_save+0x111/0x1e0 [ 1462.458012][T13155] ? stack_trace_snprint+0x150/0x150 [ 1462.463280][T13155] should_fail+0x6fb/0x860 [ 1462.467682][T13155] ? setup_fault_attr+0x2b0/0x2b0 [ 1462.472696][T13155] ? __rcu_read_lock+0x50/0x50 [ 1462.477443][T13155] ? __kasan_slab_free+0x1e2/0x220 [ 1462.482545][T13155] ? slab_free_freelist_hook+0xd0/0x150 [ 1462.488078][T13155] __alloc_pages_nodemask+0x1ee/0x7c0 [ 1462.493447][T13155] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 1462.498975][T13155] alloc_slab_page+0x3a/0x390 [ 1462.503624][T13155] ? cred_has_capability+0x2b2/0x3f0 [ 1462.508879][T13155] new_slab+0x97/0x450 [ 1462.512921][T13155] ? should_fail+0x182/0x860 [ 1462.517522][T13155] ___slab_alloc+0x2e0/0x450 [ 1462.522090][T13155] ? cap_capable+0x23f/0x280 [ 1462.526675][T13155] ? proc_pid_stack+0x1d5/0x1f0 [ 1462.529149][T13151] FAULT_INJECTION: forcing a failure. [ 1462.529149][T13151] name failslab, interval 1, probability 0, space 0, times 0 [ 1462.531507][T13155] ? proc_pid_stack+0x8e/0x1f0 [ 1462.531516][T13155] ? proc_pid_stack+0x8e/0x1f0 [ 1462.531526][T13155] kmem_cache_alloc_trace+0x24c/0x270 [ 1462.531535][T13155] proc_pid_stack+0x8e/0x1f0 [ 1462.531546][T13155] proc_single_show+0xd3/0x130 [ 1462.531562][T13155] seq_read+0x4aa/0xd30 [ 1462.572491][T13155] do_iter_read+0x43b/0x550 [ 1462.576989][T13155] do_preadv+0x1f4/0x330 [ 1462.581212][T13155] ? do_writev+0x560/0x560 [ 1462.585610][T13155] ? security_file_permission+0x128/0x300 [ 1462.591309][T13155] ? __sb_end_write+0xa4/0xf0 [ 1462.595967][T13155] ? vfs_write+0x427/0x4f0 [ 1462.600366][T13155] do_syscall_64+0xcb/0x150 [ 1462.604885][T13155] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1462.610842][T13155] RIP: 0033:0x45d5b9 [ 1462.614714][T13155] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1462.634303][T13155] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1462.642705][T13155] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1462.650662][T13155] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1462.658617][T13155] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1462.667323][T13155] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000b [ 1462.675287][T13155] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1462.683253][T13151] CPU: 1 PID: 13151 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1462.693412][T13151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1462.703452][T13151] Call Trace: [ 1462.706729][T13151] dump_stack+0x1b0/0x21e [ 1462.711043][T13151] ? devkmsg_release+0x11c/0x11c [ 1462.715962][T13151] ? show_regs_print_info+0x12/0x12 [ 1462.721174][T13151] ? cred_has_capability+0x18c/0x3f0 [ 1462.726460][T13151] ? cred_has_capability+0x2b2/0x3f0 [ 1462.731731][T13151] should_fail+0x6fb/0x860 [ 1462.736135][T13151] ? setup_fault_attr+0x2b0/0x2b0 [ 1462.741149][T13151] ? slab_free_freelist_hook+0xd0/0x150 [ 1462.746691][T13151] ? cap_capable+0x23f/0x280 [ 1462.751284][T13151] ? proc_pid_stack+0x1d5/0x1f0 [ 1462.756119][T13151] ? proc_pid_stack+0x8e/0x1f0 [ 1462.760864][T13151] should_failslab+0x5/0x20 [ 1462.765443][T13151] kmem_cache_alloc_trace+0x39/0x270 [ 1462.770717][T13151] proc_pid_stack+0x8e/0x1f0 [ 1462.775299][T13151] proc_single_show+0xd3/0x130 [ 1462.780055][T13151] seq_read+0x4aa/0xd30 [ 1462.784207][T13151] do_iter_read+0x43b/0x550 [ 1462.788701][T13151] do_preadv+0x1f4/0x330 [ 1462.792935][T13151] ? do_writev+0x560/0x560 [ 1462.797342][T13151] ? security_file_permission+0x128/0x300 [ 1462.803045][T13151] ? __sb_end_write+0xa4/0xf0 [ 1462.807707][T13151] ? vfs_write+0x427/0x4f0 [ 1462.812227][T13151] do_syscall_64+0xcb/0x150 [ 1462.816740][T13151] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1462.822700][T13151] RIP: 0033:0x45d5b9 [ 1462.826576][T13151] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:43:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb7955e05d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1462.846164][T13151] RSP: 002b:00007f63a8839c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1462.854558][T13151] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1462.862601][T13151] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1462.870555][T13151] RBP: 00007f63a8839ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1462.878526][T13151] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004c [ 1462.886481][T13151] R13: 00007ffebb13841f R14: 00007f63a883a9c0 R15: 000000000118cf4c 04:43:08 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x5, 0x0) 04:43:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:08 executing program 2 (fault-call:12 fault-nth:12): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:08 executing program 0 (fault-call:15 fault-nth:77): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1463.233747][T13178] FAULT_INJECTION: forcing a failure. [ 1463.233747][T13178] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.246445][T13178] CPU: 0 PID: 13178 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1463.256592][T13178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1463.266623][T13178] Call Trace: [ 1463.269891][T13178] dump_stack+0x1b0/0x21e [ 1463.274197][T13178] ? devkmsg_release+0x11c/0x11c [ 1463.279107][T13178] ? show_regs_print_info+0x12/0x12 [ 1463.284279][T13178] ? cred_has_capability+0x18c/0x3f0 [ 1463.289535][T13178] ? cred_has_capability+0x2b2/0x3f0 [ 1463.294797][T13178] should_fail+0x6fb/0x860 [ 1463.299190][T13178] ? setup_fault_attr+0x2b0/0x2b0 [ 1463.304191][T13178] ? slab_free_freelist_hook+0xd0/0x150 [ 1463.309721][T13178] ? cap_capable+0x23f/0x280 [ 1463.314284][T13178] ? proc_pid_stack+0x1d5/0x1f0 [ 1463.319108][T13178] ? proc_pid_stack+0x8e/0x1f0 [ 1463.323866][T13178] should_failslab+0x5/0x20 [ 1463.328367][T13178] kmem_cache_alloc_trace+0x39/0x270 [ 1463.333645][T13178] proc_pid_stack+0x8e/0x1f0 [ 1463.338228][T13178] proc_single_show+0xd3/0x130 [ 1463.342969][T13178] seq_read+0x4aa/0xd30 [ 1463.347103][T13178] do_iter_read+0x43b/0x550 [ 1463.351595][T13178] do_preadv+0x1f4/0x330 [ 1463.355820][T13178] ? do_writev+0x560/0x560 [ 1463.360236][T13178] ? security_file_permission+0x128/0x300 [ 1463.365947][T13178] ? __sb_end_write+0xa4/0xf0 [ 1463.370598][T13178] ? vfs_write+0x427/0x4f0 [ 1463.375166][T13178] do_syscall_64+0xcb/0x150 [ 1463.379645][T13178] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1463.385513][T13178] RIP: 0033:0x45d5b9 [ 1463.389382][T13178] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1463.408961][T13178] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1463.417348][T13178] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1463.425293][T13178] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1463.433250][T13178] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1463.441207][T13178] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000c [ 1463.449154][T13178] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:08 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7002ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1463.625932][T13184] FAULT_INJECTION: forcing a failure. [ 1463.625932][T13184] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.638561][T13184] CPU: 1 PID: 13184 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1463.648698][T13184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1463.658741][T13184] Call Trace: [ 1463.662056][T13184] dump_stack+0x1b0/0x21e [ 1463.666383][T13184] ? devkmsg_release+0x11c/0x11c [ 1463.671308][T13184] ? show_regs_print_info+0x12/0x12 [ 1463.676494][T13184] ? cred_has_capability+0x18c/0x3f0 [ 1463.681943][T13184] ? cred_has_capability+0x2b2/0x3f0 [ 1463.687219][T13184] should_fail+0x6fb/0x860 [ 1463.691626][T13184] ? setup_fault_attr+0x2b0/0x2b0 [ 1463.696834][T13184] ? slab_free_freelist_hook+0xd0/0x150 [ 1463.702376][T13184] ? cap_capable+0x23f/0x280 [ 1463.706956][T13184] ? proc_pid_stack+0x1d5/0x1f0 [ 1463.711796][T13184] ? proc_pid_stack+0x8e/0x1f0 [ 1463.716567][T13184] should_failslab+0x5/0x20 [ 1463.721060][T13184] kmem_cache_alloc_trace+0x39/0x270 [ 1463.726334][T13184] proc_pid_stack+0x8e/0x1f0 [ 1463.730912][T13184] proc_single_show+0xd3/0x130 [ 1463.735665][T13184] seq_read+0x4aa/0xd30 [ 1463.739813][T13184] do_iter_read+0x43b/0x550 [ 1463.744306][T13184] do_preadv+0x1f4/0x330 [ 1463.748533][T13184] ? do_writev+0x560/0x560 [ 1463.752939][T13184] ? security_file_permission+0x128/0x300 [ 1463.758642][T13184] ? __sb_end_write+0xa4/0xf0 [ 1463.763305][T13184] ? vfs_write+0x427/0x4f0 [ 1463.767714][T13184] do_syscall_64+0xcb/0x150 [ 1463.772212][T13184] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1463.778090][T13184] RIP: 0033:0x45d5b9 [ 1463.781968][T13184] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1463.801567][T13184] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1463.809961][T13184] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1463.817943][T13184] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1463.825902][T13184] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1463.833861][T13184] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004d [ 1463.841815][T13184] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:09 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x6, 0x0) 04:43:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:09 executing program 0 (fault-call:15 fault-nth:78): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:09 executing program 2 (fault-call:12 fault-nth:13): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7003ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1464.089934][T13207] FAULT_INJECTION: forcing a failure. [ 1464.089934][T13207] name failslab, interval 1, probability 0, space 0, times 0 [ 1464.096139][T13206] FAULT_INJECTION: forcing a failure. [ 1464.096139][T13206] name failslab, interval 1, probability 0, space 0, times 0 [ 1464.104070][T13207] CPU: 0 PID: 13207 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1464.126710][T13207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1464.136767][T13207] Call Trace: [ 1464.140064][T13207] dump_stack+0x1b0/0x21e [ 1464.144568][T13207] ? devkmsg_release+0x11c/0x11c [ 1464.149499][T13207] ? show_regs_print_info+0x12/0x12 [ 1464.154705][T13207] ? cred_has_capability+0x18c/0x3f0 [ 1464.159985][T13207] ? cred_has_capability+0x2b2/0x3f0 [ 1464.165250][T13207] should_fail+0x6fb/0x860 [ 1464.169661][T13207] ? setup_fault_attr+0x2b0/0x2b0 [ 1464.174688][T13207] ? slab_free_freelist_hook+0xd0/0x150 [ 1464.180214][T13207] ? cap_capable+0x23f/0x280 [ 1464.184787][T13207] ? proc_pid_stack+0x1d5/0x1f0 [ 1464.189623][T13207] ? proc_pid_stack+0x8e/0x1f0 [ 1464.194393][T13207] should_failslab+0x5/0x20 [ 1464.198894][T13207] kmem_cache_alloc_trace+0x39/0x270 [ 1464.204611][T13207] proc_pid_stack+0x8e/0x1f0 [ 1464.209182][T13207] proc_single_show+0xd3/0x130 [ 1464.213951][T13207] seq_read+0x4aa/0xd30 [ 1464.218092][T13207] do_iter_read+0x43b/0x550 [ 1464.222574][T13207] do_preadv+0x1f4/0x330 [ 1464.226844][T13207] ? do_writev+0x560/0x560 [ 1464.231242][T13207] ? security_file_permission+0x128/0x300 [ 1464.237308][T13207] ? __sb_end_write+0xa4/0xf0 [ 1464.241965][T13207] ? vfs_write+0x427/0x4f0 [ 1464.246368][T13207] do_syscall_64+0xcb/0x150 [ 1464.250853][T13207] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1464.256723][T13207] RIP: 0033:0x45d5b9 [ 1464.260619][T13207] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1464.280379][T13207] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1464.288965][T13207] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1464.297268][T13207] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1464.305255][T13207] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1464.313208][T13207] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000d [ 1464.321247][T13207] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1464.329211][T13206] CPU: 1 PID: 13206 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1464.339433][T13206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1464.349484][T13206] Call Trace: [ 1464.352756][T13206] dump_stack+0x1b0/0x21e [ 1464.357080][T13206] ? devkmsg_release+0x11c/0x11c [ 1464.361991][T13206] ? show_regs_print_info+0x12/0x12 [ 1464.367183][T13206] ? cred_has_capability+0x18c/0x3f0 [ 1464.372450][T13206] ? cred_has_capability+0x2b2/0x3f0 [ 1464.377710][T13206] should_fail+0x6fb/0x860 [ 1464.382466][T13206] ? setup_fault_attr+0x2b0/0x2b0 [ 1464.388350][T13206] ? slab_free_freelist_hook+0xd0/0x150 [ 1464.394218][T13206] ? cap_capable+0x23f/0x280 [ 1464.398800][T13206] ? proc_pid_stack+0x1d5/0x1f0 [ 1464.403626][T13206] ? proc_pid_stack+0x8e/0x1f0 [ 1464.408378][T13206] should_failslab+0x5/0x20 [ 1464.412863][T13206] kmem_cache_alloc_trace+0x39/0x270 [ 1464.418136][T13206] proc_pid_stack+0x8e/0x1f0 [ 1464.422717][T13206] proc_single_show+0xd3/0x130 [ 1464.427474][T13206] seq_read+0x4aa/0xd30 [ 1464.431611][T13206] do_iter_read+0x43b/0x550 [ 1464.436105][T13206] do_preadv+0x1f4/0x330 [ 1464.440322][T13206] ? do_writev+0x560/0x560 [ 1464.444719][T13206] ? security_file_permission+0x128/0x300 [ 1464.451826][T13206] ? __sb_end_write+0xa4/0xf0 [ 1464.456502][T13206] ? vfs_write+0x427/0x4f0 [ 1464.460926][T13206] do_syscall_64+0xcb/0x150 [ 1464.465433][T13206] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1464.471318][T13206] RIP: 0033:0x45d5b9 [ 1464.475189][T13206] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1464.494773][T13206] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1464.503198][T13206] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1464.511173][T13206] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1464.519130][T13206] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1464.527085][T13206] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004e [ 1464.535059][T13206] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:09 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x7, 0x0) 04:43:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:09 executing program 2 (fault-call:12 fault-nth:14): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:09 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7004ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1464.941943][T13227] FAULT_INJECTION: forcing a failure. [ 1464.941943][T13227] name failslab, interval 1, probability 0, space 0, times 0 [ 1464.955959][T13227] CPU: 1 PID: 13227 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1464.966815][T13227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1464.979200][T13227] Call Trace: [ 1464.982480][T13227] dump_stack+0x1b0/0x21e [ 1464.986819][T13227] ? devkmsg_release+0x11c/0x11c [ 1464.991922][T13227] ? show_regs_print_info+0x12/0x12 [ 1464.997201][T13227] ? cred_has_capability+0x18c/0x3f0 [ 1465.002480][T13227] ? cred_has_capability+0x2b2/0x3f0 [ 1465.007756][T13227] should_fail+0x6fb/0x860 [ 1465.012164][T13227] ? setup_fault_attr+0x2b0/0x2b0 [ 1465.017185][T13227] ? slab_free_freelist_hook+0xd0/0x150 [ 1465.022748][T13227] ? cap_capable+0x23f/0x280 [ 1465.027326][T13227] ? proc_pid_stack+0x1d5/0x1f0 [ 1465.032168][T13227] ? proc_pid_stack+0x8e/0x1f0 [ 1465.036923][T13227] should_failslab+0x5/0x20 [ 1465.041621][T13227] kmem_cache_alloc_trace+0x39/0x270 [ 1465.046988][T13227] proc_pid_stack+0x8e/0x1f0 [ 1465.051598][T13227] proc_single_show+0xd3/0x130 [ 1465.056358][T13227] seq_read+0x4aa/0xd30 [ 1465.061208][T13227] do_iter_read+0x43b/0x550 [ 1465.065798][T13227] do_preadv+0x1f4/0x330 [ 1465.070029][T13227] ? do_writev+0x560/0x560 [ 1465.074437][T13227] ? __schedule+0x8ae/0xe30 [ 1465.078941][T13227] do_syscall_64+0xcb/0x150 [ 1465.083462][T13227] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1465.089378][T13227] RIP: 0033:0x45d5b9 [ 1465.093874][T13227] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1465.113817][T13227] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1465.122230][T13227] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1465.130333][T13227] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:43:10 executing program 0 (fault-call:15 fault-nth:79): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1465.138296][T13227] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1465.146278][T13227] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000e [ 1465.154239][T13227] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:10 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7005ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1465.397229][T13235] FAULT_INJECTION: forcing a failure. [ 1465.397229][T13235] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.410002][T13235] CPU: 1 PID: 13235 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1465.420762][T13235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1465.430798][T13235] Call Trace: [ 1465.434085][T13235] dump_stack+0x1b0/0x21e [ 1465.438419][T13235] ? devkmsg_release+0x11c/0x11c [ 1465.443353][T13235] ? show_regs_print_info+0x12/0x12 [ 1465.448549][T13235] ? cred_has_capability+0x18c/0x3f0 [ 1465.453830][T13235] ? cred_has_capability+0x2b2/0x3f0 [ 1465.459108][T13235] should_fail+0x6fb/0x860 [ 1465.463518][T13235] ? setup_fault_attr+0x2b0/0x2b0 [ 1465.468624][T13235] ? slab_free_freelist_hook+0xd0/0x150 [ 1465.474149][T13235] ? cap_capable+0x23f/0x280 [ 1465.478750][T13235] ? proc_pid_stack+0x1d5/0x1f0 [ 1465.483602][T13235] ? proc_pid_stack+0x8e/0x1f0 [ 1465.488361][T13235] should_failslab+0x5/0x20 [ 1465.492858][T13235] kmem_cache_alloc_trace+0x39/0x270 [ 1465.498119][T13235] proc_pid_stack+0x8e/0x1f0 [ 1465.502703][T13235] proc_single_show+0xd3/0x130 [ 1465.507460][T13235] seq_read+0x4aa/0xd30 [ 1465.511598][T13235] ? iov_iter_advance+0x2af/0xef0 [ 1465.517040][T13235] do_iter_read+0x43b/0x550 [ 1465.521544][T13235] do_preadv+0x1f4/0x330 [ 1465.525784][T13235] ? do_writev+0x560/0x560 [ 1465.530195][T13235] ? security_file_permission+0x128/0x300 [ 1465.535889][T13235] ? __sb_end_write+0xa4/0xf0 [ 1465.540546][T13235] ? vfs_write+0x427/0x4f0 [ 1465.544968][T13235] do_syscall_64+0xcb/0x150 [ 1465.549452][T13235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1465.555337][T13235] RIP: 0033:0x45d5b9 [ 1465.559211][T13235] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1465.578810][T13235] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1465.587201][T13235] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:10 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x8, 0x0) 04:43:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:10 executing program 2 (fault-call:12 fault-nth:15): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1465.596033][T13235] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1465.603979][T13235] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1465.611930][T13235] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000004f [ 1465.619893][T13235] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1465.826649][T13251] FAULT_INJECTION: forcing a failure. [ 1465.826649][T13251] name failslab, interval 1, probability 0, space 0, times 0 [ 1465.839382][T13251] CPU: 0 PID: 13251 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1465.849535][T13251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1465.859576][T13251] Call Trace: [ 1465.862856][T13251] dump_stack+0x1b0/0x21e [ 1465.867176][T13251] ? devkmsg_release+0x11c/0x11c [ 1465.872102][T13251] ? show_regs_print_info+0x12/0x12 [ 1465.877332][T13251] ? cred_has_capability+0x18c/0x3f0 [ 1465.882632][T13251] ? cred_has_capability+0x2b2/0x3f0 [ 1465.887930][T13251] should_fail+0x6fb/0x860 [ 1465.892354][T13251] ? setup_fault_attr+0x2b0/0x2b0 [ 1465.897371][T13251] ? cap_capable+0x23f/0x280 [ 1465.901989][T13251] ? proc_pid_stack+0x8e/0x1f0 [ 1465.907111][T13251] should_failslab+0x5/0x20 [ 1465.912498][T13251] kmem_cache_alloc_trace+0x39/0x270 [ 1465.918761][T13251] proc_pid_stack+0x8e/0x1f0 [ 1465.923373][T13251] proc_single_show+0xd3/0x130 [ 1465.928134][T13251] seq_read+0x4aa/0xd30 [ 1465.932718][T13251] ? retint_kernel+0x1b/0x1b [ 1465.937303][T13251] do_iter_read+0x43b/0x550 [ 1465.941884][T13251] do_preadv+0x1f4/0x330 [ 1465.946144][T13251] ? do_writev+0x560/0x560 [ 1465.950571][T13251] ? __sb_start_write+0x9c/0x150 [ 1465.955520][T13251] ? __sb_end_write+0xa4/0xf0 [ 1465.960190][T13251] ? vfs_write+0x427/0x4f0 [ 1465.964606][T13251] ? do_syscall_64+0x57/0x150 [ 1465.969271][T13251] ? do_syscall_64+0x1f/0x150 [ 1465.973939][T13251] do_syscall_64+0xcb/0x150 [ 1465.978520][T13251] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1465.984491][T13251] RIP: 0033:0x45d5b9 [ 1465.988412][T13251] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1466.008092][T13251] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1466.016508][T13251] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:11 executing program 0 (fault-call:15 fault-nth:80): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1466.024468][T13251] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1466.032452][T13251] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1466.040417][T13251] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000000f [ 1466.048378][T13251] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:11 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7006ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1466.289901][T13260] FAULT_INJECTION: forcing a failure. [ 1466.289901][T13260] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.303053][T13260] CPU: 1 PID: 13260 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1466.313210][T13260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1466.323600][T13260] Call Trace: [ 1466.326878][T13260] dump_stack+0x1b0/0x21e [ 1466.331204][T13260] ? devkmsg_release+0x11c/0x11c [ 1466.336147][T13260] ? show_regs_print_info+0x12/0x12 [ 1466.341355][T13260] ? cred_has_capability+0x18c/0x3f0 [ 1466.346624][T13260] ? cred_has_capability+0x2b2/0x3f0 [ 1466.351925][T13260] should_fail+0x6fb/0x860 [ 1466.356338][T13260] ? setup_fault_attr+0x2b0/0x2b0 [ 1466.361370][T13260] ? slab_free_freelist_hook+0xd0/0x150 [ 1466.366925][T13260] ? cap_capable+0x23f/0x280 [ 1466.371530][T13260] ? proc_pid_stack+0x1d5/0x1f0 [ 1466.376365][T13260] ? proc_pid_stack+0x8e/0x1f0 [ 1466.381137][T13260] should_failslab+0x5/0x20 [ 1466.385627][T13260] kmem_cache_alloc_trace+0x39/0x270 [ 1466.390909][T13260] proc_pid_stack+0x8e/0x1f0 [ 1466.395491][T13260] proc_single_show+0xd3/0x130 [ 1466.400247][T13260] seq_read+0x4aa/0xd30 [ 1466.404393][T13260] do_iter_read+0x43b/0x550 [ 1466.408884][T13260] do_preadv+0x1f4/0x330 [ 1466.413122][T13260] ? do_writev+0x560/0x560 [ 1466.417641][T13260] ? security_file_permission+0x128/0x300 [ 1466.424145][T13260] ? __sb_end_write+0xa4/0xf0 [ 1466.428920][T13260] ? vfs_write+0x427/0x4f0 [ 1466.433367][T13260] do_syscall_64+0xcb/0x150 [ 1466.437862][T13260] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1466.443745][T13260] RIP: 0033:0x45d5b9 [ 1466.447631][T13260] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1466.467398][T13260] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1466.475885][T13260] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:11 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x9, 0x0) 04:43:11 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7007ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:11 executing program 2 (fault-call:12 fault-nth:16): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1466.484832][T13260] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1466.493244][T13260] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1466.501202][T13260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000050 [ 1466.509161][T13260] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:11 executing program 0 (fault-call:15 fault-nth:81): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1466.735651][T13283] FAULT_INJECTION: forcing a failure. [ 1466.735651][T13283] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.748396][T13283] CPU: 0 PID: 13283 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1466.758540][T13283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1466.768587][T13283] Call Trace: [ 1466.771861][T13283] dump_stack+0x1b0/0x21e [ 1466.776183][T13283] ? devkmsg_release+0x11c/0x11c [ 1466.781095][T13283] ? show_regs_print_info+0x12/0x12 [ 1466.786269][T13283] ? cred_has_capability+0x18c/0x3f0 [ 1466.791526][T13283] ? cred_has_capability+0x2b2/0x3f0 [ 1466.796783][T13283] should_fail+0x6fb/0x860 [ 1466.801173][T13283] ? setup_fault_attr+0x2b0/0x2b0 [ 1466.806177][T13283] ? slab_free_freelist_hook+0xd0/0x150 [ 1466.811700][T13283] ? cap_capable+0x23f/0x280 [ 1466.816275][T13283] ? proc_pid_stack+0x1d5/0x1f0 [ 1466.821112][T13283] ? proc_pid_stack+0x8e/0x1f0 [ 1466.825849][T13283] should_failslab+0x5/0x20 [ 1466.830330][T13283] kmem_cache_alloc_trace+0x39/0x270 [ 1466.835593][T13283] proc_pid_stack+0x8e/0x1f0 [ 1466.840158][T13283] proc_single_show+0xd3/0x130 [ 1466.844910][T13283] seq_read+0x4aa/0xd30 [ 1466.849050][T13283] do_iter_read+0x43b/0x550 [ 1466.853531][T13283] do_preadv+0x1f4/0x330 [ 1466.857762][T13283] ? do_writev+0x560/0x560 [ 1466.862158][T13283] ? security_file_permission+0x128/0x300 [ 1466.867853][T13283] ? __sb_end_write+0xa4/0xf0 [ 1466.872506][T13283] ? vfs_write+0x427/0x4f0 [ 1466.876902][T13283] do_syscall_64+0xcb/0x150 [ 1466.881394][T13283] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1466.887264][T13283] RIP: 0033:0x45d5b9 [ 1466.891154][T13283] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1466.910736][T13283] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1466.919143][T13283] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1466.927093][T13283] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1466.935047][T13283] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1466.943001][T13283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 1466.950963][T13283] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1467.048358][T13285] FAULT_INJECTION: forcing a failure. [ 1467.048358][T13285] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.062189][T13285] CPU: 1 PID: 13285 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1467.072337][T13285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.082367][T13285] Call Trace: [ 1467.085638][T13285] dump_stack+0x1b0/0x21e [ 1467.089957][T13285] ? devkmsg_release+0x11c/0x11c [ 1467.094875][T13285] ? show_regs_print_info+0x12/0x12 [ 1467.100050][T13285] ? cred_has_capability+0x18c/0x3f0 [ 1467.105310][T13285] ? cred_has_capability+0x2b2/0x3f0 [ 1467.110571][T13285] should_fail+0x6fb/0x860 [ 1467.114965][T13285] ? setup_fault_attr+0x2b0/0x2b0 [ 1467.119962][T13285] ? slab_free_freelist_hook+0xd0/0x150 [ 1467.125483][T13285] ? cap_capable+0x23f/0x280 [ 1467.130048][T13285] ? proc_pid_stack+0x1d5/0x1f0 [ 1467.134873][T13285] ? proc_pid_stack+0x8e/0x1f0 [ 1467.139608][T13285] should_failslab+0x5/0x20 [ 1467.144100][T13285] kmem_cache_alloc_trace+0x39/0x270 [ 1467.149360][T13285] proc_pid_stack+0x8e/0x1f0 [ 1467.153941][T13285] proc_single_show+0xd3/0x130 [ 1467.158690][T13285] seq_read+0x4aa/0xd30 [ 1467.162825][T13285] do_iter_read+0x43b/0x550 [ 1467.167316][T13285] do_preadv+0x1f4/0x330 [ 1467.171547][T13285] ? do_writev+0x560/0x560 [ 1467.175939][T13285] ? security_file_permission+0x128/0x300 [ 1467.181632][T13285] ? __sb_end_write+0xa4/0xf0 [ 1467.186459][T13285] ? vfs_write+0x427/0x4f0 [ 1467.190859][T13285] do_syscall_64+0xcb/0x150 [ 1467.195336][T13285] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1467.201202][T13285] RIP: 0033:0x45d5b9 [ 1467.205074][T13285] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1467.224656][T13285] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1467.233069][T13285] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1467.241019][T13285] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1467.248967][T13285] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1467.256916][T13285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000051 [ 1467.264864][T13285] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7008ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:12 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xa, 0x0) 04:43:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:12 executing program 2 (fault-call:12 fault-nth:17): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:12 executing program 0 (fault-call:15 fault-nth:82): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:12 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d700accc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1467.591214][T13313] FAULT_INJECTION: forcing a failure. [ 1467.591214][T13313] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.603939][T13313] CPU: 0 PID: 13313 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1467.614074][T13313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.624113][T13313] Call Trace: [ 1467.627394][T13313] dump_stack+0x1b0/0x21e [ 1467.631764][T13313] ? devkmsg_release+0x11c/0x11c [ 1467.636686][T13313] ? show_regs_print_info+0x12/0x12 [ 1467.641881][T13313] ? cred_has_capability+0x18c/0x3f0 [ 1467.647153][T13313] ? cred_has_capability+0x2b2/0x3f0 [ 1467.652428][T13313] should_fail+0x6fb/0x860 [ 1467.656832][T13313] ? setup_fault_attr+0x2b0/0x2b0 [ 1467.661849][T13313] ? slab_free_freelist_hook+0xd0/0x150 [ 1467.667386][T13313] ? cap_capable+0x23f/0x280 [ 1467.671967][T13313] ? proc_pid_stack+0x1d5/0x1f0 [ 1467.676809][T13313] ? proc_pid_stack+0x8e/0x1f0 [ 1467.681577][T13313] should_failslab+0x5/0x20 [ 1467.686071][T13313] kmem_cache_alloc_trace+0x39/0x270 [ 1467.691348][T13313] proc_pid_stack+0x8e/0x1f0 [ 1467.695928][T13313] proc_single_show+0xd3/0x130 [ 1467.700684][T13313] seq_read+0x4aa/0xd30 [ 1467.704839][T13313] do_iter_read+0x43b/0x550 [ 1467.709334][T13313] do_preadv+0x1f4/0x330 [ 1467.713567][T13313] ? do_writev+0x560/0x560 [ 1467.717979][T13313] ? security_file_permission+0x128/0x300 [ 1467.723684][T13313] ? __sb_end_write+0xa4/0xf0 [ 1467.728356][T13313] ? vfs_write+0x427/0x4f0 [ 1467.732848][T13313] do_syscall_64+0xcb/0x150 [ 1467.737341][T13313] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1467.743215][T13313] RIP: 0033:0x45d5b9 [ 1467.748226][T13313] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1467.767840][T13313] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1467.776241][T13313] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1467.784206][T13313] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1467.792167][T13313] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1467.800130][T13313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000011 [ 1467.808085][T13313] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1467.901627][T13301] FAULT_INJECTION: forcing a failure. [ 1467.901627][T13301] name failslab, interval 1, probability 0, space 0, times 0 [ 1467.974594][T13301] CPU: 1 PID: 13301 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1467.984840][T13301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1467.994915][T13301] Call Trace: [ 1467.998216][T13301] dump_stack+0x1b0/0x21e [ 1468.002534][T13301] ? devkmsg_release+0x11c/0x11c [ 1468.007458][T13301] ? __schedule+0x8ae/0xe30 [ 1468.011958][T13301] ? show_regs_print_info+0x12/0x12 [ 1468.017149][T13301] ? cred_has_capability+0x18c/0x3f0 [ 1468.022421][T13301] ? cred_has_capability+0x2b2/0x3f0 [ 1468.027693][T13301] should_fail+0x6fb/0x860 [ 1468.032101][T13301] ? setup_fault_attr+0x2b0/0x2b0 [ 1468.037110][T13301] ? cap_capable+0x23f/0x280 [ 1468.041690][T13301] ? preempt_schedule_notrace+0x110/0x110 [ 1468.047396][T13301] ? proc_pid_stack+0x8e/0x1f0 [ 1468.052143][T13301] should_failslab+0x5/0x20 [ 1468.056634][T13301] kmem_cache_alloc_trace+0x39/0x270 [ 1468.061906][T13301] proc_pid_stack+0x8e/0x1f0 [ 1468.066484][T13301] proc_single_show+0xd3/0x130 [ 1468.071238][T13301] seq_read+0x4aa/0xd30 [ 1468.075387][T13301] do_iter_read+0x43b/0x550 [ 1468.079879][T13301] do_preadv+0x1f4/0x330 [ 1468.084119][T13301] ? do_writev+0x560/0x560 [ 1468.088522][T13301] ? security_file_permission+0x128/0x300 [ 1468.094227][T13301] ? __sb_end_write+0xa4/0xf0 [ 1468.098890][T13301] ? vfs_write+0x427/0x4f0 [ 1468.103319][T13301] do_syscall_64+0xcb/0x150 [ 1468.107814][T13301] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1468.113954][T13301] RIP: 0033:0x45d5b9 [ 1468.117924][T13301] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1468.137536][T13301] RSP: 002b:00007f63a8839c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1468.146063][T13301] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1468.154023][T13301] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1468.161979][T13301] RBP: 00007f63a8839ca0 R08: 0000000000000000 R09: 0000000000000000 04:43:13 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xb, 0x0) [ 1468.169933][T13301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000052 [ 1468.177891][T13301] R13: 00007ffebb13841f R14: 00007f63a883a9c0 R15: 000000000118cf4c 04:43:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:13 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d700bccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:13 executing program 0 (fault-call:15 fault-nth:83): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:13 executing program 2 (fault-call:12 fault-nth:18): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1468.395526][T13336] FAULT_INJECTION: forcing a failure. [ 1468.395526][T13336] name failslab, interval 1, probability 0, space 0, times 0 [ 1468.395843][T13335] FAULT_INJECTION: forcing a failure. [ 1468.395843][T13335] name failslab, interval 1, probability 0, space 0, times 0 [ 1468.408144][T13336] CPU: 0 PID: 13336 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1468.408155][T13336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1468.440874][T13336] Call Trace: [ 1468.444149][T13336] dump_stack+0x1b0/0x21e [ 1468.448455][T13336] ? devkmsg_release+0x11c/0x11c [ 1468.453370][T13336] ? show_regs_print_info+0x12/0x12 [ 1468.458567][T13336] ? cred_has_capability+0x18c/0x3f0 [ 1468.463828][T13336] ? cred_has_capability+0x2b2/0x3f0 [ 1468.469115][T13336] should_fail+0x6fb/0x860 [ 1468.473531][T13336] ? setup_fault_attr+0x2b0/0x2b0 [ 1468.478535][T13336] ? slab_free_freelist_hook+0xd0/0x150 [ 1468.484064][T13336] ? cap_capable+0x23f/0x280 [ 1468.488646][T13336] ? proc_pid_stack+0x1d5/0x1f0 [ 1468.493475][T13336] ? proc_pid_stack+0x8e/0x1f0 [ 1468.498218][T13336] should_failslab+0x5/0x20 [ 1468.502717][T13336] kmem_cache_alloc_trace+0x39/0x270 [ 1468.507979][T13336] proc_pid_stack+0x8e/0x1f0 [ 1468.512552][T13336] proc_single_show+0xd3/0x130 [ 1468.517294][T13336] seq_read+0x4aa/0xd30 [ 1468.521431][T13336] do_iter_read+0x43b/0x550 [ 1468.525930][T13336] do_preadv+0x1f4/0x330 [ 1468.530151][T13336] ? do_writev+0x560/0x560 [ 1468.534551][T13336] ? security_file_permission+0x128/0x300 [ 1468.540246][T13336] ? __sb_end_write+0xa4/0xf0 [ 1468.544904][T13336] ? vfs_write+0x427/0x4f0 [ 1468.549302][T13336] do_syscall_64+0xcb/0x150 [ 1468.553783][T13336] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1468.559652][T13336] RIP: 0033:0x45d5b9 [ 1468.563526][T13336] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1468.583109][T13336] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1468.591504][T13336] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1468.599463][T13336] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1468.607410][T13336] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1468.615374][T13336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000012 [ 1468.623325][T13336] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1468.631286][T13335] CPU: 1 PID: 13335 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1468.641427][T13335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1468.651473][T13335] Call Trace: [ 1468.654756][T13335] dump_stack+0x1b0/0x21e [ 1468.659072][T13335] ? devkmsg_release+0x11c/0x11c [ 1468.664114][T13335] ? show_regs_print_info+0x12/0x12 [ 1468.669295][T13335] ? cred_has_capability+0x18c/0x3f0 [ 1468.674577][T13335] ? cred_has_capability+0x2b2/0x3f0 [ 1468.679864][T13335] should_fail+0x6fb/0x860 [ 1468.684263][T13335] ? setup_fault_attr+0x2b0/0x2b0 [ 1468.689270][T13335] ? slab_free_freelist_hook+0xd0/0x150 [ 1468.694802][T13335] ? cap_capable+0x23f/0x280 [ 1468.699376][T13335] ? proc_pid_stack+0x1d5/0x1f0 [ 1468.704207][T13335] ? proc_pid_stack+0x8e/0x1f0 [ 1468.708958][T13335] should_failslab+0x5/0x20 [ 1468.713448][T13335] kmem_cache_alloc_trace+0x39/0x270 [ 1468.718720][T13335] proc_pid_stack+0x8e/0x1f0 [ 1468.723290][T13335] proc_single_show+0xd3/0x130 [ 1468.728036][T13335] seq_read+0x4aa/0xd30 [ 1468.732182][T13335] do_iter_read+0x43b/0x550 [ 1468.736678][T13335] do_preadv+0x1f4/0x330 [ 1468.740903][T13335] ? do_writev+0x560/0x560 [ 1468.745300][T13335] ? security_file_permission+0x128/0x300 [ 1468.750992][T13335] ? __sb_end_write+0xa4/0xf0 [ 1468.755657][T13335] ? vfs_write+0x427/0x4f0 [ 1468.760051][T13335] do_syscall_64+0xcb/0x150 [ 1468.764533][T13335] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1468.770415][T13335] RIP: 0033:0x45d5b9 [ 1468.774284][T13335] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1468.793870][T13335] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1468.802398][T13335] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1468.810366][T13335] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1468.818313][T13335] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1468.826266][T13335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000053 [ 1468.834215][T13335] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d700fccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:14 executing program 2 (fault-call:12 fault-nth:19): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:14 executing program 0 (fault-call:15 fault-nth:84): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:14 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xc, 0x0) 04:43:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x5000f4) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x149}) r3 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0xf, 0xffffffffffffffff, 0x812}) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x2002a480}, 0xc805) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000500)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYRESDEC], 0x3}, 0x1, 0x0, 0x0, 0x2c942}, 0x8000) r6 = creat(&(0x7f0000000140)='./bus\x00', 0x40) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r5, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4004011) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e24, 0x3f, @private0, 0x401}, 0x1c) [ 1469.144616][T13355] FAULT_INJECTION: forcing a failure. [ 1469.144616][T13355] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.157839][T13355] CPU: 1 PID: 13355 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1469.169104][T13355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1469.179153][T13355] Call Trace: [ 1469.182433][T13355] dump_stack+0x1b0/0x21e [ 1469.186749][T13355] ? devkmsg_release+0x11c/0x11c [ 1469.190881][T13356] FAULT_INJECTION: forcing a failure. [ 1469.190881][T13356] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.191765][T13355] ? show_regs_print_info+0x12/0x12 [ 1469.191783][T13355] ? cred_has_capability+0x18c/0x3f0 [ 1469.214762][T13355] ? cred_has_capability+0x2b2/0x3f0 [ 1469.220024][T13355] should_fail+0x6fb/0x860 [ 1469.224419][T13355] ? setup_fault_attr+0x2b0/0x2b0 [ 1469.229434][T13355] ? slab_free_freelist_hook+0xd0/0x150 [ 1469.234956][T13355] ? cap_capable+0x23f/0x280 [ 1469.239528][T13355] ? proc_pid_stack+0x1d5/0x1f0 [ 1469.244357][T13355] ? proc_pid_stack+0x8e/0x1f0 [ 1469.251968][T13355] should_failslab+0x5/0x20 [ 1469.256451][T13355] kmem_cache_alloc_trace+0x39/0x270 [ 1469.261717][T13355] proc_pid_stack+0x8e/0x1f0 [ 1469.266290][T13355] proc_single_show+0xd3/0x130 [ 1469.271033][T13355] seq_read+0x4aa/0xd30 [ 1469.275185][T13355] do_iter_read+0x43b/0x550 [ 1469.279673][T13355] do_preadv+0x1f4/0x330 [ 1469.283892][T13355] ? do_writev+0x560/0x560 [ 1469.288290][T13355] ? security_file_permission+0x128/0x300 [ 1469.293986][T13355] ? __sb_end_write+0xa4/0xf0 [ 1469.298656][T13355] ? vfs_write+0x427/0x4f0 [ 1469.303053][T13355] do_syscall_64+0xcb/0x150 [ 1469.307539][T13355] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1469.313409][T13355] RIP: 0033:0x45d5b9 [ 1469.317283][T13355] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1469.336866][T13355] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1469.345782][T13355] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1469.354448][T13355] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1469.362396][T13355] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1469.370361][T13355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 1469.378313][T13355] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1469.386274][T13356] CPU: 0 PID: 13356 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1469.396410][T13356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1469.406533][T13356] Call Trace: [ 1469.409817][T13356] dump_stack+0x1b0/0x21e [ 1469.415862][T13356] ? devkmsg_release+0x11c/0x11c [ 1469.420805][T13356] ? show_regs_print_info+0x12/0x12 [ 1469.426003][T13356] ? cred_has_capability+0x18c/0x3f0 [ 1469.431284][T13356] ? cred_has_capability+0x2b2/0x3f0 [ 1469.436544][T13356] should_fail+0x6fb/0x860 [ 1469.440938][T13356] ? setup_fault_attr+0x2b0/0x2b0 [ 1469.445938][T13356] ? slab_free_freelist_hook+0xd0/0x150 [ 1469.451466][T13356] ? cap_capable+0x23f/0x280 [ 1469.456034][T13356] ? proc_pid_stack+0x1d5/0x1f0 [ 1469.460858][T13356] ? proc_pid_stack+0x8e/0x1f0 [ 1469.465596][T13356] should_failslab+0x5/0x20 [ 1469.470075][T13356] kmem_cache_alloc_trace+0x39/0x270 [ 1469.475335][T13356] proc_pid_stack+0x8e/0x1f0 [ 1469.479898][T13356] proc_single_show+0xd3/0x130 [ 1469.484636][T13356] seq_read+0x4aa/0xd30 [ 1469.488786][T13356] do_iter_read+0x43b/0x550 [ 1469.493264][T13356] do_preadv+0x1f4/0x330 [ 1469.497479][T13356] ? do_writev+0x560/0x560 [ 1469.501872][T13356] ? security_file_permission+0x128/0x300 [ 1469.507563][T13356] ? __sb_end_write+0xa4/0xf0 [ 1469.512218][T13356] ? vfs_write+0x427/0x4f0 [ 1469.516625][T13356] do_syscall_64+0xcb/0x150 [ 1469.521118][T13356] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1469.526983][T13356] RIP: 0033:0x45d5b9 [ 1469.530853][T13356] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1469.550454][T13356] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1469.558838][T13356] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1469.566782][T13356] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1469.574729][T13356] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1469.582673][T13356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000054 [ 1469.590620][T13356] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:14 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7011ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:14 executing program 0 (fault-call:15 fault-nth:85): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000040)={0xfff, 0x1f, 0xbfe, 0x80000000}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f0000000180), 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r2 = dup3(r1, r0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x40100, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) 04:43:14 executing program 2 (fault-call:12 fault-nth:20): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$setown(r1, 0x8, r2) dup3(r1, r0, 0x0) 04:43:15 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xd, 0x0) 04:43:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x0, 0x0, 0x149}) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r4, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r4, r0, 0x0) [ 1469.954192][T13395] FAULT_INJECTION: forcing a failure. [ 1469.954192][T13395] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.966841][T13395] CPU: 0 PID: 13395 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1469.969663][T13396] FAULT_INJECTION: forcing a failure. [ 1469.969663][T13396] name failslab, interval 1, probability 0, space 0, times 0 [ 1469.976972][T13395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1469.976976][T13395] Call Trace: [ 1469.976989][T13395] dump_stack+0x1b0/0x21e [ 1469.977004][T13395] ? devkmsg_release+0x11c/0x11c [ 1470.012056][T13395] ? show_regs_print_info+0x12/0x12 [ 1470.017236][T13395] ? cred_has_capability+0x18c/0x3f0 [ 1470.022504][T13395] ? cred_has_capability+0x2b2/0x3f0 [ 1470.027769][T13395] should_fail+0x6fb/0x860 [ 1470.032185][T13395] ? setup_fault_attr+0x2b0/0x2b0 [ 1470.037193][T13395] ? slab_free_freelist_hook+0xd0/0x150 [ 1470.042717][T13395] ? cap_capable+0x23f/0x280 [ 1470.047286][T13395] ? proc_pid_stack+0x1d5/0x1f0 [ 1470.052117][T13395] ? proc_pid_stack+0x8e/0x1f0 [ 1470.056945][T13395] should_failslab+0x5/0x20 [ 1470.061428][T13395] kmem_cache_alloc_trace+0x39/0x270 [ 1470.066723][T13395] proc_pid_stack+0x8e/0x1f0 [ 1470.071293][T13395] proc_single_show+0xd3/0x130 [ 1470.076041][T13395] seq_read+0x4aa/0xd30 [ 1470.080179][T13395] do_iter_read+0x43b/0x550 [ 1470.084660][T13395] do_preadv+0x1f4/0x330 [ 1470.088881][T13395] ? do_writev+0x560/0x560 [ 1470.093283][T13395] ? security_file_permission+0x128/0x300 [ 1470.098986][T13395] ? __sb_end_write+0xa4/0xf0 [ 1470.103650][T13395] ? vfs_write+0x427/0x4f0 [ 1470.108051][T13395] do_syscall_64+0xcb/0x150 [ 1470.112536][T13395] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1470.118867][T13395] RIP: 0033:0x45d5b9 [ 1470.122751][T13395] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1470.142599][T13395] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1470.151261][T13395] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1470.159218][T13395] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1470.167184][T13395] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1470.175136][T13395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000055 [ 1470.183086][T13395] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1470.191047][T13396] CPU: 1 PID: 13396 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1470.201179][T13396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.211210][T13396] Call Trace: [ 1470.214496][T13396] dump_stack+0x1b0/0x21e [ 1470.218803][T13396] ? devkmsg_release+0x11c/0x11c [ 1470.223723][T13396] ? show_regs_print_info+0x12/0x12 [ 1470.228897][T13396] ? cred_has_capability+0x18c/0x3f0 [ 1470.234160][T13396] ? cred_has_capability+0x2b2/0x3f0 [ 1470.239421][T13396] should_fail+0x6fb/0x860 [ 1470.243833][T13396] ? setup_fault_attr+0x2b0/0x2b0 [ 1470.248833][T13396] ? slab_free_freelist_hook+0xd0/0x150 [ 1470.254355][T13396] ? cap_capable+0x23f/0x280 [ 1470.258931][T13396] ? proc_pid_stack+0x1d5/0x1f0 [ 1470.263756][T13396] ? proc_pid_stack+0x8e/0x1f0 [ 1470.268496][T13396] should_failslab+0x5/0x20 [ 1470.272995][T13396] kmem_cache_alloc_trace+0x39/0x270 [ 1470.278257][T13396] proc_pid_stack+0x8e/0x1f0 [ 1470.282821][T13396] proc_single_show+0xd3/0x130 [ 1470.287574][T13396] seq_read+0x4aa/0xd30 [ 1470.291709][T13396] do_iter_read+0x43b/0x550 [ 1470.296200][T13396] do_preadv+0x1f4/0x330 [ 1470.300416][T13396] ? do_writev+0x560/0x560 [ 1470.304823][T13396] ? security_file_permission+0x128/0x300 [ 1470.310521][T13396] ? __sb_end_write+0xa4/0xf0 [ 1470.315181][T13396] ? vfs_write+0x427/0x4f0 [ 1470.319578][T13396] do_syscall_64+0xcb/0x150 [ 1470.324091][T13396] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1470.329959][T13396] RIP: 0033:0x45d5b9 [ 1470.333830][T13396] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1470.353428][T13396] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1470.361815][T13396] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1470.369764][T13396] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1470.377714][T13396] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1470.385670][T13396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 1470.393616][T13396] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:15 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7060ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x1ffffffc}) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x4b, 0x1}, 0x7) r1 = syz_open_pts(r0, 0x20280) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:15 executing program 0 (fault-call:15 fault-nth:86): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:15 executing program 2 (fault-call:12 fault-nth:21): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/43, 0x2b}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:15 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xe, 0x0) [ 1470.744762][T13420] FAULT_INJECTION: forcing a failure. [ 1470.744762][T13420] name failslab, interval 1, probability 0, space 0, times 0 [ 1470.757422][T13420] CPU: 0 PID: 13420 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1470.767566][T13420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1470.777607][T13420] Call Trace: [ 1470.780900][T13420] dump_stack+0x1b0/0x21e [ 1470.785214][T13420] ? devkmsg_release+0x11c/0x11c [ 1470.790129][T13420] ? show_regs_print_info+0x12/0x12 [ 1470.795306][T13420] ? cred_has_capability+0x18c/0x3f0 [ 1470.800568][T13420] ? cred_has_capability+0x2b2/0x3f0 [ 1470.805828][T13420] should_fail+0x6fb/0x860 [ 1470.810229][T13420] ? setup_fault_attr+0x2b0/0x2b0 [ 1470.815251][T13420] ? slab_free_freelist_hook+0xd0/0x150 [ 1470.820778][T13420] ? cap_capable+0x23f/0x280 [ 1470.825344][T13420] ? proc_pid_stack+0x1d5/0x1f0 [ 1470.830183][T13420] ? proc_pid_stack+0x8e/0x1f0 [ 1470.834922][T13420] should_failslab+0x5/0x20 [ 1470.839401][T13420] kmem_cache_alloc_trace+0x39/0x270 [ 1470.844680][T13420] proc_pid_stack+0x8e/0x1f0 [ 1470.849245][T13420] proc_single_show+0xd3/0x130 [ 1470.853983][T13420] seq_read+0x4aa/0xd30 [ 1470.858115][T13420] do_iter_read+0x43b/0x550 [ 1470.862605][T13420] do_preadv+0x1f4/0x330 [ 1470.866829][T13420] ? do_writev+0x560/0x560 [ 1470.871232][T13420] ? security_file_permission+0x128/0x300 [ 1470.876924][T13420] ? __sb_end_write+0xa4/0xf0 [ 1470.881574][T13420] ? vfs_write+0x427/0x4f0 [ 1470.885966][T13420] do_syscall_64+0xcb/0x150 [ 1470.890458][T13420] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1470.896340][T13420] RIP: 0033:0x45d5b9 [ 1470.900297][T13420] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1470.921459][T13420] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1470.929844][T13420] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1470.937819][T13420] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1470.945779][T13420] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1470.953725][T13420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000056 [ 1470.961688][T13420] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1470.971776][T13432] FAULT_INJECTION: forcing a failure. [ 1470.971776][T13432] name failslab, interval 1, probability 0, space 0, times 0 [ 1470.984403][T13432] CPU: 1 PID: 13432 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 04:43:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r0], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) [ 1470.994534][T13432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1471.004573][T13432] Call Trace: [ 1471.007854][T13432] dump_stack+0x1b0/0x21e [ 1471.012178][T13432] ? devkmsg_release+0x11c/0x11c [ 1471.017202][T13432] ? show_regs_print_info+0x12/0x12 [ 1471.022391][T13432] ? cred_has_capability+0x18c/0x3f0 [ 1471.027661][T13432] ? cred_has_capability+0x2b2/0x3f0 [ 1471.032962][T13432] should_fail+0x6fb/0x860 [ 1471.037367][T13432] ? setup_fault_attr+0x2b0/0x2b0 [ 1471.042388][T13432] ? slab_free_freelist_hook+0xd0/0x150 [ 1471.047913][T13432] ? cap_capable+0x23f/0x280 [ 1471.052480][T13432] ? proc_pid_stack+0x1d5/0x1f0 [ 1471.057309][T13432] ? proc_pid_stack+0x8e/0x1f0 [ 1471.062050][T13432] should_failslab+0x5/0x20 [ 1471.066565][T13432] kmem_cache_alloc_trace+0x39/0x270 [ 1471.071834][T13432] proc_pid_stack+0x8e/0x1f0 [ 1471.076409][T13432] proc_single_show+0xd3/0x130 [ 1471.081149][T13432] seq_read+0x4aa/0xd30 [ 1471.085282][T13432] do_iter_read+0x43b/0x550 [ 1471.089760][T13432] do_preadv+0x1f4/0x330 [ 1471.093988][T13432] ? do_writev+0x560/0x560 [ 1471.098382][T13432] ? security_file_permission+0x128/0x300 [ 1471.104101][T13432] ? __sb_end_write+0xa4/0xf0 [ 1471.108754][T13432] ? vfs_write+0x427/0x4f0 [ 1471.113150][T13432] do_syscall_64+0xcb/0x150 [ 1471.117631][T13432] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1471.123497][T13432] RIP: 0033:0x45d5b9 04:43:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d70e0ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1471.127369][T13432] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1471.146954][T13432] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1471.155342][T13432] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1471.163286][T13432] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1471.171235][T13432] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1471.179198][T13432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 1471.187330][T13432] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r2, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r1, 0x0, 0x0, 0x149}) r3 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000080)={0xf, r2, 0x812}) r4 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) write$FUSE_BMAP(r4, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYRESDEC=r3, @ANYRESDEC=r0, @ANYRES32, @ANYBLOB="5169a89373b19cee067b99498fcbd067b96e5179ba6966ac1b204c7e6ef6710c756fc6aaeb9863aca0ecc083a4da4be833ebfd6cbed970d2990974c5af238bf9332f92fd0432a38a5396b91378047174e41250889337c1c66deebb4a1d56c527f17d4e6ed397aaafd67ad8a90b940a27abdb320a0c220bda69895643199d9a09839b85d9b6db0950886fac78a6ceece94468a4615f1b2bc081cd30ad", @ANYRESHEX=r4, @ANYRESOCT=0x0, @ANYRESOCT=r4], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) r5 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110", 0x2}) readv(r5, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r5, r0, 0x0) 04:43:16 executing program 0 (fault-call:15 fault-nth:87): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, 0x0) preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:16 executing program 2 (fault-call:12 fault-nth:22): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) [ 1471.432905][T13459] FAULT_INJECTION: forcing a failure. [ 1471.432905][T13459] name failslab, interval 1, probability 0, space 0, times 0 [ 1471.445592][T13459] CPU: 1 PID: 13459 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1471.456011][T13459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1471.466044][T13459] Call Trace: [ 1471.469327][T13459] dump_stack+0x1b0/0x21e [ 1471.473644][T13459] ? devkmsg_release+0x11c/0x11c [ 1471.478552][T13459] ? show_regs_print_info+0x12/0x12 [ 1471.483722][T13459] ? cred_has_capability+0x18c/0x3f0 [ 1471.488976][T13459] ? cred_has_capability+0x2b2/0x3f0 [ 1471.494245][T13459] should_fail+0x6fb/0x860 [ 1471.498634][T13459] ? setup_fault_attr+0x2b0/0x2b0 [ 1471.503631][T13459] ? slab_free_freelist_hook+0xd0/0x150 [ 1471.509150][T13459] ? cap_capable+0x23f/0x280 [ 1471.513728][T13459] ? proc_pid_stack+0x1d5/0x1f0 [ 1471.518551][T13459] ? proc_pid_stack+0x8e/0x1f0 [ 1471.523290][T13459] should_failslab+0x5/0x20 [ 1471.527771][T13459] kmem_cache_alloc_trace+0x39/0x270 [ 1471.533028][T13459] proc_pid_stack+0x8e/0x1f0 [ 1471.537589][T13459] proc_single_show+0xd3/0x130 [ 1471.542326][T13459] seq_read+0x4aa/0xd30 [ 1471.546459][T13459] do_iter_read+0x43b/0x550 [ 1471.550937][T13459] do_preadv+0x1f4/0x330 [ 1471.555685][T13459] ? do_writev+0x560/0x560 [ 1471.560077][T13459] ? security_file_permission+0x128/0x300 [ 1471.565856][T13459] ? __sb_end_write+0xa4/0xf0 [ 1471.570528][T13459] ? vfs_write+0x427/0x4f0 [ 1471.574924][T13459] do_syscall_64+0xcb/0x150 [ 1471.579513][T13459] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1471.585382][T13459] RIP: 0033:0x45d5b9 [ 1471.589358][T13459] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1471.611032][T13459] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1471.619423][T13459] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:16 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc3e028374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1471.627373][T13459] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1471.635319][T13459] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1471.643281][T13459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000057 [ 1471.651327][T13459] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1471.711767][T13464] FAULT_INJECTION: forcing a failure. [ 1471.711767][T13464] name failslab, interval 1, probability 0, space 0, times 0 [ 1471.725304][T13464] CPU: 0 PID: 13464 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1471.736925][T13464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1471.747839][T13464] Call Trace: [ 1471.751139][T13464] dump_stack+0x1b0/0x21e [ 1471.755769][T13464] ? devkmsg_release+0x11c/0x11c [ 1471.761511][T13464] ? show_regs_print_info+0x12/0x12 [ 1471.767662][T13464] ? cred_has_capability+0x18c/0x3f0 [ 1471.772953][T13464] ? cred_has_capability+0x2b2/0x3f0 [ 1471.778516][T13464] should_fail+0x6fb/0x860 [ 1471.782903][T13464] ? setup_fault_attr+0x2b0/0x2b0 [ 1471.787907][T13464] ? slab_free_freelist_hook+0xd0/0x150 [ 1471.793457][T13464] ? cap_capable+0x23f/0x280 [ 1471.798026][T13464] ? proc_pid_stack+0x1d5/0x1f0 [ 1471.802851][T13464] ? proc_pid_stack+0x8e/0x1f0 [ 1471.807586][T13464] should_failslab+0x5/0x20 [ 1471.812124][T13464] kmem_cache_alloc_trace+0x39/0x270 [ 1471.817431][T13464] proc_pid_stack+0x8e/0x1f0 [ 1471.822014][T13464] proc_single_show+0xd3/0x130 [ 1471.826758][T13464] seq_read+0x4aa/0xd30 [ 1471.830889][T13464] do_iter_read+0x43b/0x550 [ 1471.835368][T13464] do_preadv+0x1f4/0x330 [ 1471.839580][T13464] ? do_writev+0x560/0x560 [ 1471.843968][T13464] ? __schedule+0x8ae/0xe30 [ 1471.848443][T13464] do_syscall_64+0xcb/0x150 [ 1471.852952][T13464] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1471.858824][T13464] RIP: 0033:0x45d5b9 [ 1471.862688][T13464] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1471.882271][T13464] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1471.890661][T13464] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1471.898617][T13464] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1471.906570][T13464] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1471.914514][T13464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000016 [ 1471.922455][T13464] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:17 executing program 5: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x56a, 0x331, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) syz_usb_disconnect(r0) syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000090000206d041cc304000000000109022400010000a0000904000001"], 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r2, r1, 0x0) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r4, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r3, 0x0, 0x0, 0x149}) r5 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0xf, r4, 0x812}) ioctl$BTRFS_IOC_SEND(r5, 0x40489426, &(0x7f0000000200)={{r2}, 0xa, &(0x7f0000000140)=[0x2, 0x7, 0x6, 0x800, 0x3, 0x7, 0x101, 0x3, 0x9, 0x6], 0x4, 0xe, [0x5, 0x375, 0x3, 0x2]}) 04:43:17 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x10, 0x0) 04:43:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:17 executing program 0 (fault-call:15 fault-nth:88): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:17 executing program 2 (fault-call:12 fault-nth:23): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b04e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1472.282947][T13491] FAULT_INJECTION: forcing a failure. [ 1472.282947][T13491] name failslab, interval 1, probability 0, space 0, times 0 [ 1472.283714][T13492] FAULT_INJECTION: forcing a failure. [ 1472.283714][T13492] name failslab, interval 1, probability 0, space 0, times 0 [ 1472.295633][T13491] CPU: 0 PID: 13491 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1472.318277][T13491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1472.328323][T13491] Call Trace: [ 1472.331609][T13491] dump_stack+0x1b0/0x21e [ 1472.336018][T13491] ? devkmsg_release+0x11c/0x11c [ 1472.340944][T13491] ? show_regs_print_info+0x12/0x12 [ 1472.346129][T13491] ? cred_has_capability+0x18c/0x3f0 [ 1472.351389][T13491] ? cred_has_capability+0x2b2/0x3f0 [ 1472.356651][T13491] should_fail+0x6fb/0x860 [ 1472.361043][T13491] ? setup_fault_attr+0x2b0/0x2b0 [ 1472.366059][T13491] ? slab_free_freelist_hook+0xd0/0x150 [ 1472.371582][T13491] ? cap_capable+0x23f/0x280 [ 1472.376166][T13491] ? proc_pid_stack+0x1d5/0x1f0 [ 1472.380992][T13491] ? proc_pid_stack+0x8e/0x1f0 [ 1472.385732][T13491] should_failslab+0x5/0x20 [ 1472.390215][T13491] kmem_cache_alloc_trace+0x39/0x270 [ 1472.395480][T13491] proc_pid_stack+0x8e/0x1f0 [ 1472.400046][T13491] proc_single_show+0xd3/0x130 [ 1472.404790][T13491] seq_read+0x4aa/0xd30 [ 1472.408925][T13491] do_iter_read+0x43b/0x550 [ 1472.413406][T13491] do_preadv+0x1f4/0x330 [ 1472.417636][T13491] ? do_writev+0x560/0x560 [ 1472.422034][T13491] ? security_file_permission+0x128/0x300 [ 1472.427728][T13491] ? __sb_end_write+0xa4/0xf0 [ 1472.432381][T13491] ? vfs_write+0x427/0x4f0 [ 1472.436793][T13491] do_syscall_64+0xcb/0x150 [ 1472.441274][T13491] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1472.447141][T13491] RIP: 0033:0x45d5b9 [ 1472.451013][T13491] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1472.470594][T13491] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1472.478980][T13491] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1472.486941][T13491] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1472.494895][T13491] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1472.502842][T13491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000058 [ 1472.510795][T13491] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1472.518754][T13492] CPU: 1 PID: 13492 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1472.528897][T13492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1472.538938][T13492] Call Trace: [ 1472.542226][T13492] dump_stack+0x1b0/0x21e [ 1472.546540][T13492] ? devkmsg_release+0x11c/0x11c [ 1472.551488][T13492] ? show_regs_print_info+0x12/0x12 [ 1472.556669][T13492] ? cred_has_capability+0x18c/0x3f0 [ 1472.561936][T13492] ? cred_has_capability+0x2b2/0x3f0 [ 1472.567206][T13492] should_fail+0x6fb/0x860 [ 1472.571608][T13492] ? setup_fault_attr+0x2b0/0x2b0 [ 1472.576621][T13492] ? slab_free_freelist_hook+0xd0/0x150 [ 1472.582166][T13492] ? cap_capable+0x23f/0x280 [ 1472.586742][T13492] ? proc_pid_stack+0x1d5/0x1f0 [ 1472.593579][T13492] ? proc_pid_stack+0x8e/0x1f0 [ 1472.598331][T13492] should_failslab+0x5/0x20 [ 1472.602848][T13492] kmem_cache_alloc_trace+0x39/0x270 [ 1472.608120][T13492] proc_pid_stack+0x8e/0x1f0 [ 1472.612688][T13492] proc_single_show+0xd3/0x130 [ 1472.617427][T13492] seq_read+0x4aa/0xd30 [ 1472.621589][T13492] do_iter_read+0x43b/0x550 [ 1472.626674][T13492] do_preadv+0x1f4/0x330 [ 1472.630893][T13492] ? do_writev+0x560/0x560 [ 1472.635723][T13492] ? security_file_permission+0x128/0x300 [ 1472.641416][T13492] ? __sb_end_write+0xa4/0xf0 [ 1472.646068][T13492] ? vfs_write+0x427/0x4f0 [ 1472.650463][T13492] do_syscall_64+0xcb/0x150 [ 1472.654944][T13492] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1472.660896][T13492] RIP: 0033:0x45d5b9 [ 1472.664767][T13492] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1472.684364][T13492] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1472.692751][T13492] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1472.700699][T13492] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1472.708645][T13492] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1472.716590][T13492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000017 [ 1472.724537][T13492] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:17 executing program 0 (fault-call:15 fault-nth:89): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:17 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374be0e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:18 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x11, 0x0) [ 1472.925094][T13507] FAULT_INJECTION: forcing a failure. [ 1472.925094][T13507] name failslab, interval 1, probability 0, space 0, times 0 [ 1472.937761][T13507] CPU: 1 PID: 13507 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1472.947979][T13507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1472.958008][T13507] Call Trace: [ 1472.961276][T13507] dump_stack+0x1b0/0x21e [ 1472.965581][T13507] ? devkmsg_release+0x11c/0x11c [ 1472.970493][T13507] ? show_regs_print_info+0x12/0x12 [ 1472.975923][T13507] ? cred_has_capability+0x18c/0x3f0 [ 1472.981182][T13507] ? cred_has_capability+0x2b2/0x3f0 [ 1472.986439][T13507] should_fail+0x6fb/0x860 [ 1472.990878][T13507] ? setup_fault_attr+0x2b0/0x2b0 [ 1472.995889][T13507] ? slab_free_freelist_hook+0xd0/0x150 [ 1473.001406][T13507] ? cap_capable+0x23f/0x280 [ 1473.005969][T13507] ? proc_pid_stack+0x1d5/0x1f0 [ 1473.010805][T13507] ? proc_pid_stack+0x8e/0x1f0 [ 1473.015553][T13507] should_failslab+0x5/0x20 [ 1473.020464][T13507] kmem_cache_alloc_trace+0x39/0x270 [ 1473.025724][T13507] proc_pid_stack+0x8e/0x1f0 [ 1473.030288][T13507] proc_single_show+0xd3/0x130 [ 1473.035025][T13507] seq_read+0x4aa/0xd30 [ 1473.039156][T13507] do_iter_read+0x43b/0x550 [ 1473.043631][T13507] do_preadv+0x1f4/0x330 [ 1473.052015][T13507] ? do_writev+0x560/0x560 [ 1473.056420][T13507] ? security_file_permission+0x128/0x300 [ 1473.062114][T13507] ? __sb_end_write+0xa4/0xf0 [ 1473.066765][T13507] ? vfs_write+0x427/0x4f0 [ 1473.071158][T13507] ? do_syscall_64+0x80/0x150 [ 1473.075806][T13507] do_syscall_64+0xcb/0x150 [ 1473.080283][T13507] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1473.086149][T13507] RIP: 0033:0x45d5b9 [ 1473.090024][T13507] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1473.109868][T13507] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1473.118253][T13507] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbe045", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:18 executing program 2 (fault-call:12 fault-nth:24): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1473.126198][T13507] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1473.134148][T13507] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1473.142094][T13507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000059 [ 1473.150038][T13507] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1473.337782][T13524] FAULT_INJECTION: forcing a failure. [ 1473.337782][T13524] name failslab, interval 1, probability 0, space 0, times 0 [ 1473.350639][T13524] CPU: 0 PID: 13524 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1473.361025][T13524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1473.371088][T13524] Call Trace: [ 1473.374365][T13524] dump_stack+0x1b0/0x21e [ 1473.378680][T13524] ? devkmsg_release+0x11c/0x11c [ 1473.385180][T13524] ? show_regs_print_info+0x12/0x12 [ 1473.390367][T13524] ? cred_has_capability+0x18c/0x3f0 [ 1473.395641][T13524] ? cred_has_capability+0x2b2/0x3f0 [ 1473.400900][T13524] should_fail+0x6fb/0x860 [ 1473.405294][T13524] ? setup_fault_attr+0x2b0/0x2b0 [ 1473.410294][T13524] ? slab_free_freelist_hook+0xd0/0x150 [ 1473.415813][T13524] ? cap_capable+0x23f/0x280 [ 1473.420379][T13524] ? proc_pid_stack+0x1d5/0x1f0 [ 1473.425222][T13524] ? proc_pid_stack+0x8e/0x1f0 [ 1473.429960][T13524] should_failslab+0x5/0x20 [ 1473.434442][T13524] kmem_cache_alloc_trace+0x39/0x270 [ 1473.439704][T13524] proc_pid_stack+0x8e/0x1f0 [ 1473.444271][T13524] proc_single_show+0xd3/0x130 [ 1473.449025][T13524] seq_read+0x4aa/0xd30 [ 1473.455163][T13524] do_iter_read+0x43b/0x550 [ 1473.459644][T13524] do_preadv+0x1f4/0x330 [ 1473.463961][T13524] ? do_writev+0x560/0x560 [ 1473.468369][T13524] ? security_file_permission+0x128/0x300 [ 1473.474072][T13524] ? __sb_end_write+0xa4/0xf0 [ 1473.478723][T13524] ? vfs_write+0x427/0x4f0 [ 1473.483118][T13524] do_syscall_64+0xcb/0x150 [ 1473.487601][T13524] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1473.493471][T13524] RIP: 0033:0x45d5b9 [ 1473.497341][T13524] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1473.516922][T13524] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1473.525312][T13524] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1473.533261][T13524] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1473.541207][T13524] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1473.549154][T13524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000018 [ 1473.557104][T13524] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:18 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x17}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:18 executing program 0 (fault-call:15 fault-nth:90): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:18 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x12, 0x0) 04:43:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) read$usbfs(0xffffffffffffffff, &(0x7f0000000000)=""/8, 0x8) dup3(r1, r0, 0x0) 04:43:18 executing program 2 (fault-call:12 fault-nth:25): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r2, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1712}]}, @TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6f}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}]}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x4) dup3(r1, r0, 0x0) 04:43:19 executing program 5: write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x10}, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x840, 0x0) ioctl$CHAR_RAW_SECTGET(r2, 0x1267, &(0x7f0000000140)) 04:43:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x5000f4) ioctl$BTRFS_IOC_ADD_DEV(r2, 0x5000940a, &(0x7f00000004c0)={{r0}, "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"}) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x40000, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) socketpair(0x2a, 0x2, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SET_NODE_ADDR(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x43}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x8004) r5 = socket(0x11, 0x3, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r4, &(0x7f0000000940)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000900)={&(0x7f0000000640)={0x28c, 0x0, 0x300, 0x70bd2b, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1000}, {0x6, 0x11, 0x6}, {0x8, 0x13, 0x7}, {0x5, 0x14, 0x1}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0xffffff0d}, {0x6, 0x11, 0x9970}, {0x8, 0x13, 0x531f}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfff}, {0x6, 0x11, 0x31}, {0x8, 0x13, 0xfffffb45}, {0x5}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0xb, 0xffffffff}, {0x6, 0x11, 0x7fff}, {0x8, 0x13, 0x1000}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x81}, {0x6, 0x11, 0x1ff}, {0x8, 0x13, 0x6a396cc3}, {0x5, 0x14, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x1}, {0x6, 0x11, 0x7b}, {0x8, 0x13, 0x7}, {0x5, 0x14, 0x3f}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6, 0x11, 0xb2}, {0x8, 0x13, 0x10000}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}, {0x6, 0x11, 0x7}, {0x8, 0x13, 0x47}, {0x5, 0x14, 0x1}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x9}, {0x6, 0x11, 0x40}, {0x8, 0x13, 0x3}, {0x5}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x8}, {0x6}, {0x8, 0x13, 0x7}, {0x5, 0x14, 0x1}}]}, 0x28c}, 0x1, 0x0, 0x0, 0x4008001}, 0x40) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r5, &(0x7f00000016c0)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000440)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c010000", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="0000080108000c000400000008000c00dca4db43"], 0x11c}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000) r9 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0x2, 0x80000) sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000a40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x2c, 0x0, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x41a}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4044040) sendmsg$NET_DM_CMD_START(r9, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x200, 0x70bd28, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x14) dup3(r1, r0, 0x0) 04:43:19 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x131}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1473.971960][T13563] FAULT_INJECTION: forcing a failure. [ 1473.971960][T13563] name failslab, interval 1, probability 0, space 0, times 0 [ 1473.978273][T13560] FAULT_INJECTION: forcing a failure. [ 1473.978273][T13560] name failslab, interval 1, probability 0, space 0, times 0 [ 1473.984591][T13563] CPU: 1 PID: 13563 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1474.007365][T13563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1474.017398][T13563] Call Trace: [ 1474.020674][T13563] dump_stack+0x1b0/0x21e [ 1474.024982][T13563] ? devkmsg_release+0x11c/0x11c [ 1474.029895][T13563] ? show_regs_print_info+0x12/0x12 [ 1474.035081][T13563] ? cred_has_capability+0x18c/0x3f0 [ 1474.040443][T13563] ? cred_has_capability+0x2b2/0x3f0 [ 1474.045706][T13563] should_fail+0x6fb/0x860 [ 1474.050100][T13563] ? setup_fault_attr+0x2b0/0x2b0 [ 1474.055116][T13563] ? slab_free_freelist_hook+0xd0/0x150 [ 1474.060640][T13563] ? cap_capable+0x23f/0x280 [ 1474.065208][T13563] ? proc_pid_stack+0x1d5/0x1f0 [ 1474.075245][T13563] ? proc_pid_stack+0x8e/0x1f0 [ 1474.079987][T13563] should_failslab+0x5/0x20 [ 1474.084471][T13563] kmem_cache_alloc_trace+0x39/0x270 [ 1474.089734][T13563] proc_pid_stack+0x8e/0x1f0 [ 1474.094302][T13563] proc_single_show+0xd3/0x130 [ 1474.099063][T13563] seq_read+0x4aa/0xd30 [ 1474.103221][T13563] do_iter_read+0x43b/0x550 [ 1474.107699][T13563] do_preadv+0x1f4/0x330 [ 1474.111918][T13563] ? do_writev+0x560/0x560 [ 1474.116314][T13563] ? security_file_permission+0x128/0x300 [ 1474.122008][T13563] ? __sb_end_write+0xa4/0xf0 [ 1474.126669][T13563] ? vfs_write+0x427/0x4f0 [ 1474.131072][T13563] do_syscall_64+0xcb/0x150 [ 1474.135819][T13563] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1474.141687][T13563] RIP: 0033:0x45d5b9 [ 1474.145560][T13563] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1474.165140][T13563] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1474.173531][T13563] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1474.181482][T13563] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1474.189433][T13563] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1474.197396][T13563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000019 [ 1474.205347][T13563] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1474.213308][T13560] CPU: 0 PID: 13560 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1474.223442][T13560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1474.233480][T13560] Call Trace: [ 1474.237113][T13560] dump_stack+0x1b0/0x21e [ 1474.241433][T13560] ? devkmsg_release+0x11c/0x11c [ 1474.246448][T13560] ? show_regs_print_info+0x12/0x12 [ 1474.251635][T13560] ? cred_has_capability+0x18c/0x3f0 [ 1474.256924][T13560] ? cred_has_capability+0x2b2/0x3f0 [ 1474.262195][T13560] should_fail+0x6fb/0x860 [ 1474.266612][T13560] ? setup_fault_attr+0x2b0/0x2b0 [ 1474.271625][T13560] ? slab_free_freelist_hook+0xd0/0x150 [ 1474.277155][T13560] ? cap_capable+0x23f/0x280 [ 1474.281829][T13560] ? proc_pid_stack+0x1d5/0x1f0 [ 1474.286666][T13560] ? proc_pid_stack+0x8e/0x1f0 [ 1474.291424][T13560] should_failslab+0x5/0x20 [ 1474.295912][T13560] kmem_cache_alloc_trace+0x39/0x270 [ 1474.301186][T13560] proc_pid_stack+0x8e/0x1f0 [ 1474.305763][T13560] proc_single_show+0xd3/0x130 [ 1474.310513][T13560] seq_read+0x4aa/0xd30 [ 1474.314656][T13560] do_iter_read+0x43b/0x550 [ 1474.319148][T13560] do_preadv+0x1f4/0x330 04:43:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1474.323385][T13560] ? do_writev+0x560/0x560 [ 1474.327791][T13560] ? security_file_permission+0x128/0x300 [ 1474.333492][T13560] ? __sb_end_write+0xa4/0xf0 [ 1474.338157][T13560] ? vfs_write+0x427/0x4f0 [ 1474.342564][T13560] do_syscall_64+0xcb/0x150 [ 1474.347058][T13560] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1474.352951][T13560] RIP: 0033:0x45d5b9 [ 1474.356834][T13560] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1474.376417][T13560] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1474.384830][T13560] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1474.392777][T13560] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1474.400725][T13560] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1474.408668][T13560] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005a 04:43:19 executing program 2 (fault-call:12 fault-nth:26): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1474.416617][T13560] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) dup3(r1, 0xffffffffffffffff, 0x80000) 04:43:19 executing program 0 (fault-call:15 fault-nth:91): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1474.572658][T13586] FAULT_INJECTION: forcing a failure. [ 1474.572658][T13586] name failslab, interval 1, probability 0, space 0, times 0 [ 1474.585478][T13586] CPU: 0 PID: 13586 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1474.595629][T13586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1474.605680][T13586] Call Trace: [ 1474.608960][T13586] dump_stack+0x1b0/0x21e [ 1474.613289][T13586] ? devkmsg_release+0x11c/0x11c [ 1474.618205][T13586] ? __schedule+0x8ae/0xe30 [ 1474.622701][T13586] ? show_regs_print_info+0x12/0x12 [ 1474.627881][T13586] ? cred_has_capability+0x18c/0x3f0 [ 1474.633157][T13586] ? cred_has_capability+0x2b2/0x3f0 [ 1474.638444][T13586] should_fail+0x6fb/0x860 [ 1474.642850][T13586] ? setup_fault_attr+0x2b0/0x2b0 [ 1474.647854][T13586] ? cap_capable+0x23f/0x280 [ 1474.652428][T13586] ? preempt_schedule_notrace+0x110/0x110 [ 1474.658127][T13586] ? proc_pid_stack+0x8e/0x1f0 [ 1474.662867][T13586] should_failslab+0x5/0x20 [ 1474.667447][T13586] kmem_cache_alloc_trace+0x39/0x270 [ 1474.672710][T13586] proc_pid_stack+0x8e/0x1f0 [ 1474.677285][T13586] proc_single_show+0xd3/0x130 [ 1474.682031][T13586] seq_read+0x4aa/0xd30 [ 1474.686173][T13586] do_iter_read+0x43b/0x550 [ 1474.690665][T13586] do_preadv+0x1f4/0x330 [ 1474.694891][T13586] ? do_writev+0x560/0x560 [ 1474.699289][T13586] ? __schedule+0x8ae/0xe30 [ 1474.703771][T13586] do_syscall_64+0xcb/0x150 [ 1474.708251][T13586] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1474.714120][T13586] RIP: 0033:0x45d5b9 [ 1474.717990][T13586] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1474.737589][T13586] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1474.745976][T13586] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1474.753943][T13586] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1474.761892][T13586] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1474.769841][T13586] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001a [ 1474.777795][T13586] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1474.868071][T13588] FAULT_INJECTION: forcing a failure. [ 1474.868071][T13588] name failslab, interval 1, probability 0, space 0, times 0 [ 1474.880807][T13588] CPU: 1 PID: 13588 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1474.890946][T13588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1474.903039][T13588] Call Trace: [ 1474.906330][T13588] dump_stack+0x1b0/0x21e [ 1474.910646][T13588] ? devkmsg_release+0x11c/0x11c [ 1474.915597][T13588] ? show_regs_print_info+0x12/0x12 [ 1474.920870][T13588] ? cred_has_capability+0x18c/0x3f0 [ 1474.926140][T13588] ? cred_has_capability+0x2b2/0x3f0 [ 1474.931409][T13588] should_fail+0x6fb/0x860 [ 1474.935814][T13588] ? setup_fault_attr+0x2b0/0x2b0 [ 1474.940837][T13588] ? slab_free_freelist_hook+0xd0/0x150 [ 1474.946397][T13588] ? cap_capable+0x23f/0x280 [ 1474.950974][T13588] ? proc_pid_stack+0x1d5/0x1f0 [ 1474.955812][T13588] ? proc_pid_stack+0x8e/0x1f0 [ 1474.960560][T13588] should_failslab+0x5/0x20 [ 1474.965040][T13588] kmem_cache_alloc_trace+0x39/0x270 [ 1474.970313][T13588] proc_pid_stack+0x8e/0x1f0 [ 1474.974880][T13588] proc_single_show+0xd3/0x130 [ 1474.979619][T13588] seq_read+0x4aa/0xd30 [ 1474.983755][T13588] do_iter_read+0x43b/0x550 [ 1474.988235][T13588] do_preadv+0x1f4/0x330 [ 1474.992457][T13588] ? do_writev+0x560/0x560 [ 1474.997038][T13588] ? security_file_permission+0x128/0x300 [ 1475.002747][T13588] ? __sb_end_write+0xa4/0xf0 [ 1475.007409][T13588] ? vfs_write+0x427/0x4f0 [ 1475.011807][T13588] do_syscall_64+0xcb/0x150 [ 1475.016306][T13588] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1475.022180][T13588] RIP: 0033:0x45d5b9 [ 1475.026077][T13588] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1475.045750][T13588] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1475.054156][T13588] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x132}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0xa00) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000040)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:20 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x25, 0x0) [ 1475.062109][T13588] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1475.070057][T13588] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.078005][T13588] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005b [ 1475.085956][T13588] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:20 executing program 2 (fault-call:12 fault-nth:27): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, 0x0, 0x0, 0x0, 0x0) [ 1475.306806][T13608] FAULT_INJECTION: forcing a failure. [ 1475.306806][T13608] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.319537][T13608] CPU: 1 PID: 13608 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1475.329670][T13608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1475.339710][T13608] Call Trace: [ 1475.342994][T13608] dump_stack+0x1b0/0x21e [ 1475.347315][T13608] ? devkmsg_release+0x11c/0x11c [ 1475.352243][T13608] ? show_regs_print_info+0x12/0x12 [ 1475.357433][T13608] ? cred_has_capability+0x18c/0x3f0 [ 1475.362719][T13608] ? cred_has_capability+0x2b2/0x3f0 [ 1475.367998][T13608] should_fail+0x6fb/0x860 [ 1475.372408][T13608] ? setup_fault_attr+0x2b0/0x2b0 [ 1475.377422][T13608] ? slab_free_freelist_hook+0xd0/0x150 [ 1475.382964][T13608] ? cap_capable+0x23f/0x280 [ 1475.387553][T13608] ? proc_pid_stack+0x1d5/0x1f0 [ 1475.392415][T13608] ? proc_pid_stack+0x8e/0x1f0 [ 1475.397181][T13608] should_failslab+0x5/0x20 [ 1475.401677][T13608] kmem_cache_alloc_trace+0x39/0x270 [ 1475.406958][T13608] proc_pid_stack+0x8e/0x1f0 [ 1475.411625][T13608] proc_single_show+0xd3/0x130 [ 1475.416416][T13608] seq_read+0x4aa/0xd30 [ 1475.420565][T13608] do_iter_read+0x43b/0x550 [ 1475.425060][T13608] do_preadv+0x1f4/0x330 [ 1475.429294][T13608] ? do_writev+0x560/0x560 [ 1475.433701][T13608] ? security_file_permission+0x128/0x300 [ 1475.439408][T13608] ? __sb_end_write+0xa4/0xf0 [ 1475.444073][T13608] ? vfs_write+0x427/0x4f0 [ 1475.448519][T13608] do_syscall_64+0xcb/0x150 [ 1475.453017][T13608] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1475.458902][T13608] RIP: 0033:0x45d5b9 [ 1475.462785][T13608] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1475.482466][T13608] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1475.490872][T13608] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1475.498842][T13608] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:43:20 executing program 0 (fault-call:15 fault-nth:92): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1475.506802][T13608] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.514765][T13608] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001b [ 1475.522729][T13608] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:20 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x20001462}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1475.679391][T13619] FAULT_INJECTION: forcing a failure. [ 1475.679391][T13619] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.692139][T13619] CPU: 1 PID: 13619 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1475.702296][T13619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1475.712338][T13619] Call Trace: [ 1475.715624][T13619] dump_stack+0x1b0/0x21e [ 1475.719935][T13619] ? devkmsg_release+0x11c/0x11c [ 1475.724854][T13619] ? show_regs_print_info+0x12/0x12 [ 1475.730041][T13619] ? cred_has_capability+0x18c/0x3f0 [ 1475.735307][T13619] ? cred_has_capability+0x2b2/0x3f0 [ 1475.740567][T13619] should_fail+0x6fb/0x860 [ 1475.744959][T13619] ? setup_fault_attr+0x2b0/0x2b0 [ 1475.749980][T13619] ? slab_free_freelist_hook+0xd0/0x150 [ 1475.755527][T13619] ? cap_capable+0x23f/0x280 [ 1475.760102][T13619] ? proc_pid_stack+0x1d5/0x1f0 [ 1475.764933][T13619] ? proc_pid_stack+0x8e/0x1f0 [ 1475.769692][T13619] should_failslab+0x5/0x20 [ 1475.774190][T13619] kmem_cache_alloc_trace+0x39/0x270 [ 1475.779460][T13619] proc_pid_stack+0x8e/0x1f0 [ 1475.784037][T13619] proc_single_show+0xd3/0x130 [ 1475.788791][T13619] seq_read+0x4aa/0xd30 [ 1475.792931][T13619] do_iter_read+0x43b/0x550 [ 1475.797425][T13619] do_preadv+0x1f4/0x330 [ 1475.801658][T13619] ? do_writev+0x560/0x560 [ 1475.806076][T13619] ? security_file_permission+0x128/0x300 [ 1475.811772][T13619] ? __sb_end_write+0xa4/0xf0 [ 1475.816436][T13619] ? vfs_write+0x427/0x4f0 [ 1475.820836][T13619] do_syscall_64+0xcb/0x150 [ 1475.825318][T13619] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1475.831186][T13619] RIP: 0033:0x45d5b9 [ 1475.835055][T13619] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1475.854739][T13619] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1475.863217][T13619] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1475.871164][T13619] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1475.879116][T13619] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.887065][T13619] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005c [ 1475.895017][T13619] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x7fff6cdf}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:21 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xcf, 0x0) 04:43:21 executing program 2 (fault-call:12 fault-nth:28): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0xfffffffd, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x159842, 0x120) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x0, 0x0, 0x149}) r4 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0xf, r0, 0x816, 0x401}) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000200)={0x9, "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"}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(0xffffffffffffffff, &(0x7f00000016c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r3, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)={0x54, 0x0, 0xfe, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4044}, 0xc000) dup3(r1, r0, 0x0) 04:43:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, 0x0, 0x0, 0x0, 0x0) 04:43:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x3, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1476.145546][T13643] FAULT_INJECTION: forcing a failure. [ 1476.145546][T13643] name failslab, interval 1, probability 0, space 0, times 0 [ 1476.158393][T13643] CPU: 0 PID: 13643 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1476.168531][T13643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1476.178577][T13643] Call Trace: [ 1476.181883][T13643] dump_stack+0x1b0/0x21e [ 1476.186202][T13643] ? devkmsg_release+0x11c/0x11c [ 1476.192700][T13643] ? show_regs_print_info+0x12/0x12 [ 1476.197899][T13643] ? cred_has_capability+0x18c/0x3f0 [ 1476.203257][T13643] ? cred_has_capability+0x2b2/0x3f0 [ 1476.208527][T13643] should_fail+0x6fb/0x860 [ 1476.212936][T13643] ? setup_fault_attr+0x2b0/0x2b0 [ 1476.217939][T13643] ? slab_free_freelist_hook+0xd0/0x150 [ 1476.223461][T13643] ? cap_capable+0x23f/0x280 [ 1476.228030][T13643] ? proc_pid_stack+0x1d5/0x1f0 [ 1476.233296][T13643] ? proc_pid_stack+0x8e/0x1f0 [ 1476.238131][T13643] should_failslab+0x5/0x20 [ 1476.242619][T13643] kmem_cache_alloc_trace+0x39/0x270 [ 1476.247986][T13643] proc_pid_stack+0x8e/0x1f0 [ 1476.252562][T13643] proc_single_show+0xd3/0x130 [ 1476.257323][T13643] seq_read+0x4aa/0xd30 [ 1476.261646][T13643] do_iter_read+0x43b/0x550 [ 1476.266145][T13643] do_preadv+0x1f4/0x330 [ 1476.271159][T13643] ? do_writev+0x560/0x560 [ 1476.276943][T13643] ? security_file_permission+0x128/0x300 [ 1476.282770][T13643] ? __sb_end_write+0xa4/0xf0 [ 1476.287436][T13643] ? vfs_write+0x427/0x4f0 [ 1476.292364][T13643] do_syscall_64+0xcb/0x150 [ 1476.296983][T13643] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1476.302974][T13643] RIP: 0033:0x45d5b9 [ 1476.307069][T13643] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1476.327701][T13643] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1476.336215][T13643] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:21 executing program 0 (fault-call:15 fault-nth:93): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = creat(&(0x7f0000002300)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x20000}, 0xc) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r2, r0, 0x0) [ 1476.345051][T13643] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1476.353011][T13643] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1476.360969][T13643] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001c [ 1476.369024][T13643] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0xfffffffe, 0x0, 0x1, 0xb, "00000000000000000300000000000002f3ff00"}) r1 = syz_open_pts(r0, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xff, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) [ 1476.613582][T13656] FAULT_INJECTION: forcing a failure. [ 1476.613582][T13656] name failslab, interval 1, probability 0, space 0, times 0 [ 1476.626342][T13656] CPU: 1 PID: 13656 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1476.636490][T13656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1476.646716][T13656] Call Trace: [ 1476.649993][T13656] dump_stack+0x1b0/0x21e [ 1476.654308][T13656] ? devkmsg_release+0x11c/0x11c [ 1476.659225][T13656] ? show_regs_print_info+0x12/0x12 [ 1476.664422][T13656] ? cred_has_capability+0x18c/0x3f0 [ 1476.669697][T13656] ? cred_has_capability+0x2b2/0x3f0 [ 1476.674959][T13656] should_fail+0x6fb/0x860 [ 1476.679353][T13656] ? setup_fault_attr+0x2b0/0x2b0 [ 1476.684442][T13656] ? slab_free_freelist_hook+0xd0/0x150 [ 1476.689967][T13656] ? cap_capable+0x23f/0x280 [ 1476.694543][T13656] ? proc_pid_stack+0x8e/0x1f0 [ 1476.699283][T13656] should_failslab+0x5/0x20 [ 1476.703764][T13656] kmem_cache_alloc_trace+0x39/0x270 [ 1476.709027][T13656] proc_pid_stack+0x8e/0x1f0 [ 1476.713598][T13656] proc_single_show+0xd3/0x130 [ 1476.718342][T13656] seq_read+0x4aa/0xd30 [ 1476.723434][T13656] do_iter_read+0x43b/0x550 [ 1476.727915][T13656] do_preadv+0x1f4/0x330 [ 1476.732133][T13656] ? do_writev+0x560/0x560 [ 1476.737320][T13656] ? security_file_permission+0x128/0x300 [ 1476.743016][T13656] ? __sb_end_write+0xa4/0xf0 [ 1476.747672][T13656] ? vfs_write+0x427/0x4f0 [ 1476.752070][T13656] do_syscall_64+0xcb/0x150 [ 1476.756552][T13656] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1476.762436][T13656] RIP: 0033:0x45d5b9 [ 1476.766315][T13656] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1476.785907][T13656] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1476.794751][T13656] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1476.802713][T13656] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:43:21 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x300, 0x0) [ 1476.810686][T13656] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1476.818638][T13656] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005d [ 1476.826598][T13656] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:21 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x8, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) ioctl$int_out(r3, 0x5462, &(0x7f0000000280)) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, r2, 0x0, 0x0, 0x149}) r4 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0xf, r3, 0x812}) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000000)=""/1) r5 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x28800, 0x0) ioctl$BLKGETSIZE64(r5, 0x80081272, &(0x7f0000000140)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) readv(r1, &(0x7f0000000340)=[{&(0x7f0000000100)=""/51, 0x33}, {&(0x7f00000002c0)=""/66, 0x42}], 0x2) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r1, r0, 0x0) 04:43:22 executing program 2 (fault-call:12 fault-nth:29): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, 0x0, 0x0, 0x0, 0x0) 04:43:22 executing program 0 (fault-call:15 fault-nth:94): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:22 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0xe0, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1477.074372][T13687] FAULT_INJECTION: forcing a failure. [ 1477.074372][T13687] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.087084][T13687] CPU: 1 PID: 13687 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1477.097231][T13687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1477.107278][T13687] Call Trace: [ 1477.110560][T13687] dump_stack+0x1b0/0x21e [ 1477.114878][T13687] ? devkmsg_release+0x11c/0x11c [ 1477.119812][T13687] ? show_regs_print_info+0x12/0x12 [ 1477.124996][T13687] ? should_fail+0x3b3/0x860 [ 1477.129571][T13687] should_fail+0x6fb/0x860 [ 1477.136348][T13687] ? setup_fault_attr+0x2b0/0x2b0 [ 1477.141353][T13687] ? slab_free_freelist_hook+0xd0/0x150 [ 1477.146883][T13687] ? cap_capable+0x23f/0x280 [ 1477.151456][T13687] ? proc_pid_stack+0x1d5/0x1f0 [ 1477.156273][T13687] ? proc_pid_stack+0x8e/0x1f0 [ 1477.161002][T13687] should_failslab+0x5/0x20 [ 1477.165473][T13687] kmem_cache_alloc_trace+0x39/0x270 [ 1477.170739][T13687] proc_pid_stack+0x8e/0x1f0 [ 1477.175318][T13687] proc_single_show+0xd3/0x130 [ 1477.179559][T13678] FAULT_INJECTION: forcing a failure. [ 1477.179559][T13678] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.180066][T13687] seq_read+0x4aa/0xd30 [ 1477.180079][T13687] do_iter_read+0x43b/0x550 [ 1477.180095][T13687] do_preadv+0x1f4/0x330 [ 1477.205674][T13687] ? do_writev+0x560/0x560 [ 1477.210075][T13687] ? security_file_permission+0x128/0x300 [ 1477.215901][T13687] ? __sb_end_write+0xa4/0xf0 [ 1477.220560][T13687] ? vfs_write+0x427/0x4f0 [ 1477.224962][T13687] do_syscall_64+0xcb/0x150 [ 1477.229446][T13687] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1477.235317][T13687] RIP: 0033:0x45d5b9 [ 1477.239191][T13687] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1477.259042][T13687] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1477.267461][T13687] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1477.275415][T13687] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1477.283366][T13687] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1477.291336][T13687] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001d [ 1477.299290][T13687] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1477.307267][T13678] CPU: 0 PID: 13678 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1477.317407][T13678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1477.327452][T13678] Call Trace: [ 1477.330731][T13678] dump_stack+0x1b0/0x21e [ 1477.335050][T13678] ? devkmsg_release+0x11c/0x11c [ 1477.339974][T13678] ? show_regs_print_info+0x12/0x12 [ 1477.345156][T13678] ? cred_has_capability+0x18c/0x3f0 [ 1477.350416][T13678] ? cred_has_capability+0x2b2/0x3f0 [ 1477.355805][T13678] should_fail+0x6fb/0x860 [ 1477.360191][T13678] ? setup_fault_attr+0x2b0/0x2b0 [ 1477.365278][T13678] ? slab_free_freelist_hook+0xd0/0x150 [ 1477.370809][T13678] ? cap_capable+0x23f/0x280 [ 1477.375369][T13678] ? proc_pid_stack+0x1d5/0x1f0 [ 1477.380190][T13678] ? proc_pid_stack+0x8e/0x1f0 [ 1477.384924][T13678] should_failslab+0x5/0x20 [ 1477.389396][T13678] kmem_cache_alloc_trace+0x39/0x270 [ 1477.394648][T13678] proc_pid_stack+0x8e/0x1f0 [ 1477.399205][T13678] proc_single_show+0xd3/0x130 [ 1477.403939][T13678] seq_read+0x4aa/0xd30 [ 1477.408850][T13678] do_iter_read+0x43b/0x550 [ 1477.413333][T13678] do_preadv+0x1f4/0x330 [ 1477.417557][T13678] ? do_writev+0x560/0x560 [ 1477.421958][T13678] ? security_file_permission+0x128/0x300 [ 1477.427655][T13678] ? __sb_end_write+0xa4/0xf0 [ 1477.432305][T13678] ? vfs_write+0x427/0x4f0 [ 1477.436705][T13678] do_syscall_64+0xcb/0x150 [ 1477.441700][T13678] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1477.447581][T13678] RIP: 0033:0x45d5b9 [ 1477.451463][T13678] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1477.471046][T13678] RSP: 002b:00007f63a8839c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1477.479441][T13678] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1477.487401][T13678] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1477.495344][T13678] RBP: 00007f63a8839ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1477.503286][T13678] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005e [ 1477.511239][T13678] R13: 00007ffebb13841f R14: 00007f63a883a9c0 R15: 000000000118cf4c 04:43:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) r1 = gettid() tkill(r1, 0x3c) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000140)=r1) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000040)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x141000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x8) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f00000004c0)={0x9, "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"}) sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36cfe9537217829ae3c72a476a4c0665b17110"}) syz_open_dev$tty20(0xc, 0x4, 0x0) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/55, 0x37}], 0x1) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "fca8ac7f6a4d33b29441632eeab7af20268259"}) dup3(r2, r0, 0x0) 04:43:22 executing program 0 (fault-call:15 fault-nth:95): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:22 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x500, 0x0) 04:43:22 executing program 2 (fault-call:12 fault-nth:30): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:22 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d700accc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:22 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x131, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1477.872368][T13713] FAULT_INJECTION: forcing a failure. [ 1477.872368][T13713] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.885351][T13713] CPU: 1 PID: 13713 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1477.887065][T13715] FAULT_INJECTION: forcing a failure. [ 1477.887065][T13715] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.895490][T13713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1477.895494][T13713] Call Trace: [ 1477.895507][T13713] dump_stack+0x1b0/0x21e [ 1477.895520][T13713] ? devkmsg_release+0x11c/0x11c [ 1477.930554][T13713] ? show_regs_print_info+0x12/0x12 [ 1477.935730][T13713] ? cred_has_capability+0x18c/0x3f0 [ 1477.940992][T13713] ? cred_has_capability+0x2b2/0x3f0 [ 1477.946254][T13713] should_fail+0x6fb/0x860 [ 1477.950650][T13713] ? setup_fault_attr+0x2b0/0x2b0 [ 1477.955665][T13713] ? slab_free_freelist_hook+0xd0/0x150 [ 1477.961186][T13713] ? cap_capable+0x23f/0x280 [ 1477.965753][T13713] ? proc_pid_stack+0x1d5/0x1f0 [ 1477.970595][T13713] ? proc_pid_stack+0x8e/0x1f0 [ 1477.975337][T13713] should_failslab+0x5/0x20 [ 1477.979834][T13713] kmem_cache_alloc_trace+0x39/0x270 [ 1477.985098][T13713] proc_pid_stack+0x8e/0x1f0 [ 1477.989666][T13713] proc_single_show+0xd3/0x130 [ 1477.994409][T13713] seq_read+0x4aa/0xd30 [ 1477.998552][T13713] do_iter_read+0x43b/0x550 [ 1478.003032][T13713] do_preadv+0x1f4/0x330 [ 1478.007252][T13713] ? do_writev+0x560/0x560 [ 1478.011650][T13713] ? security_file_permission+0x128/0x300 [ 1478.017348][T13713] ? __sb_end_write+0xa4/0xf0 [ 1478.022115][T13713] ? vfs_write+0x427/0x4f0 [ 1478.026515][T13713] do_syscall_64+0xcb/0x150 [ 1478.031000][T13713] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1478.036870][T13713] RIP: 0033:0x45d5b9 [ 1478.040743][T13713] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1478.060325][T13713] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1478.068803][T13713] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1478.076768][T13713] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1478.084720][T13713] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1478.092679][T13713] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000005f [ 1478.100630][T13713] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1478.108678][T13715] CPU: 0 PID: 13715 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1478.118813][T13715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1478.128865][T13715] Call Trace: [ 1478.132156][T13715] dump_stack+0x1b0/0x21e [ 1478.136464][T13715] ? devkmsg_release+0x11c/0x11c [ 1478.141413][T13715] ? show_regs_print_info+0x12/0x12 [ 1478.146606][T13715] ? cred_has_capability+0x18c/0x3f0 [ 1478.151874][T13715] ? cred_has_capability+0x2b2/0x3f0 [ 1478.157133][T13715] should_fail+0x6fb/0x860 [ 1478.161540][T13715] ? setup_fault_attr+0x2b0/0x2b0 [ 1478.166541][T13715] ? slab_free_freelist_hook+0xd0/0x150 [ 1478.172061][T13715] ? cap_capable+0x23f/0x280 [ 1478.176622][T13715] ? proc_pid_stack+0x1d5/0x1f0 [ 1478.181445][T13715] ? proc_pid_stack+0x8e/0x1f0 [ 1478.186185][T13715] should_failslab+0x5/0x20 [ 1478.190664][T13715] kmem_cache_alloc_trace+0x39/0x270 [ 1478.195939][T13715] proc_pid_stack+0x8e/0x1f0 [ 1478.200532][T13715] proc_single_show+0xd3/0x130 [ 1478.205274][T13715] seq_read+0x4aa/0xd30 [ 1478.209409][T13715] do_iter_read+0x43b/0x550 [ 1478.213891][T13715] do_preadv+0x1f4/0x330 [ 1478.218120][T13715] ? do_writev+0x560/0x560 [ 1478.222513][T13715] ? security_file_permission+0x128/0x300 [ 1478.228219][T13715] ? __sb_end_write+0xa4/0xf0 [ 1478.232875][T13715] ? vfs_write+0x427/0x4f0 [ 1478.237286][T13715] do_syscall_64+0xcb/0x150 [ 1478.241765][T13715] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1478.247635][T13715] RIP: 0033:0x45d5b9 [ 1478.251505][T13715] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:43:23 executing program 5 (fault-call:13 fault-nth:0): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1478.271099][T13715] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1478.279487][T13715] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1478.287434][T13715] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1478.295383][T13715] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1478.303513][T13715] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001e [ 1478.311468][T13715] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:23 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x132, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:23 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x600, 0x0) 04:43:23 executing program 2 (fault-call:12 fault-nth:31): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:23 executing program 0 (fault-call:15 fault-nth:96): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1478.680270][T13744] FAULT_INJECTION: forcing a failure. [ 1478.680270][T13744] name failslab, interval 1, probability 0, space 0, times 0 [ 1478.680322][T13743] FAULT_INJECTION: forcing a failure. [ 1478.680322][T13743] name failslab, interval 1, probability 0, space 0, times 0 [ 1478.692940][T13744] CPU: 1 PID: 13744 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1478.715624][T13744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1478.725657][T13744] Call Trace: [ 1478.728938][T13744] dump_stack+0x1b0/0x21e [ 1478.733447][T13744] ? devkmsg_release+0x11c/0x11c [ 1478.738404][T13744] ? show_regs_print_info+0x12/0x12 [ 1478.743645][T13744] ? cred_has_capability+0x18c/0x3f0 [ 1478.748923][T13744] ? cred_has_capability+0x2b2/0x3f0 [ 1478.754203][T13744] should_fail+0x6fb/0x860 [ 1478.758730][T13744] ? setup_fault_attr+0x2b0/0x2b0 [ 1478.763737][T13744] ? slab_free_freelist_hook+0xd0/0x150 [ 1478.769311][T13744] ? cap_capable+0x23f/0x280 [ 1478.774078][T13744] ? proc_pid_stack+0x1d5/0x1f0 [ 1478.778913][T13744] ? proc_pid_stack+0x8e/0x1f0 [ 1478.783917][T13744] should_failslab+0x5/0x20 [ 1478.788416][T13744] kmem_cache_alloc_trace+0x39/0x270 [ 1478.793708][T13744] proc_pid_stack+0x8e/0x1f0 [ 1478.798288][T13744] proc_single_show+0xd3/0x130 [ 1478.803032][T13744] seq_read+0x4aa/0xd30 [ 1478.807186][T13744] do_iter_read+0x43b/0x550 [ 1478.811767][T13744] do_preadv+0x1f4/0x330 [ 1478.816002][T13744] ? do_writev+0x560/0x560 [ 1478.820498][T13744] ? security_file_permission+0x128/0x300 [ 1478.826206][T13744] ? __sb_end_write+0xa4/0xf0 [ 1478.830874][T13744] ? vfs_write+0x427/0x4f0 [ 1478.835285][T13744] do_syscall_64+0xcb/0x150 [ 1478.839774][T13744] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1478.845862][T13744] RIP: 0033:0x45d5b9 [ 1478.849741][T13744] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1478.870110][T13744] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1478.878874][T13744] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1478.886932][T13744] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1478.894991][T13744] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1478.902955][T13744] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000001f [ 1478.911008][T13744] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1478.919888][T13743] CPU: 0 PID: 13743 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1478.930045][T13743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1478.941575][T13743] Call Trace: [ 1478.945377][T13743] dump_stack+0x1b0/0x21e [ 1478.949701][T13743] ? devkmsg_release+0x11c/0x11c [ 1478.954618][T13743] ? show_regs_print_info+0x12/0x12 [ 1478.959983][T13743] ? cred_has_capability+0x18c/0x3f0 [ 1478.965516][T13743] ? cred_has_capability+0x2b2/0x3f0 [ 1478.970786][T13743] should_fail+0x6fb/0x860 [ 1478.975358][T13743] ? setup_fault_attr+0x2b0/0x2b0 [ 1478.980375][T13743] ? slab_free_freelist_hook+0xd0/0x150 [ 1478.986355][T13743] ? cap_capable+0x23f/0x280 [ 1478.990947][T13743] ? proc_pid_stack+0x1d5/0x1f0 [ 1478.995795][T13743] ? proc_pid_stack+0x8e/0x1f0 [ 1479.000564][T13743] should_failslab+0x5/0x20 [ 1479.005237][T13743] kmem_cache_alloc_trace+0x39/0x270 [ 1479.010502][T13743] proc_pid_stack+0x8e/0x1f0 [ 1479.016025][T13743] proc_single_show+0xd3/0x130 [ 1479.020792][T13743] seq_read+0x4aa/0xd30 [ 1479.024933][T13743] do_iter_read+0x43b/0x550 [ 1479.029446][T13743] do_preadv+0x1f4/0x330 [ 1479.033679][T13743] ? do_writev+0x560/0x560 [ 1479.039048][T13743] ? security_file_permission+0x128/0x300 [ 1479.045728][T13743] ? __sb_end_write+0xa4/0xf0 [ 1479.050405][T13743] ? vfs_write+0x427/0x4f0 [ 1479.054826][T13743] do_syscall_64+0xcb/0x150 [ 1479.059316][T13743] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1479.065188][T13743] RIP: 0033:0x45d5b9 [ 1479.069061][T13743] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1479.088649][T13743] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1479.098269][T13743] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1479.106683][T13743] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1479.114647][T13743] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1479.122712][T13743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000060 [ 1479.130808][T13743] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c 04:43:24 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x700, 0x0) 04:43:24 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0xffe0, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:24 executing program 0 (fault-call:15 fault-nth:97): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:24 executing program 2 (fault-call:12 fault-nth:32): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:24 executing program 3 (fault-call:5 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) [ 1479.516360][T13772] FAULT_INJECTION: forcing a failure. [ 1479.516360][T13772] name failslab, interval 1, probability 0, space 0, times 0 [ 1479.529029][T13772] CPU: 0 PID: 13772 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1479.539394][T13772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1479.549435][T13772] Call Trace: [ 1479.552713][T13772] dump_stack+0x1b0/0x21e [ 1479.557027][T13772] ? devkmsg_release+0x11c/0x11c [ 1479.561942][T13772] ? show_regs_print_info+0x12/0x12 [ 1479.567123][T13772] ? cred_has_capability+0x18c/0x3f0 [ 1479.572407][T13772] ? cred_has_capability+0x2b2/0x3f0 [ 1479.577188][T13776] FAULT_INJECTION: forcing a failure. [ 1479.577188][T13776] name failslab, interval 1, probability 0, space 0, times 0 [ 1479.577673][T13772] should_fail+0x6fb/0x860 [ 1479.577686][T13772] ? setup_fault_attr+0x2b0/0x2b0 [ 1479.599653][T13772] ? slab_free_freelist_hook+0xd0/0x150 [ 1479.606135][T13772] ? cap_capable+0x23f/0x280 [ 1479.610704][T13772] ? proc_pid_stack+0x1d5/0x1f0 [ 1479.615547][T13772] ? proc_pid_stack+0x8e/0x1f0 [ 1479.620310][T13772] should_failslab+0x5/0x20 [ 1479.624794][T13772] kmem_cache_alloc_trace+0x39/0x270 [ 1479.630077][T13772] proc_pid_stack+0x8e/0x1f0 [ 1479.634644][T13772] proc_single_show+0xd3/0x130 [ 1479.639389][T13772] seq_read+0x4aa/0xd30 [ 1479.643526][T13772] do_iter_read+0x43b/0x550 [ 1479.648008][T13772] do_preadv+0x1f4/0x330 [ 1479.652240][T13772] ? do_writev+0x560/0x560 [ 1479.656643][T13772] ? security_file_permission+0x128/0x300 [ 1479.662356][T13772] ? __sb_end_write+0xa4/0xf0 [ 1479.667016][T13772] ? vfs_write+0x427/0x4f0 [ 1479.671416][T13772] do_syscall_64+0xcb/0x150 [ 1479.675906][T13772] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1479.681783][T13772] RIP: 0033:0x45d5b9 [ 1479.686005][T13772] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1479.706147][T13772] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1479.714545][T13772] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1479.722508][T13772] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1479.730927][T13772] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1479.738894][T13772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000061 [ 1479.746870][T13772] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1479.754936][T13776] CPU: 1 PID: 13776 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1479.765084][T13776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1479.775239][T13776] Call Trace: [ 1479.778526][T13776] dump_stack+0x1b0/0x21e [ 1479.782834][T13776] ? devkmsg_release+0x11c/0x11c [ 1479.787748][T13776] ? show_regs_print_info+0x12/0x12 [ 1479.792923][T13776] ? cred_has_capability+0x18c/0x3f0 [ 1479.798198][T13776] ? cred_has_capability+0x2b2/0x3f0 [ 1479.804505][T13776] should_fail+0x6fb/0x860 [ 1479.808899][T13776] ? setup_fault_attr+0x2b0/0x2b0 [ 1479.813909][T13776] ? slab_free_freelist_hook+0xd0/0x150 [ 1479.820841][T13776] ? cap_capable+0x23f/0x280 [ 1479.825408][T13776] ? proc_pid_stack+0x1d5/0x1f0 [ 1479.830236][T13776] ? proc_pid_stack+0x8e/0x1f0 [ 1479.834997][T13776] should_failslab+0x5/0x20 [ 1479.839479][T13776] kmem_cache_alloc_trace+0x39/0x270 [ 1479.844747][T13776] proc_pid_stack+0x8e/0x1f0 [ 1479.849762][T13776] proc_single_show+0xd3/0x130 [ 1479.854509][T13776] seq_read+0x4aa/0xd30 [ 1479.858747][T13776] do_iter_read+0x43b/0x550 [ 1479.863241][T13776] do_preadv+0x1f4/0x330 [ 1479.867505][T13776] ? do_writev+0x560/0x560 [ 1479.871998][T13776] ? security_file_permission+0x128/0x300 [ 1479.877693][T13776] ? __sb_end_write+0xa4/0xf0 [ 1479.882368][T13776] ? vfs_write+0x427/0x4f0 [ 1479.886779][T13776] do_syscall_64+0xcb/0x150 [ 1479.891261][T13776] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1479.897142][T13776] RIP: 0033:0x45d5b9 [ 1479.901015][T13776] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1479.921567][T13776] RSP: 002b:00007f4cee122c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1479.929956][T13776] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1479.937902][T13776] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1479.945867][T13776] RBP: 00007f4cee122ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1479.953921][T13776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000020 04:43:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0xffffffe0, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1479.961880][T13776] R13: 00007ffd8dcf940f R14: 00007f4cee1239c0 R15: 000000000118d12c 04:43:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x4) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:25 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x900, 0x0) 04:43:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0xffffffffffffffe0, 0x0, 0x0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:25 executing program 2 (fault-call:12 fault-nth:33): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:25 executing program 0 (fault-call:15 fault-nth:98): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x2, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x2000028e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) [ 1480.348472][T13810] FAULT_INJECTION: forcing a failure. [ 1480.348472][T13810] name failslab, interval 1, probability 0, space 0, times 0 [ 1480.361927][T13810] CPU: 1 PID: 13810 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1480.372074][T13810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1480.382928][T13810] Call Trace: [ 1480.386275][T13810] dump_stack+0x1b0/0x21e [ 1480.390612][T13810] ? devkmsg_release+0x11c/0x11c [ 1480.395675][T13810] ? show_regs_print_info+0x12/0x12 [ 1480.400903][T13810] ? cred_has_capability+0x18c/0x3f0 [ 1480.406202][T13810] ? cred_has_capability+0x2b2/0x3f0 [ 1480.411501][T13810] should_fail+0x6fb/0x860 [ 1480.415911][T13810] ? setup_fault_attr+0x2b0/0x2b0 [ 1480.420928][T13810] ? slab_free_freelist_hook+0xd0/0x150 [ 1480.426482][T13810] ? cap_capable+0x23f/0x280 [ 1480.431092][T13810] ? proc_pid_stack+0x1d5/0x1f0 [ 1480.436012][T13810] ? proc_pid_stack+0x8e/0x1f0 [ 1480.441070][T13810] should_failslab+0x5/0x20 [ 1480.445934][T13810] kmem_cache_alloc_trace+0x39/0x270 [ 1480.450882][T13801] FAULT_INJECTION: forcing a failure. [ 1480.450882][T13801] name failslab, interval 1, probability 0, space 0, times 0 [ 1480.451314][T13810] proc_pid_stack+0x8e/0x1f0 [ 1480.468805][T13810] proc_single_show+0xd3/0x130 [ 1480.473559][T13810] seq_read+0x4aa/0xd30 [ 1480.477707][T13810] do_iter_read+0x43b/0x550 [ 1480.482187][T13810] do_preadv+0x1f4/0x330 [ 1480.486411][T13810] ? do_writev+0x560/0x560 [ 1480.490818][T13810] ? security_file_permission+0x128/0x300 [ 1480.497043][T13810] ? __sb_end_write+0xa4/0xf0 [ 1480.501702][T13810] ? vfs_write+0x427/0x4f0 [ 1480.506803][T13810] do_syscall_64+0xcb/0x150 [ 1480.511294][T13810] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1480.517335][T13810] RIP: 0033:0x45d5b9 [ 1480.521646][T13810] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1480.541341][T13810] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1480.549742][T13810] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1480.557698][T13810] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1480.567503][T13810] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1480.575481][T13810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000021 [ 1480.583619][T13810] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1480.591767][T13801] CPU: 0 PID: 13801 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1480.602022][T13801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1480.612068][T13801] Call Trace: [ 1480.615350][T13801] dump_stack+0x1b0/0x21e [ 1480.619676][T13801] ? devkmsg_release+0x11c/0x11c [ 1480.624602][T13801] ? show_regs_print_info+0x12/0x12 [ 1480.629789][T13801] ? cred_has_capability+0x18c/0x3f0 [ 1480.635056][T13801] ? cred_has_capability+0x2b2/0x3f0 [ 1480.640325][T13801] should_fail+0x6fb/0x860 [ 1480.644730][T13801] ? setup_fault_attr+0x2b0/0x2b0 [ 1480.649739][T13801] ? slab_free_freelist_hook+0xd0/0x150 [ 1480.655276][T13801] ? cap_capable+0x23f/0x280 [ 1480.659853][T13801] ? proc_pid_stack+0x1d5/0x1f0 [ 1480.664690][T13801] ? proc_pid_stack+0x8e/0x1f0 [ 1480.669442][T13801] should_failslab+0x5/0x20 [ 1480.673934][T13801] kmem_cache_alloc_trace+0x39/0x270 [ 1480.679211][T13801] proc_pid_stack+0x8e/0x1f0 [ 1480.683801][T13801] proc_single_show+0xd3/0x130 [ 1480.688563][T13801] seq_read+0x4aa/0xd30 [ 1480.693061][T13801] do_iter_read+0x43b/0x550 [ 1480.697727][T13801] do_preadv+0x1f4/0x330 [ 1480.701955][T13801] ? do_writev+0x560/0x560 [ 1480.706359][T13801] ? security_file_permission+0x128/0x300 [ 1480.712060][T13801] ? __sb_end_write+0xa4/0xf0 [ 1480.716724][T13801] ? vfs_write+0x427/0x4f0 [ 1480.721131][T13801] do_syscall_64+0xcb/0x150 [ 1480.725625][T13801] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1480.731512][T13801] RIP: 0033:0x45d5b9 04:43:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x7ffff000) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:25 executing program 2 (fault-call:12 fault-nth:34): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1480.735411][T13801] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1480.755001][T13801] RSP: 002b:00007f63a8839c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1480.763404][T13801] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1480.771367][T13801] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1480.779326][T13801] RBP: 00007f63a8839ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1480.787510][T13801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000062 04:43:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:25 executing program 0 (fault-call:15 fault-nth:99): pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TIOCL_GETKMSGREDIRECT(r1, 0x541c, &(0x7f0000000040)) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) fcntl$dupfd(r2, 0x0, r0) read$hidraw(r1, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/llc/core\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x1c, r5, 0x11, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r5, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c800}, 0x4) [ 1480.795459][T13801] R13: 00007ffebb13841f R14: 00007f63a883a9c0 R15: 000000000118cf4c 04:43:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000004c0)=ANY=[@ANYBLOB="1201000200000010580413500000000000010902240001000000000904000049030000000921000ca40122dc0109058103"], 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7201a960632ed46b0fde8aad6bba45825a570e80e9649fced16db574dd5a49d314", @ANYRES64], 0x58}}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io(r1, &(0x7f0000000140)={0x2c, &(0x7f0000000000)=ANY=[@ANYBLOB="0010017bb656080000"], 0x0, 0x0, 0x0, 0x0}, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x4, 0x0, 0x0, 0xb, 0x40, "00bf00"}) r2 = syz_open_pts(r0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) read$hidraw(r3, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffffffff, 0x0, "36c7e95300000000e2caa77ab1711000"}) [ 1480.891431][T13837] FAULT_INJECTION: forcing a failure. [ 1480.891431][T13837] name failslab, interval 1, probability 0, space 0, times 0 [ 1480.904114][T13837] CPU: 0 PID: 13837 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1480.914251][T13837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1480.924282][T13837] Call Trace: [ 1480.927557][T13837] dump_stack+0x1b0/0x21e [ 1480.931877][T13837] ? devkmsg_release+0x11c/0x11c [ 1480.936804][T13837] ? show_regs_print_info+0x12/0x12 [ 1480.941987][T13837] ? cred_has_capability+0x18c/0x3f0 [ 1480.947251][T13837] ? cred_has_capability+0x2b2/0x3f0 [ 1480.952860][T13837] should_fail+0x6fb/0x860 [ 1480.957252][T13837] ? setup_fault_attr+0x2b0/0x2b0 [ 1480.962253][T13837] ? slab_free_freelist_hook+0xd0/0x150 [ 1480.967776][T13837] ? cap_capable+0x23f/0x280 [ 1480.972357][T13837] ? proc_pid_stack+0x1d5/0x1f0 [ 1480.977197][T13837] ? proc_pid_stack+0x8e/0x1f0 [ 1480.981935][T13837] should_failslab+0x5/0x20 [ 1480.986414][T13837] kmem_cache_alloc_trace+0x39/0x270 [ 1480.991689][T13837] proc_pid_stack+0x8e/0x1f0 [ 1480.996255][T13837] proc_single_show+0xd3/0x130 [ 1481.000994][T13837] seq_read+0x4aa/0xd30 [ 1481.005129][T13837] do_iter_read+0x43b/0x550 [ 1481.009619][T13837] do_preadv+0x1f4/0x330 [ 1481.013838][T13837] ? do_writev+0x560/0x560 [ 1481.018231][T13837] ? security_file_permission+0x128/0x300 [ 1481.023926][T13837] ? __sb_end_write+0xa4/0xf0 [ 1481.028577][T13837] ? vfs_write+0x427/0x4f0 [ 1481.032971][T13837] do_syscall_64+0xcb/0x150 [ 1481.037450][T13837] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1481.043316][T13837] RIP: 0033:0x45d5b9 [ 1481.047186][T13837] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1481.066777][T13837] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1481.075161][T13837] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1481.083104][T13837] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1481.091050][T13837] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1481.098994][T13837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000022 [ 1481.106940][T13837] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1481.147724][T13840] FAULT_INJECTION: forcing a failure. [ 1481.147724][T13840] name failslab, interval 1, probability 0, space 0, times 0 [ 1481.160708][T13840] CPU: 0 PID: 13840 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1481.170850][T13840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1481.180882][T13840] Call Trace: [ 1481.184154][T13840] dump_stack+0x1b0/0x21e [ 1481.188476][T13840] ? devkmsg_release+0x11c/0x11c [ 1481.193386][T13840] ? show_regs_print_info+0x12/0x12 [ 1481.198556][T13840] ? cred_has_capability+0x18c/0x3f0 [ 1481.203812][T13840] ? cred_has_capability+0x2b2/0x3f0 [ 1481.209068][T13840] should_fail+0x6fb/0x860 [ 1481.213459][T13840] ? setup_fault_attr+0x2b0/0x2b0 [ 1481.218459][T13840] ? slab_free_freelist_hook+0xd0/0x150 [ 1481.223980][T13840] ? cap_capable+0x23f/0x280 [ 1481.228546][T13840] ? proc_pid_stack+0x1d5/0x1f0 [ 1481.233376][T13840] ? proc_pid_stack+0x8e/0x1f0 [ 1481.238110][T13840] should_failslab+0x5/0x20 [ 1481.242601][T13840] kmem_cache_alloc_trace+0x39/0x270 [ 1481.247863][T13840] proc_pid_stack+0x8e/0x1f0 [ 1481.252425][T13840] proc_single_show+0xd3/0x130 [ 1481.257162][T13840] seq_read+0x4aa/0xd30 [ 1481.261293][T13840] do_iter_read+0x43b/0x550 [ 1481.265768][T13840] do_preadv+0x1f4/0x330 [ 1481.269999][T13840] ? do_writev+0x560/0x560 [ 1481.274388][T13840] ? __schedule+0x8ae/0xe30 [ 1481.278869][T13840] do_syscall_64+0xcb/0x150 [ 1481.283348][T13840] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1481.289229][T13840] RIP: 0033:0x45d5b9 [ 1481.293107][T13840] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1481.312690][T13840] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1481.321076][T13840] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1481.329025][T13840] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1481.336973][T13840] RBP: 00007f63a87f7ca0 R08: 0000000000000000 R09: 0000000000000000 04:43:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x3, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:26 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xa00, 0x0) [ 1481.344930][T13840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000063 [ 1481.352877][T13840] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1481.429983][ T5] usb 4-1: new high-speed USB device number 31 using dummy_hcd 04:43:26 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x4, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:26 executing program 2 (fault-call:12 fault-nth:35): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_icmp(0xa, 0x2, 0x3a) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x10040, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write(r1, &(0x7f00000002c0)="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", 0x1000) fcntl$setpipe(r4, 0x407, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x55, 0x3f, 0x2, @empty, @local, 0x700, 0x7800, 0x9, 0x5}}) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000), 0x0, 0x6) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r5, &(0x7f0000000140), 0x0, 0xfffffffe, 0x0) 04:43:26 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x5, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1481.690010][ T5] usb 4-1: Using ep0 maxpacket: 16 [ 1481.697724][T13869] FAULT_INJECTION: forcing a failure. [ 1481.697724][T13869] name failslab, interval 1, probability 0, space 0, times 0 [ 1481.710356][T13869] CPU: 0 PID: 13869 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1481.720502][T13869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1481.730544][T13869] Call Trace: [ 1481.733841][T13869] dump_stack+0x1b0/0x21e [ 1481.738179][T13869] ? devkmsg_release+0x11c/0x11c [ 1481.743108][T13869] ? show_regs_print_info+0x12/0x12 [ 1481.748300][T13869] ? cred_has_capability+0x18c/0x3f0 [ 1481.753565][T13869] ? cred_has_capability+0x2b2/0x3f0 [ 1481.758838][T13869] should_fail+0x6fb/0x860 [ 1481.763244][T13869] ? setup_fault_attr+0x2b0/0x2b0 [ 1481.768264][T13869] ? slab_free_freelist_hook+0xd0/0x150 [ 1481.773806][T13869] ? cap_capable+0x23f/0x280 [ 1481.778396][T13869] ? proc_pid_stack+0x1d5/0x1f0 [ 1481.783242][T13869] ? proc_pid_stack+0x8e/0x1f0 [ 1481.787995][T13869] should_failslab+0x5/0x20 [ 1481.792486][T13869] kmem_cache_alloc_trace+0x39/0x270 [ 1481.797764][T13869] proc_pid_stack+0x8e/0x1f0 [ 1481.802366][T13869] proc_single_show+0xd3/0x130 [ 1481.807131][T13869] seq_read+0x4aa/0xd30 [ 1481.811286][T13869] do_iter_read+0x43b/0x550 [ 1481.815770][T13869] do_preadv+0x1f4/0x330 [ 1481.819987][T13869] ? do_writev+0x560/0x560 [ 1481.824382][T13869] ? security_file_permission+0x128/0x300 [ 1481.830070][T13869] ? __sb_end_write+0xa4/0xf0 [ 1481.834721][T13869] ? vfs_write+0x427/0x4f0 [ 1481.839142][T13869] do_syscall_64+0xcb/0x150 [ 1481.843672][T13869] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1481.849579][T13869] RIP: 0033:0x45d5b9 [ 1481.853453][T13869] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1481.873058][T13869] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1481.881456][T13869] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:26 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x8, 0x0, 0x0) [ 1481.889428][T13869] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1481.897391][T13869] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1481.905350][T13869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000023 [ 1481.913309][T13869] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x6, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:27 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x7, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1482.040108][ T5] usb 4-1: too many endpoints for config 0 interface 0 altsetting 0: 73, using maximum allowed: 30 [ 1482.051198][ T5] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1482.062155][ T5] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1482.072003][ T5] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 73 [ 1482.090104][ T5] usb 4-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 1482.105093][ T5] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1482.116254][ T5] usb 4-1: config 0 descriptor?? [ 1482.879948][ T5] usbhid 4-1:0.0: can't add hid device: -71 [ 1482.885897][ T5] usbhid: probe of 4-1:0.0 failed with error -71 [ 1482.893534][ T5] usb 4-1: USB disconnect, device number 31 [ 1483.589901][ T5] usb 4-1: new high-speed USB device number 32 using dummy_hcd [ 1483.829941][ T5] usb 4-1: Using ep0 maxpacket: 16 [ 1483.950001][ T5] usb 4-1: too many endpoints for config 0 interface 0 altsetting 0: 73, using maximum allowed: 30 [ 1483.960873][ T5] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1483.971735][ T5] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1483.981584][ T5] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 73 [ 1483.994925][ T5] usb 4-1: New USB device found, idVendor=0458, idProduct=5013, bcdDevice= 0.00 [ 1484.004005][ T5] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1484.012776][ T5] usb 4-1: config 0 descriptor?? 04:43:29 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x2, 0x0) 04:43:29 executing program 2 (fault-call:12 fault-nth:36): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x8, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:29 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xb00, 0x0) 04:43:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x5, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) finit_module(r1, &(0x7f0000000080)='stack\x00', 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x2, 0x1daf, 0x2, 0x9, 0x10000000000000, 0x20000009, 0x80000000, 0x100000}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="29000000040000000000000000000000060000000000000000000000000000000100000000000000004633ed99b9774941a9f84dc63030f8e8a43e64ed67340ecd8f982a9693c9c978cf5421faa3ef23a2b45bcf63f838e25dbb6abadc0050f8abb44555e9c4d4fb34526ea2b29022525ea71f143f030dfb1ccaf598140415f7ae2f2f432f4f734b49ae72f0904a81b95947dcfaf6f8c31db7f1090d69ffb2e43bf3621583a517008ce357cbbdb2e1c5e7f59596c8ee2e96d2ef1d7380c46585f986c3e700"/209], 0x29) 04:43:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x6aeae31a584d9ee3, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x11}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) read$hidraw(r1, &(0x7f0000000200)=""/142, 0x8e) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x1041, 0x0) fallocate(r3, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x149}) r4 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0xf, r3, 0x812}) getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x30) r5 = socket(0x11, 0x3, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r5, &(0x7f00000016c0)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000040)={'vxcan0\x00', r7}) creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000140)={0x0, 0x80000, 0x0, 0x0, 0x0, "38c7e98bf0000000e2caa77ab1731200"}) 04:43:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xa, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1484.209964][ T5] usbhid 4-1:0.0: can't add hid device: -71 [ 1484.227179][ T5] usbhid: probe of 4-1:0.0 failed with error -71 [ 1484.248457][T13928] FAULT_INJECTION: forcing a failure. [ 1484.248457][T13928] name failslab, interval 1, probability 0, space 0, times 0 [ 1484.261084][T13928] CPU: 0 PID: 13928 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1484.271243][T13928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1484.281310][T13928] Call Trace: [ 1484.284607][T13928] dump_stack+0x1b0/0x21e [ 1484.288930][T13928] ? devkmsg_release+0x11c/0x11c [ 1484.293858][T13928] ? show_regs_print_info+0x12/0x12 [ 1484.299742][T13928] ? cred_has_capability+0x18c/0x3f0 [ 1484.305018][T13928] ? cred_has_capability+0x2b2/0x3f0 [ 1484.310293][T13928] should_fail+0x6fb/0x860 [ 1484.314700][T13928] ? setup_fault_attr+0x2b0/0x2b0 [ 1484.319714][T13928] ? slab_free_freelist_hook+0xd0/0x150 [ 1484.325252][T13928] ? cap_capable+0x23f/0x280 [ 1484.329831][T13928] ? proc_pid_stack+0x1d5/0x1f0 [ 1484.334667][T13928] ? proc_pid_stack+0x8e/0x1f0 [ 1484.339423][T13928] should_failslab+0x5/0x20 [ 1484.343920][T13928] kmem_cache_alloc_trace+0x39/0x270 [ 1484.349218][T13928] proc_pid_stack+0x8e/0x1f0 [ 1484.353798][T13928] proc_single_show+0xd3/0x130 [ 1484.358554][T13928] seq_read+0x4aa/0xd30 [ 1484.362710][T13928] do_iter_read+0x43b/0x550 [ 1484.367210][T13928] do_preadv+0x1f4/0x330 [ 1484.371442][T13928] ? do_writev+0x560/0x560 [ 1484.375853][T13928] ? security_file_permission+0x128/0x300 [ 1484.381562][T13928] ? __sb_end_write+0xa4/0xf0 [ 1484.386240][T13928] ? vfs_write+0x427/0x4f0 [ 1484.390654][T13928] do_syscall_64+0xcb/0x150 [ 1484.395158][T13928] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1484.401039][T13928] RIP: 0033:0x45d5b9 04:43:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x101002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) [ 1484.404926][T13928] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1484.424526][T13928] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1484.432931][T13928] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1484.440891][T13928] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1484.448937][T13928] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 04:43:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) r3 = accept4$unix(r2, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e, 0x800) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r3, 0xc038943b, &(0x7f0000000140)={0x9, 0x20, [], 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0]}) [ 1484.456895][T13928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000024 [ 1484.464856][T13928] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1484.474501][ T5] usb 4-1: USB disconnect, device number 32 04:43:29 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x3, 0x0) 04:43:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xb, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f0000000000)={0x5, 0x3, 0x0, 0xffffffff, 0x1}) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r4, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r3, 0x0, 0x0, 0x149}) r5 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0xf, r4, 0x812}) getpeername$tipc(r4, &(0x7f0000000040)=@id, &(0x7f00000000c0)=0x10) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x71b9, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000", 0x0, 0xffffffff}) 04:43:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xf, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:29 executing program 2 (fault-call:12 fault-nth:37): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:29 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x4, 0x0) [ 1484.874637][T13972] FAULT_INJECTION: forcing a failure. [ 1484.874637][T13972] name failslab, interval 1, probability 0, space 0, times 0 [ 1484.887384][T13972] CPU: 0 PID: 13972 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1484.897518][T13972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1484.907563][T13972] Call Trace: [ 1484.910844][T13972] dump_stack+0x1b0/0x21e [ 1484.915165][T13972] ? devkmsg_release+0x11c/0x11c [ 1484.920109][T13972] ? show_regs_print_info+0x12/0x12 [ 1484.925296][T13972] ? cred_has_capability+0x18c/0x3f0 [ 1484.930566][T13972] ? cred_has_capability+0x2b2/0x3f0 [ 1484.935837][T13972] should_fail+0x6fb/0x860 [ 1484.940235][T13972] ? setup_fault_attr+0x2b0/0x2b0 [ 1484.945245][T13972] ? slab_free_freelist_hook+0xd0/0x150 [ 1484.950767][T13972] ? cap_capable+0x23f/0x280 [ 1484.955332][T13972] ? proc_pid_stack+0x1d5/0x1f0 [ 1484.960172][T13972] ? proc_pid_stack+0x8e/0x1f0 [ 1484.964909][T13972] should_failslab+0x5/0x20 [ 1484.969386][T13972] kmem_cache_alloc_trace+0x39/0x270 [ 1484.974646][T13972] proc_pid_stack+0x8e/0x1f0 [ 1484.979225][T13972] proc_single_show+0xd3/0x130 [ 1484.983982][T13972] seq_read+0x4aa/0xd30 [ 1484.988120][T13972] do_iter_read+0x43b/0x550 [ 1484.992616][T13972] do_preadv+0x1f4/0x330 [ 1484.996845][T13972] ? do_writev+0x560/0x560 [ 1485.001257][T13972] ? security_file_permission+0x128/0x300 [ 1485.006949][T13972] ? __sb_end_write+0xa4/0xf0 [ 1485.011601][T13972] ? vfs_write+0x427/0x4f0 [ 1485.015996][T13972] do_syscall_64+0xcb/0x150 [ 1485.020481][T13972] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1485.026361][T13972] RIP: 0033:0x45d5b9 [ 1485.030232][T13972] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1485.049904][T13972] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1485.058289][T13972] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1485.066238][T13972] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 04:43:30 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xc00, 0x0) [ 1485.074186][T13972] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1485.082130][T13972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000025 [ 1485.090076][T13972] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x11, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x8, 0x0, 0x20, 0x3, 0x6, 0x1, 0x313, 0x40, 0x294, 0x5, 0x6, 0x38, 0x1, 0x1, 0x1, 0x100}, [{0x0, 0xfffffffd, 0xfffffffffffffff8, 0xff, 0x10001, 0x81, 0x3, 0x14b}, {0x7, 0x6, 0x9, 0x81, 0x8, 0x0, 0x1, 0x3}], "56416492730150f885e722656a0ed5fa4b2888d1fc8b00e1e454e44d9cf0991090ce42e8b07b1adb9c0e061d7e98055465ccf4643e232cfd595bf04bb17c4954724823a3869596d267eda067", [[], [], [], []]}, 0x4fc) 04:43:30 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x5, 0x0) 04:43:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000180)={0x0, r4, 0x0, 0x0, 0x149}) preadv(r4, &(0x7f0000000240)=[{&(0x7f0000000140)=""/240, 0xf0}, {&(0x7f0000000440)=""/117, 0x75}, {&(0x7f0000000340)=""/201, 0xc9}], 0x3, 0x10000000, 0x0) 04:43:30 executing program 2 (fault-call:12 fault-nth:38): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xbc997c61cdb14d4d, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x14b042, 0x0) fallocate(r4, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000180)={0x0, r3, 0x0, 0x0, 0x149}) r5 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000080)={0xf, r4, 0x812}) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000040)) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x60, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1485.358352][T14007] FAULT_INJECTION: forcing a failure. [ 1485.358352][T14007] name failslab, interval 1, probability 0, space 0, times 0 [ 1485.371146][T14007] CPU: 0 PID: 14007 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1485.381315][T14007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1485.392452][T14007] Call Trace: [ 1485.395772][T14007] dump_stack+0x1b0/0x21e [ 1485.400122][T14007] ? devkmsg_release+0x11c/0x11c [ 1485.405074][T14007] ? show_regs_print_info+0x12/0x12 [ 1485.410263][T14007] ? cred_has_capability+0x18c/0x3f0 [ 1485.415540][T14007] ? cred_has_capability+0x2b2/0x3f0 [ 1485.420809][T14007] should_fail+0x6fb/0x860 [ 1485.425240][T14007] ? setup_fault_attr+0x2b0/0x2b0 [ 1485.430245][T14007] ? slab_free_freelist_hook+0xd0/0x150 [ 1485.435760][T14007] ? cap_capable+0x23f/0x280 [ 1485.440323][T14007] ? proc_pid_stack+0x1d5/0x1f0 [ 1485.445144][T14007] ? proc_pid_stack+0x8e/0x1f0 [ 1485.449887][T14007] should_failslab+0x5/0x20 [ 1485.454371][T14007] kmem_cache_alloc_trace+0x39/0x270 [ 1485.459637][T14007] proc_pid_stack+0x8e/0x1f0 [ 1485.464209][T14007] proc_single_show+0xd3/0x130 [ 1485.468945][T14007] seq_read+0x4aa/0xd30 [ 1485.473072][T14007] do_iter_read+0x43b/0x550 [ 1485.477550][T14007] do_preadv+0x1f4/0x330 [ 1485.481763][T14007] ? do_writev+0x560/0x560 [ 1485.486150][T14007] ? security_file_permission+0x128/0x300 [ 1485.491917][T14007] ? __sb_end_write+0xa4/0xf0 [ 1485.496579][T14007] ? vfs_write+0x427/0x4f0 [ 1485.500995][T14007] do_syscall_64+0xcb/0x150 [ 1485.505478][T14007] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1485.511340][T14007] RIP: 0033:0x45d5b9 [ 1485.515328][T14007] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1485.534901][T14007] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1485.543285][T14007] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1485.551237][T14007] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1485.559193][T14007] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1485.567132][T14007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000026 [ 1485.575087][T14007] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xe0, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:30 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x6, 0x0) 04:43:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000)=0x2, 0x4) 04:43:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x131, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:31 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xd00, 0x0) 04:43:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r1 = syz_usb_connect$hid(0x1, 0x3f, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000215000020ac05590240000102030109022d00010102300709040003010301022009210180000122b20f09058103080000ff010905020320001f0403"], &(0x7f00000003c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x300, 0x80, 0x4, 0x1, 0x8, 0x9}, 0xe8, &(0x7f00000000c0)={0x5, 0xf, 0xe8, 0x6, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x6, 0x6, 0x7}, @generic={0x85, 0x10, 0x4, "9255dafd66d72f2426e9341d904b70fdeeba39b6533f7b2d1bfda6b030567f8b26c12d2eaac307a7e2915a8d89d9f782af82e27498004ec9ea6062832c250f6746c2b7942de3329a5cbaaf74d416264328ebc8634a24a95054d6e9bf6605d558a76be1943fb690fc172f7054ea53a1e39c89414ab1172ab4983ba37f7c67dd6fa390"}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x8, 0x1, 0x40, 0x1}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "d11ef7bf95974093f0e7720d023171c5"}, @generic={0x33, 0x10, 0x4, "2d793021e200b05070eab60e78a68ccf37844aac04f1c1200d2f5957a8ed1ac2189b8afacf40e344919abb31fca63d36"}]}, 0x4, [{0x4, &(0x7f00000001c0)=@lang_id={0x4, 0x3, 0x1009}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x42a}}, {0x4e, &(0x7f0000000300)=@string={0x4e, 0x3, "aed8134367b665c611bf6a56cb98781bcb452f669f30e227ee13b3c8e0a209fd37e7a31e56aff8f6bcef89bc6e762e5794cb5f76e6042922f86397058789e9971a370c1882f13f97f3448dad"}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x809}}]}) syz_usb_control_io(r1, &(0x7f0000000600)={0x2c, &(0x7f0000000440)={0x40, 0x11, 0x2b, {0x2b, 0x22, "af6e349b0b6c5b11ce4f6c0da59dc1f2de181aeec0ebe39bbb925f05f404dfc164edd9e6b320792b90"}}, &(0x7f00000004c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x441}}, &(0x7f0000000500)={0x0, 0xf, 0x3f, {0x5, 0xf, 0x3f, 0x5, [@ss_container_id={0x14, 0x10, 0x4, 0x2, "8cc01ea175784690af0619fbe7634b89"}, @ssp_cap={0x10, 0x10, 0xa, 0x20, 0x1, 0x4, 0xf0f, 0x7, [0xc000]}, @ssp_cap={0xc, 0x10, 0xa, 0xff, 0x0, 0x7fff, 0x1100, 0x9}, @ptm_cap={0x3}, @ext_cap={0x7, 0x10, 0x2, 0xc, 0x5, 0x6, 0x9}]}}, &(0x7f0000000580)={0x20, 0x29, 0xf, {0xf, 0x29, 0x0, 0x0, 0x27, 0x27, "466cc86c", "c53071bd"}}, &(0x7f00000005c0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x5, 0x4, 0x1, 0x3f, 0x7c, 0x6, 0x7}}}, &(0x7f0000000a80)={0x84, &(0x7f0000000640)={0x0, 0x14, 0x54, "8c940934e8258a2b9b4f99b11d8c674eda93ced3cc6bb5e6bffd801a796d74b2150e87d67878c1b3b7c34616a4a551a0bb36020329118750adae081369e522a931f3a2552369c51ec89b6798c57f00bdbcf3f534"}, &(0x7f00000006c0)={0x0, 0xa, 0x1, 0xa8}, &(0x7f0000000700)={0x0, 0x8, 0x1, 0xa5}, &(0x7f0000000740)={0x20, 0x0, 0x4, {0x1, 0x2}}, &(0x7f0000000780)={0x20, 0x0, 0x8, {0x400, 0x4, [0x0]}}, &(0x7f00000007c0)={0x40, 0x7, 0x2, 0x1ff}, &(0x7f0000000800)={0x40, 0x9, 0x1, 0x4}, &(0x7f0000000840)={0x40, 0xb, 0x2, "27f1"}, &(0x7f0000000880)={0x40, 0xf, 0x2, 0x400}, &(0x7f00000008c0)={0x40, 0x13, 0x6, @broadcast}, &(0x7f0000000900)={0x40, 0x17, 0x6, @remote}, &(0x7f0000000940)={0x40, 0x19, 0x2, "d3c5"}, &(0x7f0000000980)={0x40, 0x1a, 0x2}, &(0x7f00000009c0)={0x40, 0x1c, 0x1, 0xff}, &(0x7f0000000a00)={0x40, 0x1e, 0x1, 0x3f}, &(0x7f0000000a40)={0x40, 0x21, 0xfffffebf, 0x3}}) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) r3 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)={{0x12, 0x1, 0x0, 0x0, 0x76, 0xbc, 0x20, 0x5c6, 0x90b2, 0x7ec8, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x7a, 0xa1, 0x8b}}]}}]}}, 0x0) syz_usb_disconnect(r3) syz_usb_control_io$cdc_ecm(r3, &(0x7f0000000c80)={0x14, &(0x7f0000000bc0)={0x20, 0x11, 0x79, {0x79, 0x7, "c47e0b167bb36e3f8bbaa665f5036dbf0f8b1dbeb9ff35462862ad6bd0c7b5f5528e168df9318425725928eec0e24c94106524c9b1b272ccb271b82873047abb3081a7ad7bc703ad5ea5362f25563dbd4f679f6e62598aa014e45892324f8ae0ff40af18984116174292d5ea037ae848019503ad2ec7de"}}, &(0x7f0000000c40)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000e80)={0x1c, &(0x7f0000000cc0)={0x20, 0x5, 0xfd, "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"}, &(0x7f0000000e00)={0x0, 0xa, 0x1, 0x80}, &(0x7f0000000e40)={0x0, 0x8, 0x1, 0x1}}) r4 = fcntl$dupfd(r2, 0x0, r0) ioctl$HIDIOCGFEATURE(r4, 0xc0404807, &(0x7f0000000b40)={0x4, "9d7e17b0c8aaeab82cdfe17ab458bd10e0752133ad5079d2fcef63197ec58409031088acbf2d9179160f6b054065db6a561257063291580b3c112576cc0c1157"}) read$hidraw(r4, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:31 executing program 2 (fault-call:12 fault-nth:39): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:31 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x7, 0x0) [ 1486.052888][T14041] FAULT_INJECTION: forcing a failure. [ 1486.052888][T14041] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.065545][T14041] CPU: 1 PID: 14041 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1486.075679][T14041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.085718][T14041] Call Trace: [ 1486.088996][T14041] dump_stack+0x1b0/0x21e [ 1486.093315][T14041] ? devkmsg_release+0x11c/0x11c [ 1486.098669][T14041] ? show_regs_print_info+0x12/0x12 [ 1486.103876][T14041] ? cred_has_capability+0x18c/0x3f0 [ 1486.109126][T14041] ? cred_has_capability+0x2b2/0x3f0 [ 1486.114389][T14041] should_fail+0x6fb/0x860 [ 1486.118791][T14041] ? setup_fault_attr+0x2b0/0x2b0 [ 1486.123804][T14041] ? slab_free_freelist_hook+0xd0/0x150 [ 1486.129337][T14041] ? cap_capable+0x23f/0x280 [ 1486.133918][T14041] ? proc_pid_stack+0x1d5/0x1f0 [ 1486.138762][T14041] ? proc_pid_stack+0x8e/0x1f0 [ 1486.143516][T14041] should_failslab+0x5/0x20 [ 1486.148012][T14041] kmem_cache_alloc_trace+0x39/0x270 04:43:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x132, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000002c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b8, 0x1e8, 0x3f8, 0xf8, 0x1e8, 0x0, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, &(0x7f0000000140), {[{{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}]}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0x3}}}, {{@ipv6={@empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xff000000, 0xffffffff, 0xff, 0xffffffff], [0xffffff00, 0xffffffff, 0xffffff00, 0xff], 'rose0\x00', 'ipvlan1\x00', {0xff}, {0xff}, 0x0, 0x0, 0x1, 0x8}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private2={0xfc, 0x2, [], 0x1}, @ipv4=@dev={0xac, 0x14, 0x14, 0x1e}, 0x16, 0x27, 0x6}}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x4d5, 0x4d5], 0x8, 0x40, 0x1}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@local, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xa, 0x1b, 0x1}}}, {{@ipv6={@private2={0xfc, 0x2, [], 0x1}, @ipv4={[], [], @multicast1}, [0xff000000, 0x0, 0xff, 0xff], [0xff, 0xff, 0xffffff00, 0xffffffff], 'team0\x00', 'bridge_slave_0\x00', {}, {0xff}, 0x2e, 0x20, 0x3, 0x40}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private0, @ipv4=@remote, 0x18, 0x22, 0x9}}}, {{@ipv6={@loopback, @mcast1, [0xff, 0xffffff00], [0x0, 0xff000000, 0xff000000, 0xffffffff], 'veth0_vlan\x00', 'rose0\x00', {}, {}, 0x67, 0xc, 0x2, 0x40}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@mcast2, @ipv4=@remote, 0x3e, 0xa, 0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x618) vmsplice(r2, &(0x7f00000001c0)=[{&(0x7f0000000900)="ccc3eebab007d10e7ddecaf8230f492d68192741f65ad014734561aa05e913e1c1b85ce07fd961705ece96c6468a07c9e83aab90c4c1767507f2503428e6c2ef808e3fb944a0e864d014a7b1812df11914810eaf8eb6d84bcf9879216fc7fa8f939a924d11fb573a2732745e61187e087bfc6d17f2b745d12334932b1075288f26db4d9e7b133719494fcf712fcfcd0c1916f7d9da4e96c00218ce28cbc8d4ffd30018faa9a80275f4eaea4e44b6a6458931de407a2caaedfa94f9a537d06320966d71b94e6a62b41c8a71a6438b579b253fbdd7e6d929506957", 0xda}, {&(0x7f0000000000)="665bda609c04218cd79d44ae8f36271038286bdb4b245f83b8c71f5092dfbd2d68d6a97fd3633add7c818a0e", 0x2c}], 0x2, 0xa) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') fcntl$setpipe(r1, 0x407, 0x8) preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) r5 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r5, 0x1fffc00000000) keyctl$link(0x8, r5, 0x0) 04:43:31 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x8, 0x0) [ 1486.153295][T14041] proc_pid_stack+0x8e/0x1f0 [ 1486.157873][T14041] proc_single_show+0xd3/0x130 [ 1486.162631][T14041] seq_read+0x4aa/0xd30 [ 1486.167009][T14041] do_iter_read+0x43b/0x550 [ 1486.171506][T14041] do_preadv+0x1f4/0x330 [ 1486.175754][T14041] ? do_writev+0x560/0x560 [ 1486.180207][T14041] ? security_file_permission+0x128/0x300 [ 1486.185896][T14041] ? __sb_end_write+0xa4/0xf0 [ 1486.190544][T14041] ? vfs_write+0x427/0x4f0 [ 1486.194931][T14041] do_syscall_64+0xcb/0x150 [ 1486.199406][T14041] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1486.205390][T14041] RIP: 0033:0x45d5b9 [ 1486.209271][T14041] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1486.228890][T14041] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1486.237289][T14041] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1486.245252][T14041] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1486.253228][T14041] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.261203][T14041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000027 [ 1486.269165][T14041] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:31 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x9, 0x0) 04:43:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x300, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:31 executing program 2 (fault-call:12 fault-nth:40): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:31 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x500, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1486.429919][ T9083] usb 4-1: new low-speed USB device number 33 using dummy_hcd 04:43:31 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xa, 0x0) [ 1486.583352][T14078] FAULT_INJECTION: forcing a failure. [ 1486.583352][T14078] name failslab, interval 1, probability 0, space 0, times 0 [ 1486.595946][T14078] CPU: 0 PID: 14078 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1486.606060][T14078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1486.616092][T14078] Call Trace: [ 1486.619392][T14078] dump_stack+0x1b0/0x21e [ 1486.623712][T14078] ? devkmsg_release+0x11c/0x11c [ 1486.628628][T14078] ? show_regs_print_info+0x12/0x12 [ 1486.633797][T14078] ? cred_has_capability+0x18c/0x3f0 [ 1486.639054][T14078] ? cred_has_capability+0x2b2/0x3f0 [ 1486.644319][T14078] should_fail+0x6fb/0x860 [ 1486.648778][T14078] ? setup_fault_attr+0x2b0/0x2b0 [ 1486.653789][T14078] ? slab_free_freelist_hook+0xd0/0x150 [ 1486.659307][T14078] ? cap_capable+0x23f/0x280 [ 1486.663887][T14078] ? proc_pid_stack+0x1d5/0x1f0 [ 1486.668747][T14078] ? proc_pid_stack+0x8e/0x1f0 [ 1486.669882][ T9083] usb 4-1: Invalid ep0 maxpacket: 32 [ 1486.673490][T14078] should_failslab+0x5/0x20 [ 1486.673503][T14078] kmem_cache_alloc_trace+0x39/0x270 [ 1486.673515][T14078] proc_pid_stack+0x8e/0x1f0 [ 1486.673529][T14078] proc_single_show+0xd3/0x130 [ 1486.697811][T14078] seq_read+0x4aa/0xd30 [ 1486.701955][T14078] do_iter_read+0x43b/0x550 [ 1486.706477][T14078] do_preadv+0x1f4/0x330 [ 1486.710709][T14078] ? do_writev+0x560/0x560 [ 1486.715127][T14078] ? security_file_permission+0x128/0x300 [ 1486.720833][T14078] ? __sb_end_write+0xa4/0xf0 [ 1486.725497][T14078] ? vfs_write+0x427/0x4f0 [ 1486.729901][T14078] do_syscall_64+0xcb/0x150 [ 1486.734390][T14078] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1486.740267][T14078] RIP: 0033:0x45d5b9 [ 1486.744147][T14078] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1486.763774][T14078] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1486.772195][T14078] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:31 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xe00, 0x0) [ 1486.780254][T14078] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1486.788218][T14078] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1486.796190][T14078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000028 [ 1486.804154][T14078] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1486.819885][ T9083] usb 4-1: new low-speed USB device number 34 using dummy_hcd [ 1487.099956][ T9083] usb 4-1: Invalid ep0 maxpacket: 32 [ 1487.105346][ T9083] usb usb4-port1: attempt power cycle [ 1487.819935][ T9083] usb 4-1: new low-speed USB device number 35 using dummy_hcd [ 1487.909948][ T9083] usb 4-1: Invalid ep0 maxpacket: 32 [ 1488.059926][ T9083] usb 4-1: new low-speed USB device number 36 using dummy_hcd [ 1488.149950][ T9083] usb 4-1: Invalid ep0 maxpacket: 32 [ 1488.155322][ T9083] usb usb4-port1: unable to enumerate USB device 04:43:34 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xb, 0x0) 04:43:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x540, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:34 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x1100, 0x0) 04:43:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) write$P9_RLOCK(r3, &(0x7f0000000040)={0x8, 0x35, 0x2, 0x1}, 0x8) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:34 executing program 2 (fault-call:12 fault-nth:41): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000000240)='./bus\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0xf, 0xffffffffffffffff, 0x812}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)={0x1208, r3, 0x804, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x8000}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x10001}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1008, 0x7d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x1004, 0x0, "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"}]}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x7ff}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x3ff}, @NL80211_ATTR_BSSID={0xa, 0xf5, @multicast}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0xffffffffffffffff}}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1b4, 0x7d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xa6, 0x0, "a5ca4fae556b66b72763b022ca6878165cc0aa1f3ad767dc5047847aad4a2786b906bc95735dc544075bad1463868fe07a41f5d72598ba6bd5da8e67bcebfaf0aa232ea45170e98655123e78908b59353aeff1d5a56bd4760fbc1faf9334ffcf11de938397991aa7ec8abc5af897a8c8fba30f07ffed44d6ba2113d46a49cd5d0ec85258d41ac54c29560d6378eabde7e94d592184d1b92cb2b4d2f5cd7f3a58cdc6"}, @NL80211_BAND_6GHZ={0xb, 0x3, "03b046ffb1377b"}, @NL80211_BAND_6GHZ={0xfb, 0x3, "04794181f9b9cc5d22e40cd50f0f0ea914b2f368c795945c2995bd0a348fbe770e71b669cb12f20d82072ed3bf5c0c609f94864989d9a9d0fc0dfb458f0c9c99bb9803ed0833f3a28347934e17fafc5489ce52205f8bb482846981dea857a068341433f386a817d3e1632480737c7e76171c2724a7e86e70ccf26a793c3db26f049b09b615cb97c4a3ab8a74715b281bfd08c145005a6e66c5c8e3c9eadbf245b16ea17dbeae454460c9b60f81ce6a89fd03b86fde02636a8f669cee982fbf99bd1a3dabfea2f9a48b77c0f473588300856dc34494f2971f13b64fda9c1b7fbf9bb4f91b9f22e925e8733d9c47690c7945af7433362a50"}]}]}, 0x1208}, 0x1, 0x0, 0x0, 0x14001}, 0x40) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r5, 0x407, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x6015) write(r5, &(0x7f0000000340), 0x41395527) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r6, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x54b, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1489.059978][T14116] FAULT_INJECTION: forcing a failure. [ 1489.059978][T14116] name failslab, interval 1, probability 0, space 0, times 0 [ 1489.072650][T14116] CPU: 0 PID: 14116 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1489.082794][T14116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1489.092840][T14116] Call Trace: [ 1489.096121][T14116] dump_stack+0x1b0/0x21e [ 1489.100436][T14116] ? devkmsg_release+0x11c/0x11c [ 1489.105354][T14116] ? show_regs_print_info+0x12/0x12 [ 1489.110816][T14116] ? cred_has_capability+0x18c/0x3f0 [ 1489.116095][T14116] ? cred_has_capability+0x2b2/0x3f0 [ 1489.121554][T14116] should_fail+0x6fb/0x860 [ 1489.125948][T14116] ? setup_fault_attr+0x2b0/0x2b0 [ 1489.130977][T14116] ? slab_free_freelist_hook+0xd0/0x150 [ 1489.136529][T14116] ? cap_capable+0x23f/0x280 [ 1489.141113][T14116] ? proc_pid_stack+0x1d5/0x1f0 [ 1489.145942][T14116] ? proc_pid_stack+0x8e/0x1f0 [ 1489.150698][T14116] should_failslab+0x5/0x20 [ 1489.155193][T14116] kmem_cache_alloc_trace+0x39/0x270 [ 1489.160477][T14116] proc_pid_stack+0x8e/0x1f0 [ 1489.165056][T14116] proc_single_show+0xd3/0x130 [ 1489.169799][T14116] seq_read+0x4aa/0xd30 [ 1489.173953][T14116] do_iter_read+0x43b/0x550 [ 1489.178456][T14116] do_preadv+0x1f4/0x330 [ 1489.182674][T14116] ? do_writev+0x560/0x560 [ 1489.187086][T14116] ? security_file_permission+0x128/0x300 [ 1489.192801][T14116] ? __sb_end_write+0xa4/0xf0 [ 1489.198165][T14116] ? vfs_write+0x427/0x4f0 [ 1489.202594][T14116] do_syscall_64+0xcb/0x150 [ 1489.207089][T14116] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1489.213331][T14116] RIP: 0033:0x45d5b9 [ 1489.217206][T14116] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1489.237066][T14116] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1489.245470][T14116] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1489.253449][T14116] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1489.261399][T14116] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1489.269346][T14116] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000029 [ 1489.277310][T14116] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x80) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {r2, r3/1000+60000}}, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000600)=ANY=[@ANYRESDEC=r3], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r0) read$hidraw(r5, &(0x7f0000000200)=""/142, 0x8e) r6 = socket(0x11, 0x3, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r6, &(0x7f00000016c0)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @broadcast}, 0x14) r9 = socket(0x11, 0x3, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(0xffffffffffffffff, &(0x7f00000005c0)=[{{&(0x7f0000000380)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @private=0xa010101}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000400)="9d9a2a91371282", 0x7}], 0x1, &(0x7f00000004c0)=[@mark={{0x14, 0x1, 0x24, 0xffffffff}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x40}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffc01}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0xfffff800}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x68d}}, @txtime={{0x18, 0x1, 0x3d, 0x8000}}], 0xd8}}], 0x1, 0x4881) getpeername$packet(r10, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) bind$packet(r9, &(0x7f00000016c0)={0x11, 0x0, r11, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmsg$ETHTOOL_MSG_WOL_SET(r5, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="84000000", @ANYRES16=0x0, @ANYBLOB="10002abd7000fbdbde250a000000700001801400020069705f76746930000000000000000000080003000100000008000100", @ANYRES32=r8, @ANYBLOB="140002007665746831000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="14000200766c616e31000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x84}, 0x1, 0x0, 0x0, 0x20004000}, 0x10) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x554, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:34 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xc, 0x0) 04:43:34 executing program 2 (fault-call:12 fault-nth:42): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x600, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:34 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xd, 0x0) 04:43:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x700, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1489.713141][T14149] FAULT_INJECTION: forcing a failure. [ 1489.713141][T14149] name failslab, interval 1, probability 0, space 0, times 0 [ 1489.726346][T14149] CPU: 1 PID: 14149 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1489.736574][T14149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1489.746736][T14149] Call Trace: [ 1489.750121][T14149] dump_stack+0x1b0/0x21e [ 1489.754543][T14149] ? devkmsg_release+0x11c/0x11c [ 1489.759549][T14149] ? show_regs_print_info+0x12/0x12 [ 1489.764741][T14149] ? cred_has_capability+0x18c/0x3f0 [ 1489.770003][T14149] ? cred_has_capability+0x2b2/0x3f0 [ 1489.775270][T14149] should_fail+0x6fb/0x860 [ 1489.780419][T14149] ? setup_fault_attr+0x2b0/0x2b0 [ 1489.786212][T14149] ? slab_free_freelist_hook+0xd0/0x150 [ 1489.791934][T14149] ? cap_capable+0x23f/0x280 [ 1489.796517][T14149] ? proc_pid_stack+0x1d5/0x1f0 [ 1489.801363][T14149] ? proc_pid_stack+0x8e/0x1f0 [ 1489.806226][T14149] should_failslab+0x5/0x20 [ 1489.810712][T14149] kmem_cache_alloc_trace+0x39/0x270 [ 1489.816095][T14149] proc_pid_stack+0x8e/0x1f0 [ 1489.820685][T14149] proc_single_show+0xd3/0x130 [ 1489.825430][T14149] seq_read+0x4aa/0xd30 [ 1489.829677][T14149] do_iter_read+0x43b/0x550 [ 1489.834161][T14149] do_preadv+0x1f4/0x330 [ 1489.838397][T14149] ? do_writev+0x560/0x560 [ 1489.842802][T14149] ? security_file_permission+0x128/0x300 [ 1489.848497][T14149] ? __sb_end_write+0xa4/0xf0 [ 1489.853166][T14149] ? vfs_write+0x427/0x4f0 [ 1489.857579][T14149] ? do_syscall_64+0x80/0x150 [ 1489.862255][T14149] do_syscall_64+0xcb/0x150 [ 1489.866769][T14149] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1489.872677][T14149] RIP: 0033:0x45d5b9 [ 1489.876572][T14149] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1489.896163][T14149] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1489.904557][T14149] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:35 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x1200, 0x0) [ 1489.912510][T14149] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1489.920485][T14149] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1489.928456][T14149] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002a [ 1489.936524][T14149] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x84000) preadv(r4, &(0x7f0000000680)=[{&(0x7f0000000180)=""/135, 0x87}, {&(0x7f00000002c0)=""/219, 0xdb}, {&(0x7f00000003c0)=""/66, 0x42}, {&(0x7f0000000240)=""/12, 0xc}, {&(0x7f0000000440)=""/168, 0xa8}, {&(0x7f0000000500)=""/99, 0x63}, {&(0x7f0000000580)=""/200, 0xc8}], 0x7, 0x7, 0x2e4a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$P9_RFLUSH(r3, &(0x7f0000000700)={0x7, 0x6d, 0x2}, 0x7) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r5, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:35 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xa00, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:35 executing program 2 (fault-call:12 fault-nth:43): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:35 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xa8b, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1490.226359][T14173] FAULT_INJECTION: forcing a failure. [ 1490.226359][T14173] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.240701][T14173] CPU: 1 PID: 14173 Comm: syz-executor.2 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1490.250894][T14173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1490.261061][T14173] Call Trace: [ 1490.264345][T14173] dump_stack+0x1b0/0x21e [ 1490.269124][T14173] ? devkmsg_release+0x11c/0x11c [ 1490.275109][T14173] ? show_regs_print_info+0x12/0x12 [ 1490.280297][T14173] ? cred_has_capability+0x18c/0x3f0 [ 1490.285629][T14173] ? cred_has_capability+0x2b2/0x3f0 [ 1490.291573][T14173] should_fail+0x6fb/0x860 [ 1490.296109][T14173] ? setup_fault_attr+0x2b0/0x2b0 [ 1490.301283][T14173] ? slab_free_freelist_hook+0xd0/0x150 [ 1490.306878][T14173] ? cap_capable+0x23f/0x280 [ 1490.311510][T14173] ? proc_pid_stack+0x1d5/0x1f0 [ 1490.316348][T14173] ? proc_pid_stack+0x8e/0x1f0 [ 1490.321102][T14173] should_failslab+0x5/0x20 [ 1490.325647][T14173] kmem_cache_alloc_trace+0x39/0x270 [ 1490.331012][T14173] proc_pid_stack+0x8e/0x1f0 [ 1490.335633][T14173] proc_single_show+0xd3/0x130 [ 1490.340435][T14173] seq_read+0x4aa/0xd30 [ 1490.344740][T14173] do_iter_read+0x43b/0x550 [ 1490.350843][T14173] do_preadv+0x1f4/0x330 [ 1490.355266][T14173] ? do_writev+0x560/0x560 [ 1490.359722][T14173] ? __schedule+0x8ae/0xe30 [ 1490.364375][T14173] do_syscall_64+0xcb/0x150 [ 1490.368875][T14173] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.374899][T14173] RIP: 0033:0x45d5b9 [ 1490.379586][T14173] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1490.401386][T14173] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1490.410225][T14173] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1490.418362][T14173] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1490.426499][T14173] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1490.434459][T14173] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002b [ 1490.442594][T14173] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c [ 1490.494942][T14163] ================================================================== [ 1490.503340][T14163] BUG: KASAN: stack-out-of-bounds in unwind_next_frame+0x1907/0x22b0 [ 1490.511491][T14163] Read of size 8 at addr ffff88817651fe08 by task syz-executor.0/14163 [ 1490.520120][T14163] [ 1490.522888][T14163] CPU: 0 PID: 14163 Comm: syz-executor.0 Not tainted 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1490.533305][T14163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1490.543790][T14163] Call Trace: [ 1490.547076][T14163] dump_stack+0x1b0/0x21e [ 1490.551551][T14163] ? show_regs_print_info+0x12/0x12 [ 1490.557394][T14163] ? __schedule+0x8ae/0xe30 [ 1490.561906][T14163] ? printk+0xc0/0x104 [ 1490.566197][T14163] print_address_description+0x96/0x5d0 [ 1490.571817][T14163] ? devkmsg_release+0x11c/0x11c [ 1490.576891][T14163] ? unwind_get_return_address+0x48/0x90 [ 1490.582516][T14163] ? arch_stack_walk+0x98/0xe0 [ 1490.587295][T14163] ? preempt_schedule+0xeb/0x110 [ 1490.592913][T14163] ? schedule_preempt_disabled+0x20/0x20 [ 1490.599312][T14163] __kasan_report+0x14b/0x1c0 [ 1490.603995][T14163] ? unwind_next_frame+0x1907/0x22b0 [ 1490.609511][T14163] kasan_report+0x27/0x50 [ 1490.614003][T14163] ? memset+0x1f/0x40 [ 1490.617980][T14163] unwind_next_frame+0x1907/0x22b0 [ 1490.623089][T14163] ? retint_kernel+0x1b/0x1b [ 1490.627665][T14163] ? unwind_get_return_address_ptr+0x130/0x130 [ 1490.634590][T14163] ? unwind_next_frame+0x22b0/0x22b0 [ 1490.640399][T14163] ? __kmalloc+0xf7/0x2c0 [ 1490.645012][T14163] ? retint_kernel+0x1b/0x1b [ 1490.649684][T14163] ? traverse+0xfb/0x540 [ 1490.654011][T14163] ? seq_read+0xc62/0xd30 [ 1490.658516][T14163] ? do_iter_read+0x43b/0x550 [ 1490.663489][T14163] ? __schedule+0x8a6/0xe30 [ 1490.667982][T14163] ? do_syscall_64+0xcb/0x150 [ 1490.672773][T14163] ? in_sched_functions+0x9/0x40 [ 1490.677984][T14163] ? stack_trace_save_tsk+0x470/0x470 [ 1490.683645][T14163] arch_stack_walk+0xb4/0xe0 [ 1490.688443][T14163] stack_trace_save_tsk+0x2d5/0x470 [ 1490.693898][T14163] ? stack_trace_consume_entry+0x230/0x230 [ 1490.700438][T14163] ? _raw_spin_lock+0xa1/0x170 [ 1490.705364][T14163] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 1490.712023][T14163] ? __ptrace_may_access+0x287/0x4f0 [ 1490.717308][T14163] proc_pid_stack+0x12f/0x1f0 [ 1490.722588][T14163] proc_single_show+0xd3/0x130 [ 1490.727722][T14163] traverse+0x20c/0x540 [ 1490.732595][T14163] ? memset+0x1f/0x40 [ 1490.736749][T14163] seq_read+0xc62/0xd30 [ 1490.741253][T14163] ? selinux_file_permission+0x2d0/0x520 [ 1490.747322][T14163] do_iter_read+0x43b/0x550 [ 1490.752295][T14163] do_preadv+0x1f4/0x330 [ 1490.756928][T14163] ? do_writev+0x560/0x560 [ 1490.761431][T14163] ? __schedule+0x8ae/0xe30 [ 1490.766558][T14163] do_syscall_64+0xcb/0x150 [ 1490.771264][T14163] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1490.777800][T14163] RIP: 0033:0x45d5b9 [ 1490.781948][T14163] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1490.802435][T14163] RSP: 002b:00007f63a87f7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1490.811117][T14163] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1490.819755][T14163] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1490.827868][T14163] RBP: 000000000118d0d0 R08: 0000000000000000 R09: 0000000000000000 [ 1490.835984][T14163] R10: 000000000000000d R11: 0000000000000246 R12: 000000000118d08c [ 1490.844392][T14163] R13: 00007ffebb13841f R14: 00007f63a87f89c0 R15: 000000000118d08c [ 1490.852743][T14163] [ 1490.855267][T14163] The buggy address belongs to the page: [ 1490.861364][T14163] page:ffffea0005d947c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 1490.870617][T14163] flags: 0x8000000000000000() [ 1490.875432][T14163] raw: 8000000000000000 0000000000000000 ffffea0005d94788 0000000000000000 [ 1490.884323][T14163] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1490.893412][T14163] page dumped because: kasan: bad access detected [ 1490.900062][T14163] [ 1490.902390][T14163] Memory state around the buggy address: [ 1490.908196][T14163] ffff88817651fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1490.916611][T14163] ffff88817651fd80: 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 00 00 f2 f2 [ 1490.924762][T14163] >ffff88817651fe00: 00 f2 f2 f2 00 f3 f3 f3 00 00 00 00 00 00 00 00 [ 1490.932976][T14163] ^ [ 1490.937391][T14163] ffff88817651fe80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1490.946038][T14163] ffff88817651ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 1490.954768][T14163] ================================================================== [ 1490.963623][T14163] Disabling lock debugging due to kernel taint 04:43:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x2c, 0x1, 0x0, 0x6}, 0x10, &(0x7f0000000040)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000000c0)="db89895407f59fffeda16e029226ab4cad01e6abc21948087e987547fe26ea5f6ba56fe37a752fc6200d514a817294616bcedc59d215d8755f4252133b0063b5fc031ea8052cabf0a3df", 0x4a}], 0x2, 0x0, 0x0, 0x4020010}, 0x3) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0xffff}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000300)=@newqdisc={0x2c, 0x24, 0x100, 0x70bd28, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x5, 0x4}, {0xffe0, 0x18}, {0xffff, 0x1}}, [@TCA_EGRESS_BLOCK={0x8, 0xe, 0x3ff}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008011}, 0x40) r4 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000340)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) bind(r1, &(0x7f0000000480)=@xdp={0x2c, 0xb, r5, 0x7}, 0x80) write(r3, &(0x7f0000000340), 0x41395527) r6 = getpgrp(r0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000200)={r3, 0xffffffff, 0x1, 0x1}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x4, 0x2, 0x3, 0x20, 0x0, 0x200, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x8106, 0x3, 0x7, 0x5, 0x5, 0x0, 0x100}, r6, 0x2, r7, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') 04:43:36 executing program 2 (fault-call:12 fault-nth:44): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:36 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x1de5, 0x0) 04:43:36 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xe, 0x0) 04:43:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xb00, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xb15, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1491.177266][T14215] FAULT_INJECTION: forcing a failure. [ 1491.177266][T14215] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.190518][T14215] CPU: 0 PID: 14215 Comm: syz-executor.2 Tainted: G B 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1491.202723][T14215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1491.212865][T14215] Call Trace: [ 1491.216252][T14215] dump_stack+0x1b0/0x21e [ 1491.220669][T14215] ? devkmsg_release+0x11c/0x11c [ 1491.225632][T14215] ? show_regs_print_info+0x12/0x12 [ 1491.230917][T14215] ? cred_has_capability+0x18c/0x3f0 [ 1491.236306][T14215] ? cred_has_capability+0x2b2/0x3f0 [ 1491.243273][T14215] should_fail+0x6fb/0x860 [ 1491.248367][T14215] ? setup_fault_attr+0x2b0/0x2b0 [ 1491.253483][T14215] ? slab_free_freelist_hook+0xd0/0x150 [ 1491.259027][T14215] ? cap_capable+0x23f/0x280 [ 1491.264158][T14215] ? proc_pid_stack+0x1d5/0x1f0 [ 1491.269112][T14215] ? proc_pid_stack+0x8e/0x1f0 [ 1491.274048][T14215] should_failslab+0x5/0x20 [ 1491.278594][T14215] kmem_cache_alloc_trace+0x39/0x270 [ 1491.283999][T14215] proc_pid_stack+0x8e/0x1f0 [ 1491.289259][T14215] proc_single_show+0xd3/0x130 [ 1491.294021][T14215] seq_read+0x4aa/0xd30 [ 1491.298495][T14215] do_iter_read+0x43b/0x550 [ 1491.302995][T14215] do_preadv+0x1f4/0x330 [ 1491.307403][T14215] ? do_writev+0x560/0x560 [ 1491.311816][T14215] ? security_file_permission+0x128/0x300 [ 1491.317817][T14215] ? __sb_end_write+0xa4/0xf0 [ 1491.322558][T14215] ? vfs_write+0x427/0x4f0 [ 1491.327067][T14215] do_syscall_64+0xcb/0x150 [ 1491.331786][T14215] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1491.337816][T14215] RIP: 0033:0x45d5b9 [ 1491.341800][T14215] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1491.361490][T14215] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 04:43:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, r1) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) [ 1491.370431][T14215] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1491.378539][T14215] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1491.386684][T14215] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1491.394831][T14215] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002c [ 1491.403310][T14215] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) close(r2) r3 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r3, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xb2a, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:36 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x10, 0x0) 04:43:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x1020000}) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x1}}, 0x18) prctl$PR_SET_ENDIAN(0x14, 0x0) getpid() r0 = gettid() tkill(r0, 0xe) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x3, 0x10000090, 0x0, 0x9, 0x0, 0x0, 0x6, 0xfffffffc}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) r4 = socket$key(0xf, 0x3, 0x2) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r4, 0x8008f513, &(0x7f0000000140)) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') sendmsg$TIPC_NL_KEY_FLUSH(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01002bbd7000fbdbdf25180000005c0005800800010065746800080001006574680008000100657468000c000280080004000800000008000100756470002c00028008c5f69c63be3578740a101e9d02411f0400ffffffff080003000000000008000200200000000800c14435ef69d91f98b1eb15b8a8b5317b0746b2b2d8849962c343d3805eaaeec50a8d83ef43de8430b2a6fa799afa748144719aad2abd07c65880430755778f6d"], 0x70}, 0x1, 0x0, 0x0, 0x24008041}, 0x4800) preadv(r5, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:36 executing program 2 (fault-call:12 fault-nth:45): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)={0x15c, r1, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @multicast1}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x84, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private2={0xfc, 0x2, [], 0x1}}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x40011}, 0x20000000) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) read$hidraw(r3, &(0x7f0000000200)=""/142, 0x8e) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$KDFONTOP_SET_DEF(r4, 0x4b72, &(0x7f0000000180)={0x2, 0x1, 0x16, 0x13, 0x19e, &(0x7f0000000640)="182f79e8a8447261480a8ea272e429964b89017cdc21d677b09b80510c417aa87056d238ef94326f42a5d73d3fcea1d4eee73cc7d3e8ab0844f90606e90e4fd441a97231ca2b57c62be1d5b69faee3b0668c636e6c6c388083486e6bdc40b204b3ac3a4bb9c8055502f26985f793008b3224b222adc8e16494f4495d9cd39a8eea89fe807a7117e138628c62a56ca8888322e6ca9f1738ef8a8db3fe40aef066da5182970d1f9dda7cf2a3035ef4b1aec992e5609d2e59cccc050a59426c49481106134f69ee4f5798f6954eb21776d35170cb3d66485bf79fad546ac544d7e3d4dc20826677b26df8f310d2bc721f7d3e22c07d820c7722b7ad833ba5a8d4ae37b5bc40c9eb9ab74a101fddcad33a1f6c0a1f1e5f4677e2f0ef5045d664c538fbe827d018fd749d1bb7b2a189235e8143c8684198590b043c0322e95d68ecd6a0b876aca1a2e3198ed9e249cc42d715ec4798f007a720ed347008de56aca565bd436a97a3751940da290802e49e0446bda39250e6b3c4ac0655d2cc815c9e6e53ca307ac163c258f8077cecdd93bb71ea44deca96ee89bdb68b4c3f41382a2fbf479eae24ff2a25ec9588c8a3a9fe330d1c6f53f051ede94c0d6fa7351ee69acc49b4fad54149b3c832ff8bb2f4c2a0fece5a5b61176d5b9ad06695b40b86e08efd9aac5e69ab2a93f36bdc593c6af7044a98be29a25c4a3a2caf94a700c9d36cb958e68f3f0267bd9ea46518ed2fae0f99cee2780361ac9f89b488659a9054c536d3309cb4ffcceb4fe887763566731553c54558c33549b55d54ca28f6477b791afcbc187d1e24374d3a7362be67890e001925742e1c9f37389264fae730f045662f4035790868f7c2137ac37f43f1eebebf46b97aecc9dc5a7b14435e47749c8fdc81e419230652dd93119b22318c55909204636d6c0652ff0e65fa2d67fc1a5c75a8f6edb5b49e8c42ecee25e891bb23b60a1a5c80ae6e5a01650856adb1df4768291cf5a6efdbb692673a36aa19bf7f6b61c3b7a5dea7128f9c5e4d83ad2afd4fd4cd79f8a5be27320c015d94090274c839c4975936b847f1ab8a4aa2444886e2a5ddc77cd93dde2f0d8859ae92655119f515e80bcf6dc7f8e7d2613641b422e838d0c75bfaa334d8669fdb6ee2c591733a78f8ab9f7a3fb9aecb4d193a4f36d62cbc0b302e3dc630113c4874869d39987ec88fa0d6d2ba89e01b376c9f3eca41e3100ee566b056155c3735079dfa64858e87ad5cf9584807eade88b73ed9158fd8442d1808818efb0437a1df8a3d04d175dbf01d5f0a74c7f07988f9d144cc3d33a64686fbe03448dba8d2425443b34d7c5017dae925a66b9899938aa6d426bb597f349d5bd8775ce5040d9c6b5572974edde0a1ad45ad8314c4d8a4fde4f0fa2dc585109ee524fe6d2f19be6df109c8e5c35636af310a6674452c8c54"}) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xb3f, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:36 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x11, 0x0) 04:43:36 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x2500, 0x0) 04:43:37 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x5000f4) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x209a0001}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="ecfa0000", @ANYRES16=0x0, @ANYBLOB="000329bd7000fcdbdf250e0000000a000900bbbbbbbbbbbb0000080031000800008b86dfe38bc0bc920005002d0001000000057e2e0000000000080031000300000008003400000000ae49423d0000000000"], 0x60}}, 0x20008004) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r1 = getpid() write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000400)=0x208220, 0x4) listxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/211, 0xd3) sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x10, 0x200000, 0x9, 0x3}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r5, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1492.002747][T14271] FAULT_INJECTION: forcing a failure. [ 1492.002747][T14271] name failslab, interval 1, probability 0, space 0, times 0 [ 1492.015674][T14271] CPU: 0 PID: 14271 Comm: syz-executor.2 Tainted: G B 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1492.027309][T14271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.037559][T14271] Call Trace: [ 1492.040870][T14271] dump_stack+0x1b0/0x21e [ 1492.045741][T14271] ? devkmsg_release+0x11c/0x11c [ 1492.051036][T14271] ? show_regs_print_info+0x12/0x12 [ 1492.056242][T14271] ? cred_has_capability+0x18c/0x3f0 [ 1492.061735][T14271] ? cred_has_capability+0x2b2/0x3f0 [ 1492.067119][T14271] should_fail+0x6fb/0x860 [ 1492.072858][T14271] ? setup_fault_attr+0x2b0/0x2b0 [ 1492.078221][T14271] ? slab_free_freelist_hook+0xd0/0x150 [ 1492.084228][T14271] ? cap_capable+0x23f/0x280 [ 1492.088838][T14271] ? proc_pid_stack+0x1d5/0x1f0 [ 1492.094344][T14271] ? proc_pid_stack+0x8e/0x1f0 [ 1492.099121][T14271] should_failslab+0x5/0x20 [ 1492.104009][T14271] kmem_cache_alloc_trace+0x39/0x270 [ 1492.109728][T14271] proc_pid_stack+0x8e/0x1f0 [ 1492.114441][T14271] proc_single_show+0xd3/0x130 [ 1492.119303][T14271] seq_read+0x4aa/0xd30 [ 1492.123600][T14271] do_iter_read+0x43b/0x550 [ 1492.128368][T14271] do_preadv+0x1f4/0x330 [ 1492.132719][T14271] ? do_writev+0x560/0x560 [ 1492.137324][T14271] ? security_file_permission+0x128/0x300 [ 1492.143273][T14271] ? __sb_end_write+0xa4/0xf0 [ 1492.147970][T14271] ? vfs_write+0x427/0x4f0 04:43:37 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x12, 0x0) 04:43:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xb54, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) r3 = epoll_create1(0x80000) pwritev2(r3, &(0x7f0000000640)=[{&(0x7f0000000000)="db1a4cef365e9cd3016d53abdc940235100e7e4a4f3d23f6ca0ac98d7225bbfcdf5f3dd1a424233f92e61c13ea36451e85e8f4ffce19556a5aec5ad811051ce03ff62027bdcbf75d747620a1cd4be57c380dadb9e771bb85f064de7bf7c789ccd3ce9421428779484841cf7e1f45fbcd919e5be89c7a77cd65d658", 0x7b}, {&(0x7f00000000c0)="1c59a539c1e9f2f91454ac44e729aee11107d15ef1b162c2e5bd33729842c2d9c287bb72f382f6587fd2ac38202e18dc857864946c74d36cfd79b5538c9f444b8238fa32f47c6700e7f48bd8bf1f36f565fa8d76f45d9a328c629df389f89a9716d9ca67b2bfd3790bd43c73f7559a2ebe487807ac3e48b99d2ba0cca518eb", 0x7f}, {&(0x7f0000000140)="f7c9e2f7c89dba8c807914c09ad687b2fb477c0fa6dc3c43e59009b2f85f422d3260e34bc348e3e21dfd17cbea062fbe71a7990168fd5adb868491a65d8d7a8da4688ed2c74bf2924889fae231c097823258eb350fc99a64256d5df2", 0x5c}, {&(0x7f00000002c0)="9a9e20457d81436b5fbac8cb7e5665aa4f5d47090d19ee26f48802ef9bcc397f4b0467cb17f3cda8b59495e7946d6f05ba933db8897993d0e60f362403611b804fd2134202bf4829951349cfd078c976bdec41017b2f5352d81ab423ffb7d01a5e8ef36db1a2ec747f07b157c44124d6bf3dcba7cf6c8460f16852c838a730c7a9c6cbaa9aa4202d6c96e6cf", 0x8c}, {&(0x7f0000000380)="ec5a8c18e402d6ae63317aa80b90e824d4926e33612c72e51475a2fdb2aa25876d90cf8f17bfd86a4bff3a048ed9993fd36ba2f5744295b67a2268e4fe39ccb7cc3436fb45a7a2f9f814ed84725cf8775a805f9594d2f02543261b9619e62fdb3ddc467f3a859d7815d940ceee2651243b729c7e472294ab9d9cd27818398706399da81d6a95bba539366a83553da4126289ae9a18ad323d2db9daa415dad111570534f9679930483802a1ee6df89a894f45b0b464765470f0455d30d7f24e4697b85d7fcd2a737bcd19faf2c4c6970195498b80634302a99b9a1ae9", 0xdc}, {&(0x7f00000004c0)="b39dacfde9dc092b1ab9da555fd652435d7e7bf9feb599c981d90d36507b7719b9389808b87c0c5d89de60df2f29910a8d64a8cd809ada5a56800f699bd6246d6e9d3827", 0x44}, {&(0x7f00000001c0)="98705fcac82e9df6f5a7c068c2c30b7fc0c05ed6d7f923c5cefe3961e296530e7421181816f1dd98d0e290979be8bb1820aecd3587", 0x35}, {&(0x7f0000000540)="8bb6c0d2880bd3dc8c8d51e3", 0xc}, {&(0x7f0000000580)="04e96a3835a52876032357049653558f89fcd8d736ba188deefed0ef832cdb2b1198c9336cfd8c692dde9f875633814f4043d3d1d431479c81ab8c18b43d6c4a73674c9ffc6dc3cb2fe423db818c9cd19fb8320b829d9ce9743fefd516b2bb22dbf7dbe036d8a2fd4e6ddfda87e2c5701b2c4150f390958e7d32299e239c0984fe7cc4ffa214c801cfd6d3cf4e703cf443c2491812b9b1882e2c9968e9435b53dc929a090aac4bba3c54871ff1aa", 0xae}], 0x9, 0x9, 0x3, 0x12) [ 1492.152398][T14271] do_syscall_64+0xcb/0x150 [ 1492.157088][T14271] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.162984][T14271] RIP: 0033:0x45d5b9 [ 1492.166885][T14271] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1492.189844][T14271] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 04:43:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) [ 1492.198617][T14271] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1492.207248][T14271] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1492.217038][T14271] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1492.227147][T14271] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002d [ 1492.235232][T14271] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xb69, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f00000000c0)=""/199, &(0x7f0000000000)=0xc7) 04:43:37 executing program 2 (fault-call:12 fault-nth:46): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xb7e, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:37 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x25, 0x0) 04:43:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) r3 = creat(&(0x7f00000022c0)='./bus\x00', 0x0) write$FUSE_BMAP(r3, 0x0, 0x0) write$P9_RWALK(r3, &(0x7f0000000000)={0x16, 0x6f, 0x2, {0x1, [{0x8, 0x1, 0x3}]}}, 0x16) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/139, 0x8b}], 0x1) [ 1492.565983][T14314] FAULT_INJECTION: forcing a failure. [ 1492.565983][T14314] name failslab, interval 1, probability 0, space 0, times 0 [ 1492.579075][T14314] CPU: 1 PID: 14314 Comm: syz-executor.2 Tainted: G B 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1492.592495][T14314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1492.602703][T14314] Call Trace: [ 1492.606008][T14314] dump_stack+0x1b0/0x21e [ 1492.610559][T14314] ? devkmsg_release+0x11c/0x11c [ 1492.615616][T14314] ? show_regs_print_info+0x12/0x12 [ 1492.621043][T14314] ? cred_has_capability+0x18c/0x3f0 [ 1492.626460][T14314] ? cred_has_capability+0x2b2/0x3f0 [ 1492.631747][T14314] should_fail+0x6fb/0x860 [ 1492.636753][T14314] ? setup_fault_attr+0x2b0/0x2b0 [ 1492.641871][T14314] ? slab_free_freelist_hook+0xd0/0x150 [ 1492.647741][T14314] ? cap_capable+0x23f/0x280 [ 1492.652433][T14314] ? proc_pid_stack+0x1d5/0x1f0 [ 1492.657279][T14314] ? proc_pid_stack+0x8e/0x1f0 [ 1492.662119][T14314] should_failslab+0x5/0x20 [ 1492.666760][T14314] kmem_cache_alloc_trace+0x39/0x270 [ 1492.672041][T14314] proc_pid_stack+0x8e/0x1f0 [ 1492.676628][T14314] proc_single_show+0xd3/0x130 [ 1492.681725][T14314] seq_read+0x4aa/0xd30 [ 1492.686126][T14314] do_iter_read+0x43b/0x550 [ 1492.690774][T14314] do_preadv+0x1f4/0x330 [ 1492.695218][T14314] ? do_writev+0x560/0x560 [ 1492.699791][T14314] ? security_file_permission+0x128/0x300 [ 1492.705755][T14314] ? __sb_end_write+0xa4/0xf0 [ 1492.710568][T14314] ? vfs_write+0x427/0x4f0 [ 1492.715053][T14314] do_syscall_64+0xcb/0x150 [ 1492.719551][T14314] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1492.725441][T14314] RIP: 0033:0x45d5b9 [ 1492.729526][T14314] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1492.749781][T14314] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1492.758328][T14314] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:37 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x4000, 0x0) [ 1492.766756][T14314] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1492.774728][T14314] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1492.782923][T14314] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002e [ 1492.791063][T14314] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="3ad15f53fbb3271c7e7da2c2ca4b5ebda357c9", 0x13}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:37 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xf00, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0x41c}, 0x16, 0x2) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:38 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xcf, 0x0) 04:43:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x201, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[], 0x4) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x0, 0x7f}]}, 0xc, 0x0) read$hidraw(r2, &(0x7f0000000200)=""/142, 0x8e) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "36c7e95300000000e2caa77ab1711000"}) 04:43:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0xfcb, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:38 executing program 2 (fault-call:12 fault-nth:47): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x1100, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1493.167184][T14355] FAULT_INJECTION: forcing a failure. [ 1493.167184][T14355] name failslab, interval 1, probability 0, space 0, times 0 [ 1493.179955][T14355] CPU: 0 PID: 14355 Comm: syz-executor.2 Tainted: G B 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1493.191840][T14355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.202357][T14355] Call Trace: [ 1493.205666][T14355] dump_stack+0x1b0/0x21e [ 1493.210005][T14355] ? devkmsg_release+0x11c/0x11c 04:43:38 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x300, 0x0) [ 1493.215043][T14355] ? show_regs_print_info+0x12/0x12 [ 1493.220428][T14355] ? cred_has_capability+0x18c/0x3f0 [ 1493.225958][T14355] ? cred_has_capability+0x2b2/0x3f0 [ 1493.231255][T14355] should_fail+0x6fb/0x860 [ 1493.235767][T14355] ? setup_fault_attr+0x2b0/0x2b0 [ 1493.241226][T14355] ? slab_free_freelist_hook+0xd0/0x150 [ 1493.246868][T14355] ? cap_capable+0x23f/0x280 [ 1493.251464][T14355] ? proc_pid_stack+0x1d5/0x1f0 [ 1493.256723][T14355] ? proc_pid_stack+0x8e/0x1f0 [ 1493.261879][T14355] should_failslab+0x5/0x20 [ 1493.266401][T14355] kmem_cache_alloc_trace+0x39/0x270 [ 1493.275011][T14355] proc_pid_stack+0x8e/0x1f0 [ 1493.279764][T14355] proc_single_show+0xd3/0x130 [ 1493.284545][T14355] seq_read+0x4aa/0xd30 [ 1493.288961][T14355] do_iter_read+0x43b/0x550 [ 1493.293576][T14355] do_preadv+0x1f4/0x330 [ 1493.297839][T14355] ? do_writev+0x560/0x560 [ 1493.302288][T14355] ? security_file_permission+0x128/0x300 [ 1493.308288][T14355] ? __sb_end_write+0xa4/0xf0 [ 1493.312973][T14355] ? vfs_write+0x427/0x4f0 [ 1493.317409][T14355] do_syscall_64+0xcb/0x150 [ 1493.322164][T14355] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1493.328250][T14355] RIP: 0033:0x45d5b9 [ 1493.332155][T14355] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1493.352122][T14355] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 04:43:38 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x500, 0x0) [ 1493.361106][T14355] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1493.369433][T14355] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1493.379340][T14355] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1493.388018][T14355] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000000002f [ 1493.396689][T14355] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x150b, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:38 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xcf00, 0x0) 04:43:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x80008d}, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x6c, 0x0, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x2, @in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x14], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @remote}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="2000e648", @ANYRES16=0x0, @ANYBLOB="02002bbd7000fedbdf25130000000c00098008000200ff010000"], 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x4004000) sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, 0x0, 0x400, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x40) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x200000) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x400000, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000180)) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r5, &(0x7f00000017c0), 0x375, 0x0, 0x0) close(r5) 04:43:38 executing program 2 (fault-call:12 fault-nth:48): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x1a4b, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:38 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x600, 0x0) 04:43:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x1f8b, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1493.865174][T14392] FAULT_INJECTION: forcing a failure. [ 1493.865174][T14392] name failslab, interval 1, probability 0, space 0, times 0 [ 1493.878574][T14392] CPU: 1 PID: 14392 Comm: syz-executor.2 Tainted: G B 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1493.891115][T14392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1493.901730][T14392] Call Trace: [ 1493.905428][T14392] dump_stack+0x1b0/0x21e [ 1493.910113][T14392] ? devkmsg_release+0x11c/0x11c [ 1493.915617][T14392] ? show_regs_print_info+0x12/0x12 [ 1493.921451][T14392] ? cred_has_capability+0x18c/0x3f0 [ 1493.927036][T14392] ? cred_has_capability+0x2b2/0x3f0 [ 1493.932862][T14392] should_fail+0x6fb/0x860 [ 1493.937455][T14392] ? setup_fault_attr+0x2b0/0x2b0 [ 1493.942617][T14392] ? slab_free_freelist_hook+0xd0/0x150 [ 1493.948868][T14392] ? cap_capable+0x23f/0x280 [ 1493.953557][T14392] ? proc_pid_stack+0x1d5/0x1f0 [ 1493.958506][T14392] ? proc_pid_stack+0x8e/0x1f0 [ 1493.963542][T14392] should_failslab+0x5/0x20 [ 1493.968140][T14392] kmem_cache_alloc_trace+0x39/0x270 [ 1493.973447][T14392] proc_pid_stack+0x8e/0x1f0 [ 1493.978300][T14392] proc_single_show+0xd3/0x130 [ 1493.983760][T14392] seq_read+0x4aa/0xd30 [ 1493.988015][T14392] do_iter_read+0x43b/0x550 [ 1493.992808][T14392] do_preadv+0x1f4/0x330 [ 1493.997330][T14392] ? do_writev+0x560/0x560 [ 1494.001754][T14392] ? security_file_permission+0x128/0x300 [ 1494.007478][T14392] ? __sb_end_write+0xa4/0xf0 [ 1494.012389][T14392] ? vfs_write+0x427/0x4f0 [ 1494.017058][T14392] do_syscall_64+0xcb/0x150 [ 1494.021875][T14392] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.027773][T14392] RIP: 0033:0x45d5b9 [ 1494.031833][T14392] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1494.052111][T14392] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 04:43:39 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x700, 0x0) [ 1494.060525][T14392] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1494.068813][T14392] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1494.077215][T14392] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1494.085276][T14392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000030 [ 1494.093608][T14392] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:39 executing program 2 (fault-call:12 fault-nth:49): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x2000, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x400009, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0xb644}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4800) ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f0000000180)) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r5, &(0x7f00000017c0), 0x375, 0x0, 0x0) [ 1494.396114][T14412] FAULT_INJECTION: forcing a failure. [ 1494.396114][T14412] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.409038][T14412] CPU: 0 PID: 14412 Comm: syz-executor.2 Tainted: G B 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1494.421598][T14412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1494.431872][T14412] Call Trace: [ 1494.435182][T14412] dump_stack+0x1b0/0x21e [ 1494.439830][T14412] ? devkmsg_release+0x11c/0x11c [ 1494.445024][T14412] ? show_regs_print_info+0x12/0x12 [ 1494.450526][T14412] ? cred_has_capability+0x18c/0x3f0 [ 1494.455919][T14412] ? cred_has_capability+0x2b2/0x3f0 [ 1494.461213][T14412] should_fail+0x6fb/0x860 [ 1494.465727][T14412] ? setup_fault_attr+0x2b0/0x2b0 [ 1494.470851][T14412] ? slab_free_freelist_hook+0xd0/0x150 [ 1494.476405][T14412] ? cap_capable+0x23f/0x280 [ 1494.481181][T14412] ? proc_pid_stack+0x1d5/0x1f0 [ 1494.486342][T14412] ? proc_pid_stack+0x8e/0x1f0 [ 1494.491230][T14412] should_failslab+0x5/0x20 [ 1494.496073][T14412] kmem_cache_alloc_trace+0x39/0x270 [ 1494.501367][T14412] proc_pid_stack+0x8e/0x1f0 [ 1494.506200][T14412] proc_single_show+0xd3/0x130 [ 1494.510983][T14412] seq_read+0x4aa/0xd30 [ 1494.515154][T14412] do_iter_read+0x43b/0x550 [ 1494.519755][T14412] do_preadv+0x1f4/0x330 [ 1494.524003][T14412] ? do_writev+0x560/0x560 [ 1494.528631][T14412] ? security_file_permission+0x128/0x300 [ 1494.534529][T14412] ? __sb_end_write+0xa4/0xf0 [ 1494.539216][T14412] ? vfs_write+0x427/0x4f0 [ 1494.543647][T14412] do_syscall_64+0xcb/0x150 [ 1494.549624][T14412] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1494.555794][T14412] RIP: 0033:0x45d5b9 [ 1494.559700][T14412] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1494.579590][T14412] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1494.588195][T14412] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 04:43:39 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xe51d, 0x0) 04:43:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x24cb, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1494.596264][T14412] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1494.604843][T14412] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1494.612819][T14412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000031 [ 1494.621132][T14412] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:39 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0x900, 0x0) 04:43:39 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x2a0b, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:39 executing program 2 (fault-call:12 fault-nth:50): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x2f4b, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1494.978274][T14441] FAULT_INJECTION: forcing a failure. [ 1494.978274][T14441] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.991350][T14441] CPU: 0 PID: 14441 Comm: syz-executor.2 Tainted: G B 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1495.003211][T14441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1495.013452][T14441] Call Trace: [ 1495.016898][T14441] dump_stack+0x1b0/0x21e [ 1495.021494][T14441] ? devkmsg_release+0x11c/0x11c [ 1495.026542][T14441] ? show_regs_print_info+0x12/0x12 [ 1495.031922][T14441] ? cred_has_capability+0x18c/0x3f0 [ 1495.037211][T14441] ? cred_has_capability+0x2b2/0x3f0 [ 1495.042683][T14441] should_fail+0x6fb/0x860 [ 1495.047200][T14441] ? setup_fault_attr+0x2b0/0x2b0 [ 1495.052418][T14441] ? slab_free_freelist_hook+0xd0/0x150 [ 1495.058373][T14441] ? cap_capable+0x23f/0x280 [ 1495.063328][T14441] ? proc_pid_stack+0x1d5/0x1f0 [ 1495.068338][T14441] ? proc_pid_stack+0x8e/0x1f0 [ 1495.073200][T14441] should_failslab+0x5/0x20 04:43:40 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xa00, 0x0) [ 1495.077716][T14441] kmem_cache_alloc_trace+0x39/0x270 [ 1495.083012][T14441] proc_pid_stack+0x8e/0x1f0 [ 1495.087611][T14441] proc_single_show+0xd3/0x130 [ 1495.092550][T14441] seq_read+0x4aa/0xd30 [ 1495.096723][T14441] do_iter_read+0x43b/0x550 [ 1495.101505][T14441] do_preadv+0x1f4/0x330 [ 1495.106002][T14441] ? do_writev+0x560/0x560 [ 1495.110644][T14441] ? security_file_permission+0x128/0x300 [ 1495.116638][T14441] ? __sb_end_write+0xa4/0xf0 [ 1495.121330][T14441] ? vfs_write+0x427/0x4f0 [ 1495.125764][T14441] do_syscall_64+0xcb/0x150 [ 1495.130439][T14441] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.136538][T14441] RIP: 0033:0x45d5b9 [ 1495.140595][T14441] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1495.160412][T14441] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1495.169020][T14441] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1495.177465][T14441] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1495.185765][T14441] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1495.193982][T14441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000032 [ 1495.202153][T14441] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x3101, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:40 executing program 2 (fault-call:12 fault-nth:51): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x3201, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:40 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xb00, 0x0) 04:43:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') write$char_usb(r3, &(0x7f0000000140)="14ecf39c571fbc63f520542bb50b2c9fb4a84ac224a2cabcfddad3c134567548c9afc8f741b590aff3a5", 0x2a) preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:40 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0x100000, 0x0) 04:43:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x348b, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1495.589335][T14477] FAULT_INJECTION: forcing a failure. [ 1495.589335][T14477] name failslab, interval 1, probability 0, space 0, times 0 [ 1495.602532][T14477] CPU: 0 PID: 14477 Comm: syz-executor.2 Tainted: G B 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1495.614208][T14477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1495.624264][T14477] Call Trace: [ 1495.627566][T14477] dump_stack+0x1b0/0x21e [ 1495.632067][T14477] ? devkmsg_release+0x11c/0x11c [ 1495.636999][T14477] ? show_regs_print_info+0x12/0x12 [ 1495.642359][T14477] ? cred_has_capability+0x18c/0x3f0 [ 1495.647764][T14477] ? cred_has_capability+0x2b2/0x3f0 [ 1495.653061][T14477] should_fail+0x6fb/0x860 [ 1495.657649][T14477] ? setup_fault_attr+0x2b0/0x2b0 [ 1495.662839][T14477] ? slab_free_freelist_hook+0xd0/0x150 [ 1495.668380][T14477] ? cap_capable+0x23f/0x280 [ 1495.672966][T14477] ? proc_pid_stack+0x1d5/0x1f0 [ 1495.677963][T14477] ? proc_pid_stack+0x8e/0x1f0 [ 1495.682731][T14477] should_failslab+0x5/0x20 [ 1495.687510][T14477] kmem_cache_alloc_trace+0x39/0x270 [ 1495.693048][T14477] proc_pid_stack+0x8e/0x1f0 [ 1495.697636][T14477] proc_single_show+0xd3/0x130 [ 1495.702569][T14477] seq_read+0x4aa/0xd30 [ 1495.706818][T14477] do_iter_read+0x43b/0x550 [ 1495.711320][T14477] do_preadv+0x1f4/0x330 [ 1495.715648][T14477] ? do_writev+0x560/0x560 [ 1495.720154][T14477] ? security_file_permission+0x128/0x300 [ 1495.725872][T14477] ? __sb_end_write+0xa4/0xf0 [ 1495.730886][T14477] ? vfs_write+0x427/0x4f0 [ 1495.735305][T14477] do_syscall_64+0xcb/0x150 [ 1495.739940][T14477] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1495.745832][T14477] RIP: 0033:0x45d5b9 [ 1495.750023][T14477] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1495.773198][T14477] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1495.783668][T14477] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1495.791720][T14477] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1495.799860][T14477] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1495.807969][T14477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000033 [ 1495.816976][T14477] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x39cb, 0xffffffe0}}], 0x400000000000132, 0x400000a) 04:43:41 executing program 2 (fault-call:12 fault-nth:52): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:41 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xc00, 0x0) 04:43:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x3f0b, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1496.271699][T14501] FAULT_INJECTION: forcing a failure. [ 1496.271699][T14501] name failslab, interval 1, probability 0, space 0, times 0 [ 1496.284539][T14501] CPU: 1 PID: 14501 Comm: syz-executor.2 Tainted: G B 5.4.64-syzkaller-00144-ge1c9ea5fd907 #0 [ 1496.296066][T14501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1496.306112][T14501] Call Trace: [ 1496.309394][T14501] dump_stack+0x1b0/0x21e [ 1496.313718][T14501] ? devkmsg_release+0x11c/0x11c [ 1496.318732][T14501] ? show_regs_print_info+0x12/0x12 [ 1496.324008][T14501] ? cred_has_capability+0x18c/0x3f0 [ 1496.329321][T14501] ? cred_has_capability+0x2b2/0x3f0 [ 1496.334602][T14501] should_fail+0x6fb/0x860 [ 1496.339010][T14501] ? setup_fault_attr+0x2b0/0x2b0 [ 1496.344025][T14501] ? slab_free_freelist_hook+0xd0/0x150 [ 1496.349558][T14501] ? cap_capable+0x23f/0x280 [ 1496.354170][T14501] ? proc_pid_stack+0x1d5/0x1f0 [ 1496.359014][T14501] ? proc_pid_stack+0x8e/0x1f0 [ 1496.363766][T14501] should_failslab+0x5/0x20 [ 1496.368281][T14501] kmem_cache_alloc_trace+0x39/0x270 [ 1496.373557][T14501] proc_pid_stack+0x8e/0x1f0 [ 1496.378138][T14501] proc_single_show+0xd3/0x130 [ 1496.383796][T14501] seq_read+0x4aa/0xd30 [ 1496.387972][T14501] do_iter_read+0x43b/0x550 [ 1496.392553][T14501] do_preadv+0x1f4/0x330 [ 1496.396811][T14501] ? do_writev+0x560/0x560 [ 1496.401220][T14501] ? security_file_permission+0x128/0x300 [ 1496.407662][T14501] ? __sb_end_write+0xa4/0xf0 [ 1496.412331][T14501] ? vfs_write+0x427/0x4f0 [ 1496.416759][T14501] ? do_syscall_64+0x10c/0x150 [ 1496.421528][T14501] ? do_syscall_64+0x11a/0x150 [ 1496.426315][T14501] do_syscall_64+0xcb/0x150 [ 1496.430813][T14501] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1496.436722][T14501] RIP: 0033:0x45d5b9 [ 1496.441621][T14501] Code: 5d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 2b b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1496.461350][T14501] RSP: 002b:00007f4cee143c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 04:43:41 executing program 0: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x0, 0x0, 0x9}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r2, &(0x7f00000017c0), 0x375, 0xd00, 0x0) 04:43:41 executing program 1: pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x1) getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x8, 0x1, 0x0, 0x0, 0xfffffffd}, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r1, &(0x7f00000017c0), 0x375, 0xf0ff7f, 0x0) 04:43:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4123a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x4000, 0xffffffe0}}], 0x400000000000132, 0x400000a) [ 1496.469846][T14501] RAX: ffffffffffffffda RBX: 0000000000025900 RCX: 000000000045d5b9 [ 1496.477812][T14501] RDX: 0000000000000375 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1496.485775][T14501] RBP: 00007f4cee143ca0 R08: 0000000000000000 R09: 0000000000000000 [ 1496.496145][T14501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000034 [ 1496.504733][T14501] R13: 00007ffd8dcf940f R14: 00007f4cee1449c0 R15: 000000000118d08c 04:43:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) getpeername(r3, &(0x7f00000001c0)=@x25={0x9, @remote}, &(0x7f0000000240)=0x80) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:41 executing program 2 (fault-call:12 fault-nth:53): prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x8, 0x1, 0x0, 0x9, 0xfffffffd}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='stack\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x0, 0x0) 04:43:41 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x1000}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f0000004d80)=[{{0x0, 0x2000000, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220b