$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x5, 0x2, 0xfd2f, 0x2}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e24, 0x3, @local, 0x1}}, [0x326b, 0xef, 0x1, 0x3, 0x7, 0x1ea, 0x9, 0x0, 0x6, 0x8, 0xffffffffffff0001, 0x2, 0x2b90, 0x200, 0x5]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000480)={r2, 0x7}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r3}, &(0x7f0000000000)=0x200000c8) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x80200, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r4, 0x400448c9, &(0x7f0000000340)={{0xa482, 0x0, 0x100000001, 0x9, 0x40, 0x9}, 0x2}) 03:34:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x840400, 0x400000) 03:34:49 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x80000000003) 03:34:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:49 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x30200, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000380)={0x4, 0x7, 0x0, 0x4, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x13, "1922f538ba4d69e9d9bd05aa7a16159d8bcdb5"}, &(0x7f0000000400)=0x1b) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000440)={r2, @in6={{0xa, 0x4e23, 0x1, @empty, 0x8000000000}}, 0xbc85, 0x100000001, 0x2, 0x80000000, 0x2}, &(0x7f0000000500)=0x98) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x6, &(0x7f00000000c0)={r3}, &(0x7f0000000000)=0x200000c8) 03:34:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r1}, &(0x7f0000000000)=0x200000c8) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000100)={r2}) r3 = dup(r0) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000280)={0x70}) 03:34:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1000000, 0x400000) 03:34:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x0) 03:34:49 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:49 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000200)={0x9, 0x1, 0x8, 0x3294, 0x8, 0x46, 0x1, 0xcfef, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)={r1, 0x1, 0x3, [0x100000000, 0x100000000, 0x2]}, &(0x7f00000002c0)=0xe) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000100)={r3, 0x0, 0x4, 0x0, 0x400}) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x6, &(0x7f00000000c0)={r5}, &(0x7f0000000000)=0x200000c8) 03:34:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x2000000, 0x400000) 03:34:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:49 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e20, @empty}]}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f0000000180)={r1, 0x100000000}, &(0x7f0000000140)=0xfffffffffffffcab) tee(r0, r0, 0x8, 0x2) 03:34:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x0) 03:34:49 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) munlockall() ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e21, 0x100, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffb, 0x800000}, 0x98) fadvise64(r1, 0x0, 0x51e3, 0x3) 03:34:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x3000000, 0x400000) 03:34:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/tcp\x00') setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000001c0)=0x8001, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) ustat(0x7ff, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x6, &(0x7f00000000c0)={r2}, &(0x7f0000000000)=0x200000c8) 03:34:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x4000000, 0x400000) 03:34:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:50 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000100)={0xffffffffffffff9c}) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x7fffffff, 0x101400) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000001c0)={r1, 0xaf3, 0x10000, "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"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x6, &(0x7f00000000c0)={r3}, &(0x7f0000000000)=0x200000c8) [ 229.181415][T13754] cgroup: fork rejected by pids controller in /syz4 03:34:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x0) 03:34:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x5000000, 0x400000) 03:34:50 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) rt_sigaction(0x6, &(0x7f0000000080)={&(0x7f0000000000)="67440f38cb58b565f30faed1c4e15059b20900000066440f8d000001000f4e9b31000000c481f92e8a0d00000068faffffffc483697f2802459c460ffe558d", {0x1}, 0x0, &(0x7f0000000040)="43c09fa863c1d3f20f7ec4c421f97f9fc3000000c441f96f8b05f0ffffc481f8291cad0000e1e0c4a3f9174a0842db6fabf2a50ff6140ff3420faef5"}, &(0x7f0000000180)={&(0x7f00000000c0)="f3640f0fcf90360f0fdf90c483f9157c06dae0f30f5cba10000000660f38201f8fca8812070000010041d990060000000f94d966410f381c5295de10", {}, 0x0, &(0x7f0000000100)="3636410f60502e76fec402d10639c4820d399492329e6da3c441b55cd6c461addba38e0000008f2978c63d0c000000660f3a0e919300000008c423e90ed5000f1f00"}, 0x8, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={'nr', 0x0}, 0x7fff, 'syz1\x00', @null, 0xffffffff, 0x2, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r2}, &(0x7f0000000000)=0x200000c8) 03:34:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x6000000, 0x400000) 03:34:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000240)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x4010640d, &(0x7f00000002c0)={0xfffffffffffffffb, 0x1}) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r1}, &(0x7f0000000000)=0x200000c8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r1}, &(0x7f0000000280)=0x8) 03:34:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:50 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r1, 0x4}, &(0x7f0000000000)=0x8) 03:34:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x8040000, 0x400000) 03:34:51 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) connect$bt_sco(r0, &(0x7f0000000000)={0x1f, {0x2, 0x5, 0x0, 0x5, 0x0, 0xed2}}, 0x8) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000080)={0x800000000000262, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @random}]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0xffdffffffffffffe, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r1}, &(0x7f0000000000)=0x200000c8) 03:34:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x8800000, 0x400000) 03:34:51 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x400) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001500)={0x0, 0x0, 0x0}, &(0x7f0000001540)=0xc) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000001580)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000015c0)={0x0, 0x0}, &(0x7f0000001600)=0xc) fstat(0xffffffffffffff9c, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000016c0)={0x0, 0x0}) r8 = geteuid() getgroups(0x6, &(0x7f0000001700)=[0xee00, 0xee00, 0xffffffffffffffff, 0xee01, 0x0, 0xffffffffffffffff]) r10 = socket(0x1, 0x4, 0x8) r11 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001740)='/proc/capi/capi20ncci\x00', 0x42200, 0x0) r12 = socket$vsock_dgram(0x28, 0x2, 0x0) r13 = accept4$x25(0xffffffffffffff9c, &(0x7f0000001780), &(0x7f00000017c0)=0x12, 0x80000) r14 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001800)='/dev/uhid\x00', 0x2, 0x0) r15 = accept4$packet(0xffffffffffffff9c, &(0x7f0000001840), &(0x7f0000001880)=0x14, 0x800) r16 = syz_open_dev$vcsa(&(0x7f00000018c0)='/dev/vcsa#\x00', 0x0, 0x201) r17 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r18 = inotify_init1(0x80000) r19 = syz_open_dev$swradio(&(0x7f0000001900)='/dev/swradio#\x00', 0x0, 0x2) r20 = socket$nl_generic(0x10, 0x3, 0x10) r21 = accept(0xffffffffffffffff, &(0x7f0000001940)=@nfc, &(0x7f00000019c0)=0x80) r22 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000001a00), &(0x7f0000001a80)=0x60) r23 = accept4$rose(0xffffffffffffff9c, &(0x7f0000001ac0)=@short={0xb, @dev, @bcast, 0x1, @netrom}, &(0x7f0000001b00)=0x1c, 0x80000) r24 = fsopen(&(0x7f0000001b40)='ecryptfs\x00', 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001bc0)={0x0, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000001b80)='vmnet0\x00', 0xffffffffffffffff}, 0x30) r26 = syz_open_dev$binder(&(0x7f0000001c00)='/dev/binder#\x00', 0x0, 0x3801a384983ba284) r27 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001c40)='/proc/capi/capi20\x00', 0x80100, 0x0) r28 = syz_open_dev$admmidi(&(0x7f0000001c80)='/dev/admmidi#\x00', 0x1, 0x100) r29 = syz_open_dev$midi(&(0x7f0000001cc0)='/dev/midi#\x00', 0x2f6, 0x0) r30 = accept4$llc(0xffffffffffffffff, &(0x7f0000001d00)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000001d40)=0x10, 0x80800) r31 = syz_open_dev$sndmidi(&(0x7f0000001d80)='/dev/snd/midiC#D#\x00', 0x7, 0x0) r32 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001dc0)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001e00)=0x0) lstat(&(0x7f0000001e40)='./file0\x00', &(0x7f0000001e80)={0x0, 0x0, 0x0, 0x0, 0x0}) r35 = getegid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000042c0)={0xffffffffffffffff}) r37 = accept4$x25(0xffffffffffffffff, &(0x7f0000004300)={0x9, @remote}, &(0x7f0000004340)=0x12, 0x80800) r38 = openat$dir(0xffffffffffffff9c, &(0x7f0000004380)='./file0\x00', 0x8000, 0x2) r39 = socket$vsock_stream(0x28, 0x1, 0x0) r40 = openat$md(0xffffffffffffff9c, &(0x7f00000043c0)='/dev/md0\x00', 0x0, 0x0) r41 = socket$inet6_sctp(0xa, 0x1, 0x84) r42 = openat$nullb(0xffffffffffffff9c, &(0x7f0000004480)='/dev/nullb0\x00', 0x202000, 0x0) r43 = openat$rtc(0xffffffffffffff9c, &(0x7f00000044c0)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000004500)=0x0) fstat(0xffffffffffffffff, &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0}) r46 = getegid() r47 = socket$bt_hidp(0x1f, 0x3, 0x6) r48 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r49 = syz_open_dev$swradio(&(0x7f0000004980)='/dev/swradio#\x00', 0x1, 0x2) r50 = syz_open_dev$video4linux(&(0x7f00000049c0)='/dev/v4l-subdev#\x00', 0x506, 0x2000) r51 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r52 = syz_open_dev$dspn(&(0x7f0000004a00)='/dev/dsp#\x00', 0x7, 0x101000) r53 = openat$uinput(0xffffffffffffff9c, &(0x7f0000004a40)='/dev/uinput\x00', 0x802, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000004a80)={0xffffffffffffffff, 0xffffffffffffffff}) r55 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000004ac0)) r56 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/mISDNtimer\x00', 0x8000, 0x0) r57 = syz_open_dev$rtc(&(0x7f0000004b40)='/dev/rtc#\x00', 0x7, 0x321800) r58 = syz_open_dev$radio(&(0x7f0000004b80)='/dev/radio#\x00', 0x0, 0x2) r59 = syz_open_pts(0xffffffffffffff9c, 0x400000) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000004bc0)={0xffffffffffffff9c}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000004c00)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004c40)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f0000004d40)=0xe8) getgroups(0x8, &(0x7f0000004d80)=[0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff, 0xee01, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff]) r64 = getpgrp(0xffffffffffffffff) lstat(&(0x7f00000059c0)='./file0\x00', &(0x7f0000005a00)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000005a80), &(0x7f0000005ac0)=0x0, &(0x7f0000005b00)) r67 = mq_open(&(0x7f0000005b40)='ppp1\x00', 0x2, 0x8, &(0x7f0000005b80)={0xfffffffffffff001, 0x9, 0x40, 0x0, 0x800, 0x3, 0x4, 0xc5}) pipe2(&(0x7f0000005bc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r69 = socket$inet6_udplite(0xa, 0x2, 0x88) r70 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r71 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000005c80)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000005cc0)={0x23a5, 0x22, 0x1, 0xffffffffffffffff}) r73 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000005d00)='/dev/video0\x00', 0x2, 0x0) r74 = socket$inet6_udplite(0xa, 0x2, 0x88) r75 = syz_open_dev$radio(&(0x7f0000005d40)='/dev/radio#\x00', 0x0, 0x2) r76 = accept$unix(0xffffffffffffff9c, &(0x7f0000005d80)=@abs, &(0x7f0000005e00)=0x6e) r77 = syz_open_dev$amidi(&(0x7f0000005e40)='/dev/amidi#\x00', 0xfff, 0x400000) r78 = syz_open_dev$binder(&(0x7f0000006140)='/dev/binder#\x00', 0x0, 0x800) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006180)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000061c0)={0x0, 0x0}, &(0x7f0000006200)=0xc) fstat(0xffffffffffffff9c, &(0x7f0000006240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r82 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x1) r83 = accept(0xffffffffffffff9c, &(0x7f00000062c0)=@can, &(0x7f0000006340)=0x80) r84 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r85 = socket$caif_stream(0x25, 0x1, 0x2) r86 = openat$uinput(0xffffffffffffff9c, &(0x7f0000006380)='/dev/uinput\x00', 0x802, 0x0) r87 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r88 = socket$packet(0x11, 0x0, 0x300) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000063c0)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000006400)={0x0, 0x0}, &(0x7f0000006440)=0xc) lstat(&(0x7f0000006480)='./file0\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000006540)=0x0) fstat(0xffffffffffffffff, &(0x7f0000006580)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000006600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000009300)=0x0) r96 = getuid() fstat(0xffffffffffffffff, &(0x7f0000009340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r98 = getpgrp(0x0) r99 = geteuid() getgroups(0x2, &(0x7f00000093c0)=[0x0, 0x0]) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000009400)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000009440)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000009540)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000009580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009600)={0x0}, &(0x7f0000009640)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000009680)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000009780)=0xe8) stat(&(0x7f00000097c0)='./file0\x00', &(0x7f0000009800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r107 = getpgid(0x0) stat(&(0x7f0000009880)='./file0\x00', &(0x7f00000098c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000009940)='./file0\x00', &(0x7f0000009980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r110 = creat(&(0x7f0000009a00)='./file0\x00', 0x100) r111 = accept$netrom(0xffffffffffffffff, &(0x7f0000009a40)={{}, [@null, @rose, @default, @bcast, @netrom, @bcast, @remote, @netrom]}, &(0x7f0000009ac0)=0x48) r112 = inotify_init1(0x80800) r113 = openat$vfio(0xffffffffffffff9c, &(0x7f0000009b00)='/dev/vfio/vfio\x00', 0x40002, 0x0) r114 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000009b40)='/dev/ubi_ctrl\x00', 0x100, 0x0) r115 = syz_open_dev$video4linux(&(0x7f0000009b80)='/dev/v4l-subdev#\x00', 0x1, 0x8000) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000009bc0)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000009c00)={0x0, 0x0}, &(0x7f0000009c40)=0xc) getgroups(0x5, &(0x7f0000009c80)=[0xee01, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00]) r119 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f000000b040)='/dev/dlm-monitor\x00', 0x200, 0x0) r120 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r121 = socket$inet_dccp(0x2, 0x6, 0x0) r122 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r123 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f000000b080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r124 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f000000b0c0)={0x0, 0xfffffffffffffffc, 0x10}, 0xc) r125 = syz_open_dev$vivid(&(0x7f000000b100)='/dev/video#\x00', 0x0, 0x2) r126 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) r127 = openat$vim2m(0xffffffffffffff9c, &(0x7f000000b140)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffff9c, 0xc058565d, &(0x7f000000b180)={0x5, 0xe, 0x4, 0x1000, {0x77359400}, {0x7, 0xc, 0x80000000, 0x8000, 0xffffffffffff28a6, 0x20, "5910217b"}, 0x5, 0x4, @fd=0xffffffffffffff9c, 0x4}) r129 = socket$pppoe(0x18, 0x1, 0x0) r130 = socket$caif_seqpacket(0x25, 0x5, 0x4) r131 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r132 = bpf$OBJ_GET_PROG(0x7, &(0x7f000000b240)={&(0x7f000000b200)='./file0\x00', 0x0, 0x8}, 0x10) r133 = openat$hwrng(0xffffffffffffff9c, &(0x7f000000b280)='/dev/hwrng\x00', 0x8000, 0x0) r134 = syz_open_dev$binder(&(0x7f000000b2c0)='/dev/binder#\x00', 0x0, 0x800) r135 = mq_open(&(0x7f000000b300)='-trustedvboxnet0\x00', 0x840, 0x104, &(0x7f000000b340)={0xb1e, 0x4, 0x7ff, 0x6994, 0x9, 0x0, 0x401, 0x8000}) clock_gettime(0x0, &(0x7f000000b380)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(0xffffffffffffff9c, 0xc0585611, &(0x7f000000b3c0)={0x4, 0x7, 0x4, 0x2000000, {r136, r137/1000+10000}, {0x3, 0xe, 0xff, 0x8, 0x6, 0x15, "fd5d767a"}, 0x6e, 0x0, @fd=0xffffffffffffff9c, 0x4}) r139 = socket$nl_route(0x10, 0x3, 0x0) r140 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r141 = accept4$ax25(0xffffffffffffffff, &(0x7f000000b440)={{0x3, @null}, [@remote, @netrom, @netrom, @netrom, @null, @bcast, @remote, @rose]}, &(0x7f000000b4c0)=0x48, 0x800) r142 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r143 = accept4$inet6(0xffffffffffffff9c, &(0x7f000000b500), &(0x7f000000b540)=0x1c, 0x800) r144 = getpgid(0x0) r145 = getuid() getresgid(&(0x7f000000b580), &(0x7f000000b5c0), &(0x7f000000b600)=0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f000000b640)=0x0) r148 = geteuid() r149 = getegid() ioctl$VIDIOC_EXPBUF(0xffffffffffffff9c, 0xc0405610, &(0x7f000000b680)={0x8, 0xda, 0x6, 0x0, 0xffffffffffffff9c}) r151 = socket$kcm(0x29, 0x5, 0x0) r152 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f000000b6c0), 0x4) r153 = socket$netlink(0x10, 0x3, 0xf) r154 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f000000b700), 0x80000) r155 = accept$packet(0xffffffffffffff9c, &(0x7f000000b740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f000000b780)=0x14) sendmmsg$unix(r0, &(0x7f000000b900)=[{&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000013c0)=[{&(0x7f0000000240)="7fa2e91c9997be9bd2999c45865b5aaecd2f7b453bdc44c928ea3bb3f9f0e0df3a1a2a93e5bbf13cf03baaa2ce96e7f589b7e85c766bb1723c8dc1f0a2f3284e65a3eb4c5f96b40119b334dd95ef0ffd758b5530ded999fa47a6e29199b21aba080d2d273dce896db5bdc7088f9d64e69a1a75d63609f6584555c795ad5a20a276f191ca54c6d70d", 0x88}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000100)="4fd4b4695a58b17974a1e151aed96d5d8561e29b18e30f211c", 0x19}, {&(0x7f0000001300)="8464cbd721891e7a4b0786fc7b9b39a8e98354d4795b466a713a8127fc201be17865f339f72b90a2a75b909a2fc21b1a2c83629506c489fc55608d37dd6fb7e5cf925930547bcbc9f35a04fb8a8dc61ec6f2540c06011779efd27bb861690a5a9c2b8a42b8ac4734f57d7a74a9db013502ca46", 0x73}, {&(0x7f0000001380)="7267af7ac202238df767711d05b8db7a066ec461b7656dd104d5f14e8e0cc0091ccd00200547d539b41f8fb8634f88b3af79462efd79524d4a8e756254", 0x3d}], 0x5, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @rights={{0x14, 0x1, 0x1, [r10]}}, @rights={{0x28, 0x1, 0x1, [r11, r12, r13, r14, r15, r16]}}, @rights={{0x30, 0x1, 0x1, [r17, r18, r19, r20, r21, r22, r23, r24]}}, @rights={{0x24, 0x1, 0x1, [r25, r26, r27, r28, r29]}}, @rights={{0x1c, 0x1, 0x1, [r30, r31, r32]}}, @cred={{0x1c, 0x1, 0x2, {r33, r34, r35}}}], 0x138, 0x40}, {&(0x7f0000002040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000004240)=[{&(0x7f00000020c0)="1bc476932a4d9137c00cbd16668d4181c4b12016b2790ac0397ee024512cc1fdaba1c3c9bd735dadec33c86f28bc905d1978016b2e9acc07c17b8b9c0b59db74874115f15c99097848618330b2d23799143db96741e473228843ae9efc68c18f23dffee818bd31259657ae2b7e1ec0b4698b10557a25f6f852207bd06a000ebbefd02680741471a05076dc2786ae475ac1c586bbc1dfa55e0b8cad85a272b6c1bb7d612c5796557fa9391e6b9bb8b9bc1b10b2fefd0d04077b9c2a6aac8dad47210afe7daccc8c4133687e9bf7cc923e9b053043a3494753651fb9ae2a77bd99999ede", 0xe3}, {&(0x7f00000021c0)="cbdb1fc4755dce451009884a9927deff1ce04b8ba514e111cf3a22a0993e66fe1b0a21eef3dfea6e00dd5e66757285ec49db090e1e1d528effa3fa266240366c113e1768506d95b309ef13b177fb4568d488425cfd4ec03a09dce0fbf144b62c97be3c2a2081f0c2ef76d2ca97af1a390165bbea26302085bd7b5ca58f4fd5e93ae1e190a1edec75af977bcb1252cb79a2def189e43113f3b3e4e15c5e64b710adf05cf30bb9ca65225d97e9012fe64400438a51669445f23f227f2242e1328e075bd5cc195e6062023c8f501a52948ad1a832492a750d8830f0c06a89c07b068da9caea9d201dcb51f32ce9d1caba589f88aab1122bac4fc3111547899d8151da12fec73434fd7a163541ea7c6e2a99c44d941d8d29419a1292afc63e8a5ee55ab3c4e0fe7ea2997976e91899b6516102850f6a9875e2b3a7b10ace2f9b440c30377f096eb03debbcb444a73130ff6299877999c947bd464eca3ef86bf5993ba25641f63258160fbdde56ee321ee917b75e75d211e8e4a3a60a3b485dc2fcab70c27279018cbe6207812d7cbc42c8e0a97460c2b5f319ae735a393f94cfc529278e12b9f80deea451cc5de3c78dfe84176f6be88f1613a5d9a99eaddb5ec9f0bd49a50e8119677d8c5460388984c6a5b18f9f846a16c722f2261b8d38320fc5af67ffe175a994cd3c997cd1c003e672fee0c945bb07212c8741c4536945df2cf8f0fe87d999daf3aa85d69c024b7d27afe59eab4dd7a6b43cd2b2a217d40480186d87b28928e2fb572ea261c43c9763ecd550ee4aaa0c50e09a80e7954683dda235ed8e058f4275f243b63b12d3e58b60955739b89828fb84565222ea0fadca3eb94beef7988cce50d715d71f4af4b61cede2e70b1369e64ae07eef2c981c0422d94d69b1fb57e4810571b1bbe3ae468779d19197531bbe0501a890bdf2aeda1ec0dcb02f4ba7239d870bb03ada389ab269eb0f08b948f78031c84e287eb99543549a8b6a7fd9021cab74365cf597cb557834cb3ea19f25f9e8f9ef885f6d0087921f4171568b76b96ef12ee004abb1a3a0f1e413889c47b21ef5db35781393625bd3d4fe856d43891e2ac682508ae06f8241651b1f8c191629a7197d34da848385b1b80aae3aa9f0cb22ccf5ac5ed6284bb7b12896b112eb17992b224043240db7bfed0f68755e430c8452b24f9e23654ce700bab1df0687078a3fd99324bf9d5f5d8c6db5133f30c640cf9014a87218d2d6d91738329e60009d54617e2f4e6ae0cee065adade25d33f818a67ef91f8a3143e5de94affe968cd3a14dffefdf7d07823f41d43fd77249a9dac0bc554861985aa6f7ed92f5eddb7f77a6d416daf1f4601d671fc905d5d61ffa6d119571f4b927ab744e237f0d57f4d2f859a1078dc7f23558fd04a6a62764b63151401774e755d4358b04ffd0f2ae85fea52ed240b55aeaf1022cee141002bd6834fc2b03ce4362eb112a47ed28cb06244c4047291490c37f829d186d7662319e43da8b1323091cced1d02ccf0c585afe05710d3e282c2c5bbc64eeac68e9592f08b24104d6fc7bf53094fc9f075fed97917b971364d3c19994a58a8b5ea38c8b56bbd4a53c0bab6314694f11e26858a39594c0e0a0855f02f93389cd02616290f9e11b24bacf198a72fd8d7ddd1b8e5e295b9c5578bf4875210aa1424cc7e574328b4f75d5403bd86acfc42ec56c93e96e879301ad86513e84bbe2cc03b39fc19a8a33c8d3db6c31d00513e654c64c938915b74a4122d8a7cc33a4857e08b0b5a79f29805f58898874bb09a84fb721a9e02b5ed85198851fdcaea186dca3e8603640e03c2cc562a339f9ac1fdd5e2a3c22ca407f9d59ade2c41447f3615e28fcbb1796c05de0cf651ea896006765eb910b44611e33647b725a47899bc03b385faab715ae2f0c40b5f704170ca1441ed1439c149dd7abfb0062741d1bc9cde23e2271eb1a55c9efe025adbcb4337721c166db3e5a57f415599dbd5a1a33af5e05016cbd0b9751adf6b30b1fa1662d84a2d41deed3e4a8de81ffd041990230cdddfc4cc0e93c787afa542791a9cc8ca07998f129aed261adf0eba9008a6e94fca891e1a066d8869d8a71231ce26a57151df0e9f41497b44019deb36247df6c6cca8da8a0e98e27016d57cac930592055afa5871c30039f9a5ec84c2e53512978ddff288df633f79072b1d29c7d065449bd761131d49d4a2d816d3fcf833fd8cb3bd193bff9a649cefc0544219fe83357819dc3a55db39238cc69c44ebe651d973dd123b94973089a06775a187c494639de8d7df7cb0919fe42e2e619270e5fac53ce6e9fe2e03a970d2baa6145e7d0f22e7e699b00ab1849727d3e1b32166516659bf1ef616473c3e729ca8d66738ead63770eaae538c4ad6a5aa2b7888bc05c8d551522c5cf5f9d0f16fc6f48f9efc85e59946024bcfe120ea0dfb2ef4c5917f7346d9665b97ec5c15a3abbe3f3c737923d52c140eb378997befbf01e44cce80eff0c0eafe3b03eb3176c3140626dcb962529fd18a9d79c2278f80d16f73f94873bf4fcf2703e77052e8c7af4c0e513e76493293a7d8436142e949e9f31a516e448aada05af097cfe87802624498c6b555189de011b7ff09a30a9c9a0a798e8ff20c74404b63c1bad88736c9e7686c7776830fc0be1f82876b419e0f51f32a7701f6eb924916bbd383c8e05f686399bcf1e0fed3c3c8e1c5c21729dc2a40fccad46142af8e07a7d671a143e839802f622aafd1023c6dfe61d2fb3654ea2aced571a8cbdd9f27879a46f71ae59ccaa919f2a6ab3fa71ca5f008333183916db2dead044aeb5eeabdf38bc5c93e6676e1a7dd373c7ee5acfd7627fb455ee9252cc39fefa5e5992992d3da3dd9d574cc96fbc2cede0f257c2323e83590533702f4ac8e3e6133a9123d1f14909a1d9a298b82d7964a3cf531e2f62af2e17e988bd8da4c804f901c11a0fa7374a7709f647c306cd3dbe72b9f0235ab1eac80590b556f9fef1726d281ced4865fada23c0fd488d863df847a3519ae3f9b7c6bec8ef64c6a0f6272f02716bda495097e74969ef1e825042576fbeed2a780c1145cf51746d62dd0894850b8b22a0431186f5fc906971eb72dd8b1947e62b69d3a3a0303fc7456346842b60e65d774730af95db8b7ad51258c6f2f0ba5c8b8899bdb979fd600ec94c943408d88baae4790009080aac546b4459cd371e5c76d78fa94b7dd3b66fc3d42b611db6012d0c1bc97d3fb54347a9e0971d3f0388df5b662817a956c4d24eb3af51f5d2483bf3a1ff23388ea45c430bcf38a33172d0fcf9ee32ba90ed9a10ca5d4d18e0899d6a110bb0c04fcbf78a45e5394ab2cda22869bcd5de55c213dceca222f7a33bc7e32b2a735c4b7c23fc0a1c44c53e65407210d26255858382822f69861a57c87073ab87a4dbd6c959ca30a4b339869a6fe8f0c88d5f4d37c85d55f261ebbc75aa9e305bd13aa7c6f641df231376a5bbcc6ae4b91edefcb131b5f02919a6c6d0599807492a68a8a8f7416f287d53d79a77583d50e13c4caae88e37ea32b029f7eb907f1ff655481c6ffb0689225165f9fd48a71e0fd5b650c17e6425d44b9f3871b55a28ac419f7db380e69a0b473ae5b5925bbd756a97d0d00582d20f97e472fa8eb532d2a949802e8548257ab1f5557c532db8db51235fe80af9fa7b17dcedce63e3615c4d37646062fe242c247b5f3df259a35d7df94ec556e3d77e678755ab407fb585459b82b0f3ce446454352794cd179c5abe242e6336379b3f15b6886fe24bb26b1a82ffe826528287b57d06f7885c344432809fce53cbf1bfc3e0bee4e6f1e60f50661b7486cf0ee284466e5f73a4c1102734a5b869ae074001be0ab5a68da4b7676c82ee29fd937bb48abf872056d0388e2e489e1e70719ae82e20eb0e3f86b9d05acffa2be6a6a820daa103fcd54e716bc2abf977908c94ad73053d0fce9d1aa03f273b345cef3f1b31cba14458fb58ec09e5e1fa0411fbf1a5b22ce541f09900e56de229cc75c3caf36ffb934c6eabd009574a7b197d2e523d9f3af55336c0e5fd77cb2d64c732997453c55e0d2ede3003a727358e6042e226a86c58bbd6e313c141f7a6ed001681ef67b01168965fdc096dd064a32039369d701a36cc3ad4e96280726e06703f7187878569d17e6cfc081d0fb2839f9b673e1a7108930df593fd77291338053c719083e64ea2c6c565127af76128f20686c00d518b9d171d5ca457a1c286f2cd7f67ff7dc578effa3debef051d9283aed27dfb3333a7faab0f578812cfc324ab20829d08dcd7cce60708222c501d4791649585403358a7891832b9edd99ba4033969407021c9ec7c175170dd2c5d769606eb8b63a98e82630094012750228165d28c1c0a6a35222de5abcefb1913fe25edc2deff7bb242c3f4ec795351043ccf934c3ae8e114630c7736bff62f533812d1d2e6082086ba707eaeb6280dcf99a77cc7db3bc81630407be392477a79fd98faf4e9f565433b40a85d38f219891ed22f8c19c448efa78cf8484b8b6b6981881b5f56ea68ca2dcba460687f0ed6afc416c77c0ccaacf18aefe2c3cd0ceab66cc4c73bc46504280c60e7c36ec5a58d473cae55da6827f8d5428b088dd85dc6088407d6e2c878e40a7c3cd31558a019392cd974838f67eb2c2bae25dcdec082e78bde6783fac3e71c4d227ca9fc5f00ccd7d3f5f8e5f568cebdbeea239be1dca5c2441ee6fec68054e89a3f9adabfd82a21c573acba79c6119249331f97c2bd6a94f3782a4af1eff387b4a5f9e2c0bc1eff8fc5dbd5ca24ae869fe6f1e3dd99ea4299894ab67f2f034c9f72f3521f9253449c732b601bdfa6796390b02d1fcb8a4c2ff4c07cb8af3125e8c5bb13f03dc88c69f07d41d4ef0b4a00a8b30c97b7700fcfc60e177eb08d896f1378ef339b1bfc6e25b5f896a85ece4c879d0e6e1892eabf34d5c8a08f044c30da69bb0d00385c2b784d2cfc630515cdb82711e6dfc4e4adc98ca6a3fbe138c2fd7693499d38900b8c3fb346e5e012994c8598f73b8177464a7d179c5d7f2aa3d83914e3fdf4780fc5b626c1884c2fc81addd2ef66878ce5248095fd12c4731560ada98eae5b0cc1c1e45feec0bd3fd79f5d2c5d6eaba81cf9a654b525d5681b5b02e3bc6ddded31fc540117d7f6fbaae1f617295121b385cff9337c543ce03f8cbf8d88e0d3538209aa13a2fb4655bd7c9e50c8b6983fd0001db9e37fe03a7a8ae0d3af859d1769395ff69fe595dcf4e4dfcf11152a8a6a696b308497e3f7c353f9b848664bbd4ab7a8227b8b27c3496543cc27456cede376453cb207270c8574956da716955ac5fafcebf9e10be7de7854e3b8a5fa2c4621dd91673d0c624dc0d2b030b80e51fe71117b4e2ff32a834e69e015d1b897e7f6f509e11289407b195a5c48bb5249f353142908274c62ed71e423cb50c1bbb3d32bba4fcde934f236df836036a235e2bf8da78ed2554f7ba3390a6f973263e3a48a5c43f83df912edf8fd46969a841da0880e40e251848ef839c366a4f9bc55b5f617e93425197853de5618f629f4a87db5ee9c4b12fbca6328a0692da3187269087194f6e3e09557565d29f3d75eb27cba9780f412296e9a22a3901919918f948450e5936d4a82edc6a08c3015ba4f463e3654321e83deb537d75233a9e446946d27517ed7c6353cb8625e7b8a09610fd7601b58808b9d35a1b4383263c54f8677b49a2b07f3ad9a8b44208032641cc362b28073870c0a01cd6968a0c8dd170c898f2bdbb9633efb3e9c7b", 0x1000}, {&(0x7f00000031c0)="bd9cee8bb23fe0d6c81927c975daa5117dc81bb5b90c737c3c572cf22303acec340000281d54e2", 0x27}, {&(0x7f0000003200)="48c662241b4ffe6e6631a36f0a174df23682a7a8283df02357", 0x19}, {&(0x7f0000003240)="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", 0x1000}], 0x5, &(0x7f0000004dc0)=[@rights={{0x1c, 0x1, 0x1, [r36, r37, r38]}}, @rights={{0x24, 0x1, 0x1, [r39, r40, r41, r42, r43]}}, @cred={{0x1c, 0x1, 0x2, {r44, r45, r46}}}, @rights={{0x30, 0x1, 0x1, [r47, r48, r49, r50, r51, r52, r53, r54]}}, @rights={{0x14, 0x1, 0x1, [r55]}}, @rights={{0x24, 0x1, 0x1, [r56, r57, r58, r59, r60]}}, @cred={{0x1c, 0x1, 0x2, {r61, r62, r63}}}], 0xf8, 0x20000000}, {&(0x7f0000004ec0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000005380)=[{&(0x7f0000004f40)="2bafebe8f7c19a2a43347f6419d80430ea50341270c03ac35e4432218f9c36d4617e6172c62b6b33af72d9f1cd8a43a04186e13de32688ff47216e54ccd0b70652df8d4c2b03bcdf3e9ee98cba3584212fbfe8029d1d618594e07da84e5a20498ae23ba940a5d1ff3c60fada43d93470af83dbe7a8b21c2b3bd5f373357f1397bd5b64eb08aa86e3f6fdea0f76f9bffb2de2b856bda8fcbed255acebeab1bc7a7329c8a8b24f8f7e04654dfd6f8992c5b422af8dd4f7d02e628cb5b324541e4e6df8", 0xc2}, {&(0x7f0000005040)="1dfb74ed5ed71a77a50c62d5132f2abb0e146590758af341d2aefbc880c1f6f60d07d3112e80cd7bc91c7f313cc2a8f8af0b4e1aa225a0259502e235ac682f29dccbab0fb5babe784ce1c8fa55dbff71ddb2a6a73397f3d9afba3bcbe83d580cb9ccc4a80bb6760ca894f092bb5d89db74e20efc4d21f81e14de73224f3769376e41d328859c4a94d026fc9802e1500a41aa094d28853a419e78a7869c55b7713d789bf0a0d3c8001c3a49fee0fabab638b598e7d6144205b6b0b1ad6f9fd105d912ea16cff283", 0xc7}, {&(0x7f0000005140)="ca8d4eb5b4c60aeed75f1f7a597f43d4af1a6c26238bef479b5cdf60c0fb3a8dfcefd4ccda7537f0f9e1c2e4fde0a050ff78add4370eddad5c23cc727a25f14feefad68278f7789b43c0e080e8e96f685dbba6a57dc28bf0ad86c9839a428a75a84579d121865b491674e8de31633d0104894813b75e3805ddf08ae405edea62ec3d37e49d97681471f6ec8a890740fa0309e6cfd19d7677afda5b80778ef9839bf44e4721d7715be867097d90bf412158e729dbe96c91052b", 0xb9}, {&(0x7f0000005200)="31aa387133a3dcf39bbbe2b2b5f7c6", 0xf}, {&(0x7f0000005240)="ec9251ac84ebd811a46bee3dcc8d9f1345cf62f8bbafc677ac00d6df23c1636537f19bc86052c0e5216b650ac1c8e1cc4857f2378fad83f88ed95a0b8523bf5332b70baa1b9be0b883ea2d7549ab348e0465036e036fc440ed74db7bd988ae1b1c8417de2a7e0c8047372d5adc9d27d61511008254957dea2b08e932163fa8f939880c4a5ec28b", 0x87}, {&(0x7f0000005300)="9141aaf0f7e2a86a963f73fc6225bf4ac20232b46d4bff05e9d20d21847116da4e7cc2e54ebaf603b62738d6e7ae2f66686aa53e095a0c39d0e4069aacbb92dc02d0ce06022f14a2cf1638108adfb1dc0825654ec2493df54c1bb644", 0x5c}], 0x6, 0x0, 0x0, 0x80}, {&(0x7f0000005400)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000005940)=[{&(0x7f0000005480)="d39878df1fce894234c7ac1ba6e00c0b1d77868ec26ab28495f169b58da788835cb6c44b1321d5c0674fce819b4b3514bc804370a9e29699ce0bf927845625ea2e35c82f67b32cb9e7f6abbc7a416ff9e4f1396101dfa8cfb88f7a2f4f0d8c6ba521628c3756fb84edd307abeba0c4bae002b889657b4ea188cb556683f8d8e5344435df1e036e1fa2de87c7bf7021259b56fd151fb82599ba58b303165bff1389951255bcb1bb04703bb6578503669688526c5aa6a263f3b0a8d9fbf4be9ee897bc620fbc1060bfc6ee0bf67b63fb70e4", 0xd1}, {&(0x7f0000005580)="8a35dc2064faa9fb33a6677f922457d69ce250b6f07198715d75bcb6d316d05f62d2a8ff904cbfe53ac5ecd8cb9977f4b955f5193b365ae0499ba861300c9e56d0aab38f301f299859dec4aaa3858bf784aef43c8cd6ec6cbe74765920d22e74256ea24c4f60d26975e99256eb2ddb2bd7b36026580f2d510fae310e57c03af4930ac25d641f67de5f56350a", 0x8c}, {&(0x7f0000005640)="ee59c7fd4d57a422ccdbd3f8657d4a8d50ca04e39b9732a269a3a74f8b318d028f68883db106bfbdf02ee34b99cb56b09beadfcc50ecea3679ff4f1da41d292f5721a4dce4eded0fbeae31f6e0cb0c7f40cb055df09374a0b9c688722ad676c648d5802a120ecd2df0d91f3cab68def38f6a98ad8896dc000c78cff9785b0fcd46bea07585199d83b6459269f2a21081e81747d3479898dc2eb1d1721fdb926193619586", 0xa4}, {&(0x7f0000005700)="51a8b748e77149e174c6717c3b43d4323a1007827190105f7307c076e9bcea3d58f97d5f78706636618ec752b5f66ca079bb83f7840138d2ae37998bbc64968c561e842c2ed084c9724841bf8a587f34d080e6b98005a7cfa05ac31d4df624113b0ebe6c6252823a5566580c4c933fc05ab0736356551b4195a0729fc44bea65b33db5d9bb0b0b75fdac72fe210bbd00", 0x90}, {&(0x7f00000057c0)="54cd79cf9386184e1698b34697a7b0ba6e480296568b3137c9739474681c5fcc3a9d9c022d99b796c7894ac39a208c598b42532c8fff2cc42422b2dd6333b0e9b20471f09ebe11", 0x47}, {&(0x7f0000005840)="50671da3c07c9af594cf5825ecffe33a2fddcca19a1145a5f287b4663d9ad34c43834ef062311767fa7148ed0835c58836bf248b466656307e2dacf130d6d23c0232df28b57403f356556debfd3c9d964db794388ca0e4de0b95bd0cfe711809a5680412d63140ad581709311109428a4db1557290e47104fa6afcbd2c9d36d8c68fda151a1b8f1bb0124525700576ac7d154eaa94ed831605d70d32d9154d49d9692b2d1824eabc76284ab5bb0e14eb13abbdce292748", 0xb7}, {&(0x7f0000005900)="e7a1d55fd2257a1bea52f6f07863243909881a221073fdd3ae760707ef78fcc93b45e5f83417ca399734f832c59f1ae68f7e63bb7a62217d66", 0x39}], 0x7, &(0x7f0000005e80)=[@cred={{0x1c, 0x1, 0x2, {r64, r65, r66}}}, @rights={{0x1c, 0x1, 0x1, [r67, r68, r69]}}, @rights={{0x30, 0x1, 0x1, [r70, r71, r72, r73, r74, r75, r76, r77]}}], 0x70, 0x4000005}, {&(0x7f0000005f00)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000006100)=[{&(0x7f0000005f80)="ae1b644eb988bf8913703be24e5211589cd56a4931e70f046f3c903a4c578a68a4279e98be8bf8cd41867ad9af61432df76fce706455e7aa12b5fa379dfe186a15f3371c32cf3581d5c2f083f3693b7b034ba68b0fb38dd8e1007c8cd55cc2c5fc", 0x61}, {&(0x7f0000006000)="553ff79188e3f02ea665da109ed0d2d881d1582ec718fa69496580094a10facc0f9901e5dbab8c217f602090e3749afc8389837c3ceb2bf3fae80bd3718a3948360d133570acba8cb918f1be0204fe7ae88b91d1192bd71292c0c45a5083b02dd9cd196eb0ba7fc40686c8cc219050194a6ac2e3ed1ce5b8a4a9b8896f19086af9", 0x81}, {&(0x7f00000060c0)="1e3082b8ac6c9318ff420511363e05ed94710b555bcb02cc95ef0a8bb43b638c50297d7b50ce141b85e725ec69db993287e61fb1e95542895566", 0x3a}], 0x3, &(0x7f0000006680)=[@rights={{0x14, 0x1, 0x1, [r78]}}, @cred={{0x1c, 0x1, 0x2, {r79, r80, r81}}}, @rights={{0x1c, 0x1, 0x1, [r82, r83, r84]}}, @rights={{0x20, 0x1, 0x1, [r85, r86, r87, r88]}}, @cred={{0x1c, 0x1, 0x2, {r89, r90, r91}}}, @cred={{0x1c, 0x1, 0x2, {r92, r93, r94}}}], 0xb8, 0x40001}, {&(0x7f0000006740)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000007dc0)=[{&(0x7f00000067c0)="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", 0x1000}, {&(0x7f00000077c0)="3bd2be9ea388ea33fbe6ef1f0c9b7e636314ab04718e4eeef7d0246a5399ed0249b404f3e418c45f047916f04634d691975fddc329e59fcda9de18ef6959a91c9e4adf5d16c858069910c0c8770eb12bc84ca206731fd64d307495d65f5fdcf1be2a1a51a6177d9450355df95441bc435aad", 0x72}, {&(0x7f0000007840)="f1db38f1518c4a20006ee3ef177b196a8464bcbb742ca19749f4d2abb275be8515b38a53ba7ed0b43aa2a65b412d30cf5ed9db731f4008d24b05dd8e056e58d77d1262384f5ba6f615c6de10dc47faa391a8ffd4c23fedaf8e466e3cccb267dd5a751de1cc41482c31d65c8847dbeb41258dbf8d5905d400", 0x78}, {&(0x7f00000078c0)="c5c14259e466c0d4c8d983dc2b682b554a71b16157dae2903eb4b646d7af1e12b28d867875116230321b1a8ad162eb59a363ba56f4cd709a3261860103c6ef5a02197fa04c1135e50ed0461bcecf1e567bd1038d7fd4fad801c28b7bbd0e852cf4c0e7c6cde24aeb0989e70fd661e07f6204efa63cded16b92fec6e235da8faf50ad59c319f73a1448513bbe373e2360db929bab5d7f660878b4689d714d5dc1", 0xa0}, {&(0x7f0000007980)="c8c95d62dc5437b4323696ac0f5f15b8a21562cfe0599b41ee9f14d8831c706a63f58728e6cecaf0e33846141a66d2208c6097fc79b3a87882fbb3ad04cad5bfe540682517a0bb855367382be33a1e5dda9b855cb9c712784f27090e0cf49ee338c4ea61713d4cc2ebddd3a1bacffb93eb285380dfd375dc15a993b598b9f2e6465ea87751dd90a4d5f50b319924d59a2d1aeb398a8b289ba716f2402045df2f8a1090cce7628bbf80dc4f21abb50f34af0c5c37582e183c666059fa7e0361a16bbf2f57a2ac03efe1ea2181c1feb25e8b4e", 0xd2}, {&(0x7f0000007a80)="d1f9a8f3ab55c443940d0861348bcdc83cb768197b23dcd86455a13edcdd563e8e5f4282f30dcfbbc0b856c490fd4d0fe691a4d1f71a6afc0b2698e9902264fcec14ff2b40e7", 0x46}, {&(0x7f0000007b00)="021c2bc2ecafff54ee72a04d7c0696ad36c1107a721c791b2cc34425f58a6ec73227997e3bcfedcb3ff298836a969d1c46ef2a6aa524e18bcc5c1d9c5c0bd695b0dde2f04e10af7446e22d8ac9af694e22cfb2969ec5d5917d559537", 0x5c}, {&(0x7f0000007b80)="c03d546a693ab5b82f2f1cd32a6f72c57401ec8ad706a84b141c7d53633b7a6e66d63c77878f081b57cc70c7d8ec4ec8", 0x30}, {&(0x7f0000007bc0)="71b09d4f5a416860bff835efe66cf7681915cc310031b2f567cf8caf45efb4c2f946a1bf9656634ac6910833334e842bd49db1e74762ec83795696af68a74e64fd2ea425ff2ac2b86ce06a7ddff1e4f5ed4f11c3640fd57b115112644b8cc446d5988bd54ed2710c61e07c465ebcf3ed65cbdb0e6e85d424d68c206724784ba8590a935842fe1bd0a77add2b574407fadb07b58765cb57eafa824955650163dd8519e44348a233dd64e5e12bddd8ee0eb988cd8178183ffe93b3486c6bec4e53f345c02e694ab5358242", 0xca}, {&(0x7f0000007cc0)="dab885c439bf84939f81618ddb4bfd1703e0cab40265b46961a7b11886d8743d9b34e62df2fd1d4806996fe58c8e1eb58dc3b1d7fde448d02ed01b98d0e7f943674b588f5b110f8ca603533e9399f0bfe200e2906c96ac04750ec89ffb84246837d6fa21a2bdf29d26fa383fd2c3a25709e8b245bfd73c726ffd93996c96b7f447d6d8748dfb8b878be94394bb011532ef2693024a876af27d4b3bdb6a4c9067ad2e300504f02d8252c153f683613d45101b7f3b1ce021e0682ec7cf2c5164fb3281addce4d75b94fa66344c", 0xcc}], 0xa, 0x0, 0x0, 0x80}, {&(0x7f0000007e80)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000009280)=[{&(0x7f0000007f00)="276e8266f32ad94604d47e4fdd370470d79fdbecc96e8d186b3f7b75bdc86d087915e0f5c08357bc5683fe48f8fa029cc8003756389fbf62c6878265b9c5492a7a48f0d1527fa8543f35821d7690838a5e51d217dea91563", 0x58}, {&(0x7f0000007f80)="9864b4656ba6a2260d93bd1611fda6618051476537fdee2d20e7a00afc998a2144cab0fc366b4bcb224edb3491e1f20f6d4a98692360d2274a0907baa44e9b7b4c31", 0x42}, {&(0x7f0000008000)="5f39d4c8f2933fe0c46c86bb5f1f1512488912dc55ccf0eba93bcaabe8822a573fa9cf7b879ca472b20b671991801c702776a7c48684e59c88e4ffb7958cca3cef1ced0328", 0x45}, {&(0x7f0000008080)="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", 0x1000}, {&(0x7f0000009080)="caad9e26a0ce2036788c16a4a4737f5cbe51e2eed512b3ced9d4ce6ff833fa68d8ec504b126b21de5b6e5d5458f040e741902fd0c315a78d6275796f5267e1e4bc0286ac7841bdc9acc8112c7286ea6dd5341011c763e5767bddf8c15b18fcbbfe7154942793bfb4f8c1166ee527d18cab493755c76dd8a0c74bc91d8ebcb47b750b6f2926a6825ed1bd9b2bc05864bd650f3489f4ddd7d9e6837396901aa3132242a261c59580076c0a1234ec98a9b0b2d2735e41da0afaa0f2c5cfbfb952ff9f9e41d980f4a9be065f4bd1481b220c41a0650758e0d46b18ad64e770ee3a75f908ab13ef2df67d8d47a0ec0a", 0xed}, {&(0x7f0000009180)="d003c89fcd64e37cb999c59a", 0xc}, {&(0x7f00000091c0)="15a892cc07e5c0cb7b9d2195b6412bb97e488e7bfdbdac9f183ad468dabb44325c149d0e98727c444d4b6a5c6941574182e8a73cec033cf3f1949cf50c6dbd4378573ee4b59196c7c53ae13f536627b30424b52c3b4fc769bf0b2f6c731ac38a8e3ccfb157bba5f813f3f18ac7d9e6a22627f9a70bcee923896b09e7d303ec61a4a679a0196dd47145aeca80ab2a098feb198f779d47d91976999b12d0c5b4daf33645450f77f151ca9eb731f69fd9f3d0d68093bccf23", 0xb7}], 0x7, &(0x7f0000009cc0)=[@cred={{0x1c, 0x1, 0x2, {r95, r96, r97}}}, @cred={{0x1c, 0x1, 0x2, {r98, r99, r100}}}, @cred={{0x1c, 0x1, 0x2, {r101, r102, r103}}}, @cred={{0x1c, 0x1, 0x2, {r104, r105, r106}}}, @cred={{0x1c, 0x1, 0x2, {r107, r108, r109}}}, @rights={{0x20, 0x1, 0x1, [r110, r111, r112, r113]}}, @rights={{0x18, 0x1, 0x1, [r114, r115]}}, @cred={{0x1c, 0x1, 0x2, {r116, r117, r118}}}], 0xf8, 0x50}, {&(0x7f0000009dc0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f000000b000)=[{&(0x7f0000009e40)="412b14ba508fd751a2649170a52693ec69de52f6b00623e51bc28e5dd5d842fc3c0257c460a6a64337ce0e5a66dde50b6b082aa3c4783a13c5f6cbfb52c61ff7173e91f0dfa65c2dac6ec7456a8890333843f5cc57d191bd80400c4a31a2ff8d8a1b97114ba3d486349a33e0838a94928565e6c4f68f21c47d88a77970e15301d9d4617a968533a6ac2bb5b518ad376954dc6911bd8ceb3feb3548481c9ea6e8e76d45d5ad912e09ad7f2d48a6660c5d0c2cc09879a98838b7b3fc8f5519f634e7edb63003aebcbf3c432ba3da3c5637224f6349f56ae15c1aeed5cbfd07bb2be0198bdafaf7da9cb6fb7aa0fac61013011a", 0xf2}, {&(0x7f0000009f40)="49c4aff5ab1ee348e23e5e7fd89f12b26a6f5bbe335e5274b1c1bcebe836e3a47319425b8a37945d06ca3a660af7c0ca224cd1b09c6db86765c35c8bb3a09f9e7a1d40de4a9ed30f41d01c51b117a2951542d9cbf7ed6ad54696f678aafb61133987a95136ec1b4caba737306787234f75a18a2d4f593012b8d391bc27d5bb59bc1e066acea8ac092ae66733344c872523d0a4f9e8c1ca8545b6ef31041d87d058268e3805fd939699130700df5a31a7da1a657b76ad99", 0xb7}, {&(0x7f000000a000)="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", 0x1000}], 0x3, &(0x7f000000b7c0)=[@rights={{0x28, 0x1, 0x1, [r119, r120, r121, r122, r123, r124]}}, @rights={{0x38, 0x1, 0x1, [r125, r126, r127, r128, r129, r130, r131, r132, r133, r134]}}, @rights={{0x1c, 0x1, 0x1, [r135, r138, r139]}}, @rights={{0x18, 0x1, 0x1, [r140, r141]}}, @rights={{0x18, 0x1, 0x1, [r142, r143]}}, @cred={{0x1c, 0x1, 0x2, {r144, r145, r146}}}, @cred={{0x1c, 0x1, 0x2, {r147, r148, r149}}}, @rights={{0x18, 0x1, 0x1, [r150, r151]}}, @rights={{0x20, 0x1, 0x1, [r152, r153, r154, r155]}}], 0x128, 0x4000}], 0x8, 0x80) r156 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r156, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r156, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r156, 0x84, 0x6, &(0x7f00000000c0)={r157}, &(0x7f0000000000)=0x200000c8) 03:34:51 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f00000000c0)={0x101, "c5b0ca6193e50747638194b26d5247dd13ed14f39afa819ea9b35a185dc110c0", 0x2, 0x1}) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x1000002, @rand_addr="bc85a11e8eec4517e562d12775f07551"}, 0xfffffffffffffe82) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0x8000, 0x9, 0x6cbdeee9}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x9000000, 0x400000) 03:34:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xb000000, 0x400000) [ 230.985731][ T26] kauditd_printk_skb: 14 callbacks suppressed [ 230.985742][ T26] audit: type=1804 audit(2000000091.959:34): pid=14005 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir827122349/syzkaller.t3RdIh/281/file0" dev="sda1" ino=16522 res=1 03:34:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x10000, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="312afdffffff"], 0x6) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x100000000}, &(0x7f0000000280)=0x8) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000600)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="00082cbd7000fddbdf250400000008000600a4000000080006002b00000008570efdab00000014000100000000000000000000000000000000000800030001800000080006004c0000000800020008000000e0fc68be80ba949cecb98e94d2e95ddceccdf35018a6a8576abd475fce15edd5b751e46c4eca309935fe9411aeac7d5b08dc47af0370fc3cf55376700d27282a7bc5a9d27bd0f7fc36eb35fd040f0cccecc760796d5faec082e7b4e3174bff0f355ffa0634b4cddd666aa89371919ab084a76d3e4366ab714164423db54c6ae32c"], 0x58}, 0x1, 0x0, 0x0, 0x8800}, 0x4040) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000002c0)={r2, 0xd1}, 0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r4}, &(0x7f0000000000)=0x200000c8) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f0000000100)=0x8) 03:34:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc000000, 0x400000) 03:34:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:52 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xd000000, 0x400000) 03:34:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f00000001c0)) shutdown(r0, 0x0) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000003000000", @ANYRES32=r1, @ANYBLOB="00000000000000f0ffffffff0060000000000000", @ANYRES32=r1, @ANYBLOB="00000000000000f0ffffffff00f0ffff00000000", @ANYRES32=r1, @ANYBLOB="000000000040976a3ccfce115fa0a1de75000000"]) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r2}, &(0x7f0000000000)=0x200000c8) 03:34:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x12000000, 0x400000) 03:34:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:34:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x9) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x4502, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f0000000100)=[0x1, 0x3], 0x2) socket$inet6(0xa, 0x1, 0x200) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r1}, &(0x7f0000000000)=0x8) 03:34:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x3f000000, 0x400000) 03:34:52 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xd000000, 0x400000) 03:34:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) 03:34:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1, 0x10081) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r1}, &(0x7f0000000000)=0x200000c8) 03:34:53 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x40000000, 0x400000) 03:34:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x0, 0x0, [0x0, 0x0, 0x0, 0x2]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x48133, r0, 0x0) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r1}, &(0x7f0000000000)=0x200000c8) 03:34:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc2000000, 0x400000) 03:34:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) 03:34:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={0x0, 0xb07}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x2}, &(0x7f0000000240)=0x8) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r3}, &(0x7f0000000000)=0x200000c8) 03:34:53 executing program 2: syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff80, 0x8, &(0x7f0000001680)=[{&(0x7f0000000080), 0x0, 0xcc}, {&(0x7f00000000c0)="49031138d688bfc604908f80365473df1aadf2b61e6a8f0554", 0x19, 0x9}, {&(0x7f0000000100)="1fa51a0bdd301c9185d3d25e6ec069e0bf72ed94a848e1553c604ceb5c3156c2ffb1961e38ebda49b74cee543e96e76bbf948254e4a7ca641c28a3edfe3f4fdf536a1a0c92ceb6bca6d010346e1318379261b4bc96f52fe3a541e7006cee0049aad09fd7137754789c1d134cbb8586fa95555559886959224fd16e17ee9f3fdf396c01ea4bc808de66bce30a733e70ce0a9047a1ec50b2803ceb1ed7aff2c34414d77b450ee3f64ddca96aedf85adebdc5f8f8a147770294d1efc75e4977e7b93126d8ef0d9c25ed2397f845", 0xcc, 0x800}, {&(0x7f0000000200)="c208c8bfec0aeb27c6641e8d5a62263f8ec0ad87c21902f0cff65b171505b3ae59e7cda1f8010550453dc933856b45e503fbfe4895ff804cad3ef28a907c3f347229e1c18de4b60af6b25cb2b156d4d055a476693527b50dcd50d6c64399c38eed465f2a6e0272986db0f05e792cbd1b22ba29dcaeb1c3a4f1ae7fb6e943465f36ad091aaf60a98ced995e2feef0e59ba277798cf97da1b71e5377093fdba5196d0ff8646c5077a61a18bb2af71fbc289da6e5183752317d6dd73d996739e9a688e36121dd2d78cd58bc2444ffbdc9c9aa98d9c3931d", 0xd6, 0x3f}, {&(0x7f0000000400)="acf59273b6fd0215823f9fb465531be9f4f4f4135d6cdb91470b7a6e5c704845e70a2eef9a90edd46e561425785793d407df03bef281e257bd52b2c17293e22a7f283f31914ad663aeb5f81c7116ed48844869e32601fbf7a7d2fecdb90dbcacf41e14d14259b2e50a4798352716b95e5a59ea374a368404bdc337a197eedabc177aae9103e8d5c0bcf4e69ad9d87c704b4db44befbaef38c70b4cca9d51304b28aa270f8311b81b57d4becd24d1", 0xae, 0x7}, {&(0x7f00000004c0)="ec0ecf6af6ce58d01c83982e7cf8b4dad8e4d9d20ee053289f5d1491f3b7c64452c18f0e8e86d750ac4b0463f302c30dbc245170cc4d2aa8b374ccb75d45893231119c8ce5904f85f9bb54bff88e3d1aab9489207bb0be4381d4f126006d2f90ca49be9a0839350abbada3524e1643e5cb84c93087eab3db5e5a930df0e895ac7d9a6113df251fb6c0f98025b95f40a9105891498097c698eed9f00d75751bdafb37cebe8d72be1569b835bf86dd3ad3ed60446e8e8b2ff492fcc9491a0c37693b9e392b21ed312a9b8e90206222aa235421abca21e2c5fcf915194bd7", 0xdd, 0x8ec}, {&(0x7f00000005c0)="df8b2bca331b5543f0c03f7e04d580500896154e23a970a4839205c995c6485ea0102a92a05d89c0c1a318c51c52810a27f154eed2f261e9018ef1a723e4a696c162eb02d852e23546c559fdbf7ee5517d6966261d1cdf71bf7fc8421e4c0414ebfad30365665f3992db9e8a2643bf3d76de57f736711a36984c4ba873f3b9fe1e26ed5f36f8d19ce142f0d9b3c4632c2977d641f9332f7b37fd013707c5841a1447011bf1510972d9f667b9d00369", 0xaf, 0x3}, {&(0x7f0000000680)="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", 0x1000, 0xffffffffffffff01}], 0x41000, &(0x7f0000000300)='\x00') r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000001880)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f00000018c0)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000001900), &(0x7f0000001980)=0x4) r1 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) socket$inet6_sctp(0xa, 0x5, 0x84) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001740)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000001840)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x5000}, 0xc, &(0x7f0000001800)={&(0x7f0000001780)={0x58, r3, 0x1, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80000000}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0xce5658cd4fe7d65b}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xd74}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8000}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x80) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000001940)=[@in={0x2, 0x4e22, @broadcast}], 0xa4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2, 0xfffffffffffffffc, 0x0, 0x1}, 0xffffff1d) 03:34:53 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x737a, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x1ff, 0x10, 0x9, 0x100000000}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x400}}}, &(0x7f0000000180)=0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x8, 0x0, 0x6, 0x9, 0x6, r1}, 0x20) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f00000001c0), &(0x7f0000000200)=0x4) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000240)={r2, 0x3}, 0x8) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc3000000, 0x400000) 03:34:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x80005, 0x84) r1 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x1, 0x141040) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x1, &(0x7f0000000280)=0x4) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r2}, &(0x7f0000000000)=0x200000c8) r3 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000080)='\x00', r3}, 0x10) 03:34:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0x0, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc4000000, 0x400000) 03:34:54 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x404200) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x5, 0x40000) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r3, 0x3e639d5d0224daa2, 0x70bd2d, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x6, &(0x7f00000000c0)={r1}, &(0x7f0000000000)=0x200000c8) 03:34:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc5000000, 0x400000) 03:34:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000080)={@mcast1}, 0x14) 03:34:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:54 executing program 2 (fault-call:5 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:34:54 executing program 3: r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000100)) r1 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x80800) tee(r0, r1, 0x54e, 0x4) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x6, &(0x7f00000000c0)={r3}, &(0x7f0000000000)=0x200000c8) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x400, 0x0) 03:34:54 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x1, 0x201, 0x100000001, 0x200, 0x5, 0x9c7c, 0x2a4, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={r3, @in={{0x2, 0x4e21, @remote}}, [0x9, 0x7, 0x7, 0xd0, 0x0, 0x7, 0xff, 0x7, 0x6, 0x8001, 0x6, 0x3, 0x4eb262b6, 0x3ff, 0x86a]}, &(0x7f0000000280)=0x100) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) lseek(r1, 0x0, 0x1) listen(r2, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000000040)={@rand_addr, 0x0}, &(0x7f0000000080)=0x14) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000140)="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") socket$inet6_udp(0xa, 0x2, 0x0) bind(r5, &(0x7f00000000c0)=@hci={0x1f, r6, 0x1}, 0x80) 03:34:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc6000000, 0x400000) 03:34:54 executing program 3 (fault-call:8 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) [ 233.913772][T14763] FAULT_INJECTION: forcing a failure. [ 233.913772][T14763] name failslab, interval 1, probability 0, space 0, times 0 [ 234.000612][T14763] CPU: 1 PID: 14763 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #11 [ 234.008727][T14763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.018816][T14763] Call Trace: [ 234.022144][T14763] dump_stack+0x1d8/0x2f8 [ 234.026493][T14763] should_fail+0x608/0x860 [ 234.030969][T14763] ? setup_fault_attr+0x2b0/0x2b0 [ 234.036072][T14763] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 234.041839][T14763] __should_failslab+0x11a/0x160 [ 234.046913][T14763] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 234.052643][T14763] should_failslab+0x9/0x20 [ 234.057157][T14763] __kmalloc+0x7a/0x310 [ 234.061323][T14763] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 234.067062][T14763] tomoyo_realpath_from_path+0xdc/0x7c0 [ 234.072653][T14763] tomoyo_path_number_perm+0x1e0/0x740 [ 234.078120][T14763] ? trace_lock_acquire+0x190/0x190 [ 234.083331][T14763] ? tomoyo_check_path_acl+0x180/0x180 [ 234.088813][T14763] ? fsnotify+0x14b9/0x1580 [ 234.093474][T14763] ? fget_many+0x30/0x30 [ 234.097729][T14763] ? debug_smp_processor_id+0x1c/0x20 [ 234.103108][T14763] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 234.109311][T14763] tomoyo_file_ioctl+0x23/0x30 [ 234.114088][T14763] security_file_ioctl+0x6d/0xd0 [ 234.119043][T14763] __x64_sys_ioctl+0xa3/0x120 [ 234.123737][T14763] do_syscall_64+0xfe/0x140 [ 234.128414][T14763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.134312][T14763] RIP: 0033:0x459519 [ 234.134325][T14763] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.134330][T14763] RSP: 002b:00007fa292ba8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 234.134339][T14763] RAX: ffffffffffffffda RBX: 00007fa292ba8c90 RCX: 0000000000459519 [ 234.134345][T14763] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 234.134351][T14763] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 234.134362][T14763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa292ba96d4 03:34:55 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x1, [0x10000]}, 0x6) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:55 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x1, 0x201, 0x100000001, 0x200, 0x5, 0x9c7c, 0x2a4, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={r3, @in={{0x2, 0x4e21, @remote}}, [0x9, 0x7, 0x7, 0xd0, 0x0, 0x7, 0xff, 0x7, 0x6, 0x8001, 0x6, 0x3, 0x4eb262b6, 0x3ff, 0x86a]}, &(0x7f0000000280)=0x100) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) lseek(r1, 0x0, 0x1) listen(r2, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000000040)={@rand_addr, 0x0}, &(0x7f0000000080)=0x14) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000140)="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") socket$inet6_udp(0xa, 0x2, 0x0) bind(r5, &(0x7f00000000c0)=@hci={0x1f, r6, 0x1}, 0x80) 03:34:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 234.158078][T14763] R13: 00000000004c284e R14: 00000000004d5af8 R15: 0000000000000006 [ 234.189343][T14763] ERROR: Out of memory at tomoyo_realpath_from_path. [ 234.220971][T14763] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 234.243210][T14811] FAULT_INJECTION: forcing a failure. [ 234.243210][T14811] name failslab, interval 1, probability 0, space 0, times 0 03:34:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc7000000, 0x400000) [ 234.332163][T14811] CPU: 1 PID: 14811 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 234.340207][T14811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.350398][T14811] Call Trace: [ 234.353898][T14811] dump_stack+0x1d8/0x2f8 [ 234.358265][T14811] should_fail+0x608/0x860 [ 234.362718][T14811] ? setup_fault_attr+0x2b0/0x2b0 [ 234.367752][T14811] ? ksys_mount+0x38/0x100 [ 234.372189][T14811] __should_failslab+0x11a/0x160 [ 234.377148][T14811] ? ksys_mount+0x38/0x100 03:34:55 executing program 2 (fault-call:5 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 234.381575][T14811] should_failslab+0x9/0x20 [ 234.386130][T14811] __kmalloc_track_caller+0x79/0x310 [ 234.391422][T14811] ? strnlen_user+0x1e0/0x260 [ 234.396115][T14811] strndup_user+0x76/0x130 [ 234.400562][T14811] ksys_mount+0x38/0x100 [ 234.404815][T14811] __x64_sys_mount+0xbf/0xd0 [ 234.409441][T14811] do_syscall_64+0xfe/0x140 [ 234.409461][T14811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.409472][T14811] RIP: 0033:0x459519 [ 234.409484][T14811] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 234.409489][T14811] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 234.409505][T14811] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 234.419932][T14811] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 234.419940][T14811] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 234.419946][T14811] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 234.419951][T14811] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 234.582245][T14853] FAULT_INJECTION: forcing a failure. [ 234.582245][T14853] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 234.595512][T14853] CPU: 1 PID: 14853 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #11 [ 234.603531][T14853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.613733][T14853] Call Trace: [ 234.617063][T14853] dump_stack+0x1d8/0x2f8 [ 234.621440][T14853] should_fail+0x608/0x860 [ 234.625926][T14853] ? setup_fault_attr+0x2b0/0x2b0 [ 234.630978][T14853] ? __bfs+0x550/0x550 [ 234.635077][T14853] should_fail_alloc_page+0x55/0x60 [ 234.635096][T14853] prepare_alloc_pages+0x283/0x460 [ 234.635109][T14853] __alloc_pages_nodemask+0x11c/0x790 [ 234.635122][T14853] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 234.635135][T14853] ? __lock_acquire+0xcf7/0x1a40 [ 234.635159][T14853] kmem_getpages+0x46/0x480 [ 234.635170][T14853] cache_grow_begin+0x7e/0x2c0 [ 234.635181][T14853] cache_alloc_refill+0x311/0x3f0 [ 234.635198][T14853] ? check_preemption_disabled+0xb7/0x280 03:34:55 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) capset(&(0x7f0000ea4ff8)={0x20080522}, &(0x7f0000004000)) syz_read_part_table(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000280)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f00000002c0)=r1) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="4d00020000827f00fbd34ae79f4001f9ecb48f32a7bf0ca904e9a6588a7f8a0c778dbdeb509c74979687fbb8c64d5ea31790e00568e23cc4ed58104f4a7406ab504cd66604ef886f5d2f7eadb72e41e30ee12a2a74c00f9a2710ec4ee530"], &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000001c0)=ANY=[@ANYRES32=r5, @ANYBLOB="0600a000dd99b2259e60814422e211ce059ff90200000000000000a10cd602d19a52fd2d4c3990388106293d1f32e84b263491a588b3b63ca988b2adf728d6fbce090c2dec1f35db14cf9d8350c9384af84d7734f4adfdc1880b3be542bb154b411f34b0ac1ee496ec69a95a694872883a00f971705a62bf049e7cd3f8e08a16b283795a5cd6f03d8cb5c352ef459147e79d20cf1d537efc685f37b3c0e1472a0a99c25491253e2179e6e12f4600052e"], 0xa8) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000000)={0x1, 0x8000, [0x4, 0x40, 0x5, 0xfffffffffffffffa, 0x3], 0x9}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000400)={0x5, {{0xa, 0x4e20, 0x0, @mcast2, 0x77}}, {{0xa, 0x4e24, 0x3f, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}}, 0x108) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={r5, @in={{0x2, 0x0, @empty}}, 0xfffffffffffffffe, 0x9, 0xfffffffffffffffc}, 0x98) [ 234.645792][T14853] __kmalloc+0x2e5/0x310 [ 234.645810][T14853] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 234.645824][T14853] tomoyo_realpath_from_path+0xdc/0x7c0 [ 234.645842][T14853] tomoyo_path_number_perm+0x1e0/0x740 [ 234.645858][T14853] ? trace_lock_acquire+0x190/0x190 [ 234.645872][T14853] ? tomoyo_check_path_acl+0x180/0x180 [ 234.681757][T14853] ? fsnotify+0x14b9/0x1580 [ 234.681807][T14853] ? fget_many+0x30/0x30 [ 234.681821][T14853] ? debug_smp_processor_id+0x1c/0x20 [ 234.681831][T14853] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 234.681846][T14853] tomoyo_file_ioctl+0x23/0x30 [ 234.681863][T14853] security_file_ioctl+0x6d/0xd0 [ 234.691863][T14853] __x64_sys_ioctl+0xa3/0x120 [ 234.691880][T14853] do_syscall_64+0xfe/0x140 [ 234.691897][T14853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 234.691908][T14853] RIP: 0033:0x459519 [ 234.691921][T14853] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:34:55 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x1, 0x1, 0x201, 0x100000001, 0x200, 0x5, 0x9c7c, 0x2a4, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000400)={r3, @in={{0x2, 0x4e21, @remote}}, [0x9, 0x7, 0x7, 0xd0, 0x0, 0x7, 0xff, 0x7, 0x6, 0x8001, 0x6, 0x3, 0x4eb262b6, 0x3ff, 0x86a]}, &(0x7f0000000280)=0x100) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) lseek(r1, 0x0, 0x1) listen(r2, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) getsockopt$inet6_mreq(r5, 0x29, 0x15, &(0x7f0000000040)={@rand_addr, 0x0}, &(0x7f0000000080)=0x14) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000140)="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") socket$inet6_udp(0xa, 0x2, 0x0) bind(r5, &(0x7f00000000c0)=@hci={0x1f, r6, 0x1}, 0x80) 03:34:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc8000000, 0x400000) [ 234.691927][T14853] RSP: 002b:00007fa292ba8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 234.691936][T14853] RAX: ffffffffffffffda RBX: 00007fa292ba8c90 RCX: 0000000000459519 [ 234.691942][T14853] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 234.691947][T14853] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 234.691953][T14853] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa292ba96d4 [ 234.691958][T14853] R13: 00000000004c284e R14: 00000000004d5af8 R15: 0000000000000006 03:34:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:55 executing program 2 (fault-call:5 fault-nth:2): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 234.873222][T14881] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 03:34:55 executing program 3 (fault-call:8 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) [ 234.949458][T14881] __loop_clr_fd: partition scan of loop0 failed (rc=-13) 03:34:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc9000000, 0x400000) [ 235.166930][T14881] loop_reread_partitions: partition scan of loop0 () failed (rc=-13) 03:34:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 235.251980][T14994] FAULT_INJECTION: forcing a failure. [ 235.251980][T14994] name failslab, interval 1, probability 0, space 0, times 0 [ 235.308262][T14994] CPU: 1 PID: 14994 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 235.316335][T14994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.326400][T14994] Call Trace: [ 235.329698][T14994] dump_stack+0x1d8/0x2f8 [ 235.334045][T14994] should_fail+0x608/0x860 [ 235.338465][T14994] ? setup_fault_attr+0x2b0/0x2b0 [ 235.343532][T14994] __should_failslab+0x11a/0x160 [ 235.348471][T14994] ? getname_flags+0xba/0x640 [ 235.353149][T14994] should_failslab+0x9/0x20 [ 235.357644][T14994] kmem_cache_alloc+0x56/0x2b0 [ 235.362427][T14994] getname_flags+0xba/0x640 [ 235.366934][T14994] user_path_at_empty+0x2d/0x50 [ 235.371778][T14994] do_mount+0x14f/0x2730 [ 235.376019][T14994] ? copy_mount_string+0x30/0x30 [ 235.380962][T14994] ? kasan_check_write+0x14/0x20 [ 235.385999][T14994] ? _copy_from_user+0xe0/0x120 [ 235.390845][T14994] ? copy_mount_options+0xcf/0x360 [ 235.395970][T14994] ksys_mount+0xcc/0x100 [ 235.400232][T14994] __x64_sys_mount+0xbf/0xd0 [ 235.404825][T14994] do_syscall_64+0xfe/0x140 [ 235.409342][T14994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 235.415259][T14994] RIP: 0033:0x459519 [ 235.419157][T14994] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 235.438888][T14994] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 235.447319][T14994] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 03:34:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e00b4ec7be070") r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f00000000c0)) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x11, 0x0, 0x0) 03:34:56 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) pidfd_send_signal(r1, 0x3f, &(0x7f0000000100)={0x5, 0x2, 0x100}, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x3, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xca000000, 0x400000) [ 235.455759][T14994] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 235.463740][T14994] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 235.471823][T14994] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 235.479905][T14994] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:56 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f00000001c0)=""/129) linkat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00', 0x40001000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) syz_init_net_socket$ax25(0x3, 0x2, 0xcc) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x600000000000000, 0x10002) 03:34:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 235.677061][T15070] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. 03:34:56 executing program 3 (fault-call:8 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xcb000000, 0x400000) [ 235.902618][T15099] FAULT_INJECTION: forcing a failure. [ 235.902618][T15099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 235.915901][T15099] CPU: 0 PID: 15099 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 235.923880][T15099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 235.933945][T15099] Call Trace: [ 235.937245][T15099] dump_stack+0x1d8/0x2f8 [ 235.941586][T15099] should_fail+0x608/0x860 [ 235.946033][T15099] ? setup_fault_attr+0x2b0/0x2b0 03:34:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x2, 0x0) [ 235.951090][T15099] ? stack_trace_save+0x1e0/0x1e0 [ 235.956127][T15099] should_fail_alloc_page+0x55/0x60 [ 235.961328][T15099] prepare_alloc_pages+0x283/0x460 [ 235.966446][T15099] __alloc_pages_nodemask+0x11c/0x790 [ 235.971826][T15099] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 235.977408][T15099] ? stack_trace_snprint+0x150/0x150 [ 235.982704][T15099] kmem_getpages+0x46/0x480 [ 235.987218][T15099] cache_grow_begin+0x7e/0x2c0 [ 235.991990][T15099] cache_alloc_refill+0x311/0x3f0 [ 235.997020][T15099] ? check_preemption_disabled+0xb7/0x280 [ 236.003177][T15099] kmem_cache_alloc+0x288/0x2b0 [ 236.003189][T15099] ? getname_flags+0xba/0x640 [ 236.003199][T15099] getname_flags+0xba/0x640 [ 236.003212][T15099] user_path_at_empty+0x2d/0x50 [ 236.003223][T15099] do_mount+0x14f/0x2730 [ 236.003238][T15099] ? copy_mount_string+0x30/0x30 [ 236.003256][T15099] ? kasan_check_write+0x14/0x20 [ 236.036227][T15099] ? _copy_from_user+0xe0/0x120 [ 236.041111][T15099] ? copy_mount_options+0xcf/0x360 [ 236.046239][T15099] ksys_mount+0xcc/0x100 [ 236.050487][T15099] __x64_sys_mount+0xbf/0xd0 [ 236.055088][T15099] do_syscall_64+0xfe/0x140 [ 236.059599][T15099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 236.065498][T15099] RIP: 0033:0x459519 [ 236.069398][T15099] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 236.089138][T15099] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:34:57 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 236.097569][T15099] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 236.105546][T15099] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 236.113526][T15099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 236.121646][T15099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 236.129613][T15099] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xcc000000, 0x400000) 03:34:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x10, 0x0) 03:34:57 executing program 1: r0 = socket$kcm(0x2, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e22, @rand_addr=0x12}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000200)=0x4) sendmsg(r0, &(0x7f0000000040)={0x0, 0xfffffecc, &(0x7f00000000c0)=[{&(0x7f0000000140)="eec9d87ff76346be7713d29305869ebf71ee6cd05f21c4291a82ccefc2b6980c2031e5885278a40c89954671a14ba13914e01beb5f08ea21a588a9e6fa576327f1107ed967d78c0a233009d26ecfb24835f2e26f5c4ea471a5b2abcd01068b973ffddcf56a333e4f4884bea8a9f39c6d89b0267bfaf3671d7da1da9b98a6b3ab0321d17e24fc4fd91f1f46ab954717d554", 0x91}], 0x1}, 0x4000) bind$nfc_llcp(r1, &(0x7f0000000240)={0x27, 0x1, 0x1, 0x6, 0x5, 0x9, "cdfcdb69dcf93d463ad82202228b7dbe691f8abf16f055a6d4f62a94dbdd9ab89e53e5760571080699c933fbf2bc7d147f8408dc53d6bb6b1c0dac8bf2aa9f", 0x26}, 0x60) 03:34:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x1278, 0x0) 03:34:57 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x10000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) listen(r1, 0x8) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x80203) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e21, 0x2eea36c5, @rand_addr="eb94dff56a6833ffd7de414b65307626", 0x1800000000}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e24, @multicast2}], 0x4c) prctl$PR_GET_SECCOMP(0x15) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xcd000000, 0x400000) 03:34:57 executing program 3 (fault-call:8 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:58 executing program 1: open(0x0, 0x400080, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') sendfile(r0, r1, &(0x7f00000000c0)=0x202, 0x8) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)=0x2, 0x4) [ 236.991356][T15352] FAULT_INJECTION: forcing a failure. [ 236.991356][T15352] name failslab, interval 1, probability 0, space 0, times 0 03:34:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:58 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe5, 0x404000) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000080)={0x1, 0xf208, 0x8}) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000040)={0x0, 0x2220, 0x364cc26a, [], &(0x7f0000000000)=0x8}) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 237.119484][T15352] CPU: 1 PID: 15352 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 237.127505][T15352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 237.137561][T15352] Call Trace: [ 237.140854][T15352] dump_stack+0x1d8/0x2f8 [ 237.145182][T15352] should_fail+0x608/0x860 [ 237.149591][T15352] ? setup_fault_attr+0x2b0/0x2b0 [ 237.154610][T15352] ? tomoyo_encode2+0x273/0x5a0 [ 237.159454][T15352] ? quarantine_put+0xb7/0x1f0 [ 237.164222][T15352] __should_failslab+0x11a/0x160 [ 237.169151][T15352] ? tomoyo_encode2+0x273/0x5a0 [ 237.173993][T15352] should_failslab+0x9/0x20 [ 237.178937][T15352] __kmalloc+0x7a/0x310 [ 237.183093][T15352] tomoyo_encode2+0x273/0x5a0 [ 237.187782][T15352] tomoyo_encode+0x29/0x40 [ 237.192195][T15352] tomoyo_mount_permission+0x2a9/0xaf0 [ 237.197659][T15352] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 237.203466][T15352] ? check_preemption_disabled+0x47/0x280 [ 237.209180][T15352] ? tomoyo_get_name+0x540/0x540 [ 237.214122][T15352] ? filename_lookup+0x4e3/0x6d0 [ 237.219053][T15352] ? hashlen_string+0x120/0x120 [ 237.223911][T15352] ? strncpy_from_user+0x33e/0x3b0 [ 237.229018][T15352] tomoyo_sb_mount+0x35/0x40 [ 237.233602][T15352] security_sb_mount+0x84/0xe0 [ 237.238375][T15352] do_mount+0x186/0x2730 [ 237.242634][T15352] ? copy_mount_string+0x30/0x30 [ 237.247570][T15352] ? kasan_check_write+0x14/0x20 [ 237.252496][T15352] ? _copy_from_user+0xe0/0x120 [ 237.257530][T15352] ? copy_mount_options+0xcf/0x360 [ 237.262657][T15352] ksys_mount+0xcc/0x100 [ 237.266917][T15352] __x64_sys_mount+0xbf/0xd0 [ 237.271510][T15352] do_syscall_64+0xfe/0x140 [ 237.276210][T15352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 237.282095][T15352] RIP: 0033:0x459519 [ 237.286109][T15352] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 237.305715][T15352] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:34:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4b31, 0x0) 03:34:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xce000000, 0x400000) [ 237.314133][T15352] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 237.322119][T15352] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 237.330989][T15352] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 237.338984][T15352] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 237.347051][T15352] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:58 executing program 1: r0 = accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) sendto$unix(r0, &(0x7f0000000040)="0365211786b6cf1ea6d37b8e65225e76e6e83f68ab5766c614eb32cbf6403d2bdff3001b36c938dc6b253bbc", 0x2c, 0x4040000, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r1 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="2bf70a63af51c173d004", 0xa, 0x0) keyctl$read(0xb, r1, &(0x7f0000000380)=""/189, 0xbd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=@random={'osx.', '\x00'}) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[@ANYRESOCT=r3], 0x10277) recvmmsg(r3, &(0x7f0000000e40)=[{{0x0, 0x400c, 0x0}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000023c0)=""/4096, 0x7ffff000}], 0x1}}], 0x2, 0x0, 0x0) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f0000000280)) 03:34:58 executing program 3 (fault-call:8 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xcf000000, 0x400000) 03:34:58 executing program 1: r0 = accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) sendto$unix(r0, &(0x7f0000000040)="0365211786b6cf1ea6d37b8e65225e76e6e83f68ab5766c614eb32cbf6403d2bdff3001b36c938dc6b253bbc", 0x2c, 0x4040000, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r1 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="2bf70a63af51c173d004", 0xa, 0x0) keyctl$read(0xb, r1, &(0x7f0000000380)=""/189, 0xbd) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="ab553fec94248c32e27d04000000288a", 0x10) r3 = accept$alg(r2, 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=@random={'osx.', '\x00'}) write$binfmt_script(r3, &(0x7f0000000240)=ANY=[@ANYRESOCT=r3], 0x10277) recvmmsg(r3, &(0x7f0000000e40)=[{{0x0, 0x400c, 0x0}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000023c0)=""/4096, 0x7ffff000}], 0x1}}], 0x2, 0x0, 0x0) ioctl$TIOCGISO7816(r2, 0x80285442, &(0x7f0000000280)) 03:34:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4b46, 0x0) 03:34:58 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xd0000000, 0x400000) 03:34:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x4, 0x84) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000b00)={@mcast1={0xff, 0x5}, @empty, @remote}) [ 238.037129][T15509] FAULT_INJECTION: forcing a failure. [ 238.037129][T15509] name failslab, interval 1, probability 0, space 0, times 0 [ 238.078912][T15509] CPU: 1 PID: 15509 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 238.086931][T15509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 238.097180][T15509] Call Trace: [ 238.100510][T15509] dump_stack+0x1d8/0x2f8 [ 238.104954][T15509] should_fail+0x608/0x860 [ 238.109384][T15509] ? setup_fault_attr+0x2b0/0x2b0 [ 238.114403][T15509] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 238.120131][T15509] __should_failslab+0x11a/0x160 [ 238.125076][T15509] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 238.130787][T15509] should_failslab+0x9/0x20 [ 238.135281][T15509] __kmalloc+0x7a/0x310 [ 238.139439][T15509] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 238.145146][T15509] tomoyo_realpath_from_path+0xdc/0x7c0 [ 238.150692][T15509] tomoyo_mount_permission+0x312/0xaf0 [ 238.156146][T15509] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 238.161946][T15509] ? check_preemption_disabled+0x47/0x280 [ 238.167660][T15509] ? tomoyo_get_name+0x540/0x540 [ 238.172601][T15509] ? filename_lookup+0x4e3/0x6d0 [ 238.177543][T15509] ? strncpy_from_user+0x33e/0x3b0 [ 238.182647][T15509] tomoyo_sb_mount+0x35/0x40 [ 238.187242][T15509] security_sb_mount+0x84/0xe0 [ 238.192003][T15509] do_mount+0x186/0x2730 [ 238.196241][T15509] ? copy_mount_string+0x30/0x30 [ 238.201197][T15509] ? kasan_check_write+0x14/0x20 [ 238.206128][T15509] ? _copy_from_user+0xe0/0x120 [ 238.210984][T15509] ? copy_mount_options+0xcf/0x360 [ 238.216100][T15509] ksys_mount+0xcc/0x100 [ 238.220340][T15509] __x64_sys_mount+0xbf/0xd0 [ 238.225098][T15509] do_syscall_64+0xfe/0x140 [ 238.229607][T15509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 238.235496][T15509] RIP: 0033:0x459519 [ 238.239382][T15509] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 238.259010][T15509] RSP: 002b:00007f12e6bfcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 238.267422][T15509] RAX: ffffffffffffffda RBX: 00007f12e6bfcc90 RCX: 0000000000459519 [ 238.275473][T15509] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 238.291100][T15509] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 238.299062][T15509] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6bfd6d4 [ 238.307031][T15509] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000003 03:34:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xd1000000, 0x400000) 03:34:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4c00, 0x0) 03:34:59 executing program 1: capset(&(0x7f0000002740)={0x20080522}, &(0x7f0000002780)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0xffffffffffff7fff, 0x4, 0x200, 0x100000001, 0x7f, 0x4, 0x0, 0x0, 0x0}, &(0x7f0000000140)=0x20) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000200)={'veth0_to_hsr\x00', {0x2, 0x4e21, @multicast1}}) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x705a, 0x2, 0x202, 0xc7f, 0x1, 0x8, 0x99, 0x6, r1}, &(0x7f00000001c0)=0x20) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x8, 0x7, 0x1000000000}}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x12, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0x8) [ 238.985576][T15509] ERROR: Out of memory at tomoyo_realpath_from_path. 03:35:00 executing program 3 (fault-call:8 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:35:00 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$rose(r3, 0x104, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:35:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xe4ffffff, 0x400000) 03:35:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:35:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4c01, 0x0) 03:35:00 executing program 1: r0 = memfd_create(&(0x7f00000000c0)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\x8b\xaa\xffIb\x9e\xc1\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', 0x0, 0x227, 0x0) getsockopt$inet_int(r1, 0x10d, 0x9b, 0x0, &(0x7f0000000080)) [ 239.333203][T15780] FAULT_INJECTION: forcing a failure. [ 239.333203][T15780] name failslab, interval 1, probability 0, space 0, times 0 03:35:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f0000000240)="ee0b128ebb27315cf6c24b32c61d2f286222d78d0c449d50ee2d3925610a0cc2f152c67be616b998570167767da2e616aecd4a771c460800ac5d81708e2218051a61e66f0de4c48e558d2330556eda6d7c6c7156186fcf44cdd4133db589d5f89ab0ac5552d936921928e3735cbb234e278c15a57454a4a9f3196f6aca522d5ba28cf7f2db0ff751898f299289f092ffec99030dc9bfa187d2548e3bef2be296ac9edaad8803030b2b5eb073fbeaf0bf2d815774f7fa47f4eaa439493eba91a9b88e3a8addec08379e0cd25bffae2394feb6467895d8c87d21438941108305d357522e9e6c351ae1a90686e62efa6fa5a195eeba2ff3090d7c01c91968ec4709445758e8f50e9bb1ef60033d4aefc29dcbf7db5191ef544ce04654546dfc57c32156fe91de3ca58be49506144981fccecc8a167d77a53582a7f26ef370a25691f7c750bd9a274edb21a1eda5c41d950e0f08cbd5e582d138cd22e343bb54489428aa66ca997f9c7988ff2dc0e3e9c661132afc940b89302ec66fc91f3d3e1b972d32b478795da6263c8fec370a6884c320863990a213a24386ec383d6846a57164ae68292aec7352f6ac9d3d5db45cb1a4f0e71b172da76bb9d6aa83cc0657b2fc001e5b249d493dff5ebe86ab2e719d91057c96909a252a2f118e22a546f7f5125107fe451918707bb0ef36e37acfe995e503cf65ae60914b8cef9e388068cd0f27a9c1d16e01522c176fc358d214cab4af90f8b60a73aaa64fe154cd5305eee2f6d3ab42eabbdc36a3c353078f65d6d9ad8b2ae023cea04d127e8cfd8ab28e0ef8df8583a431f743b9406bc207892f209e270340b9a42fca47deb073c099831a229686fd16dfc7fb1955aa60eb7caab7ff38730f36d08ba6c1258fcbefacb8b3daa6e3aac521882f2ee547c12355c96578aad0be815d5284be007a5a226e9f2407f6467566a2f7d0a91c8dab43b421ded6048198f931412709e952c633adf66150453af44ec0c1949d4a063eef547f3f11a693afc9473d566fc888d9d88a142989f857a587ebaeba58a418133845e48e155ed1bde7a0ebc40aecdf62c6107b8870938bd268b98ceffb00eb882940964f669ca1bb1863ecf66661ae7de97ccd59ef396ee5be4111b778abe002f0e704a4296e68840a68dd1fbfe4d4d60c63bd29084cf85ffa0577a7d4f8ac876c305423fcb30e788db1adf80dd3a8580910ce8779871d12dc6a9490cd84299f365d647bf57327765163bf0e4f6dc3a6b8af9e01b59016afb4c1b420add56e10c8be7842ca581d89df48c97b9d2156e917b54c91b63544f80d5d7ff47163c498f0317da8f0dcdbc8469f701ab4edd8e2f4d7dccc45a19d003573ba4054cacd3c8d94c1205ee551c3257c87315dbd87455a8781b2f3891ff055ef83cc43a7d3f15e9caa9a621a9a6b47cb729bf2960d5eb8aaaa92f73f89be303a979762474a94be77b46b708babb97ad473639a7eccf1e0dc3c976dc2c03f0555624ab5ed0cdcef860ed2d685ca080ae97122469b5027fae6f955ac27b4829d7be38e0ef6c84ea6f6f8a22cd7b1a6c08b50049772312df03a3f7bcdbd847c79dfdec568d02c7b6cd4c57e17713d27868610e47121517ca524405a4ea0b512312d9963d1a274530b8e884b8ce0703a7d550fc69e3ad3f9c357cc71224fdcc1bad78b82bb09e45d7347d5ebb9ba76fd9c3d27c7d221d78532734b9f3e77d9f1a80e9a89705e4dc45f9f8fdb04b8b0d4d0c01a7b65e496bde945489cc7428f17e5adabb516a47faa9b23edf95cc447a04ea87441ccbe01f65ffec1b190a98f010d3f9b1bb880425012da89809778d782f07161a180b50d7d41b4d905b1aa80f9793b6810ada1bdbc455f1c4d3d0071898642acd2133dc6e56603b098ca2d2a52f4b9a3cac75eae896dde750fb37ee49b238840ee7aee588e5f217e6935b8aa1a604c7b4c0582fa5a6d8689a6176f799de065d64427164e15f83a2eb5b78656fc69973e898f52244263a9c969c9b625c07b0f4d5848a57981b6c8b79097843f6b40f5fce4bf4bc13f29177ac92530c7697368d098566461ed6e42ce4f72d6cd526831cdf44cfbc10de396ee401366ed2b54681ceaf733040673fda0456c1b67659685e0c751d4f55e7c628812f4e4cb6f5fae2849d76d8e9660e8b4a32fa1bd55fecd9ce6a59157f127dda6b18e6b71d6a07d59500990633628eea6ce2135790df6aab1b66c4ef29a1203d538ea036da575006dc6cd34e61844c7110fd65cf1c7790a0fef79e62e2481109e13b36498721d66549560d4bc673317706c4e3c3d14d6ba1fa235c5821605138ceef5e17124eed3b015cbd274db37a91ef768d8ae7ef243b08b3133f33e9c070c043a818f61e5dbba8424e0791e295dff76917d39c23b5f9d5c4f10f41f78af6be468492bfff691f99456f078b27969934886aaad4149512e386982dfcec133c0e6c1b0fe53d979153f169e78663223f13de1c8791f59edcbee8c6c871094fc492d25dd56e5baa64b7f0224cdb8b548d3aa61d1a68646ea31e452bbca02de36d36e5da59f5a9225956f077c168965727ce528675d1ae43b07caae5754c2d6b7caab86d2094acd1026179a020cdbe05a9f9c7a7a1a525221b6836b4cdf813c31c06ed41efd3f70ee4cdcad7adc8e2242c22ebc4265a6b2b9820c16a224cf42bc9808e526bf2d86375ca0584342c3cbdf193e9875daeb6057e45db6898eba3a53f75bf8da6235c09e15c3c9f81959414da0d73165d4841a88a582e2d369e7fc9e6db3f475195c4a7c4d184aa79e5340f618a19c12648b4c71defe17514be638030fabb800478da72096554fb798d808f0e8786d17ac67eb1702a4913ae0dc10fc8dbbf40689f42ea746139406ed3ed84c8de1b1644897dab78a0bcbc464f7d03011f9db293b1aef17838748b4a93844ac8546442bf8078b5f1ae16bc98af92054b2904c1693b2820125fefeb35dc8c077fd37c6ee37a0cfaed877eb8f60883d696c948145ea79007b6a8ef0f9e33f69f1d5f00f9273fb0d0dd4f16d046c036bc8f4509a2e1906230c098b9d79d94dbee98aba3d5e33b6d837eec8ef4add55c6a0170341051a50eccd1eb2929da2d3824c63cdb7e9a1dc3fd08e8fa9f71c9b6adf60533bcad8f1ea6f1e05569f3b9cfe6d0abcf0318aef166a1f82ddccbea467cde50e820e36535efc87aad08b2c829056fa7783667e3ad057acc78943f535e014f423fafc799242a59c27840b580a390f721e382dc8c553cc039623882665ed4430f52add643e28d44be0fb4376de60637998a3886b856b1d50ec0a28826b6c059246f6427ed180a19e307fe32fbd1d12919358c535eca04defb26a85c3f1c409a422141cd3f2461b2dda9cb94816d11114ce6527cc3164315fbd4abbfbc2753d5f3295aeec0620a27ddc6e848ed176e8ae1db8f748fd412ad6b8e2f23baf048994118c47a801c6fe4f89cafb25beaf663d917e5b576d72a35189ff721fde0443bb37ecb52812ca8bac3c0a86853fde2c0e1d96a1718aaa6c7c34a77b6f7e589776f0e2af5f1027730a77c520908a83800c7d835dfa97aa42593d345f4667d587b2f251e69b3fd9e61b75bfa29d378280eb2688ce80931be8277efbeef355a8a7c3679351891341a1e44e3ec2dc665c06e5cd078e68b0b007d26232462aafe1700e3198ea1612a501729fa4a3008a5b557dff5ea3aa69e98345306b60c040b9aacd869ae2ba6493e66083b958c39c3e51ea56875cb3ada9d026f89e01b01846e30aeff8a041bb48e7b9a771f3f4406efb83a35e8db678663b83e8a5f87dae252878fa334ba9cafe6729d46b3fbafc2601c05b00c4e778af9e763a182b8462281cfabed768d558e8dd314182e2b289cfd933caca60b0361f9f7d1941768af008d27da84bafa89496b4f819ad81c82d68e351b34f16653748153bf9c1a375572a9a844d839eade664c8f5ecdbd632c8b338546adcf3c3db0f6775c56cdc3e0717e3d327f161bf6b0339ed7e1e378af1c3b363b3991d41a07e6023c21bfc664334411468dc3ee1c7ac37b1a3ee5ec9ba06dbe792981724e76a51c9fce399d8e09e4f7877fcd735ed0f85aaca3cc36afa502bc805b363a70e30977d840cdfbeb1e06e461533eb9bdc82f5b1223c14df117bbf7bad786325add898d3c4d0f35e614501417ae6dc5f3619056b03ccd5b69bc0b7bcd1bf69384a18ee1a935a2e317e05cb24d477d3b62e93dd7913f4604155733ceb5fe6a3993a89489a7cfd7ea528c62e0cc979b766d1d89d7beb9dcf4700d9b6f035a094aceabf6c6cda0be930ccb6fcf5defbf8172c36979e06f5e76225bd672c02a9db0b1f8ab551f45efab4370b6e70411f05058d66bba37f4bf21c1c34250069c962eb6ad77f6d95f98db5e38939a34562f82e681489d7e9e2ac87eac441bf98c5d6d58c0a0675e50334c59e41b8ce39793457fecd85c6899f80d15b618a7501467d6b50d53704a6b82f1912a113935b573d77e8af15e6bb46e8461ab7c63c4ea39c9c4be35458e36867c3c0818af114988e76cbaf4b387767d17db9b6c301a01d904648ba5f36d7638c156f458d3d56b37acecc307872d3ec1ecb6fcff022ac302b8160febad61714a57887397e2ce300285ee12143ef0c6ff2be13234ad16a572f2fcd0d5b8620e41b7e6d2951b023814a5eab52e841d71ac5e557ce7657f5a2e370c7caadd2b7317a498a41b726036b7f33f4fdbbf7d4d7118483103e393ba1d03b252de3d5e5f6d6e324efb2cd4b1872f7821ed0981b16c1bb1dc6daedf25cc830767e5082998c5803b185488f423673bd3955fff350bb35fd79d79622ab2c3c0f6665434a3366dd88e83e34b2676206e86e89c3b522dd4321dcc604c62c7998def549d3d701b8ad2c7a5ccc2e188c8563498295f847413221c99c691c892cbd75e01c79471b1140b21c092e3bfe78527e55ce6529729ace86659b0d93f1b95a88ff63aefc7fb2aacfacde15065597cc070356afdc132cf3b6f447b52ca44725d5367af507bfffce53041565c4b847b66649d2795e52f69ab73e25e522708dba94779a6c7c9b064c43eb23f34bcfc9591104a443c0c61872d0bdc72c170ca605b9bd3c9737f5527c394bb11d07b3f208a113c3a8cf73b43dd6bcdae0e86edfc55cb6ee8baba304478e711abbb8e8ea73f4670d1c567880ef7dc119b14b391d429347efa6f3524b706d08e848d741b032ca762209c2962682fabd0e3e9e7cc94d70c0eef758aeaf9326aa15694a2925a701f27e21bcbaad3f97f0bc1b64f4ee62116d50f77bfc7c07d162816aa395bd83bb4366e303e69be39b13a77f2f817be3a3538cd20be2a2b3e128792e69eb2e304338144a694368f9c587721a64aaf13417eb58af92457aefb4387e39cac532bdf08582b26d6e917d8709c81705e1488dff20a80850c2df0b09fccc623bd5ea5b86c5f00d4068bad1bb13dc459f7cfb4ab90fbe7b5bd56b90fa093bf310173404e6db002ca3a7e7118f5d9583885ee222d5ae6f49c9b38f32abff0e8a0469b83e71af9f3062c569ea9e5de872b15bcc5b3abf14dfd488f2ca79bf793fb4b6b851379003e67bca63cff37d4721837911eb58f75af8eeb86d0aa6ea6fdc8ab7eec0cf8f9086136f6f6ab0ed85025ca6f1561e7f4201ba4912b1f01d394b5d9b67ac9b666c434837317980a8f9a416cfd2cdea2186b11669c424cbda475ae6928764522c1742f4e825c390a72c3f5be3830c258d0bec4b21f094742153a133f02f547d9a8151f6d4779c", 0xffb, 0x5}], 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x222400, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000001240)) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x200, 0x101000) bpf$OBJ_GET_MAP(0x7, &(0x7f00000012c0)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x0, 0x0) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @default}, [@remote, @remote, @rose, @null, @bcast, @netrom, @remote, @default]}, &(0x7f0000000140)=0x48, 0x80800) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000001300)='trusted.overlay.upper\x00', &(0x7f0000001340)={0x0, 0xfb, 0x8f, 0x1, 0x3, "a62da0f95ef874e036a2d7f59b176b80", "4b372d9d175385cca83979ef5d610d772946acec614fc65558bac1736f098fd6fe6f288536f1895aef808fd8268450d08ee502166872b22296fe229cee317f6fa86b5d12a7248312bdc6a1f5a46096548cb0c9e52efd664ba2d78ec604c01860af05fa2f9ccbf3bc9075a1d0faea71adef3d7ca2da6ecbbf3a53"}, 0x8f, 0x3) [ 239.415265][T15780] CPU: 1 PID: 15780 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 239.423308][T15780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 239.433374][T15780] Call Trace: [ 239.436679][T15780] dump_stack+0x1d8/0x2f8 [ 239.441049][T15780] should_fail+0x608/0x860 [ 239.445474][T15780] ? setup_fault_attr+0x2b0/0x2b0 [ 239.450534][T15780] ? tomoyo_encode2+0x273/0x5a0 [ 239.456076][T15780] __should_failslab+0x11a/0x160 [ 239.461065][T15780] ? tomoyo_encode2+0x273/0x5a0 [ 239.465929][T15780] should_failslab+0x9/0x20 [ 239.470444][T15780] __kmalloc+0x7a/0x310 [ 239.474631][T15780] ? kasan_check_write+0x14/0x20 [ 239.479577][T15780] tomoyo_encode2+0x273/0x5a0 [ 239.484285][T15780] tomoyo_encode+0x29/0x40 [ 239.488714][T15780] tomoyo_mount_permission+0x488/0xaf0 [ 239.494194][T15780] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 239.500002][T15780] ? check_preemption_disabled+0x47/0x280 [ 239.505721][T15780] ? tomoyo_get_name+0x540/0x540 [ 239.510677][T15780] ? filename_lookup+0x4e3/0x6d0 [ 239.515646][T15780] ? strncpy_from_user+0x33e/0x3b0 [ 239.520809][T15780] tomoyo_sb_mount+0x35/0x40 [ 239.525416][T15780] security_sb_mount+0x84/0xe0 [ 239.530299][T15780] do_mount+0x186/0x2730 [ 239.534570][T15780] ? copy_mount_string+0x30/0x30 [ 239.539527][T15780] ? kasan_check_write+0x14/0x20 [ 239.544476][T15780] ? _copy_from_user+0xe0/0x120 [ 239.549332][T15780] ? copy_mount_options+0xcf/0x360 [ 239.554473][T15780] ksys_mount+0xcc/0x100 [ 239.558722][T15780] __x64_sys_mount+0xbf/0xd0 [ 239.563330][T15780] do_syscall_64+0xfe/0x140 [ 239.567887][T15780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 239.573781][T15780] RIP: 0033:0x459519 [ 239.577674][T15780] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 239.597322][T15780] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 239.605749][T15780] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 03:35:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:35:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xeffdffff, 0x400000) 03:35:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x541f, 0x0) [ 239.613755][T15780] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 239.621922][T15780] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 239.629894][T15780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 239.629901][T15780] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:35:00 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x1fff) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0), 0x4) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x40, 0x400001) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 239.697493][T15878] F2FS-fs (loop1): Invalid SB checksum offset: 3705729484 [ 239.768014][T15878] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 03:35:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xefffffff, 0x400000) [ 239.880016][T15878] F2FS-fs (loop1): Unable to read 2th superblock [ 239.975667][T15878] F2FS-fs (loop1): Invalid SB checksum offset: 3705729484 [ 240.022640][T15878] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 240.069020][T15878] F2FS-fs (loop1): Unable to read 2th superblock 03:35:01 executing program 3 (fault-call:8 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:35:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x5421, 0x0) 03:35:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xf4ffffff, 0x400000) 03:35:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:35:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(r1, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x120) socket$inet_sctp(0x2, 0x0, 0x84) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) sendto$unix(r2, &(0x7f0000000200)="8de70bd15e34ee11ba1eb223655cbc413e481bab25b3e77d99b53e4a94c33aa6daa8c0892ad80fd16566a7284f1280be396aef0b6ef0cb9dcbd62b39981866327b6ea420449eb3965e309d99a32231920da5c903fb05518ae115ce8ac0d666e1ad96061f81cf7634afca49642133f52a137e845e8156a8f8b9b689215e71506288a969ba1e522c6dd6ef00012609dd8196", 0x91, 0x40, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0xfe8c) unlink(&(0x7f0000000140)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, 0x0, 0x20040002) getsockopt$sock_timeval(r2, 0x1, 0x0, 0x0, 0x0) accept4$packet(r2, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000005c0)=0x14, 0x800) sendmmsg$inet(r1, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000002c0)="13fd77e6d003d1b307a332632d92f4bdadb159f5939c260ec810a2fbe1680865521307f1341d9c07e9677cf38aa9fd3311486c3c60cbfa3a7f952ccf5d6b4c87f3dfefc47ba2258cf3a3ae4999a27a3e18393de844f9e65525a555589d858fd3c80de260ad7dc6b22311dd81e3ffa3ba7bd3279c1cb1b33e5e96", 0x7a}, {&(0x7f0000000340)="5b57582c949daf41b0f5b09380b9fb79ebb7fa3fcbe6a92f4fc287acd0a6cb12f13510c7d5fa0ffda9746a305f9a539baaa902b59d415e4a7b2a9dda09ac23032a1ef3c13ad4c4fe23b7fd5231d97c2cff03fc66bc59c2d5e780bc1997ff9d57e0f085f0cf84e8769cb7d4de0c5e94d2edbe94f8f8aae21a3d528cfcb1637da25af3b2c748ae34830c9857a099c8966ce1673cc6b5d406acd4c3e913b7a92c93c95ee7793d27fbc68e8697bbb74d1f9ebbd6d4258c67e1983ba32c8216bc72e3e6a32389cb23cb1e256b08119da7fd60ea5258595214ded535c1d7b059ff6b8bd8ea", 0xe2}, {&(0x7f0000000180)="ed2566ddae25a0b9688ffe782e4f5df3e6f13213e36edb73245d401d6992c6eac3f339e887de78f6aec3cc5dc9fc7971325146a0e1934a36a2eb8e8690", 0x3d}, {&(0x7f0000000440)="d03833106490126da60cacbf873c3049a57143ad74bdcf5293907dae282d6137f4e9570331b3be387bfc858cd388aedf8d0032d413b8ff793ab6fd", 0x3b}, {&(0x7f0000000480)="e5fc079e1b9466a7527e269a178df0548a55436a063aa07776d3af945c9f0084e0bc2bba8d2c9d1001f2177749104f854d1257748a74e79fea70d9674aa2f3cbdbc7174d7eda185c7a898a532a8f5e3debd3db9d2e4b9c05104d73d26b8092387fe60bb601a5c7ac24", 0x69}], 0x5, &(0x7f0000000600)=[@ip_retopts={{0x20, 0x0, 0x7, {[@lsrr={0x83, 0xf, 0xd158, [@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @local]}]}}}, @ip_retopts={{0x6c, 0x0, 0x7, {[@end, @timestamp={0x44, 0x1c, 0x1000, 0x0, 0x6, [{[], 0xe41}, {[@multicast2], 0x5}, {[@rand_addr=0x3], 0x6}, {[], 0x6}]}, @generic={0x0, 0xe, "c50c2e19e5bddb6935aef36b"}, @timestamp={0x44, 0x18, 0x8000, 0x717ec1bad29c528f, 0xcb, [{[], 0xdcb3}, {[], 0xfffffffffffffffe}, {[@dev={0xac, 0x14, 0x14, 0x1d}], 0xfffffffffffffa7f}, {[], 0x3}]}, @ssrr={0x89, 0xf, 0x5, [@broadcast, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @generic={0x7, 0x9, "de1c1277f84938"}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x76}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_retopts={{0x78, 0x0, 0x7, {[@timestamp={0x44, 0x14, 0x5, 0x3, 0x9, [{[], 0x1}, {[], 0x5}, {[@multicast1], 0xc9}]}, @ssrr={0x89, 0x3, 0x1}, @timestamp={0x44, 0x8, 0x800, 0x1, 0x8000, [{}]}, @rr={0x7, 0x23, 0xffff, [@remote, @broadcast, @multicast2, @multicast2, @multicast1, @remote, @local, @local]}, @lsrr={0x83, 0x23, 0x4, [@multicast1, @remote, @loopback, @empty, @dev={0xac, 0x14, 0x14, 0x22}, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x6]}]}}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@noop, @noop, @cipso={0x86, 0x49, 0x0, [{0x7, 0xb, "b2fb9ce392ca4a95ab"}, {0x6, 0x6, 'J*<4'}, {0x7, 0xb, "713f10ef480be3b542"}, {0x1, 0x11, "799daee6a8618af3e03e07439ef8c4"}, {0x0, 0xf, "04dd65d2793b0bf40a1394f9b3"}, {0x0, 0x7, "22e9b986f9"}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}}}], 0x1b8}}], 0x1, 0x8000) socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x0, 0x0, 0x0) r4 = semget(0x1, 0x1, 0x2) semctl$GETNCNT(r4, 0x3, 0xe, &(0x7f0000000800)=""/117) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x52) shutdown(r1, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x2, 0x0, 0x1a) [ 240.321200][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 240.335389][T16020] FAULT_INJECTION: forcing a failure. [ 240.335389][T16020] name failslab, interval 1, probability 0, space 0, times 0 [ 240.361729][T16020] CPU: 1 PID: 16020 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 240.369755][T16020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 240.379824][T16020] Call Trace: [ 240.383134][T16020] dump_stack+0x1d8/0x2f8 [ 240.387472][T16020] should_fail+0x608/0x860 [ 240.391897][T16020] ? setup_fault_attr+0x2b0/0x2b0 [ 240.397140][T16020] ? tomoyo_encode2+0x273/0x5a0 [ 240.402030][T16020] __should_failslab+0x11a/0x160 [ 240.406972][T16020] ? tomoyo_encode2+0x273/0x5a0 [ 240.411858][T16020] should_failslab+0x9/0x20 [ 240.416361][T16020] __kmalloc+0x7a/0x310 [ 240.420527][T16020] tomoyo_encode2+0x273/0x5a0 [ 240.425217][T16020] tomoyo_realpath_from_path+0x769/0x7c0 [ 240.430861][T16020] tomoyo_mount_permission+0x312/0xaf0 [ 240.436344][T16020] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 240.442163][T16020] ? check_preemption_disabled+0x47/0x280 [ 240.447892][T16020] ? tomoyo_get_name+0x540/0x540 [ 240.452878][T16020] ? filename_lookup+0x4e3/0x6d0 [ 240.459343][T16020] ? strncpy_from_user+0x33e/0x3b0 [ 240.464460][T16020] tomoyo_sb_mount+0x35/0x40 [ 240.469055][T16020] security_sb_mount+0x84/0xe0 [ 240.473821][T16020] do_mount+0x186/0x2730 [ 240.478077][T16020] ? copy_mount_string+0x30/0x30 [ 240.483024][T16020] ? kasan_check_write+0x14/0x20 [ 240.487961][T16020] ? _copy_from_user+0xe0/0x120 [ 240.492810][T16020] ? copy_mount_options+0xcf/0x360 [ 240.497930][T16020] ksys_mount+0xcc/0x100 [ 240.502179][T16020] __x64_sys_mount+0xbf/0xd0 [ 240.506776][T16020] do_syscall_64+0xfe/0x140 [ 240.511745][T16020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 240.517638][T16020] RIP: 0033:0x459519 [ 240.521532][T16020] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 240.541137][T16020] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 240.549546][T16020] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 240.557546][T16020] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 03:35:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 240.565519][T16020] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 240.573485][T16020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 240.581460][T16020] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 240.594540][T16020] ERROR: Out of memory at tomoyo_realpath_from_path. 03:35:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfbffffff, 0x400000) 03:35:01 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:35:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x5423, 0x0) 03:35:01 executing program 3 (fault-call:8 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:35:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfeffffff, 0x400000) [ 241.115382][T16242] FAULT_INJECTION: forcing a failure. [ 241.115382][T16242] name failslab, interval 1, probability 0, space 0, times 0 [ 241.189918][T16242] CPU: 0 PID: 16242 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 241.197948][T16242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 241.208048][T16242] Call Trace: [ 241.211350][T16242] dump_stack+0x1d8/0x2f8 [ 241.215685][T16242] should_fail+0x608/0x860 [ 241.220117][T16242] ? setup_fault_attr+0x2b0/0x2b0 [ 241.225169][T16242] __should_failslab+0x11a/0x160 [ 241.230215][T16242] should_failslab+0x9/0x20 [ 241.234729][T16242] kmem_cache_alloc_trace+0x5d/0x2c0 [ 241.240025][T16242] ? legacy_init_fs_context+0x51/0xc0 [ 241.245394][T16242] legacy_init_fs_context+0x51/0xc0 [ 241.250591][T16242] alloc_fs_context+0x49a/0x580 [ 241.255441][T16242] fs_context_for_mount+0x24/0x30 [ 241.260483][T16242] do_mount+0x1200/0x2730 [ 241.264815][T16242] ? copy_mount_string+0x30/0x30 [ 241.269753][T16242] ? kasan_check_write+0x14/0x20 [ 241.274695][T16242] ? _copy_from_user+0xe0/0x120 [ 241.279554][T16242] ? copy_mount_options+0xcf/0x360 [ 241.284687][T16242] ksys_mount+0xcc/0x100 [ 241.288950][T16242] __x64_sys_mount+0xbf/0xd0 [ 241.293656][T16242] do_syscall_64+0xfe/0x140 [ 241.298184][T16242] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 241.304095][T16242] RIP: 0033:0x459519 [ 241.308009][T16242] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 241.329118][T16242] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:35:02 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = accept4(r1, 0x0, 0x0, 0x0) ustat(0x2, &(0x7f00000000c0)) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000240), &(0x7f0000000280)=0x14) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x466ec0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000002c0)=0x7, 0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') socket$vsock_stream(0x28, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r3, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000180)=[0x4, 0x7fff], 0x2, 0x1, 0x5, 0x1f, 0x6, 0x66b, {0x7, 0x5, 0x6, 0x8001, 0x7, 0x8, 0x81, 0x4, 0x80000001, 0x1ff, 0x40, 0x0, 0xfffffffffffff532, 0x3, "b43ad4e57db37a316a75ce85822eba485efec313cab72fea9a56f37b5b0f89e2"}}) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xa1000800}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000062726f616463617374506c696e6b090000000000000000d9e0b94433a7104a861b94cf00000000000000000000f9ec3da3a31a9b00000000000067b8318094d279eb04f6c7dc98100c0d6d15d5f6d5fb7cf7c478ab6e97f3581e679542722cab0502bdf79e858c27d87f47a16ebfc790dbe9016c3dd4f1ed3709900024441f76fd853da00489"], 0x30}, 0x1, 0x0, 0x0, 0x79f0b7b4a533c43c}, 0x4004890) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:35:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 241.337549][T16242] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 241.345521][T16242] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 241.353490][T16242] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 241.361632][T16242] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 241.369601][T16242] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:35:02 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x501100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000080)={0xfffffffffffff195, 0x8, 0x9, 0x2067, 0x9, 0x1ff}) sendto$isdn(r0, &(0x7f0000000100)={0x8, 0x1, "352e994df2337755c0d1020b860a7839df559952e2b10c6c45aa4d34f5a256ced398085ae9198047231d5f203e8a010c5d32da6cf59f8a0125bba35c14ca75095b5be7c71049d42ab3cd7ebdbfec63618aa911e4f119282216df57744af8e9f0cb9a40ef55294a13ac7f9f4e9272a31251e4748e62b5e93c411c2a5d5e4c050cb9a1dfb5c7a6fd90419c68f2c85e16330bfedaf0f6181b35f3aedca497456296328c63d3e1ac21e4b24f200821f6e231c5630b348bc128a67dbbf7b7a384f30379"}, 0xc9, 0xc800, &(0x7f0000000200)={0x22, 0x0, 0x200, 0xb88, 0x3}, 0x6) r1 = socket(0x42000000015, 0x805, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000002c0)={r2, 0x6, 0x1}, &(0x7f0000000300)=0x8) write$cgroup_int(r0, &(0x7f0000000340)=0xf9, 0x12) getsockopt(r1, 0x114, 0x2717, 0x0, &(0x7f0000000000)) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000380)) 03:35:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x5450, 0x0) 03:35:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xff010000, 0x400000) 03:35:02 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) setuid(0xee01) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000000)={0x0, 0xfffffffffffffff7, 0x80, 0x0, 0x1000}) 03:35:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x5451, 0x0) 03:35:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xff0f0000, 0x400000) 03:35:02 executing program 1: r0 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) setuid(0xee01) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000000)={0x0, 0xfffffffffffffff7, 0x80, 0x0, 0x1000}) 03:35:02 executing program 3 (fault-call:8 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:35:02 executing program 1: r0 = socket$inet(0x10, 0x80003, 0xc) preadv(r0, &(0x7f0000002440)=[{&(0x7f0000000100)=""/255, 0xff}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/241, 0xf1}, {&(0x7f0000001300)=""/82, 0x52}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/135, 0x87}], 0x6, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$selinux_attr(r1, &(0x7f00000000c0)='system_u:object_r:etc_aliases_t:s0\x00', 0x23) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f0000000040)={0x1f, "8f538bd198d516fd20e6e5ba85f23c2000fe6af59b7bf42d116be0689a3daecc"}) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7ff, 0x4402) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000080)={0x18}, 0x18) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000002500)={0x7fff, "c69348f69d609121b0fb7322a414ced8a7dd6a9668099206ff889833a8c62de5", 0x3, 0x1}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000024c0)={0x7, 0xa, 0x1, 0x5, "491807a7778a65e722d44c817ba5bc138b673616c10f1cc955544d7415336b16"}) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0), 0x1, 0x0, 0xffffffffffffff6a}, 0x44010) 03:35:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 242.036589][T16406] FAULT_INJECTION: forcing a failure. [ 242.036589][T16406] name failslab, interval 1, probability 0, space 0, times 0 [ 242.110287][T16406] CPU: 0 PID: 16406 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 242.118318][T16406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.128387][T16406] Call Trace: [ 242.131693][T16406] dump_stack+0x1d8/0x2f8 [ 242.136038][T16406] should_fail+0x608/0x860 [ 242.140461][T16406] ? setup_fault_attr+0x2b0/0x2b0 [ 242.145501][T16406] __should_failslab+0x11a/0x160 [ 242.150449][T16406] should_failslab+0x9/0x20 [ 242.154962][T16406] kmem_cache_alloc_trace+0x5d/0x2c0 [ 242.160269][T16406] ? alloc_fs_context+0x65/0x580 [ 242.165219][T16406] alloc_fs_context+0x65/0x580 [ 242.170019][T16406] ? _raw_read_unlock+0x2c/0x50 [ 242.174878][T16406] fs_context_for_mount+0x24/0x30 [ 242.179906][T16406] do_mount+0x1200/0x2730 [ 242.184244][T16406] ? copy_mount_string+0x30/0x30 [ 242.189192][T16406] ? kasan_check_write+0x14/0x20 [ 242.194179][T16406] ? _copy_from_user+0xe0/0x120 [ 242.199041][T16406] ? copy_mount_options+0xcf/0x360 [ 242.204158][T16406] ksys_mount+0xcc/0x100 [ 242.208406][T16406] __x64_sys_mount+0xbf/0xd0 [ 242.213003][T16406] do_syscall_64+0xfe/0x140 [ 242.218258][T16406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 242.224159][T16406] RIP: 0033:0x459519 [ 242.228064][T16406] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 242.248031][T16406] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 242.256450][T16406] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 242.264432][T16406] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 242.272413][T16406] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 242.280411][T16406] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 242.288394][T16406] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:35:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x5452, 0x0) 03:35:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xff1f0000, 0x400000) 03:35:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="055e0bcfec7be070") clock_settime(0x0, &(0x7f0000000000)={0x77359400}) flistxattr(r0, &(0x7f0000000080)=""/78, 0x4e) 03:35:03 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) tee(r0, r1, 0x4, 0x2) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') io_uring_setup(0xbaf, &(0x7f0000000040)={0x0, 0x0, 0x3, 0x0, 0xed}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:35:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfffffdef, 0x400000) 03:33:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x4e24, @remote}, {0x306, @remote}, 0xc, {0x2, 0x4e22, @multicast1}, 'nr0\x00'}) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:pam_var_run_t:s0\x00', 0x23, 0x1) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000240), 0x0) 03:33:20 executing program 3 (fault-call:8 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x5460, 0x0) 03:33:20 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4003) close(r0) perf_event_open(&(0x7f00000000c0)={0x1, 0xfffffffffffffddc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41ba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, &(0x7f00000007c0)=[&(0x7f0000000580)='/dev/ubi_ctrl\x00', &(0x7f00000005c0)='/dev/ubi_ctrl\x00', &(0x7f0000000600)='ppp0\x00', &(0x7f0000000700)='@lo}eth1eth0selinux\x00', 0x0]) 03:33:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xffffff7f, 0x400000) [ 242.847108][T16664] FAULT_INJECTION: forcing a failure. [ 242.847108][T16664] name failslab, interval 1, probability 0, space 0, times 0 [ 242.899292][T16664] CPU: 0 PID: 16664 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 242.907311][T16664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 242.917364][T16664] Call Trace: [ 242.917386][T16664] dump_stack+0x1d8/0x2f8 [ 242.917402][T16664] should_fail+0x608/0x860 [ 242.917414][T16664] ? setup_fault_attr+0x2b0/0x2b0 [ 242.917436][T16664] __should_failslab+0x11a/0x160 [ 242.917450][T16664] should_failslab+0x9/0x20 [ 242.917459][T16664] kmem_cache_alloc_trace+0x5d/0x2c0 [ 242.917470][T16664] ? legacy_init_fs_context+0x51/0xc0 [ 242.917481][T16664] legacy_init_fs_context+0x51/0xc0 [ 242.917495][T16664] alloc_fs_context+0x49a/0x580 [ 242.917513][T16664] fs_context_for_mount+0x24/0x30 [ 242.970090][T16664] do_mount+0x1200/0x2730 [ 242.974429][T16664] ? copy_mount_string+0x30/0x30 [ 242.979381][T16664] ? kasan_check_write+0x14/0x20 [ 242.984316][T16664] ? _copy_from_user+0xe0/0x120 [ 242.989169][T16664] ? copy_mount_options+0xcf/0x360 [ 242.994285][T16664] ksys_mount+0xcc/0x100 [ 242.998532][T16664] __x64_sys_mount+0xbf/0xd0 [ 243.003128][T16664] do_syscall_64+0xfe/0x140 [ 243.007633][T16664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.013522][T16664] RIP: 0033:0x459519 [ 243.017412][T16664] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.037107][T16664] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:33:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:20 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r1, 0xa, 0x7) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) prctl$PR_GET_CHILD_SUBREAPER(0x25) 03:33:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x5501, 0x0) [ 243.045709][T16664] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 243.053687][T16664] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 243.061653][T16664] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 243.069619][T16664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 243.077588][T16664] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:20 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xffffffe4, 0x400000) 03:33:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x6364, 0x0) 03:33:21 executing program 3 (fault-call:8 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xffffffef, 0x400000) [ 243.614973][T16808] FAULT_INJECTION: forcing a failure. [ 243.614973][T16808] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 243.628223][T16808] CPU: 1 PID: 16808 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 243.636325][T16808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 243.646379][T16808] Call Trace: [ 243.649669][T16808] dump_stack+0x1d8/0x2f8 [ 243.649689][T16808] should_fail+0x608/0x860 [ 243.649704][T16808] ? setup_fault_attr+0x2b0/0x2b0 [ 243.649716][T16808] ? arch_stack_walk+0x98/0xe0 [ 243.649740][T16808] should_fail_alloc_page+0x55/0x60 [ 243.649751][T16808] prepare_alloc_pages+0x283/0x460 [ 243.649768][T16808] __alloc_pages_nodemask+0x11c/0x790 [ 243.683974][T16808] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 243.689523][T16808] ? trace_lock_acquire+0x190/0x190 [ 243.694714][T16808] ? fs_context_for_mount+0x24/0x30 [ 243.699903][T16808] ? do_mount+0x1200/0x2730 [ 243.704392][T16808] ? ksys_mount+0xcc/0x100 [ 243.708793][T16808] ? __x64_sys_mount+0xbf/0xd0 [ 243.713549][T16808] kmem_getpages+0x46/0x480 [ 243.718047][T16808] cache_grow_begin+0x7e/0x2c0 [ 243.722809][T16808] cache_alloc_refill+0x311/0x3f0 [ 243.727826][T16808] ? check_preemption_disabled+0xb7/0x280 [ 243.733544][T16808] kmem_cache_alloc_trace+0x29f/0x2c0 [ 243.738909][T16808] ? alloc_super+0x5d/0x740 [ 243.743403][T16808] alloc_super+0x5d/0x740 [ 243.747724][T16808] sget_userns+0x1bf/0x4f0 [ 243.752133][T16808] ? free_anon_bdev+0x30/0x30 [ 243.756808][T16808] mount_nodev+0xe5/0x1c0 [ 243.761128][T16808] ? devpts_kill_sb+0x70/0x70 [ 243.765819][T16808] devpts_mount+0x2c/0x40 [ 243.770140][T16808] legacy_get_tree+0xf9/0x1a0 [ 243.774891][T16808] ? devpts_pty_kill+0xe0/0xe0 [ 243.779662][T16808] vfs_get_tree+0x8f/0x360 [ 243.784101][T16808] do_mount+0x1813/0x2730 [ 243.788438][T16808] ? copy_mount_string+0x30/0x30 [ 243.793374][T16808] ? kasan_check_write+0x14/0x20 [ 243.798306][T16808] ? _copy_from_user+0xe0/0x120 [ 243.803143][T16808] ? copy_mount_options+0xcf/0x360 [ 243.808242][T16808] ksys_mount+0xcc/0x100 [ 243.812471][T16808] __x64_sys_mount+0xbf/0xd0 [ 243.817082][T16808] do_syscall_64+0xfe/0x140 [ 243.821594][T16808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 243.827477][T16808] RIP: 0033:0x459519 [ 243.831359][T16808] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 243.850968][T16808] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:33:21 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='ro\x00', 0x0, 0x0) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 243.859379][T16808] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 243.867337][T16808] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 243.875317][T16808] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 243.883280][T16808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 243.891244][T16808] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x8903, 0x0) 03:33:21 executing program 1: ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x89b1, &(0x7f0000000000)="18483a") r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x100, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 03:33:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfffffff4, 0x400000) 03:33:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:21 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xa, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000000000000020000000000000063013000000000009500000000000000"], &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04'}, 0x48) 03:33:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfffffffb, 0x400000) 03:33:21 executing program 3 (fault-call:8 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x8912, 0x0) 03:33:21 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101000, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r0, 0x4) r1 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RXATTRCREATE(r1, &(0x7f0000000000)={0x7, 0x21, 0x1}, 0x7) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @ipv4={[], [], @remote}, 0x4}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfffffffe, 0x400000) [ 244.445721][T16891] FAULT_INJECTION: forcing a failure. [ 244.445721][T16891] name failslab, interval 1, probability 0, space 0, times 0 03:33:22 executing program 1: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x800000000001, 0x33ca5a26745ae5c) [ 244.578500][T16891] CPU: 1 PID: 16891 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 244.586540][T16891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.596814][T16891] Call Trace: [ 244.600216][T16891] dump_stack+0x1d8/0x2f8 [ 244.604557][T16891] should_fail+0x608/0x860 [ 244.608980][T16891] ? setup_fault_attr+0x2b0/0x2b0 [ 244.614022][T16891] __should_failslab+0x11a/0x160 [ 244.618995][T16891] should_failslab+0x9/0x20 [ 244.623501][T16891] kmem_cache_alloc_trace+0x5d/0x2c0 [ 244.628793][T16891] ? smack_sb_alloc_security+0x51/0x130 [ 244.634348][T16891] ? alloc_super+0x15f/0x740 [ 244.638963][T16891] smack_sb_alloc_security+0x51/0x130 [ 244.644358][T16891] security_sb_alloc+0x55/0xb0 [ 244.649129][T16891] alloc_super+0x167/0x740 [ 244.653551][T16891] sget_userns+0x1bf/0x4f0 [ 244.657993][T16891] ? free_anon_bdev+0x30/0x30 [ 244.662675][T16891] mount_nodev+0xe5/0x1c0 [ 244.667008][T16891] ? devpts_kill_sb+0x70/0x70 [ 244.671690][T16891] devpts_mount+0x2c/0x40 [ 244.676061][T16891] legacy_get_tree+0xf9/0x1a0 [ 244.680738][T16891] ? devpts_pty_kill+0xe0/0xe0 [ 244.685503][T16891] vfs_get_tree+0x8f/0x360 [ 244.689921][T16891] do_mount+0x1813/0x2730 [ 244.694366][T16891] ? copy_mount_string+0x30/0x30 [ 244.699332][T16891] ? kasan_check_write+0x14/0x20 [ 244.704268][T16891] ? _copy_from_user+0xe0/0x120 [ 244.709137][T16891] ? copy_mount_options+0xcf/0x360 [ 244.714286][T16891] ksys_mount+0xcc/0x100 [ 244.718547][T16891] __x64_sys_mount+0xbf/0xd0 [ 244.718577][T16891] do_syscall_64+0xfe/0x140 03:33:22 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x891b, 0x0) [ 244.718594][T16891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 244.718609][T16891] RIP: 0033:0x459519 [ 244.727691][T16891] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 244.727698][T16891] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 244.727709][T16891] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 03:33:22 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getgid() getsockname(r0, 0x0, &(0x7f0000000040)=0xced750fd8db779cb) [ 244.727716][T16891] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 244.727722][T16891] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 244.727729][T16891] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 244.727735][T16891] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x10000000000, 0x400000) 03:33:22 executing program 1: unshare(0x2000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x2b, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) connect$l2tp(r1, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @loopback}, 0x0, 0x0, 0x3, 0x2}}, 0x2e) 03:33:22 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e23, 0x5, @loopback}, 0x1c) listen(0xffffffffffffffff, 0x8) r1 = socket$inet6_sctp(0xa, 0x8005, 0x84) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, &(0x7f0000000040), 0x4) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x8933, 0x0) 03:33:22 executing program 3 (fault-call:8 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:22 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xffffffff000, 0x400000) 03:33:22 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:22 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x40000000089, &(0x7f0000000340)=0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) write$P9_RREMOVE(r3, &(0x7f00000000c0), 0x3bb1) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./bus\x00') ftruncate(r2, 0x56) fcntl$setstatus(r0, 0x4, 0x44800) fcntl$setstatus(r4, 0x4, 0x6100) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x80000001, 0x0, 0x2, 0x6}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000040)={0x80000000, r5, 0x10001, 0x1}) 03:33:22 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) prctl$PR_GET_SECCOMP(0x15) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 245.204638][T17103] FAULT_INJECTION: forcing a failure. [ 245.204638][T17103] name failslab, interval 1, probability 0, space 0, times 0 [ 245.263601][T17103] CPU: 1 PID: 17103 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 245.271713][T17103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.281864][T17103] Call Trace: [ 245.281897][T17103] dump_stack+0x1d8/0x2f8 [ 245.281918][T17103] should_fail+0x608/0x860 [ 245.281939][T17103] ? setup_fault_attr+0x2b0/0x2b0 [ 245.281966][T17103] __should_failslab+0x11a/0x160 [ 245.281987][T17103] should_failslab+0x9/0x20 [ 245.282000][T17103] kmem_cache_alloc_trace+0x5d/0x2c0 [ 245.282013][T17103] ? smack_sb_alloc_security+0x51/0x130 [ 245.282027][T17103] ? alloc_super+0x15f/0x740 [ 245.282042][T17103] smack_sb_alloc_security+0x51/0x130 [ 245.282057][T17103] security_sb_alloc+0x55/0xb0 [ 245.282069][T17103] alloc_super+0x167/0x740 [ 245.282082][T17103] sget_userns+0x1bf/0x4f0 [ 245.282099][T17103] ? free_anon_bdev+0x30/0x30 [ 245.299141][T17103] mount_nodev+0xe5/0x1c0 [ 245.352509][T17103] ? devpts_kill_sb+0x70/0x70 [ 245.357189][T17103] devpts_mount+0x2c/0x40 [ 245.361516][T17103] legacy_get_tree+0xf9/0x1a0 [ 245.366188][T17103] ? devpts_pty_kill+0xe0/0xe0 [ 245.370949][T17103] vfs_get_tree+0x8f/0x360 [ 245.375355][T17103] do_mount+0x1813/0x2730 [ 245.379683][T17103] ? copy_mount_string+0x30/0x30 [ 245.384628][T17103] ? kasan_check_write+0x14/0x20 [ 245.389571][T17103] ? _copy_from_user+0xe0/0x120 [ 245.394418][T17103] ? copy_mount_options+0xcf/0x360 [ 245.399531][T17103] ksys_mount+0xcc/0x100 [ 245.403767][T17103] __x64_sys_mount+0xbf/0xd0 [ 245.408370][T17103] do_syscall_64+0xfe/0x140 [ 245.412875][T17103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 245.418785][T17103] RIP: 0033:0x459519 [ 245.422689][T17103] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 245.442312][T17103] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 245.450737][T17103] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 03:33:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x400000000000, 0x400000) [ 245.459321][T17103] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 245.467327][T17103] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 245.475309][T17103] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 245.483278][T17103] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x8982, 0x0) 03:33:23 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:23 executing program 3 (fault-call:8 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:23 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000a00)={0x101, 0x1, 0xffff}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x5) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) r9 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getresgid(&(0x7f0000000300), &(0x7f0000000600)=0x0, &(0x7f0000000640)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f00000007c0)=[0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0xffffffffffffffff]) write$P9_RLOPEN(r0, &(0x7f0000000a40)={0x18, 0xd, 0x2, {{0x80, 0x0, 0x2}, 0x40}}, 0x18) r15 = getgid() stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000008c0)={0x0, 0x0, 0x0}, &(0x7f0000000900)=0xc) r18 = getegid() fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {0x1, 0x38ba9e8dae97b2d3}, [{0x2, 0x2, r5}, {0x2, 0x2, r6}, {0x2, 0x0, r7}, {0x2, 0x0, r8}, {0x2, 0x4, r9}, {0x2, 0x4, r10}], {0x4, 0x3}, [{0x8, 0x2, r11}, {0x8, 0x5, r12}, {0x8, 0x2, r13}, {0x8, 0x76b07d0446d5ddee, r14}, {0x8, 0x4, r15}, {0x8, 0x0, r16}, {0x8, 0x2, r17}, {0x8, 0x3, r18}], {0x10, 0x5}, {0x20, 0x7}}, 0x94, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x800800000000, 0x400000) 03:33:23 executing program 1: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x40000000089, &(0x7f0000000340)=0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) write$P9_RREMOVE(r3, &(0x7f00000000c0), 0x3bb1) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./bus\x00') ftruncate(r2, 0x56) fcntl$setstatus(r0, 0x4, 0x44800) fcntl$setstatus(r4, 0x4, 0x6100) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x80000001, 0x0, 0x2, 0x6}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000040)={0x80000000, r5, 0x10001, 0x1}) 03:33:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x89e4, 0x0) [ 245.878407][T17239] FAULT_INJECTION: forcing a failure. [ 245.878407][T17239] name failslab, interval 1, probability 0, space 0, times 0 03:33:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1000000000000, 0x400000) [ 246.010344][T17239] CPU: 0 PID: 17239 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 246.018392][T17239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.028464][T17239] Call Trace: [ 246.031784][T17239] dump_stack+0x1d8/0x2f8 [ 246.036127][T17239] should_fail+0x608/0x860 [ 246.040554][T17239] ? setup_fault_attr+0x2b0/0x2b0 [ 246.045594][T17239] ? prealloc_shrinker+0x97/0x2e0 [ 246.050645][T17239] __should_failslab+0x11a/0x160 [ 246.055597][T17239] ? prealloc_shrinker+0x97/0x2e0 [ 246.060632][T17239] should_failslab+0x9/0x20 [ 246.065137][T17239] __kmalloc+0x7a/0x310 [ 246.065156][T17239] prealloc_shrinker+0x97/0x2e0 [ 246.065171][T17239] alloc_super+0x609/0x740 [ 246.065185][T17239] sget_userns+0x1bf/0x4f0 [ 246.074177][T17239] ? free_anon_bdev+0x30/0x30 [ 246.074192][T17239] mount_nodev+0xe5/0x1c0 [ 246.074200][T17239] ? devpts_kill_sb+0x70/0x70 [ 246.074210][T17239] devpts_mount+0x2c/0x40 [ 246.074220][T17239] legacy_get_tree+0xf9/0x1a0 [ 246.074227][T17239] ? devpts_pty_kill+0xe0/0xe0 03:33:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 246.074237][T17239] vfs_get_tree+0x8f/0x360 [ 246.074250][T17239] do_mount+0x1813/0x2730 [ 246.074264][T17239] ? copy_mount_string+0x30/0x30 [ 246.074283][T17239] ? kasan_check_write+0x14/0x20 [ 246.074294][T17239] ? _copy_from_user+0xe0/0x120 [ 246.074302][T17239] ? copy_mount_options+0xcf/0x360 [ 246.074314][T17239] ksys_mount+0xcc/0x100 [ 246.074325][T17239] __x64_sys_mount+0xbf/0xd0 [ 246.074348][T17239] do_syscall_64+0xfe/0x140 [ 246.133930][T17239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.143246][T17239] RIP: 0033:0x459519 [ 246.143258][T17239] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.143263][T17239] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 246.143272][T17239] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 246.143277][T17239] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 246.143283][T17239] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 246.143288][T17239] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 246.143293][T17239] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:23 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x2000000000000, 0x400000) 03:33:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xab00, 0x0) 03:33:23 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xed, 0xc0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100), 0x4) fsetxattr$security_ima(r0, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@sha1={0x1, "892b950d24560a9bafe9904890cad3010902156c"}, 0x15, 0x3) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000002a80)=""/4096, 0x1000) r2 = socket$inet_udp(0x2, 0x2, 0x0) unshare(0x8020000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) kcmp(0x0, 0x0, 0x6, 0xffffffffffffffff, r3) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000000)={{0x0, @broadcast, 0x4e24, 0x0, 'nq\x00', 0x28}, {@rand_addr=0x340, 0x0, 0x10000, 0x51aa, 0x7f, 0x7}}, 0x44) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e22}, @in={0x2, 0x4e24, @rand_addr=0xffff}], 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240), 0x4) setns(r4, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x11\x00\x00\x88\x88\x00\x11\x00\x00\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x288) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) 03:33:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:23 executing program 3 (fault-call:8 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xab02, 0x0) [ 246.434698][T17387] FAULT_INJECTION: forcing a failure. [ 246.434698][T17387] name failslab, interval 1, probability 0, space 0, times 0 [ 246.455708][T17387] CPU: 0 PID: 17387 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 246.463724][T17387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 246.473783][T17387] Call Trace: [ 246.477085][T17387] dump_stack+0x1d8/0x2f8 [ 246.481435][T17387] should_fail+0x608/0x860 [ 246.485862][T17387] ? setup_fault_attr+0x2b0/0x2b0 [ 246.490893][T17387] ? __list_lru_init+0xbe/0x900 [ 246.495752][T17387] __should_failslab+0x11a/0x160 [ 246.500699][T17387] ? __list_lru_init+0xbe/0x900 [ 246.505546][T17387] should_failslab+0x9/0x20 [ 246.510041][T17387] __kmalloc+0x7a/0x310 [ 246.510057][T17387] __list_lru_init+0xbe/0x900 [ 246.510071][T17387] ? prealloc_shrinker+0x249/0x2e0 [ 246.510085][T17387] alloc_super+0x635/0x740 [ 246.510098][T17387] sget_userns+0x1bf/0x4f0 [ 246.510106][T17387] ? free_anon_bdev+0x30/0x30 [ 246.510122][T17387] mount_nodev+0xe5/0x1c0 [ 246.510136][T17387] ? devpts_kill_sb+0x70/0x70 [ 246.532837][T17387] devpts_mount+0x2c/0x40 [ 246.532851][T17387] legacy_get_tree+0xf9/0x1a0 [ 246.532860][T17387] ? devpts_pty_kill+0xe0/0xe0 [ 246.532876][T17387] vfs_get_tree+0x8f/0x360 [ 246.541868][T17387] do_mount+0x1813/0x2730 [ 246.541889][T17387] ? copy_mount_string+0x30/0x30 [ 246.550879][T17387] ? kasan_check_write+0x14/0x20 [ 246.550891][T17387] ? _copy_from_user+0xe0/0x120 [ 246.550901][T17387] ? copy_mount_options+0xcf/0x360 [ 246.550914][T17387] ksys_mount+0xcc/0x100 [ 246.550926][T17387] __x64_sys_mount+0xbf/0xd0 [ 246.550942][T17387] do_syscall_64+0xfe/0x140 [ 246.550961][T17387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 246.560371][T17387] RIP: 0033:0x459519 [ 246.560384][T17387] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 246.560390][T17387] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 246.560400][T17387] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 246.560406][T17387] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 246.560412][T17387] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 246.560419][T17387] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 246.560425][T17387] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:24 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x4000000000000, 0x400000) 03:33:24 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xed, 0xc0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f0000000100), 0x4) fsetxattr$security_ima(r0, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@sha1={0x1, "892b950d24560a9bafe9904890cad3010902156c"}, 0x15, 0x3) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000000) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000002a80)=""/4096, 0x1000) r2 = socket$inet_udp(0x2, 0x2, 0x0) unshare(0x8020000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) kcmp(0x0, 0x0, 0x6, 0xffffffffffffffff, r3) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000000)={{0x0, @broadcast, 0x4e24, 0x0, 'nq\x00', 0x28}, {@rand_addr=0x340, 0x0, 0x10000, 0x51aa, 0x7f, 0x7}}, 0x44) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000000c0)=[@in={0x2, 0x4e22}, @in={0x2, 0x4e24, @rand_addr=0xffff}], 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240), 0x4) setns(r4, 0x0) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x11\x00\x00\x88\x88\x00\x11\x00\x00\x00\x00\x00\x00\x11\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x288) socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000300)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) 03:33:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xab0a, 0x0) 03:33:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x10000000000000, 0x400000) 03:33:24 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000a00)={0x101, 0x1, 0xffff}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x5) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) r9 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) getresgid(&(0x7f0000000300), &(0x7f0000000600)=0x0, &(0x7f0000000640)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f00000007c0)=[0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0xffffffffffffffff]) write$P9_RLOPEN(r0, &(0x7f0000000a40)={0x18, 0xd, 0x2, {{0x80, 0x0, 0x2}, 0x40}}, 0x18) r15 = getgid() stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000008c0)={0x0, 0x0, 0x0}, &(0x7f0000000900)=0xc) r18 = getegid() fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000940)={{}, {0x1, 0x38ba9e8dae97b2d3}, [{0x2, 0x2, r5}, {0x2, 0x2, r6}, {0x2, 0x0, r7}, {0x2, 0x0, r8}, {0x2, 0x4, r9}, {0x2, 0x4, r10}], {0x4, 0x3}, [{0x8, 0x2, r11}, {0x8, 0x5, r12}, {0x8, 0x2, r13}, {0x8, 0x76b07d0446d5ddee, r14}, {0x8, 0x4, r15}, {0x8, 0x0, r16}, {0x8, 0x2, r17}, {0x8, 0x3, r18}], {0x10, 0x5}, {0x20, 0x7}}, 0x94, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae01, 0x0) 03:33:24 executing program 3 (fault-call:8 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:24 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x20000000000000, 0x400000) 03:33:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 247.357096][T17644] FAULT_INJECTION: forcing a failure. [ 247.357096][T17644] name failslab, interval 1, probability 0, space 0, times 0 [ 247.378497][T17644] CPU: 1 PID: 17644 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 247.386521][T17644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 247.396581][T17644] Call Trace: [ 247.396610][T17644] dump_stack+0x1d8/0x2f8 [ 247.396626][T17644] should_fail+0x608/0x860 [ 247.396638][T17644] ? setup_fault_attr+0x2b0/0x2b0 [ 247.396661][T17644] __should_failslab+0x11a/0x160 [ 247.396675][T17644] should_failslab+0x9/0x20 [ 247.396695][T17644] kmem_cache_alloc_trace+0x5d/0x2c0 [ 247.428411][T17644] ? __list_lru_init+0x3e3/0x900 [ 247.433351][T17644] __list_lru_init+0x3e3/0x900 [ 247.433371][T17644] alloc_super+0x635/0x740 [ 247.433384][T17644] sget_userns+0x1bf/0x4f0 [ 247.433392][T17644] ? free_anon_bdev+0x30/0x30 [ 247.433407][T17644] mount_nodev+0xe5/0x1c0 [ 247.433421][T17644] ? devpts_kill_sb+0x70/0x70 [ 247.442658][T17644] devpts_mount+0x2c/0x40 [ 247.442673][T17644] legacy_get_tree+0xf9/0x1a0 [ 247.442682][T17644] ? devpts_pty_kill+0xe0/0xe0 [ 247.442696][T17644] vfs_get_tree+0x8f/0x360 [ 247.442714][T17644] do_mount+0x1813/0x2730 [ 247.483773][T17644] ? copy_mount_string+0x30/0x30 [ 247.488730][T17644] ? kasan_check_write+0x14/0x20 [ 247.493673][T17644] ? _copy_from_user+0xe0/0x120 [ 247.498618][T17644] ? copy_mount_options+0xcf/0x360 [ 247.503742][T17644] ksys_mount+0xcc/0x100 [ 247.507991][T17644] __x64_sys_mount+0xbf/0xd0 [ 247.512579][T17644] do_syscall_64+0xfe/0x140 [ 247.517083][T17644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 247.522966][T17644] RIP: 0033:0x459519 [ 247.526854][T17644] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 247.546477][T17644] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:33:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae03, 0x0) 03:33:25 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/31, 0x1f) [ 247.554883][T17644] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 247.562844][T17644] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 247.570806][T17644] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 247.578772][T17644] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 247.587166][T17644] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x80000000000000, 0x400000) 03:33:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae41, 0x0) 03:33:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:25 executing program 3 (fault-call:8 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:25 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$ax25_int(r0, 0x101, 0xe, &(0x7f0000000000)=0x7, 0x4) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x0, @empty, 0x80000000}, @in6={0xa, 0x4e23, 0x8000, @rand_addr="384071b9a2cb7ae96e160955b422aaa7", 0x7f}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}], 0x48) [ 247.932124][T17779] FAULT_INJECTION: forcing a failure. [ 247.932124][T17779] name failslab, interval 1, probability 0, space 0, times 0 [ 247.997290][T17779] CPU: 1 PID: 17779 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 248.005324][T17779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.015373][T17779] Call Trace: [ 248.018666][T17779] dump_stack+0x1d8/0x2f8 [ 248.022990][T17779] should_fail+0x608/0x860 [ 248.027411][T17779] ? setup_fault_attr+0x2b0/0x2b0 [ 248.032437][T17779] __should_failslab+0x11a/0x160 [ 248.037366][T17779] should_failslab+0x9/0x20 [ 248.041880][T17779] kmem_cache_alloc_trace+0x5d/0x2c0 [ 248.047156][T17779] ? __list_lru_init+0x3e3/0x900 [ 248.052092][T17779] __list_lru_init+0x3e3/0x900 [ 248.056865][T17779] alloc_super+0x635/0x740 [ 248.061271][T17779] sget_userns+0x1bf/0x4f0 [ 248.065680][T17779] ? free_anon_bdev+0x30/0x30 [ 248.070348][T17779] mount_nodev+0xe5/0x1c0 [ 248.074676][T17779] ? devpts_kill_sb+0x70/0x70 [ 248.079340][T17779] devpts_mount+0x2c/0x40 [ 248.083657][T17779] legacy_get_tree+0xf9/0x1a0 [ 248.088317][T17779] ? devpts_pty_kill+0xe0/0xe0 [ 248.093077][T17779] vfs_get_tree+0x8f/0x360 [ 248.097485][T17779] do_mount+0x1813/0x2730 [ 248.101808][T17779] ? copy_mount_string+0x30/0x30 [ 248.106745][T17779] ? kasan_check_write+0x14/0x20 [ 248.111677][T17779] ? _copy_from_user+0xe0/0x120 [ 248.116518][T17779] ? copy_mount_options+0xcf/0x360 [ 248.121620][T17779] ksys_mount+0xcc/0x100 [ 248.125856][T17779] __x64_sys_mount+0xbf/0xd0 [ 248.130446][T17779] do_syscall_64+0xfe/0x140 [ 248.134951][T17779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.140835][T17779] RIP: 0033:0x459519 [ 248.144723][T17779] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.164331][T17779] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 248.172758][T17779] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 248.180721][T17779] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 248.188685][T17779] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:33:25 executing program 1: r0 = socket$kcm(0xa, 0x7, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'yam0\xff\x7f\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="130000000000000018800d93aa730c099bf9352e29fc8a8151b558b04c181291edab7c0ef61b4b216682f96b45dc9d63f21aed2a815a000000000000000000000013000000"]}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10041, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000100)={0x7, 0x8, 0x6}) 03:33:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x81010000000000, 0x400000) [ 248.196648][T17779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 248.204611][T17779] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x82040000000000, 0x400000) 03:33:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xaea2, 0x0) 03:33:26 executing program 3 (fault-call:8 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:26 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e20, 0x4, @ipv4={[], [], @loopback}}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:26 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) getpeername$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x1c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) fallocate(r1, 0x3, 0x2, 0x100000001) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x6) ioctl$int_in(r2, 0x800000800c5012, &(0x7f0000000040)) 03:33:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x84040000000000, 0x400000) [ 248.616743][T17927] FAULT_INJECTION: forcing a failure. [ 248.616743][T17927] name failslab, interval 1, probability 0, space 0, times 0 [ 248.671174][T17927] CPU: 1 PID: 17927 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 248.679185][T17927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.689237][T17927] Call Trace: [ 248.692528][T17927] dump_stack+0x1d8/0x2f8 [ 248.692547][T17927] should_fail+0x608/0x860 [ 248.692567][T17927] ? setup_fault_attr+0x2b0/0x2b0 [ 248.701562][T17927] __should_failslab+0x11a/0x160 [ 248.701578][T17927] should_failslab+0x9/0x20 [ 248.701588][T17927] kmem_cache_alloc_trace+0x5d/0x2c0 [ 248.701597][T17927] ? __list_lru_init+0x3e3/0x900 [ 248.701610][T17927] __list_lru_init+0x3e3/0x900 [ 248.701629][T17927] alloc_super+0x635/0x740 [ 248.701642][T17927] sget_userns+0x1bf/0x4f0 [ 248.739754][T17927] ? free_anon_bdev+0x30/0x30 [ 248.744425][T17927] mount_nodev+0xe5/0x1c0 [ 248.748734][T17927] ? devpts_kill_sb+0x70/0x70 [ 248.753419][T17927] devpts_mount+0x2c/0x40 [ 248.757736][T17927] legacy_get_tree+0xf9/0x1a0 [ 248.762396][T17927] ? devpts_pty_kill+0xe0/0xe0 [ 248.767159][T17927] vfs_get_tree+0x8f/0x360 [ 248.771577][T17927] do_mount+0x1813/0x2730 [ 248.775912][T17927] ? copy_mount_string+0x30/0x30 [ 248.780878][T17927] ? kasan_check_write+0x14/0x20 [ 248.785815][T17927] ? _copy_from_user+0xe0/0x120 [ 248.790830][T17927] ? copy_mount_options+0xcf/0x360 [ 248.795930][T17927] ksys_mount+0xcc/0x100 [ 248.800162][T17927] __x64_sys_mount+0xbf/0xd0 [ 248.804748][T17927] do_syscall_64+0xfe/0x140 [ 248.809249][T17927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.815130][T17927] RIP: 0033:0x459519 [ 248.819013][T17927] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 248.838655][T17927] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 248.847064][T17927] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 248.855023][T17927] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 248.862986][T17927] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:33:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x40042409, 0x0) [ 248.870948][T17927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 248.878924][T17927] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xf0ffffff0f0000, 0x400000) 03:33:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x44a, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1f, 0x53dfb56b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000003040)='ip6_vti0\x00', 0xfffb) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) creat(0x0, 0x0) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) 03:33:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x40045431, 0x0) 03:33:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x100000000000000, 0x400000) 03:33:26 executing program 3 (fault-call:8 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x400454ca, 0x0) [ 249.437092][T18161] FAULT_INJECTION: forcing a failure. [ 249.437092][T18161] name failslab, interval 1, probability 0, space 0, times 0 [ 249.469411][T18161] CPU: 1 PID: 18161 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 249.477516][T18161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.487572][T18161] Call Trace: [ 249.487596][T18161] dump_stack+0x1d8/0x2f8 [ 249.487615][T18161] should_fail+0x608/0x860 [ 249.495306][T18161] ? setup_fault_attr+0x2b0/0x2b0 [ 249.495330][T18161] __should_failslab+0x11a/0x160 [ 249.509676][T18161] should_failslab+0x9/0x20 [ 249.514195][T18161] kmem_cache_alloc_trace+0x5d/0x2c0 [ 249.519481][T18161] ? __list_lru_init+0x3e3/0x900 [ 249.524431][T18161] __list_lru_init+0x3e3/0x900 [ 249.529202][T18161] alloc_super+0x635/0x740 [ 249.533627][T18161] sget_userns+0x1bf/0x4f0 [ 249.538046][T18161] ? free_anon_bdev+0x30/0x30 [ 249.542727][T18161] mount_nodev+0xe5/0x1c0 [ 249.547142][T18161] ? devpts_kill_sb+0x70/0x70 [ 249.551824][T18161] devpts_mount+0x2c/0x40 [ 249.556158][T18161] legacy_get_tree+0xf9/0x1a0 [ 249.560830][T18161] ? devpts_pty_kill+0xe0/0xe0 [ 249.560845][T18161] vfs_get_tree+0x8f/0x360 [ 249.560857][T18161] do_mount+0x1813/0x2730 [ 249.560873][T18161] ? copy_mount_string+0x30/0x30 [ 249.560892][T18161] ? kasan_check_write+0x14/0x20 [ 249.584234][T18161] ? _copy_from_user+0xe0/0x120 [ 249.589099][T18161] ? copy_mount_options+0xcf/0x360 [ 249.594227][T18161] ksys_mount+0xcc/0x100 [ 249.598487][T18161] __x64_sys_mount+0xbf/0xd0 [ 249.603125][T18161] do_syscall_64+0xfe/0x140 [ 249.607651][T18161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.613546][T18161] RIP: 0033:0x459519 [ 249.617471][T18161] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:27 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@int=0x73, 0x4) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 249.637178][T18161] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 249.645600][T18161] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 249.653605][T18161] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 249.661582][T18161] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 249.669819][T18161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 249.677800][T18161] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x200000000000000, 0x400000) 03:33:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x300000000000000, 0x400000) 03:33:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x40045564, 0x0) 03:33:27 executing program 1: clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x3f, 0x4}) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x4205, r0, 0x202, &(0x7f0000000000)={&(0x7f0000001440)="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", 0x210}) 03:33:27 executing program 3 (fault-call:8 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:27 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x1, 0x2}) 03:33:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x400000000000000, 0x400000) 03:33:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x40045569, 0x0) [ 250.231125][T18371] FAULT_INJECTION: forcing a failure. [ 250.231125][T18371] name failslab, interval 1, probability 0, space 0, times 0 [ 250.282272][T18371] CPU: 0 PID: 18371 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 250.290303][T18371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.306708][T18371] Call Trace: [ 250.310018][T18371] dump_stack+0x1d8/0x2f8 [ 250.314360][T18371] should_fail+0x608/0x860 [ 250.318784][T18371] ? setup_fault_attr+0x2b0/0x2b0 [ 250.324373][T18371] __should_failslab+0x11a/0x160 [ 250.329322][T18371] should_failslab+0x9/0x20 [ 250.333833][T18371] kmem_cache_alloc_trace+0x5d/0x2c0 [ 250.339128][T18371] ? __list_lru_init+0x3e3/0x900 [ 250.344068][T18371] __list_lru_init+0x3e3/0x900 [ 250.348841][T18371] alloc_super+0x635/0x740 [ 250.353256][T18371] sget_userns+0x1bf/0x4f0 [ 250.357657][T18371] ? free_anon_bdev+0x30/0x30 [ 250.362327][T18371] mount_nodev+0xe5/0x1c0 [ 250.366673][T18371] ? devpts_kill_sb+0x70/0x70 [ 250.371347][T18371] devpts_mount+0x2c/0x40 [ 250.375673][T18371] legacy_get_tree+0xf9/0x1a0 [ 250.380352][T18371] ? devpts_pty_kill+0xe0/0xe0 [ 250.385117][T18371] vfs_get_tree+0x8f/0x360 [ 250.389527][T18371] do_mount+0x1813/0x2730 [ 250.393852][T18371] ? copy_mount_string+0x30/0x30 [ 250.398789][T18371] ? kasan_check_write+0x14/0x20 [ 250.403727][T18371] ? _copy_from_user+0xe0/0x120 [ 250.408573][T18371] ? copy_mount_options+0xcf/0x360 [ 250.413675][T18371] ksys_mount+0xcc/0x100 [ 250.417930][T18371] __x64_sys_mount+0xbf/0xd0 [ 250.422523][T18371] do_syscall_64+0xfe/0x140 [ 250.427028][T18371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.432918][T18371] RIP: 0033:0x459519 [ 250.436810][T18371] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.457572][T18371] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 250.465992][T18371] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 250.474061][T18371] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 250.482034][T18371] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 250.490040][T18371] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 250.498010][T18371] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x500000000000000, 0x400000) 03:33:28 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xb1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, r0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) ioctl$SIOCNRDECOBS(r0, 0x89e2) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:28 executing program 3 (fault-call:8 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x40049409, 0x0) 03:33:28 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000000)={0x73622a85, 0x1, 0x2}) 03:33:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x600000000000000, 0x400000) 03:33:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 251.139318][T18553] FAULT_INJECTION: forcing a failure. [ 251.139318][T18553] name failslab, interval 1, probability 0, space 0, times 0 [ 251.157768][T18553] CPU: 0 PID: 18553 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 251.165806][T18553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.175883][T18553] Call Trace: [ 251.179190][T18553] dump_stack+0x1d8/0x2f8 [ 251.183538][T18553] should_fail+0x608/0x860 [ 251.187960][T18553] ? setup_fault_attr+0x2b0/0x2b0 [ 251.192994][T18553] __should_failslab+0x11a/0x160 [ 251.193009][T18553] should_failslab+0x9/0x20 [ 251.193018][T18553] kmem_cache_alloc_trace+0x5d/0x2c0 [ 251.193028][T18553] ? __list_lru_init+0x3e3/0x900 [ 251.193039][T18553] __list_lru_init+0x3e3/0x900 [ 251.193056][T18553] alloc_super+0x635/0x740 [ 251.193068][T18553] sget_userns+0x1bf/0x4f0 [ 251.193075][T18553] ? free_anon_bdev+0x30/0x30 [ 251.193089][T18553] mount_nodev+0xe5/0x1c0 [ 251.193099][T18553] ? devpts_kill_sb+0x70/0x70 [ 251.193110][T18553] devpts_mount+0x2c/0x40 [ 251.193125][T18553] legacy_get_tree+0xf9/0x1a0 [ 251.217502][T18553] ? devpts_pty_kill+0xe0/0xe0 [ 251.217519][T18553] vfs_get_tree+0x8f/0x360 [ 251.217533][T18553] do_mount+0x1813/0x2730 [ 251.217549][T18553] ? copy_mount_string+0x30/0x30 [ 251.249006][T18553] ? kasan_check_write+0x14/0x20 [ 251.249019][T18553] ? _copy_from_user+0xe0/0x120 [ 251.249035][T18553] ? copy_mount_options+0xcf/0x360 [ 251.282310][T18553] ksys_mount+0xcc/0x100 [ 251.286574][T18553] __x64_sys_mount+0xbf/0xd0 [ 251.291179][T18553] do_syscall_64+0xfe/0x140 [ 251.295694][T18553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.301591][T18553] RIP: 0033:0x459519 [ 251.305483][T18553] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.327337][T18553] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:33:28 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x3}, 0xc9) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4004ae8b, 0x0) [ 251.335759][T18553] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 251.343760][T18553] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 251.351737][T18553] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 251.359724][T18553] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 251.367710][T18553] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x804000000000000, 0x400000) 03:33:29 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000280), 0x1, {0xa, 0x4e24, 0x0, @local, 0x3}, r1}}, 0x38) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x10000, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x7) r3 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3f, 0x1) write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000100)={0x45, 0x6, 0x0, {0x6, 0x5, 0x1c, 0x0, 'procvboxnet0.$vboxnet1md5sum'}}, 0x45) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x4000, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f00000000c0)) ioctl$VIDIOC_SUBDEV_S_CROP(r3, 0xc038563c, &(0x7f0000000180)={0x0, 0x0, {0x9, 0x7ff, 0x1, 0x89e5}}) ioctl$PPPIOCGUNIT(r3, 0x80047456, &(0x7f00000001c0)) 03:33:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x900000000000000, 0x400000) 03:33:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) close(r0) timerfd_create(0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0x3f, 0xba63, 0x678d, 0x6, 0x2, 0x400}) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000005, 0x0, r0, 0x0}]) 03:33:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4004ae99, 0x0) 03:33:29 executing program 3 (fault-call:8 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xb00000000000000, 0x400000) 03:33:29 executing program 1: openat$vfio(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x9d, &(0x7f0000000000)) stat(&(0x7f00000000c0)='./file0\x00', 0x0) getresuid(0x0, &(0x7f0000000680), 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_NOTIFY_DELETE(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="37000000060000000000000000000000040000000000000006000800cc00000000000000000000007b76626f786e657430"], 0x31) 03:33:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x16, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x12, 0x0, &(0x7f0000000140)=0xffffffffffffff70) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xa8, 0x32000) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) syz_open_dev$adsp(0x0, 0x3, 0x1) [ 252.026784][T18709] FAULT_INJECTION: forcing a failure. [ 252.026784][T18709] name failslab, interval 1, probability 0, space 0, times 0 [ 252.098231][T18709] CPU: 1 PID: 18709 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 252.106263][T18709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.116343][T18709] Call Trace: [ 252.119639][T18709] dump_stack+0x1d8/0x2f8 [ 252.123980][T18709] should_fail+0x608/0x860 [ 252.128391][T18709] ? setup_fault_attr+0x2b0/0x2b0 [ 252.133416][T18709] __should_failslab+0x11a/0x160 [ 252.139226][T18709] should_failslab+0x9/0x20 [ 252.143728][T18709] kmem_cache_alloc_trace+0x5d/0x2c0 [ 252.149050][T18709] ? __list_lru_init+0x3e3/0x900 [ 252.153988][T18709] __list_lru_init+0x3e3/0x900 [ 252.158767][T18709] alloc_super+0x635/0x740 [ 252.163184][T18709] sget_userns+0x1bf/0x4f0 [ 252.167595][T18709] ? free_anon_bdev+0x30/0x30 [ 252.172270][T18709] mount_nodev+0xe5/0x1c0 [ 252.176595][T18709] ? devpts_kill_sb+0x70/0x70 [ 252.181263][T18709] devpts_mount+0x2c/0x40 [ 252.185594][T18709] legacy_get_tree+0xf9/0x1a0 [ 252.190266][T18709] ? devpts_pty_kill+0xe0/0xe0 [ 252.195037][T18709] vfs_get_tree+0x8f/0x360 [ 252.199451][T18709] do_mount+0x1813/0x2730 [ 252.203809][T18709] ? copy_mount_string+0x30/0x30 [ 252.208839][T18709] ? kasan_check_write+0x14/0x20 [ 252.213783][T18709] ? _copy_from_user+0xe0/0x120 [ 252.218623][T18709] ? copy_mount_options+0xcf/0x360 [ 252.223729][T18709] ksys_mount+0xcc/0x100 [ 252.227969][T18709] __x64_sys_mount+0xbf/0xd0 [ 252.232560][T18709] do_syscall_64+0xfe/0x140 [ 252.237058][T18709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.242944][T18709] RIP: 0033:0x459519 [ 252.246831][T18709] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.266528][T18709] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 252.276963][T18709] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 252.285662][T18709] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 252.293641][T18709] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 252.301620][T18709] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 252.309696][T18709] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:29 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x1, 0x4) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000040)={0xfffffffffffffffa, 0x100, 0x0, 0x7fffffff, 0x9, 0x6}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc00000000000000, 0x400000) 03:33:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x40086200, 0x0) 03:33:30 executing program 1: socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20001, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000100), 0x8) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) pselect6(0xff5c, &(0x7f00000000c0)={0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000040), 0x0) 03:33:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xd00000000000000, 0x400000) 03:33:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x40087705, 0x0) [ 252.549804][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 252.555729][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:33:30 executing program 3 (fault-call:8 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x1200000000000000, 0x400000) 03:33:30 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x2) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 252.832250][T18880] FAULT_INJECTION: forcing a failure. [ 252.832250][T18880] name failslab, interval 1, probability 0, space 0, times 0 [ 252.892244][T18880] CPU: 1 PID: 18880 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 252.900293][T18880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.910384][T18880] Call Trace: [ 252.913678][T18880] dump_stack+0x1d8/0x2f8 [ 252.918004][T18880] should_fail+0x608/0x860 [ 252.922416][T18880] ? setup_fault_attr+0x2b0/0x2b0 [ 252.927438][T18880] __should_failslab+0x11a/0x160 [ 252.932390][T18880] should_failslab+0x9/0x20 [ 252.936881][T18880] kmem_cache_alloc_trace+0x5d/0x2c0 [ 252.942163][T18880] ? __list_lru_init+0x3e3/0x900 [ 252.947102][T18880] __list_lru_init+0x3e3/0x900 [ 252.951866][T18880] alloc_super+0x635/0x740 [ 252.956269][T18880] sget_userns+0x1bf/0x4f0 [ 252.960677][T18880] ? free_anon_bdev+0x30/0x30 [ 252.965346][T18880] mount_nodev+0xe5/0x1c0 [ 252.969669][T18880] ? devpts_kill_sb+0x70/0x70 [ 252.974345][T18880] devpts_mount+0x2c/0x40 [ 252.978671][T18880] legacy_get_tree+0xf9/0x1a0 [ 252.983347][T18880] ? devpts_pty_kill+0xe0/0xe0 [ 252.988102][T18880] vfs_get_tree+0x8f/0x360 [ 252.992609][T18880] do_mount+0x1813/0x2730 [ 252.996948][T18880] ? copy_mount_string+0x30/0x30 [ 253.001884][T18880] ? kasan_check_write+0x14/0x20 [ 253.006817][T18880] ? _copy_from_user+0xe0/0x120 [ 253.011668][T18880] ? copy_mount_options+0xcf/0x360 [ 253.016789][T18880] ksys_mount+0xcc/0x100 [ 253.021037][T18880] __x64_sys_mount+0xbf/0xd0 [ 253.025640][T18880] do_syscall_64+0xfe/0x140 [ 253.030143][T18880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.036041][T18880] RIP: 0033:0x459519 [ 253.039931][T18880] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.059645][T18880] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 253.068074][T18880] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 253.076133][T18880] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 253.084107][T18880] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 253.092070][T18880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 253.100134][T18880] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 253.108387][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 253.109864][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 253.114263][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 253.119940][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 253.131476][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 253.137252][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:33:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4008af00, 0x0) [ 253.143128][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 253.148934][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:33:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x2000000000000000, 0x400000) 03:33:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:30 executing program 0: r0 = syz_open_dev$usb(0x0, 0x1, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000780)='/proc/thread-self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x194, r2, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x68, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1c}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x14, 0x8}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x17}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xb7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xf8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffe}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1c}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x194}, 0x1, 0x0, 0x0, 0x80}, 0x20000800) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000400)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) r6 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000600)=0xe8) getresgid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) fsetxattr$system_posix_acl(r4, &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x1}, [{0x2, 0x1, r5}, {0x2, 0x2, r6}, {0x2, 0x1, r7}], {0x4, 0x4}, [{0x8, 0x4, r8}], {0x10, 0x2}, {0x20, 0x6}}, 0x44, 0x2) 03:33:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = msgget(0x0, 0x254) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() getgroups(0x7, &(0x7f0000000240)=[0x0, 0xee00, 0xffffffffffffffff, 0xee01, 0x0, 0x0, 0xee01]) r6 = getpgid(0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000280)={{0x4, r2, r3, r4, r5, 0x80, 0x80000001}, 0x3, 0x360, 0x3ff, 0x13, 0x8001, 0x101, r6}) r7 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r8 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r7, 0x4040ae79, &(0x7f0000000040)={0x1, 0x0, 0x2, r8, 0x1}) ioctl$KVM_IOEVENTFD(r7, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x2, r8, 0x3}) 03:33:31 executing program 3 (fault-call:8 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x40187542, 0x0) 03:33:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x3f00000000000000, 0x400000) [ 253.600762][T19005] FAULT_INJECTION: forcing a failure. [ 253.600762][T19005] name failslab, interval 1, probability 0, space 0, times 0 [ 253.683179][T19005] CPU: 0 PID: 19005 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 253.691202][T19005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.701269][T19005] Call Trace: [ 253.704579][T19005] dump_stack+0x1d8/0x2f8 [ 253.708926][T19005] should_fail+0x608/0x860 [ 253.713359][T19005] ? setup_fault_attr+0x2b0/0x2b0 [ 253.718491][T19005] __should_failslab+0x11a/0x160 [ 253.723439][T19005] should_failslab+0x9/0x20 [ 253.727945][T19005] kmem_cache_alloc_trace+0x5d/0x2c0 [ 253.733242][T19005] ? __list_lru_init+0x3e3/0x900 [ 253.738188][T19005] __list_lru_init+0x3e3/0x900 [ 253.742972][T19005] alloc_super+0x635/0x740 [ 253.747399][T19005] sget_userns+0x1bf/0x4f0 [ 253.751996][T19005] ? free_anon_bdev+0x30/0x30 [ 253.756687][T19005] mount_nodev+0xe5/0x1c0 [ 253.761371][T19005] ? devpts_kill_sb+0x70/0x70 [ 253.766060][T19005] devpts_mount+0x2c/0x40 [ 253.770400][T19005] legacy_get_tree+0xf9/0x1a0 [ 253.775168][T19005] ? devpts_pty_kill+0xe0/0xe0 [ 253.780032][T19005] vfs_get_tree+0x8f/0x360 [ 253.784487][T19005] do_mount+0x1813/0x2730 [ 253.788835][T19005] ? copy_mount_string+0x30/0x30 [ 253.793783][T19005] ? kasan_check_write+0x14/0x20 [ 253.798734][T19005] ? _copy_from_user+0xe0/0x120 [ 253.803595][T19005] ? copy_mount_options+0xcf/0x360 [ 253.808720][T19005] ksys_mount+0xcc/0x100 [ 253.812969][T19005] __x64_sys_mount+0xbf/0xd0 [ 253.817569][T19005] do_syscall_64+0xfe/0x140 [ 253.822092][T19005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.828003][T19005] RIP: 0033:0x459519 [ 253.831901][T19005] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.851523][T19005] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 253.859941][T19005] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 253.867911][T19005] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 253.875888][T19005] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:33:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000000)={0x9, 0x8, 0x8, 0x7628, 0xf2, 0x14, 0x4, 0x2, 0x0}, &(0x7f0000000040)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r2, 0x2, 0x7, 0x7fffffff, 0x3, 0x100}, 0x14) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x4102, 0x0) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000180)={0x0, 0x10000000001000, 0x2, 0x89, 0x9}) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000200007041dfffd946f610500810000001f004203000008000800180006e7fe7e280000001100fffdba16a0aa1c0900000000000012000000000000eff24d8238cfa40e000000bf54", 0x4c}], 0x32b}, 0x4000000) r4 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$SG_GET_SCSI_ID(r4, 0x2276, &(0x7f0000000100)) [ 253.883870][T19005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 253.891878][T19005] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:31 executing program 1: r0 = socket$inet6(0x10, 0xb, 0x40000000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000200)="5500000018007f5300fe01b2a4a280930a602c0fffa843029100000b390009002b000c000b0000001900050000000000000008dc1338d54402009bcdc66ef75afb83de448daa7227c43ab8220000060cec4fab91cf", 0x55}], 0x1}, 0x0) 03:33:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x4000000000000000, 0x400000) 03:33:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4020940d, 0x0) 03:33:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f00000000c0)={0x1680000000000000, 0x0, 0x20, 0x8, 0x14}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'bridge_slave_0\x00', 0x0}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000000c0)=r4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\v'], 0x1, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:33:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x8000000000000000, 0x400000) 03:33:31 executing program 3 (fault-call:8 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) [ 254.450826][T19312] FAULT_INJECTION: forcing a failure. [ 254.450826][T19312] name failslab, interval 1, probability 0, space 0, times 0 [ 254.472435][T19312] CPU: 0 PID: 19312 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 254.480433][T19312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.480440][T19312] Call Trace: [ 254.480461][T19312] dump_stack+0x1d8/0x2f8 [ 254.480479][T19312] should_fail+0x608/0x860 [ 254.480493][T19312] ? setup_fault_attr+0x2b0/0x2b0 [ 254.480516][T19312] __should_failslab+0x11a/0x160 [ 254.480533][T19312] should_failslab+0x9/0x20 [ 254.480549][T19312] kmem_cache_alloc_trace+0x5d/0x2c0 [ 254.507615][T19312] ? __list_lru_init+0x3e3/0x900 [ 254.507633][T19312] __list_lru_init+0x3e3/0x900 [ 254.507652][T19312] alloc_super+0x635/0x740 [ 254.507665][T19312] sget_userns+0x1bf/0x4f0 [ 254.540845][T19312] ? free_anon_bdev+0x30/0x30 [ 254.545528][T19312] mount_nodev+0xe5/0x1c0 [ 254.549848][T19312] ? devpts_kill_sb+0x70/0x70 [ 254.554553][T19312] devpts_mount+0x2c/0x40 [ 254.558880][T19312] legacy_get_tree+0xf9/0x1a0 [ 254.563549][T19312] ? devpts_pty_kill+0xe0/0xe0 [ 254.568307][T19312] vfs_get_tree+0x8f/0x360 [ 254.572721][T19312] do_mount+0x1813/0x2730 [ 254.577046][T19312] ? copy_mount_string+0x30/0x30 [ 254.581981][T19312] ? kasan_check_write+0x14/0x20 [ 254.586922][T19312] ? _copy_from_user+0xe0/0x120 [ 254.591802][T19312] ? copy_mount_options+0xcf/0x360 [ 254.596926][T19312] ksys_mount+0xcc/0x100 [ 254.601169][T19312] __x64_sys_mount+0xbf/0xd0 [ 254.605761][T19312] do_syscall_64+0xfe/0x140 [ 254.610272][T19312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.616170][T19312] RIP: 0033:0x459519 [ 254.620063][T19312] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.639670][T19312] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:33:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc200000000000000, 0x400000) 03:33:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0xa, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000080)="d0", 0x0}, 0x18) [ 254.648090][T19312] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 254.656078][T19312] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 254.664074][T19312] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 254.672050][T19312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 254.680041][T19312] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4020ae46, 0x0) 03:33:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$9p_tcp(&(0x7f0000000000)='\n27.0.0.1.', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=tcp,port=0x']) r1 = dup2(r0, r0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000080)={0x72a1, 0x1, 0xfffffffffffffd5c, 0x3ff}) 03:33:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc300000000000000, 0x400000) [ 254.932596][T19366] 9pnet: p9_fd_create_tcp (19366): problem connecting socket to [ 254.932596][T19366] 27.0.0.1. 03:33:32 executing program 3 (fault-call:8 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:32 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000400)={'filter\x00', 0x7, 0x4, 0x4a8, 0x140, 0x0, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000000), {[{{@arp={@remote, @broadcast, 0x0, 0xffffffff, @mac, {[0xff, 0xff, 0xff, 0x0, 0xff]}, @mac, {[0xff, 0xff, 0x0, 0xff, 0xff]}, 0x4, 0x9, 0x49da, 0x1, 0xd3, 0x5, 'veth1_to_hsr\x00', 'bcsf0\x00', {0xff}, {}, 0x0, 0x40}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @multicast1, @remote, 0x8, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @dev={0xac, 0x14, 0x14, 0xb}, 0x2, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x21}, @empty, @rand_addr=0x8, @dev={0xac, 0x14, 0x14, 0xa}, 0x9, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) listen(r0, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 255.006078][T19366] 9pnet: p9_fd_create_tcp (19366): problem connecting socket to [ 255.006078][T19366] 27.0.0.1. 03:33:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc400000000000000, 0x400000) [ 255.127915][T19404] FAULT_INJECTION: forcing a failure. [ 255.127915][T19404] name failslab, interval 1, probability 0, space 0, times 0 [ 255.158275][T19404] CPU: 1 PID: 19404 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 255.166310][T19404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.176381][T19404] Call Trace: [ 255.179716][T19404] dump_stack+0x1d8/0x2f8 [ 255.184055][T19404] should_fail+0x608/0x860 [ 255.188485][T19404] ? setup_fault_attr+0x2b0/0x2b0 [ 255.193527][T19404] __should_failslab+0x11a/0x160 [ 255.198484][T19404] should_failslab+0x9/0x20 [ 255.202988][T19404] kmem_cache_alloc_trace+0x5d/0x2c0 [ 255.208449][T19404] ? __list_lru_init+0x3e3/0x900 [ 255.213397][T19404] __list_lru_init+0x3e3/0x900 [ 255.218199][T19404] alloc_super+0x635/0x740 [ 255.222619][T19404] sget_userns+0x1bf/0x4f0 [ 255.227049][T19404] ? free_anon_bdev+0x30/0x30 [ 255.231734][T19404] mount_nodev+0xe5/0x1c0 [ 255.236066][T19404] ? devpts_kill_sb+0x70/0x70 [ 255.240749][T19404] devpts_mount+0x2c/0x40 [ 255.245087][T19404] legacy_get_tree+0xf9/0x1a0 [ 255.249770][T19404] ? devpts_pty_kill+0xe0/0xe0 [ 255.254545][T19404] vfs_get_tree+0x8f/0x360 [ 255.258963][T19404] do_mount+0x1813/0x2730 [ 255.263303][T19404] ? copy_mount_string+0x30/0x30 [ 255.268255][T19404] ? kasan_check_write+0x14/0x20 [ 255.273191][T19404] ? _copy_from_user+0xe0/0x120 [ 255.278043][T19404] ? copy_mount_options+0xcf/0x360 [ 255.283159][T19404] ksys_mount+0xcc/0x100 [ 255.287403][T19404] __x64_sys_mount+0xbf/0xd0 [ 255.292025][T19404] do_syscall_64+0xfe/0x140 [ 255.296535][T19404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.302456][T19404] RIP: 0033:0x459519 [ 255.306349][T19404] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) waitid(0x2, r0, &(0x7f0000000080), 0x80000001, &(0x7f0000000280)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket$nl_netfilter(0x10, 0x3, 0xc) preadv(r1, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000180)=""/71, 0x47}], 0x2, 0x0) [ 255.326627][T19404] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 255.335040][T19404] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 255.343019][T19404] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 255.350996][T19404] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 255.358969][T19404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 255.367116][T19404] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:33 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x80100) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4030582a, 0x0) 03:33:33 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000400)={'filter\x00', 0x7, 0x4, 0x4a8, 0x140, 0x0, 0x140, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000000), {[{{@arp={@remote, @broadcast, 0x0, 0xffffffff, @mac, {[0xff, 0xff, 0xff, 0x0, 0xff]}, @mac, {[0xff, 0xff, 0x0, 0xff, 0xff]}, 0x4, 0x9, 0x49da, 0x1, 0xd3, 0x5, 'veth1_to_hsr\x00', 'bcsf0\x00', {0xff}, {}, 0x0, 0x40}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @multicast1, @remote, 0x8, 0xffffffff}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local, @dev={0xac, 0x14, 0x14, 0xb}, 0x2, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x21}, @empty, @rand_addr=0x8, @dev={0xac, 0x14, 0x14, 0xa}, 0x9, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) listen(r0, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc500000000000000, 0x400000) 03:33:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x40345632, 0x0) 03:33:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc600000000000000, 0x400000) 03:33:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:33 executing program 3 (fault-call:8 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:33 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getpeername$inet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x80000000, 0x20}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={r4, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0xfffffffffffffd1f) 03:33:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc700000000000000, 0x400000) 03:33:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080)=0x5, 0x4) connect(r0, &(0x7f0000000000)=@caif=@util={0x25, "11ff5fde86f4c242d377c111ee043c07"}, 0x80) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) 03:33:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4038ae7a, 0x0) 03:33:33 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc800000000000000, 0x400000) [ 256.375331][T19749] FAULT_INJECTION: forcing a failure. [ 256.375331][T19749] name failslab, interval 1, probability 0, space 0, times 0 [ 256.460545][T19749] CPU: 0 PID: 19749 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 256.468555][T19749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.478691][T19749] Call Trace: [ 256.481987][T19749] dump_stack+0x1d8/0x2f8 [ 256.486314][T19749] should_fail+0x608/0x860 [ 256.490783][T19749] ? setup_fault_attr+0x2b0/0x2b0 [ 256.495819][T19749] __should_failslab+0x11a/0x160 [ 256.500758][T19749] should_failslab+0x9/0x20 [ 256.505277][T19749] kmem_cache_alloc_node_trace+0x6e/0x280 [ 256.510997][T19749] ? __kmalloc_node+0x3c/0x60 [ 256.515674][T19749] __kmalloc_node+0x3c/0x60 [ 256.520176][T19749] kvmalloc_node+0xcc/0x130 [ 256.524669][T19749] __list_lru_init+0x35b/0x900 [ 256.529427][T19749] alloc_super+0x635/0x740 [ 256.533836][T19749] sget_userns+0x1bf/0x4f0 [ 256.538235][T19749] ? free_anon_bdev+0x30/0x30 [ 256.542914][T19749] mount_nodev+0xe5/0x1c0 [ 256.547242][T19749] ? devpts_kill_sb+0x70/0x70 [ 256.551923][T19749] devpts_mount+0x2c/0x40 [ 256.556242][T19749] legacy_get_tree+0xf9/0x1a0 [ 256.560920][T19749] ? devpts_pty_kill+0xe0/0xe0 [ 256.565676][T19749] vfs_get_tree+0x8f/0x360 [ 256.570082][T19749] do_mount+0x1813/0x2730 [ 256.574404][T19749] ? copy_mount_string+0x30/0x30 [ 256.579357][T19749] ? kasan_check_write+0x14/0x20 [ 256.584286][T19749] ? _copy_from_user+0xe0/0x120 [ 256.589393][T19749] ? copy_mount_options+0xcf/0x360 [ 256.594495][T19749] ksys_mount+0xcc/0x100 [ 256.598727][T19749] __x64_sys_mount+0xbf/0xd0 [ 256.604020][T19749] do_syscall_64+0xfe/0x140 [ 256.608539][T19749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.614426][T19749] RIP: 0033:0x459519 [ 256.618313][T19749] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.637928][T19749] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 256.646340][T19749] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 03:33:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4048ae9b, 0x0) 03:33:34 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, 0x0) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r2, 0x4) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000400)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r3, 0x6) sendmsg$unix(r3, &(0x7f00000003c0)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000600)="89a195c51aa500bb1fad8e7f6915a949c9a8c081cbcf7907f1e551b6945ba89adf5c52b0a313f5954e28151c29266e24e0de383fc86a4e1eaf0858b5a6d56a14443eb73e5b3f3466a5111eb94909576b53c3795ada6a5163aa9b1fad038a2a52b7c69cc1de224235796db5425e753cc86f1b7e70932215c1a8f4891ee995b433d4b1ac3cf4c6df0f37eb38ce7d7eebbe0bfa69bae955be790a6ed43ed495ddd826228eadd3df90457b885a88862523300c4e48f5c67f2bceb35f51b7ddbb33a4c418effc352a9ee9a405611f3ba69a99eff060e85254063b76c40bbfdde53a33dde1f327317d856b23940599451872fd6c2f579983a1d35f9fd51cfdedb06b958ce1ad6f43f5a632a9d54f4e33289684157d8110425e0caadf53e8b23e79d806da668fb7c8547930c37486f9ab0ddff8975707be04910a33c02e88f867862c4ce68e201d840962c73fb6869d94a860b2438112c8e482a79acaefc7e223328223fb48544dbabfc0e5e3b386b6d441ca0e79d7ddf3caeb955c080e30cc75a4a9e17074e65121a8e78280f6a2eceeb9d790c0b82a2aa20869f53dc569f8a966b58890cc1d83c17242f0872a2ccc41328be36c3088d0ffde3a0ff47fc62458ea512a35bceb6efb9ffcc12bd7687170e92a792f925bd4093dd05ef2e916607e1a2c8f5c31c3d8aa63430b777e1d40272fae37c39eb581582ec4456fcf70d8599afc38b20db434cc88b46afe44e1813e8c0c2072739e53a50da8b7cd7d13419cc5bcd34320d6d38c53d1a77f7a5e1ab13f5b54a9eeee0cc3d130ea776bb1dac5b2695ce122369ab49a51024973cb1f3cec600d2358fe0f42e16abdb4a8e234f3e334e954d9472d6de43dc647596f31f7cc7c4cccbcca1f1c34c7b1cb356a1b117cdbaa6acb878107bf81e4841d2b59f3e3c88abfa8b4aebc6fc7978bd9ab48c258cd1cce78f78569d66f0e075c7eb30100d1084b0a26f7ee13d5ed8ca6d72f566b8442aa08f167f34114b37caac1259a94b3c146b32d7f911160a4b6b4f65207241dff2adbcf4f9be84d08492ab893df6ad83789c6ecac2d69dc4e7a4cbdf1d60407d55a524c8960e87340cdc958f7fd7dcb0886fa037ab3f85668ca4ffcbf3d7230d139616fd37e44f74dbc2e9c4fe7375eacc3a4092928938e476b8b3a3bffec7238359d16208a493d537e7c04f6f237b0d58c38bbb93b87f9f0d76670b9d0a782eceed0c84205e913139204f7155c89684a66d6ea898c7a8f1d19300baeabd0d257b25b74927395658a25512e1528f1757301728a8c1211f241120d1692e0202fae18e0c639b81e37064d11763ff0220b119de141db07117039fecf3fa1e68424cd50a057e1b7aef8b9a0135dac712179fd1988fcbc52899e1cc2ac7736c9437623352c054e277994e19b59a1e40bdfb4deb75406715704de8bcdb32361fa94f26904a649ad1f70596478a719fe2461e87405e2234b689af768bf94eeb1e24fa700c57269ff19afba813f32c16ca968eb5f63943679104fa2e936d28e1b6914c6bbde867cb38c6c9f06c588cc616bae2436d7eb1e6e4e4e8eac23ef555e91ef7063e3406c8841f0f1f735b9e8af45dcc8f4608c246d50ada0e091a54593da195dac6b3daa76dd5d210f97784abded06247c45a1683863a480dcf5d72bf3c8924e5795370d3e2663143cb4dd2d527f412d530717ef091a22dbecaf30456923240c60eae40eafc044d8b8926d01366e62d0f08a1bbf74167e5fc3ee0b2e6e294dcbe4c9a109037bd46d2239ed066b1992ce36cceadac1beee101fba47a1643dd8fc8357aeda7047c712e6e74b662562cc9c3e742b9e38c0f45ee60b50d7706aa8a3927df74a168d7c4e741380b988469510edb4f3f2fb107a5471363585c991c767163b33e3d1625d57ec14ee666e85424c5081ca33aa1c69bb1953827aa26672837e8823757f57c28e5c767be652db5cf8f75ee6ba20809858bb473179262175ae0156d060a3b147fa5d0e2df52dcb39c520507466d20a6ba48d9ad1b44aaa5f3f5a195cc2f281a1f7ff59face1e2b7968da8f50f148c52054eba32597fdfa012e1c24cf59f5f22e366ef0a645a2f38b6f7337d56e9a295061f2e89e1bac0741b9824cfead33097b0985151d2157609ec0cc57542d1c156e157f304f80e78b4941e616932392e0f5f55e313086918749e99a64988ae181b80110b527ed4da98799eddecc0d56e6b8aefef968fc4891e3a6bd1a79b39d9f2b9810208ab682ccbcb9461aba411a74a45bf0cad81a90a946a51f6a41a43bd541e8259f3750610278ab51f7cb77521b76cd33c06c819e034ee78961ab6fdd194f2b4ef0642cc8a2835dbe69c7e5d4d03b1a98ee099e228e0dd512958c4971f3543131309d485e4191f5a4a7cc28f33fa9726a1567331ff8ce96164537cb1141104d1aeeaf585f0e9bdc4b1bfcd83338b6188aa58bd5dcdac2f68ea9483da9a2930ec714363a20bb5037dab0e14c4bf84b5ff96a335b08b32cbdff24b53611d78a58ff5d4111eae9aff555046493537f29abca5d5da20028b99c48fd069d3eb5bce1a48e769aaab693aad47e73474b265970937db65e5baf7a7723099e4023d5457c9d0a28d725955cc8705f247c2f710d4ed2fe27f6d0159af28531f47c000984c415376b3c5869a5c9fdce44b2eb02e827d071065db22d9fb7207c96033847795dd98497ddeb47a7e16480abc2fc5967c33ecea9ec725db27111b15cc2f64e24ac51ce73d32fe9f6231045795eaccf4b40461f970ccea18ee1776edb77455dfac3c6ec90099a927c4d1f3abab622d3d06cc496d40134bb06923a32d51c59cc90725fbc1eb1f75288c44d5e09ebeff19df11df50963055a8171884e17b456b79cd9facb1e7d0668f286d65ce6a7b8b3cf89b2f92b5f3c63528a85a5f5ac5874d4154ef0f55b9c0157d5c01857fb906ceb2ad24bd4198d352606e1aaed0d719b874c59329963659c69fdc422b7d24a9fdecb92ba2b7f37c455291fc58c40929e868d7e227f0e81195680081954875cf5fee3f545befdc3a2533f2e95582633a303f8dcf85e54063ac68d95ec89ece9f1f678574180e06ecfee65fcde34496228f278e4c9852cb82f16f98bccf376379aa9157629e9037c768f158e52e9b434edb870e07e70f80f474ddfd942e62e92bc2b2e84336e2e0de97906afcba998d072fe1e5c28c39da4b719c4fc0218aaec94e62960695a414004279b5adaa87adf4323ce21bb3e68a59750251954770bf3002a07ee62fe3d76d5fe08cc0e27f7e8c901ea7761518a6ed8409ea5827e29e50f8c5ebadac5d1365ff8e57e0955009e247bb33f0886f5d4de6d00b7c3f63905bdfb80b68c8ea216915a69217959c8aad4f8dd28d3cc1569e7baaa2d8358e0c0bb4951eadcc47f373bb59f7e0fb7933c19d7a3726ce068b4574d28bea1dca44c8d1497769356b90481b2ea96342cadc12f6e93827f18a675cb975ec4205b63ba6f76c4760bbf554153219c2a7f48f380bc5fbf4ce266416d223f8ce3d205d5b61c1488e1e7db2325aefe6d5b6f451e760b1a04b21c105976b5cade865b8da5f138353dec061536fa57282b7658c50ef9114037f7d33d8a2a362738e0d33855492a846aeeb9c70c093379c793f4cbbd68edc3f0f47e6c99d0f3221d4287c549cab836c5804c638546746a7bd07a9fd7f57681ec1ad98cbd24bf24454487f544f23b1599a8486b8c4f554ff54fce774df0a296f64cd50a940a081831c50721117c795daad753320879bb7140502330b15594d09841df3861808e1076b7d50b47002843a9ef46856d9eda5d2fd2acae4d3fd3da6ec910f6bb566d7e760d4d06764ca0fb004eaeff506bcbf4b6235160ed0141fcf5e6f51a416e98d42ab67f07a4e87f9f54050ae02ae4c0616d213cf93979ba15f1803f3be25dec3c9459e55b2f0f6c83714533fc7e28641ac7bdbaa4f0cee4b11a067232ce651150b3f769cffda9a226b761e0d7b900ba4cb58bc9876c42019a64e95eb1d7535612520979225e79931b482362ad798249f9d1e9eb1f96bcc9d793ee43e9073d5f39667ee8258c6bdc9fe255751accc14b5a7e1fed02d48815093755e6b010239f7a684ac6d96a4d1aaa84584a1381690911e43fecfe0adb7d63d50c29dea1e0b95916c2cf4c15c0e1f38b7207b16ec179748f800dd6a96b7bdb83b1753b5a4b0bda15f2c8e5b40a3a5490fb57b20c4db0d79ff06616b14b457d23d31ac368372576223a7c3220a94b92e7d2ab75527c2437523a6d1343bdc02211c1e573958232e8200ffee045c78e518c84d7f93f630fd7d3c885921d5f7e0005f15eda724abfc3dee7181e5e5f44a82725c6c7732187ae7b333f5c4fb90861739ac82244db40473088909f3e89578a7b4cc482d78552c36ec14f9899699397ce6433bb232f4d28802d769111cff107c3990479e45f668aafbf44f71e9eac1496b592ff4403e9843a5157424bfe0c80f8f01df3ba449d670e5d16834258110b9e03c4e3e3748b27536c0536c9c21142e3216fae25154b352a9162a6428b42cd0d64ffc4d52ee5beb9167552c8e5811583cb1d018baf9b012ae36915d557a030a06606ebbd1566e19ca61178922aa9ef557706233d24a865c6456a2d87b579e3d4c70a0df6e18c9bef2845b5136b016912584652116fe061baccbe4b2019a1fc1b9d7a9250ade186e420cffcdfbd5b7e4eb3f1ae453d3f76e73048061fa05c3a8f1d4007360cf5b265fb3be445cf595c667e7bf306053dae686c81c918f89e480bbb88a7dfc4c2e61d541d7fa805ec05dd0161b2e4884914e53ad1665ff5800c0e35cbd2dff6af1a82198f41a0c1c46475768d4cffff4f9e1004d9c4844d98716957a2f4471057ef70888074fdd574592e00b13e662d6d5d103f8b9bf2939aa431270b77ec854fb2b313b6ee121e2a2522827ecc86218963dda61949dbdeefb86a6a7c2e252b2a044bf1bdd462f0012589eb798754c6264a2189a51b530f8e7efb7e56a704f77ebf2896927fee68a80556dc7879ce6f561b1bfcfeef218f47841b8794a09e1d4af55483b172565a6d32f8724f87e0008481764b378047243b7e51697759e66bb361b0636269af6a33430c3b9293845b4348ecd20e7ea205f26b1d4bf1107538ee5ebd674dc690a64a2bcde2b4c80bef9c95aea2e63bdf2605f2f73bdbd3fca34b28fcfe5930c6a49ea832d4fd3ff467a42b4dc175dffaa82238ff3e98d22840468027a0a3174ddcd814bd2dd9797a99d4c6b1c02019dd916d42be62bbd56db356ed8b87d19c6ae49b5d3d35a1efd65210ff71f70ad58cbf32c1dab582c3cf6fa6c3b534e86548e75ee7a8875e3672c29238616175ff2c74fb9f294dcf5dfbe0ee79b627bf6fde645272a06b2d7bbd4f2ca8508a3dd40b3135b66955a14ea8b32d0f32904fc7d4a2a4ca5039891f503a1f75d9be9887caf78b0e98fe5e0d9c46e2212888c3caabf01490f6588cb57d8fd17aa61a90e91e294e080a1748887411f63270328821eaa36f04c3649e0380569aa82a7bb36edf32a365c848750575ec7580b67d9fc6f93aa454a6e8e920113b1a3258450579d022df2ec572dc334bea19092689a6baae530589b67a329fd766eeafeda86abc10ec24e3cf45d5b83e3c7ff11ace3fc81eca974a431f149f5db7c83c285cee3192ebf0a993090881e5866c92180138ab965124a838680181c21f0eb6c88ef96db2e158c73e4a7ba547cab202c0e2d572d5a0cd2aa0da8b368a693efeb942c3b20378098399ace219000d02e0bb07", 0x1000}, {&(0x7f00000002c0)="36565838e722276f31170ab54cda2aa5c35a0e35cc67ae4a7a3e6b669792fb77cc1c14fa1185b3d3c29104aacda316da396f100e4cff91acfb4ef910399a7e52c72ea4e4839016f7ca2d122f6f21a9b131288b8b57053d21cb4bee2cdcee09c84d649bd818cf5506fa6debcbedfee7eb34b9f6bd1e42d08bc49cca95bbaeb5e40366eb695805618f8f3306dc350748c0a0be23d5a88aa8d8c6c4ac163a6ffb635a18f2c5840ee0a8dad12e94010a1fee24bd8f861ff31143a8dfc53b828db4d53193227e9149fce88ab1ba538ee03354b98923e6d03a2ac2089f35576ca546498af516f518c4f53e1b9063c3e1fbb30442e2", 0xf2}], 0x2, 0x0, 0x0, 0x80}, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SET_CLOCK(r4, 0x4030ae7b, &(0x7f0000000100)={0xfffffffffffffffb, 0xb1fe}) clock_adjtime(0x0, &(0x7f0000000080)={0x8305}) setsockopt$ax25_int(r3, 0x101, 0x7, &(0x7f0000000500)=0x20, 0x4) open(0x0, 0x0, 0x4a) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00', {0x2, 0x0, @rand_addr=0x4c}}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @remote}}) [ 256.654302][T19749] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 256.662261][T19749] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 256.670221][T19749] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 256.678184][T19749] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:34 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4$inet(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10, 0x800) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000000)=0x8000, 0x4) r3 = accept4(r0, 0x0, 0x0, 0x80800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:34 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xc900000000000000, 0x400000) 03:33:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4090ae82, 0x0) 03:33:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xca00000000000000, 0x400000) 03:33:35 executing program 3 (fault-call:8 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x4138ae84, 0x0) 03:33:35 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x11}}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)='nlmon0\x00', 0x5, 0x2}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xcb00000000000000, 0x400000) 03:33:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x41a0ae8d, 0x0) [ 257.706346][T19908] FAULT_INJECTION: forcing a failure. [ 257.706346][T19908] name failslab, interval 1, probability 0, space 0, times 0 [ 257.817457][T19908] CPU: 0 PID: 19908 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 257.825490][T19908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.835556][T19908] Call Trace: [ 257.838867][T19908] dump_stack+0x1d8/0x2f8 [ 257.843205][T19908] should_fail+0x608/0x860 [ 257.847628][T19908] ? setup_fault_attr+0x2b0/0x2b0 [ 257.852662][T19908] __should_failslab+0x11a/0x160 [ 257.857598][T19908] should_failslab+0x9/0x20 [ 257.862100][T19908] kmem_cache_alloc_trace+0x5d/0x2c0 [ 257.867382][T19908] ? __list_lru_init+0x3e3/0x900 [ 257.872321][T19908] __list_lru_init+0x3e3/0x900 [ 257.877091][T19908] alloc_super+0x635/0x740 [ 257.881508][T19908] sget_userns+0x1bf/0x4f0 [ 257.885923][T19908] ? free_anon_bdev+0x30/0x30 [ 257.890618][T19908] mount_nodev+0xe5/0x1c0 [ 257.894947][T19908] ? devpts_kill_sb+0x70/0x70 [ 257.899624][T19908] devpts_mount+0x2c/0x40 [ 257.903963][T19908] legacy_get_tree+0xf9/0x1a0 [ 257.908640][T19908] ? devpts_pty_kill+0xe0/0xe0 [ 257.913404][T19908] vfs_get_tree+0x8f/0x360 [ 257.917826][T19908] do_mount+0x1813/0x2730 [ 257.922169][T19908] ? copy_mount_string+0x30/0x30 [ 257.927114][T19908] ? kasan_check_write+0x14/0x20 [ 257.932056][T19908] ? _copy_from_user+0xe0/0x120 [ 257.936907][T19908] ? copy_mount_options+0xcf/0x360 [ 257.942026][T19908] ksys_mount+0xcc/0x100 [ 257.946267][T19908] __x64_sys_mount+0xbf/0xd0 [ 257.950880][T19908] do_syscall_64+0xfe/0x140 [ 257.955386][T19908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.961365][T19908] RIP: 0033:0x459519 [ 257.965259][T19908] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.984873][T19908] RSP: 002b:00007f12e6bfcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 257.993288][T19908] RAX: ffffffffffffffda RBX: 00007f12e6bfcc90 RCX: 0000000000459519 [ 258.001254][T19908] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 258.009231][T19908] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 258.017207][T19908] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6bfd6d4 [ 258.025184][T19908] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:35 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f0000000180)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x1, r2, 0x30, 0x0, @ib={0x1b, 0x8, 0xfffffffffffffffc, {"fc9936256c9ce81b96738eb7a9d800c5"}, 0x800, 0x80000000000000, 0x836}}}, 0xa0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000040)={0x0, 0x8}) 03:33:35 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) socket$rxrpc(0x21, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) getpeername$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) getpeername$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14) getpeername$packet(r3, &(0x7f0000000540)={0x11, 0x0, 0x0}, &(0x7f0000000580)=0x14) accept4$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000780)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000b40)={&(0x7f0000000000), 0xc, &(0x7f0000000b00)={&(0x7f00000007c0)={0x30c, r4, 0x4, 0x70bd28, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0xc0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff26}}}]}}, {{0x8, 0x1, r7}, {0x1ac, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xdaf}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x1ff, 0x86, 0x7, 0x2}, {0x1f, 0x9, 0x0, 0x1f}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}]}}]}, 0x30c}, 0x1, 0x0, 0x0, 0x20040000}, 0x40000) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xcc00000000000000, 0x400000) 03:33:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x800448d3, 0x0) 03:33:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:35 executing program 3 (fault-call:8 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) [ 258.476272][T20034] FAULT_INJECTION: forcing a failure. [ 258.476272][T20034] name failslab, interval 1, probability 0, space 0, times 0 03:33:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xcd00000000000000, 0x400000) [ 258.605386][T20034] CPU: 1 PID: 20034 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 258.613409][T20034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.623476][T20034] Call Trace: [ 258.623500][T20034] dump_stack+0x1d8/0x2f8 [ 258.623520][T20034] should_fail+0x608/0x860 [ 258.631135][T20034] ? setup_fault_attr+0x2b0/0x2b0 [ 258.631154][T20034] __should_failslab+0x11a/0x160 [ 258.631167][T20034] should_failslab+0x9/0x20 [ 258.631176][T20034] kmem_cache_alloc_trace+0x5d/0x2c0 [ 258.631185][T20034] ? __list_lru_init+0x3e3/0x900 [ 258.631201][T20034] __list_lru_init+0x3e3/0x900 [ 258.665017][T20034] alloc_super+0x635/0x740 [ 258.669443][T20034] sget_userns+0x1bf/0x4f0 [ 258.674005][T20034] ? free_anon_bdev+0x30/0x30 [ 258.678726][T20034] mount_nodev+0xe5/0x1c0 [ 258.683088][T20034] ? devpts_kill_sb+0x70/0x70 [ 258.687769][T20034] devpts_mount+0x2c/0x40 [ 258.692111][T20034] legacy_get_tree+0xf9/0x1a0 [ 258.696808][T20034] ? devpts_pty_kill+0xe0/0xe0 [ 258.701578][T20034] vfs_get_tree+0x8f/0x360 [ 258.706006][T20034] do_mount+0x1813/0x2730 [ 258.710347][T20034] ? copy_mount_string+0x30/0x30 [ 258.715291][T20034] ? kasan_check_write+0x14/0x20 [ 258.720243][T20034] ? _copy_from_user+0xe0/0x120 [ 258.725104][T20034] ? copy_mount_options+0xcf/0x360 [ 258.730225][T20034] ksys_mount+0xcc/0x100 [ 258.734481][T20034] __x64_sys_mount+0xbf/0xd0 [ 258.739076][T20034] do_syscall_64+0xfe/0x140 [ 258.743680][T20034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.749573][T20034] RIP: 0033:0x459519 03:33:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f00000000c0)=0x54) sendmsg$nl_route(r1, &(0x7f00000087c0)={0x0, 0x0, &(0x7f0000008780)={&(0x7f00000086c0)=@newlink={0x38, 0x10, 0x505, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @erspan={{0x14, 0x1, 'erspan\x00'}, {0x8, 0x2, [@gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x38}}, 0x0) 03:33:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c0080001800f9000600000000000000000000090000000000000000"], 0x1c}}, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@ipx, &(0x7f0000000080)=0x80, 0x800) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) [ 258.753468][T20034] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.773081][T20034] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 258.773094][T20034] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 258.773099][T20034] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 258.773105][T20034] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 258.773110][T20034] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 258.773115][T20034] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x80045430, 0x0) 03:33:36 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x4000) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xce00000000000000, 0x400000) 03:33:36 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) socket$rxrpc(0x21, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) getpeername$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) getpeername$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14) getpeername$packet(r3, &(0x7f0000000540)={0x11, 0x0, 0x0}, &(0x7f0000000580)=0x14) accept4$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000780)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000b40)={&(0x7f0000000000), 0xc, &(0x7f0000000b00)={&(0x7f00000007c0)={0x30c, r4, 0x4, 0x70bd28, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0xc0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff26}}}]}}, {{0x8, 0x1, r7}, {0x1ac, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xdaf}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x1ff, 0x86, 0x7, 0x2}, {0x1f, 0x9, 0x0, 0x1f}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}]}}]}, 0x30c}, 0x1, 0x0, 0x0, 0x20040000}, 0x40000) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0xa) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:36 executing program 3 (fault-call:8 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:36 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xcf00000000000000, 0x400000) 03:33:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x800454d2, 0x0) [ 259.265908][T20184] FAULT_INJECTION: forcing a failure. [ 259.265908][T20184] name failslab, interval 1, probability 0, space 0, times 0 [ 259.326505][T20184] CPU: 0 PID: 20184 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 259.334879][T20184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.345472][T20184] Call Trace: [ 259.349041][T20184] dump_stack+0x1d8/0x2f8 [ 259.353390][T20184] should_fail+0x608/0x860 [ 259.357824][T20184] ? setup_fault_attr+0x2b0/0x2b0 [ 259.362868][T20184] __should_failslab+0x11a/0x160 [ 259.367819][T20184] should_failslab+0x9/0x20 [ 259.372328][T20184] kmem_cache_alloc_trace+0x5d/0x2c0 [ 259.377617][T20184] ? __list_lru_init+0x3e3/0x900 [ 259.382559][T20184] __list_lru_init+0x3e3/0x900 [ 259.387338][T20184] alloc_super+0x635/0x740 [ 259.391758][T20184] sget_userns+0x1bf/0x4f0 [ 259.396202][T20184] ? free_anon_bdev+0x30/0x30 [ 259.400889][T20184] mount_nodev+0xe5/0x1c0 [ 259.405291][T20184] ? devpts_kill_sb+0x70/0x70 [ 259.409959][T20184] devpts_mount+0x2c/0x40 [ 259.414275][T20184] legacy_get_tree+0xf9/0x1a0 [ 259.418941][T20184] ? devpts_pty_kill+0xe0/0xe0 [ 259.423703][T20184] vfs_get_tree+0x8f/0x360 [ 259.428111][T20184] do_mount+0x1813/0x2730 [ 259.432436][T20184] ? copy_mount_string+0x30/0x30 [ 259.437546][T20184] ? kasan_check_write+0x14/0x20 [ 259.442477][T20184] ? _copy_from_user+0xe0/0x120 [ 259.447346][T20184] ? copy_mount_options+0xcf/0x360 [ 259.452454][T20184] ksys_mount+0xcc/0x100 [ 259.456696][T20184] __x64_sys_mount+0xbf/0xd0 [ 259.461286][T20184] do_syscall_64+0xfe/0x140 [ 259.465808][T20184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.471693][T20184] RIP: 0033:0x459519 [ 259.475582][T20184] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.495196][T20184] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 259.503622][T20184] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 259.511618][T20184] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 259.519603][T20184] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 259.527575][T20184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 259.535542][T20184] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:37 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) socket$rxrpc(0x21, 0x2, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') getsockname$packet(r3, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) getpeername$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) getpeername$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0}, &(0x7f0000000500)=0x14) getpeername$packet(r3, &(0x7f0000000540)={0x11, 0x0, 0x0}, &(0x7f0000000580)=0x14) accept4$packet(r0, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000640)=0x14, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f0000000780)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000b40)={&(0x7f0000000000), 0xc, &(0x7f0000000b00)={&(0x7f00000007c0)={0x30c, r4, 0x4, 0x70bd28, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0xc0, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff26}}}]}}, {{0x8, 0x1, r7}, {0x1ac, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xdaf}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x1ff, 0x86, 0x7, 0x2}, {0x1f, 0x9, 0x0, 0x1f}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x40}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r11}}}]}}]}, 0x30c}, 0x1, 0x0, 0x0, 0x20040000}, 0x40000) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:37 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x4000000002) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xd000000000000000, 0x400000) 03:33:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x800455d1, 0x0) 03:33:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, 0x0, 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:37 executing program 1: socketpair$unix(0x1, 0x20000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf000}, 0xc, &(0x7f0000000200)={&(0x7f0000000240)=@bridge_delneigh={0x1c, 0x1c, 0xf07, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x2}}, 0x1c}}, 0x0) r3 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x2, 0x2) sendto$x25(r3, &(0x7f0000000100), 0x0, 0x10, &(0x7f0000000140)={0x9, @null=' \x00'}, 0x12) 03:33:37 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xd100000000000000, 0x400000) 03:33:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x8004ae98, 0x0) 03:33:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, 0x0, 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:37 executing program 3 (fault-call:8 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:37 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000080)=""/253) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x40, 0x0, 0x0, 0x0, 0xffffffffffff0000, &(0x7f0000000180)='vxcan1\x00', 0x7f, 0x3ff, 0x5}) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='^)\xe7(vboxnet0selinux$ppp1\x00', &(0x7f0000000040)='./file0\x00', r0) 03:33:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xe4ffffff00000000, 0x400000) 03:33:38 executing program 1: seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101800, 0x0) mq_timedreceive(r0, &(0x7f0000000200)=""/11, 0xfffffffffffffc2c, 0xfff, &(0x7f0000000240)={0x77359400}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x2320, 0x81, 0x8, 0x1, 0x0, 0x80000000, 0x4000, 0x8, 0x10001, 0x7, 0xed7, 0x3, 0x1000, 0x5, 0x6, 0x84, 0x6, 0x9, 0xd48db3a00, 0x1, 0x0, 0x81, 0x3, 0x100000000, 0x81, 0x0, 0x3, 0x6c2b532c, 0x9, 0x9, 0x3, 0x0, 0x57, 0x1, 0x5, 0x8, 0x0, 0x5, 0x0, @perf_config_ext={0x8000, 0x2}, 0x400a, 0xf3, 0x5dab, 0x9, 0xed, 0x1, 0x77}, r1, 0x3, 0xffffffffffffffff, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x18) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000280)={r2, 0xafd}, &(0x7f00000001c0)=0x8) [ 260.420184][T20438] FAULT_INJECTION: forcing a failure. [ 260.420184][T20438] name failslab, interval 1, probability 0, space 0, times 0 03:33:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x80086301, 0x0) [ 260.555902][T20438] CPU: 0 PID: 20438 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 260.563926][T20438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.574017][T20438] Call Trace: [ 260.577322][T20438] dump_stack+0x1d8/0x2f8 [ 260.581702][T20438] should_fail+0x608/0x860 [ 260.586125][T20438] ? setup_fault_attr+0x2b0/0x2b0 [ 260.591174][T20438] __should_failslab+0x11a/0x160 [ 260.596119][T20438] should_failslab+0x9/0x20 [ 260.600630][T20438] kmem_cache_alloc_trace+0x5d/0x2c0 [ 260.605907][T20438] ? __list_lru_init+0x3e3/0x900 [ 260.610844][T20438] __list_lru_init+0x3e3/0x900 [ 260.615617][T20438] alloc_super+0x635/0x740 [ 260.620040][T20438] sget_userns+0x1bf/0x4f0 [ 260.624459][T20438] ? free_anon_bdev+0x30/0x30 [ 260.629147][T20438] mount_nodev+0xe5/0x1c0 [ 260.633482][T20438] ? devpts_kill_sb+0x70/0x70 [ 260.638163][T20438] devpts_mount+0x2c/0x40 [ 260.642499][T20438] legacy_get_tree+0xf9/0x1a0 [ 260.647180][T20438] ? devpts_pty_kill+0xe0/0xe0 [ 260.651946][T20438] vfs_get_tree+0x8f/0x360 [ 260.656354][T20438] do_mount+0x1813/0x2730 [ 260.660677][T20438] ? copy_mount_string+0x30/0x30 [ 260.665613][T20438] ? kasan_check_write+0x14/0x20 [ 260.670537][T20438] ? _copy_from_user+0xe0/0x120 [ 260.675374][T20438] ? copy_mount_options+0xcf/0x360 [ 260.680475][T20438] ksys_mount+0xcc/0x100 [ 260.684709][T20438] __x64_sys_mount+0xbf/0xd0 [ 260.689295][T20438] do_syscall_64+0xfe/0x140 [ 260.693793][T20438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.699680][T20438] RIP: 0033:0x459519 [ 260.703567][T20438] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.723173][T20438] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 260.731581][T20438] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 260.739542][T20438] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 260.747506][T20438] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 260.755467][T20438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 260.763426][T20438] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 260.788207][ T26] audit: type=1326 audit(2000000018.353:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=228 compat=0 ip=0x45c35a code=0x50000 03:33:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xeffdffffffffffff, 0x400000) [ 260.865963][ T26] audit: type=1326 audit(2000000018.383:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459519 code=0x50000 [ 260.954672][ T26] audit: type=1326 audit(2000000018.383:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459519 code=0x50000 03:33:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x80184560, 0x0) [ 261.027003][ T26] audit: type=1326 audit(2000000018.383:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459519 code=0x50000 [ 261.149775][ T26] audit: type=1326 audit(2000000018.383:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459519 code=0x50000 [ 261.251194][ T26] audit: type=1326 audit(2000000018.383:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459519 code=0x50000 03:33:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, 0x0, 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xefffffffffffffff, 0x400000) [ 261.320088][ T26] audit: type=1326 audit(2000000018.383:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459519 code=0x50000 [ 261.342640][ T26] audit: type=1326 audit(2000000018.383:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459519 code=0x50000 03:33:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x80345621, 0x0) 03:33:39 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x0, @loopback, 0x4e21, 0x4, 'wlc\x00', 0x12, 0x7, 0x6c}, 0x2c) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 261.415451][ T26] audit: type=1326 audit(2000000018.383:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459519 code=0x50000 03:33:39 executing program 3 (fault-call:8 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xf4ffffff00000000, 0x400000) [ 261.590939][ T26] audit: type=1326 audit(2000000018.383:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=20443 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x459519 code=0x50000 [ 261.629597][T20627] FAULT_INJECTION: forcing a failure. [ 261.629597][T20627] name failslab, interval 1, probability 0, space 0, times 0 [ 261.648102][T20627] CPU: 1 PID: 20627 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 261.656090][T20627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.666148][T20627] Call Trace: [ 261.669446][T20627] dump_stack+0x1d8/0x2f8 [ 261.673786][T20627] should_fail+0x608/0x860 [ 261.678205][T20627] ? setup_fault_attr+0x2b0/0x2b0 [ 261.683244][T20627] __should_failslab+0x11a/0x160 [ 261.688188][T20627] should_failslab+0x9/0x20 [ 261.692694][T20627] kmem_cache_alloc_trace+0x5d/0x2c0 [ 261.697977][T20627] ? __list_lru_init+0x3e3/0x900 [ 261.702917][T20627] __list_lru_init+0x3e3/0x900 [ 261.707693][T20627] alloc_super+0x635/0x740 [ 261.712113][T20627] sget_userns+0x1bf/0x4f0 [ 261.716541][T20627] ? free_anon_bdev+0x30/0x30 [ 261.721231][T20627] mount_nodev+0xe5/0x1c0 [ 261.725561][T20627] ? devpts_kill_sb+0x70/0x70 [ 261.730242][T20627] devpts_mount+0x2c/0x40 [ 261.734573][T20627] legacy_get_tree+0xf9/0x1a0 [ 261.739244][T20627] ? devpts_pty_kill+0xe0/0xe0 [ 261.744036][T20627] vfs_get_tree+0x8f/0x360 [ 261.748456][T20627] do_mount+0x1813/0x2730 [ 261.752794][T20627] ? copy_mount_string+0x30/0x30 [ 261.757739][T20627] ? kasan_check_write+0x14/0x20 [ 261.762675][T20627] ? _copy_from_user+0xe0/0x120 [ 261.767524][T20627] ? copy_mount_options+0xcf/0x360 [ 261.772633][T20627] ksys_mount+0xcc/0x100 [ 261.776878][T20627] __x64_sys_mount+0xbf/0xd0 [ 261.781471][T20627] do_syscall_64+0xfe/0x140 [ 261.785977][T20627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.791868][T20627] RIP: 0033:0x459519 [ 261.795762][T20627] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.815373][T20627] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 261.823789][T20627] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 261.831756][T20627] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 03:33:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 261.831764][T20627] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 261.831770][T20627] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 261.831775][T20627] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:39 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000080)=""/253) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x40, 0x0, 0x0, 0x0, 0xffffffffffff0000, &(0x7f0000000180)='vxcan1\x00', 0x7f, 0x3ff, 0x5}) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='^)\xe7(vboxnet0selinux$ppp1\x00', &(0x7f0000000040)='./file0\x00', r0) 03:33:39 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfbffffff00000000, 0x400000) 03:33:39 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@int=0xe8, 0x4) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000100)={@dev}, &(0x7f0000000140)=0x14) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000000)=""/176) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x8090ae81, 0x0) 03:33:39 executing program 3 (fault-call:8 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) [ 262.217910][T20783] sctp: [Deprecated]: syz-executor.0 (pid 20783) Use of int in max_burst socket option deprecated. [ 262.217910][T20783] Use struct sctp_assoc_value instead [ 262.298995][T20787] FAULT_INJECTION: forcing a failure. [ 262.298995][T20787] name failslab, interval 1, probability 0, space 0, times 0 [ 262.383459][T20787] CPU: 0 PID: 20787 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 262.391586][T20787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.401642][T20787] Call Trace: [ 262.404949][T20787] dump_stack+0x1d8/0x2f8 [ 262.409286][T20787] should_fail+0x608/0x860 [ 262.413704][T20787] ? setup_fault_attr+0x2b0/0x2b0 [ 262.418738][T20787] __should_failslab+0x11a/0x160 [ 262.423677][T20787] should_failslab+0x9/0x20 [ 262.428181][T20787] kmem_cache_alloc_trace+0x5d/0x2c0 [ 262.433465][T20787] ? __list_lru_init+0x3e3/0x900 [ 262.438409][T20787] __list_lru_init+0x3e3/0x900 [ 262.443178][T20787] alloc_super+0x635/0x740 [ 262.447595][T20787] sget_userns+0x1bf/0x4f0 [ 262.452004][T20787] ? free_anon_bdev+0x30/0x30 [ 262.457769][T20787] mount_nodev+0xe5/0x1c0 [ 262.462098][T20787] ? devpts_kill_sb+0x70/0x70 [ 262.466774][T20787] devpts_mount+0x2c/0x40 [ 262.471108][T20787] legacy_get_tree+0xf9/0x1a0 [ 262.475775][T20787] ? devpts_pty_kill+0xe0/0xe0 [ 262.480542][T20787] vfs_get_tree+0x8f/0x360 [ 262.484961][T20787] do_mount+0x1813/0x2730 [ 262.489290][T20787] ? copy_mount_string+0x30/0x30 [ 262.494234][T20787] ? kasan_check_write+0x14/0x20 [ 262.499173][T20787] ? _copy_from_user+0xe0/0x120 [ 262.504034][T20787] ? copy_mount_options+0xcf/0x360 [ 262.509186][T20787] ksys_mount+0xcc/0x100 [ 262.513427][T20787] __x64_sys_mount+0xbf/0xd0 [ 262.518027][T20787] do_syscall_64+0xfe/0x140 [ 262.522537][T20787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.528433][T20787] RIP: 0033:0x459519 [ 262.532327][T20787] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.551966][T20787] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 262.560467][T20787] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 262.568526][T20787] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 262.576498][T20787] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 262.584468][T20787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 262.592436][T20787] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfeffffff00000000, 0x400000) 03:33:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x8138ae83, 0x0) [ 262.652809][T20783] sctp: [Deprecated]: syz-executor.0 (pid 20783) Use of int in max_burst socket option deprecated. [ 262.652809][T20783] Use struct sctp_assoc_value instead 03:33:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:40 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000080)=""/253) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x40, 0x0, 0x0, 0x0, 0xffffffffffff0000, &(0x7f0000000180)='vxcan1\x00', 0x7f, 0x3ff, 0x5}) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='^)\xe7(vboxnet0selinux$ppp1\x00', &(0x7f0000000040)='./file0\x00', r0) 03:33:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0x81a0ae8c, 0x0) 03:33:40 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x3) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xff01000000000000, 0x400000) 03:33:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc0045878, 0x0) 03:33:40 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xff0f000000000000, 0x400000) 03:33:40 executing program 3 (fault-call:8 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:40 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) r2 = socket$inet(0x2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f0000000080)=""/253) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f00000001c0)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e23, @broadcast}, 0x40, 0x0, 0x0, 0x0, 0xffffffffffff0000, &(0x7f0000000180)='vxcan1\x00', 0x7f, 0x3ff, 0x5}) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='^)\xe7(vboxnet0selinux$ppp1\x00', &(0x7f0000000040)='./file0\x00', r0) 03:33:41 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) connect$ax25(r0, &(0x7f0000000040)={{0x3, @bcast, 0x4}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null]}, 0x48) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="0800eeff0800"], 0x14) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xff1f000000000000, 0x400000) 03:33:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc0045878, 0x0) 03:33:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xffffff7f00000000, 0x400000) 03:33:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc0106401, 0x0) 03:33:41 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@int=0xe8, 0x4) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000100)={@dev}, &(0x7f0000000140)=0x14) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000000)=""/176) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:41 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) recvfrom$unix(r3, &(0x7f0000000400)=""/4096, 0x1000, 0x2102, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e23}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:41 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xffffffff00000000, 0x400000) [ 264.092137][T21121] FAULT_INJECTION: forcing a failure. [ 264.092137][T21121] name failslab, interval 1, probability 0, space 0, times 0 [ 264.191844][T21182] sctp: [Deprecated]: syz-executor.1 (pid 21182) Use of int in max_burst socket option deprecated. [ 264.191844][T21182] Use struct sctp_assoc_value instead [ 264.217061][T21121] CPU: 1 PID: 21121 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 264.225069][T21121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.235185][T21121] Call Trace: [ 264.238487][T21121] dump_stack+0x1d8/0x2f8 [ 264.242827][T21121] should_fail+0x608/0x860 [ 264.247257][T21121] ? setup_fault_attr+0x2b0/0x2b0 [ 264.253295][T21121] __should_failslab+0x11a/0x160 [ 264.258255][T21121] should_failslab+0x9/0x20 [ 264.262767][T21121] kmem_cache_alloc_trace+0x5d/0x2c0 [ 264.268062][T21121] ? __list_lru_init+0x3e3/0x900 [ 264.277682][T21121] __list_lru_init+0x3e3/0x900 [ 264.283937][T21121] alloc_super+0x635/0x740 [ 264.288387][T21121] sget_userns+0x1bf/0x4f0 [ 264.292825][T21121] ? free_anon_bdev+0x30/0x30 [ 264.298658][T21121] mount_nodev+0xe5/0x1c0 [ 264.302984][T21121] ? devpts_kill_sb+0x70/0x70 [ 264.307692][T21121] devpts_mount+0x2c/0x40 [ 264.312023][T21121] legacy_get_tree+0xf9/0x1a0 [ 264.316720][T21121] ? devpts_pty_kill+0xe0/0xe0 [ 264.321510][T21121] vfs_get_tree+0x8f/0x360 [ 264.325932][T21121] do_mount+0x1813/0x2730 [ 264.330290][T21121] ? copy_mount_string+0x30/0x30 [ 264.335244][T21121] ? kasan_check_write+0x14/0x20 [ 264.340199][T21121] ? _copy_from_user+0xe0/0x120 [ 264.345046][T21121] ? copy_mount_options+0xcf/0x360 [ 264.350157][T21121] ksys_mount+0xcc/0x100 [ 264.354407][T21121] __x64_sys_mount+0xbf/0xd0 [ 264.359002][T21121] do_syscall_64+0xfe/0x140 [ 264.363514][T21121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.369413][T21121] RIP: 0033:0x459519 [ 264.373426][T21121] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.393111][T21121] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 264.401533][T21121] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 264.409484][T21121] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 264.417437][T21121] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 264.425402][T21121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 264.433417][T21121] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:42 executing program 3 (fault-call:8 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc0184900, 0x0) 03:33:42 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@int=0xe8, 0x4) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000100)={@dev}, &(0x7f0000000140)=0x14) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000000)=""/176) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xfffffffffffffdef, 0x400000) 03:33:42 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f00000000c0)=""/247) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x40010, r0, 0x8000000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x29a) write$P9_RREMOVE(r0, &(0x7f00000001c0)={0x7, 0x7b, 0x2}, 0x7) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 264.766544][T21263] FAULT_INJECTION: forcing a failure. [ 264.766544][T21263] name failslab, interval 1, probability 0, space 0, times 0 [ 264.832705][T21261] sctp: [Deprecated]: syz-executor.1 (pid 21261) Use of int in max_burst socket option deprecated. [ 264.832705][T21261] Use struct sctp_assoc_value instead 03:33:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0xffffffffffffffef, 0x400000) [ 264.923739][T21263] CPU: 0 PID: 21263 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 264.931773][T21263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.941852][T21263] Call Trace: [ 264.945146][T21263] dump_stack+0x1d8/0x2f8 [ 264.949516][T21263] should_fail+0x608/0x860 [ 264.953941][T21263] ? setup_fault_attr+0x2b0/0x2b0 [ 264.958985][T21263] __should_failslab+0x11a/0x160 [ 264.963927][T21263] should_failslab+0x9/0x20 [ 264.968437][T21263] kmem_cache_alloc_trace+0x5d/0x2c0 [ 264.973719][T21263] ? __list_lru_init+0x3e3/0x900 [ 264.978680][T21263] __list_lru_init+0x3e3/0x900 [ 264.983483][T21263] alloc_super+0x635/0x740 [ 264.987914][T21263] sget_userns+0x1bf/0x4f0 [ 264.992351][T21263] ? free_anon_bdev+0x30/0x30 [ 264.997036][T21263] mount_nodev+0xe5/0x1c0 [ 265.001394][T21263] ? devpts_kill_sb+0x70/0x70 [ 265.006072][T21263] devpts_mount+0x2c/0x40 [ 265.010408][T21263] legacy_get_tree+0xf9/0x1a0 [ 265.015105][T21263] ? devpts_pty_kill+0xe0/0xe0 [ 265.019957][T21263] vfs_get_tree+0x8f/0x360 [ 265.024379][T21263] do_mount+0x1813/0x2730 [ 265.028729][T21263] ? copy_mount_string+0x30/0x30 [ 265.033913][T21263] ? kasan_check_write+0x14/0x20 [ 265.038850][T21263] ? _copy_from_user+0xe0/0x120 [ 265.043702][T21263] ? copy_mount_options+0xcf/0x360 [ 265.048829][T21263] ksys_mount+0xcc/0x100 [ 265.053077][T21263] __x64_sys_mount+0xbf/0xd0 [ 265.057715][T21263] do_syscall_64+0xfe/0x140 [ 265.062240][T21263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.068128][T21263] RIP: 0033:0x459519 [ 265.072153][T21263] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.091796][T21263] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 265.100217][T21263] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 265.108288][T21263] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 265.116247][T21263] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:33:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:42 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f0000000040)=0x4) syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x10000, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="88505c97fd0dc31dd0a04b7f4505bb217ebb99f207e69abe498514866490a9dbf6338620567b759b28371db431ccfc4f96649a5b86c706ce6f3001448b5f59072cbee2488f32962f25f933b5dcf33ce46b68c635e0fcb7a5459d3240e9170f34ac5b3fbd2e4358df35549443d1e12202ee019ac825580613a1b1098c9db7227df19ee2b6db136ee3ddb670e356029a98ca47d4a455bd4e0a0498441543c978c5ff35d43645", 0xa5, 0x7}, {&(0x7f0000000200)="feabdc09b36e0634e72f15ab2e6409d78d8ebe1d07a172d159655cce8069839d113b81e610154c3315f94b60409ee2d4918d3af8", 0x34, 0x10001}], 0x2000000, &(0x7f0000000280)={[{@map_acorn='map=acorn'}], [{@seclabel='seclabel'}]}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:42 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000001300)='ns/pid_for_children\x00') write(r0, &(0x7f00000000c0)="2400000058001f00ff07f4f9002304000a04f51108000100020100020800038005000000", 0x24) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) [ 265.124205][T21263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 265.132163][T21263] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:42 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x600) 03:33:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x0, 0x606041) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000480)=""/5) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x0, @reserved}, 0x10) 03:33:43 executing program 3 (fault-call:8 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc018643a, 0x0) 03:33:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xa00) 03:33:43 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0xfffffffffffffcde) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:43 executing program 1: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffcdc88ee44503fec300000000002f9078ac14ffbbe00000010000a83eca889078"], 0x0) 03:33:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xc00) 03:33:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fi'], 0x4) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 265.719344][T21517] FAULT_INJECTION: forcing a failure. [ 265.719344][T21517] name failslab, interval 1, probability 0, space 0, times 0 [ 265.775955][T21517] CPU: 0 PID: 21517 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 265.783975][T21517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.794032][T21517] Call Trace: [ 265.797327][T21517] dump_stack+0x1d8/0x2f8 [ 265.801663][T21517] should_fail+0x608/0x860 [ 265.806087][T21517] ? setup_fault_attr+0x2b0/0x2b0 [ 265.811121][T21517] __should_failslab+0x11a/0x160 [ 265.811137][T21517] should_failslab+0x9/0x20 [ 265.811147][T21517] kmem_cache_alloc_node_trace+0x6e/0x280 [ 265.811155][T21517] ? __kmalloc_node+0x3c/0x60 [ 265.811164][T21517] ? memset+0x31/0x40 [ 265.811174][T21517] __kmalloc_node+0x3c/0x60 [ 265.811187][T21517] kvmalloc_node+0xcc/0x130 [ 265.811200][T21517] __list_lru_init+0x35b/0x900 [ 265.811218][T21517] alloc_super+0x664/0x740 [ 265.811230][T21517] sget_userns+0x1bf/0x4f0 [ 265.811244][T21517] ? free_anon_bdev+0x30/0x30 [ 265.839551][T21517] mount_nodev+0xe5/0x1c0 [ 265.839563][T21517] ? devpts_kill_sb+0x70/0x70 [ 265.839576][T21517] devpts_mount+0x2c/0x40 [ 265.875580][T21517] legacy_get_tree+0xf9/0x1a0 [ 265.880288][T21517] ? devpts_pty_kill+0xe0/0xe0 [ 265.885232][T21517] vfs_get_tree+0x8f/0x360 [ 265.889644][T21517] do_mount+0x1813/0x2730 [ 265.893990][T21517] ? copy_mount_string+0x30/0x30 [ 265.898923][T21517] ? kasan_check_write+0x14/0x20 [ 265.903855][T21517] ? _copy_from_user+0xe0/0x120 [ 265.908698][T21517] ? copy_mount_options+0xcf/0x360 [ 265.913800][T21517] ksys_mount+0xcc/0x100 [ 265.918043][T21517] __x64_sys_mount+0xbf/0xd0 [ 265.922630][T21517] do_syscall_64+0xfe/0x140 [ 265.927126][T21517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.933109][T21517] RIP: 0033:0x459519 [ 265.936992][T21517] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.956616][T21517] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 265.965028][T21517] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 03:33:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400, 0x0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000000c0)={0xdc, 0x4, 0x9, 0xfffffffffffffffb, 0x0, 0x401}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000040)={0x94}) [ 265.973012][T21517] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 265.980977][T21517] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 265.988957][T21517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 265.996924][T21517] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:43 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xe00) 03:33:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc0189436, 0x0) 03:33:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{0x8b, 0x920e, 0x8, 0x6}, 'syz0\x00', 0x55}) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x82080) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x0, @rand_addr="acb8192408fec251d3ac0812b3e1bbbe", 0x9}, @in6={0xa, 0x4e22, 0x7fffffff, @mcast1, 0x3}], 0x38) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000140)={[0x4, 0x6, 0x2, 0x4, 0x17, 0x1c, 0x7, 0x7fffffff, 0x81, 0x350d, 0x8, 0x7, 0x4, 0x3, 0x30, 0x3f], 0x11d000, 0x10000}) unshare(0x8000400) prctl$PR_GET_NAME(0x10, &(0x7f0000000200)=""/255) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={0x0}, &(0x7f0000000380)=0x8) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000003c0)={0x4, 0x0, 0x1000}, 0x4) mq_getsetattr(r1, &(0x7f0000000400)={0x8, 0x8, 0x6, 0x1, 0x0, 0x3, 0x3, 0x1}, &(0x7f0000000440)) modify_ldt$write(0x1, &(0x7f0000000480)={0x100000000, 0x20000800, 0x0, 0x800, 0x2, 0x401, 0x1, 0xc30, 0x9, 0x7}, 0x10) seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f00000004c0)=[{0x1ff, 0x9, 0x8, 0x400}]}) write$binfmt_elf32(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0xfff, 0x1, 0x6, 0xfffffffffffffffe, 0x3, 0x0, 0xffffffff, 0x2d1, 0x38, 0x3b4, 0x80000001, 0x7ff, 0x20, 0x1, 0x4e, 0x3, 0x720a0000}, [{0x2, 0x5, 0x5, 0x7, 0x400, 0x7ff, 0x2, 0x5}], "804027ee96e7bf88e61481e92510f7e78f8a87110264ad05b07d8e5d2c76758a025d3f107f2e96bdda520f5c84f8211c50ac6cbd9bc64ff14611aa07a9e7c73535a9488bb0801f465c3beba28e0491465ac0e4abc343806838c9a5dc604ae7ec1d5383b0294513ccfcfbafba9dcb15af5c972e32134f103daabc4940ddb3958f84894f71cf88dbb9c321ed96a73b49100dbb40598c3531c1b9e86cf6afaaf96f394d9b2479655f3ef53c8dd0a3215104294b2ddfa4", [[]]}, 0x20d) lsetxattr$security_ima(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='security.ima\x00', &(0x7f0000000800)=@ng={0x4, 0x9, "1d9e490ebacd4f10b1f9cc"}, 0xd, 0x1) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000840)) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000880)="a8bea435ea7a3453025a5991e8742e0259e00da3fd52630142a0648286ccfcd825b1d17b7dd21b9983216a0629abd1759bfc24fb4ea100ee0c3b4e3a9ae82397b318c11a146848052e48226a3c1686d27483d977a265cc2f6d0c8ece7f48928de7c9562bfbb4bc686aca5cbd974d2766eec53f21dad945ee732da2ec585be528de8874014de0048295fcef19cbf5316ca27e9aa21b08a4e08ba83b784e816cc133ab49f263a43352a2e04f77145439addb7c2993c7ea133e6f77bbb3e141011219729179b93001a862cece6e38ff") lsetxattr$security_evm(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='security.evm\x00', &(0x7f0000000a00)=@ng={0x4, 0xe, "8cd2"}, 0x4, 0x2) shutdown(r1, 0x1) pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_FPU(r4, 0x81a0ae8c, &(0x7f0000000a80)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000c40)="a80e57697b0c733e75aa346daabd757b", 0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000c80)={0x100000001, 0x8008, 0x5, 0x81, r2}, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000d00)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r4, &(0x7f0000000dc0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000d80)={&(0x7f0000000d40)={0x3c, r5, 0x301, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80e}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x10) write$P9_RCLUNK(r3, &(0x7f0000000e00)={0x7, 0x79, 0x1}, 0x7) ioctl$KVM_GET_LAPIC(r4, 0x8400ae8e, &(0x7f0000000e40)={"1314d05e084556519b4b6c69874c28da2794737f091767cc21cb7b5a982f5c677725c1694be3176dda0418edc6b5517f987d1350ba30f21c8015fc6f3027e39498b1315f716ff14369868f514bb07f3f264ccc4ba30d5c26572976a1fda4be02d88af3b8d54c5e017b3f0d66feb3c1e52273b7a87148000e19cc8572d409a25b77388e025778da9bc2df23f33bb56408a34f09eb5ed89e722fc6bb9a04aff662434197e36f1c631da04723a739d55c861cbc52cd409d28ea15f07c0af3af3437fa2cd5e60c708716579ba586a244d1bb2584406d7ba227d6d80369699454b21bf624f5a8ab72ff95c946d9dc68cc39509c1154bb039b762b3a76c885d7a75d78151fcc0173206d305cf34398cdbf059441a5a2b8285f70510558b3d733e40ac0284ffb6245493841a567baef873b1bb4c25c4da0f2bfe5654ede87adeab5ce1c75c9eab6cf55d20d2525f687186b9f31160573650abb6154e89dd832319a28949360faa8c8cca023116a68e618b957a044d99c0d2b66c617317de76f34cd21f9e5a531ecebd32c4bf6d9a01527378e047b9aff40aa5a05ad9583a54b23090c28fa342ff45aed888c9fc0b7a418adfb4b243a5cfbd47be8f731970c89cdfa7d6ade85385e407e13d21e829b3a806e82f262b0c519e8218a9b4aee18d3a6472d70552116fb6da3c333c323f767662ad58edef5b7cd338983852bb736d5d8dd9966d4c1934eae02353254420f1e28252d5a4ba24b2fe48c25a4d4a0f423e702188dfd8970736480655822eccb9d82252f5e4035ff48658c717f2c759537ed3def0a71cb4627fc09921328a56c0c9f26b4671602b931ab5d4bf9204fe627bf2d64b246e7647baa610cfd9f5507607e5a754f2907e004c03099c2ef8dc501157520cec50543e7f042d4a01b4a6bad25854cba77f8f6ec1cddf0ad61f248d13d0acb26b5adf970b09b9e6f3325d5f0fca3493375c780d202b614dfb61561b448d6b0d4d517f23148327c64363ffd0a3c8ee09fde962eaaa7418d2c9fa4f46f4322cafa2af0b21d92c2bd4c7a6ee154890b50d0c05f0d74d30b16f3fa7ebdfc175d8d18cf76d827e996a623cc4f5e70ab3464b523278ed4ecd7ed4a23d14c02cd5d5d2887218857a06ca27d3f79269768b9bd3d123df6ec168b563d5b8c565ff13441258335deabba64213bc60652fd03268d8c1cc68749c27234cc8af12a44b3fd9eca86e3032c51198ea8ec64e7b4e6c5c2a658e99f8cda1ab31156532c3b44891b9d9f246a254df9723e2aa97c4d3c3129e32a12a635a7d6a7227ea2f75563f4a2c18462aec542efea15d3577a613cdc3ce22c2912042b11f0870d0b57078b2437dd93706f489fa2da264a1ffb7a6ea076f4ad72241d980e4aaee11eaf31d85e88c5451082197ed48c830540ba1ba6d22746942a315c78986f52d020b9055e96334a"}) r6 = add_key(&(0x7f0000001240)='.request_key_auth\x00', &(0x7f0000001280)={'syz', 0x2}, &(0x7f00000012c0)="71ada2d28ed8bad8d82c6a299f433b5c85cf52ffaa0bcdbe0bcc71504fc0d84c3b70792a07ed6b584dcddf95", 0x2c, 0xfffffffffffffffe) keyctl$get_security(0x11, r6, &(0x7f0000001300)=""/96, 0x60) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f00000013c0)={0x34, 0x0, &(0x7f0000001380)}) 03:33:43 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:44 executing program 3 (fault-call:8 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x1200) 03:33:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc018ae85, 0x0) 03:33:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fi'], 0x4) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:44 executing program 1: socket$tipc(0x1e, 0x3, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_GET_STATS(r0, 0x80f86406, &(0x7f0000000040)=""/137) 03:33:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x1400) [ 266.646977][T21668] FAULT_INJECTION: forcing a failure. [ 266.646977][T21668] name failslab, interval 1, probability 0, space 0, times 0 [ 266.766771][T21668] CPU: 1 PID: 21668 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 266.774804][T21668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.785000][T21668] Call Trace: [ 266.788303][T21668] dump_stack+0x1d8/0x2f8 [ 266.792681][T21668] should_fail+0x608/0x860 [ 266.797129][T21668] ? setup_fault_attr+0x2b0/0x2b0 [ 266.802181][T21668] __should_failslab+0x11a/0x160 [ 266.807135][T21668] should_failslab+0x9/0x20 [ 266.811647][T21668] kmem_cache_alloc_trace+0x5d/0x2c0 [ 266.816938][T21668] ? __list_lru_init+0x3e3/0x900 [ 266.821882][T21668] __list_lru_init+0x3e3/0x900 [ 266.826689][T21668] alloc_super+0x635/0x740 [ 266.831109][T21668] sget_userns+0x1bf/0x4f0 [ 266.835529][T21668] ? free_anon_bdev+0x30/0x30 [ 266.840212][T21668] mount_nodev+0xe5/0x1c0 [ 266.844540][T21668] ? devpts_kill_sb+0x70/0x70 [ 266.849223][T21668] devpts_mount+0x2c/0x40 [ 266.853557][T21668] legacy_get_tree+0xf9/0x1a0 [ 266.858230][T21668] ? devpts_pty_kill+0xe0/0xe0 [ 266.862998][T21668] vfs_get_tree+0x8f/0x360 [ 266.867421][T21668] do_mount+0x1813/0x2730 [ 266.871843][T21668] ? copy_mount_string+0x30/0x30 [ 266.876805][T21668] ? kasan_check_write+0x14/0x20 [ 266.881754][T21668] ? _copy_from_user+0xe0/0x120 [ 266.886606][T21668] ? copy_mount_options+0xcf/0x360 [ 266.891714][T21668] ksys_mount+0xcc/0x100 [ 266.891727][T21668] __x64_sys_mount+0xbf/0xd0 [ 266.891744][T21668] do_syscall_64+0xfe/0x140 [ 266.891761][T21668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.891772][T21668] RIP: 0033:0x459519 [ 266.891783][T21668] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.891788][T21668] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 266.891798][T21668] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 266.891816][T21668] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 266.950916][T21668] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 266.950924][T21668] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 266.950930][T21668] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fi'], 0x4) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:44 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000140)="c030c95c030d4073d5fe21f1af6173e75bd29e6ccfb1bf789eb3bfe16a8a2b3c9aaf713aa23e39e9d0c7ebaf977c175bb8c33d935a238de80b65b97f398fa18f83c991a5bc65380f90dd146cd661007460e5", 0x52}, {&(0x7f0000000200)="b30f2011ef8f6e3bfaf15a15606cae65f84dccd4b7241900be3cfd9ff66e81ed754e11f72672f9ddf38e9be1f81707a277a510b6a8a7c9a91186c1561e773b4fcb16666bac5ae67ec9455eb9e01f36c518b8e315bb4bc87ed969062d10df2b49b0c12e4fef3c4a7ab08a6acd323677825b4dadd7d82f66ea726c9d0c6fa6cdb8991d4f0b1a17df9396f362eca8db61b69c516d875e3f53b088dc83000d3943c75a5b9cddb0c709df0bf429b3545bf4fddb6f78f089743c65fd27b5728f637dcf615480e3e4a2986a90", 0xc9, 0x10001}], 0x40, &(0x7f0000000500)={[{@minixdf='minixdf'}, {@barrier='barrier'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@fowner_lt={'fowner<', r1}}, {@permit_directio='permit_directio'}]}) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)) 03:33:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x1600) 03:33:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc020660b, 0x0) [ 267.146769][T21790] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 03:33:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x1800) [ 267.214559][T21803] overlayfs: missing 'lowerdir' 03:33:44 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x100) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 267.280757][T21803] overlayfs: missing 'lowerdir' [ 267.290995][T21790] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 03:33:44 executing program 3 (fault-call:8 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc058560f, 0x0) [ 267.546555][T21918] FAULT_INJECTION: forcing a failure. [ 267.546555][T21918] name failslab, interval 1, probability 0, space 0, times 0 [ 267.624520][T21918] CPU: 1 PID: 21918 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 267.641854][T21918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.651923][T21918] Call Trace: [ 267.655229][T21918] dump_stack+0x1d8/0x2f8 [ 267.659605][T21918] should_fail+0x608/0x860 [ 267.664029][T21918] ? setup_fault_attr+0x2b0/0x2b0 [ 267.669406][T21918] __should_failslab+0x11a/0x160 03:33:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="0300000000000000"], 0x1) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000174, 0x0) [ 267.674350][T21918] should_failslab+0x9/0x20 [ 267.678871][T21918] kmem_cache_alloc_trace+0x5d/0x2c0 [ 267.684160][T21918] ? __list_lru_init+0x3e3/0x900 [ 267.689119][T21918] __list_lru_init+0x3e3/0x900 [ 267.693921][T21918] alloc_super+0x664/0x740 [ 267.698348][T21918] sget_userns+0x1bf/0x4f0 [ 267.698358][T21918] ? free_anon_bdev+0x30/0x30 [ 267.698373][T21918] mount_nodev+0xe5/0x1c0 [ 267.698381][T21918] ? devpts_kill_sb+0x70/0x70 [ 267.698395][T21918] devpts_mount+0x2c/0x40 03:33:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x1a00) 03:33:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm'], 0x6) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:45 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) accept4$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711, @my=0x0}, 0x10, 0x80800) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback, 0x3}, 0x1c) listen(r1, 0x8) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) epoll_wait(r0, &(0x7f0000000000)=[{}, {}], 0x2, 0x100000001) [ 267.720809][T21918] legacy_get_tree+0xf9/0x1a0 [ 267.720821][T21918] ? devpts_pty_kill+0xe0/0xe0 [ 267.720835][T21918] vfs_get_tree+0x8f/0x360 [ 267.720847][T21918] do_mount+0x1813/0x2730 [ 267.720867][T21918] ? copy_mount_string+0x30/0x30 [ 267.744088][T21918] ? kasan_check_write+0x14/0x20 [ 267.749047][T21918] ? _copy_from_user+0xe0/0x120 [ 267.753945][T21918] ? copy_mount_options+0xcf/0x360 [ 267.759091][T21918] ksys_mount+0xcc/0x100 [ 267.763472][T21918] __x64_sys_mount+0xbf/0xd0 [ 267.768169][T21918] do_syscall_64+0xfe/0x140 [ 267.772711][T21918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.778618][T21918] RIP: 0033:0x459519 [ 267.782541][T21918] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.802514][T21918] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 267.810944][T21918] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 267.818941][T21918] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 267.826914][T21918] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 267.834887][T21918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 267.842886][T21918] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x1c00) 03:33:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc06855c8, 0x0) 03:33:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x1e00) 03:33:45 executing program 3 (fault-call:8 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm'], 0x6) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 268.289154][T22061] FAULT_INJECTION: forcing a failure. [ 268.289154][T22061] name failslab, interval 1, probability 0, space 0, times 0 03:33:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc0745645, 0x0) 03:33:45 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x2000) [ 268.368463][T22061] CPU: 1 PID: 22061 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 268.376619][T22061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.386688][T22061] Call Trace: [ 268.390004][T22061] dump_stack+0x1d8/0x2f8 [ 268.394474][T22061] should_fail+0x608/0x860 [ 268.398904][T22061] ? setup_fault_attr+0x2b0/0x2b0 [ 268.404100][T22061] __should_failslab+0x11a/0x160 [ 268.409058][T22061] should_failslab+0x9/0x20 [ 268.413651][T22061] kmem_cache_alloc_node_trace+0x6e/0x280 [ 268.419380][T22061] ? __kmalloc_node+0x3c/0x60 [ 268.424080][T22061] ? memset+0x31/0x40 [ 268.428111][T22061] __kmalloc_node+0x3c/0x60 [ 268.432656][T22061] kvmalloc_node+0xcc/0x130 [ 268.437173][T22061] __list_lru_init+0x35b/0x900 [ 268.442564][T22061] alloc_super+0x664/0x740 [ 268.446990][T22061] sget_userns+0x1bf/0x4f0 [ 268.451408][T22061] ? free_anon_bdev+0x30/0x30 [ 268.457626][T22061] mount_nodev+0xe5/0x1c0 [ 268.461957][T22061] ? devpts_kill_sb+0x70/0x70 [ 268.466637][T22061] devpts_mount+0x2c/0x40 [ 268.470970][T22061] legacy_get_tree+0xf9/0x1a0 [ 268.475644][T22061] ? devpts_pty_kill+0xe0/0xe0 [ 268.480409][T22061] vfs_get_tree+0x8f/0x360 [ 268.484826][T22061] do_mount+0x1813/0x2730 [ 268.489150][T22061] ? copy_mount_string+0x30/0x30 [ 268.494082][T22061] ? kasan_check_write+0x14/0x20 [ 268.499010][T22061] ? _copy_from_user+0xe0/0x120 [ 268.503850][T22061] ? copy_mount_options+0xcf/0x360 [ 268.508966][T22061] ksys_mount+0xcc/0x100 [ 268.513376][T22061] __x64_sys_mount+0xbf/0xd0 [ 268.517981][T22061] do_syscall_64+0xfe/0x140 [ 268.522495][T22061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.528377][T22061] RIP: 0033:0x459519 [ 268.532271][T22061] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.551877][T22061] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 268.560296][T22061] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 268.568347][T22061] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 268.576309][T22061] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 268.584273][T22061] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 268.592294][T22061] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:46 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {}, [], {0x4, 0x4}, [{0x8, 0x6}]}, 0x2c, 0x1) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 03:33:46 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4001) 03:33:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xc08c5336, 0x0) [ 268.858150][T22186] overlayfs: lowerdir is in-use as upperdir/workdir 03:33:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm'], 0x6) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 268.908120][T22186] overlayfs: workdir and upperdir must reside under the same mount 03:33:46 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) getresgid(&(0x7f0000000600), 0x0, &(0x7f0000000680)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {0x1, 0x4}, [{}, {0x2, 0x7}], {0x4, 0x4}, [{}, {0x8, 0x6}], {}, {0x20, 0x4}}, 0x44, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="85", 0x1, 0xfffffffffffffffa) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='lowerdir', 0xfffffffffffffff8) add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f00000004c0)="3f3be743286827eabbb8815bbc8c1f151f8576bc9aeed6faf8fa6b9d846784c24d1c51d614eb08a0765fe6eae5920406cacda7d1297d2dc56cdc2cc36c0f825f9f8a9a3fe9f2f8d7a6c2489691e4123329f9887288f344513edfa8c35457fdce8f6cd57a49fbae4808", 0x69, 0xfffffffffffffff8) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 03:33:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x2) 03:33:46 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) read$eventfd(r0, &(0x7f0000000040), 0x8) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000000)={0x4}, 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) semget(0x1, 0x0, 0x40) 03:33:46 executing program 3 (fault-call:8 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:46 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x20001) 03:33:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 269.388926][T22323] FAULT_INJECTION: forcing a failure. [ 269.388926][T22323] name failslab, interval 1, probability 0, space 0, times 0 [ 269.411320][T22323] CPU: 0 PID: 22323 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 269.419590][T22323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.429735][T22323] Call Trace: [ 269.433059][T22323] dump_stack+0x1d8/0x2f8 [ 269.437402][T22323] should_fail+0x608/0x860 [ 269.441851][T22323] ? setup_fault_attr+0x2b0/0x2b0 [ 269.447159][T22323] __should_failslab+0x11a/0x160 [ 269.452105][T22323] should_failslab+0x9/0x20 [ 269.456698][T22323] kmem_cache_alloc_trace+0x5d/0x2c0 [ 269.461979][T22323] ? __list_lru_init+0x3e3/0x900 [ 269.466923][T22323] __list_lru_init+0x3e3/0x900 [ 269.471708][T22323] alloc_super+0x664/0x740 [ 269.476140][T22323] sget_userns+0x1bf/0x4f0 [ 269.480545][T22323] ? free_anon_bdev+0x30/0x30 [ 269.480559][T22323] mount_nodev+0xe5/0x1c0 [ 269.480567][T22323] ? devpts_kill_sb+0x70/0x70 [ 269.480578][T22323] devpts_mount+0x2c/0x40 [ 269.480589][T22323] legacy_get_tree+0xf9/0x1a0 [ 269.480596][T22323] ? devpts_pty_kill+0xe0/0xe0 [ 269.480607][T22323] vfs_get_tree+0x8f/0x360 [ 269.480619][T22323] do_mount+0x1813/0x2730 [ 269.480634][T22323] ? copy_mount_string+0x30/0x30 [ 269.480652][T22323] ? kasan_check_write+0x14/0x20 [ 269.480664][T22323] ? _copy_from_user+0xe0/0x120 [ 269.480674][T22323] ? copy_mount_options+0xcf/0x360 [ 269.480687][T22323] ksys_mount+0xcc/0x100 [ 269.480698][T22323] __x64_sys_mount+0xbf/0xd0 [ 269.480714][T22323] do_syscall_64+0xfe/0x140 [ 269.480731][T22323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.480746][T22323] RIP: 0033:0x459519 [ 269.496510][T22329] overlayfs: filesystem on './file0' not supported as upperdir [ 269.498705][T22323] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x3) 03:33:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x3fe00) [ 269.498713][T22323] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 269.498724][T22323] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 269.498732][T22323] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 269.498738][T22323] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 269.498744][T22323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 269.498751][T22323] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:47 executing program 1: ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1000000000054}, 0x98) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000000c0)) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) 03:33:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x40000) 03:33:47 executing program 3 (fault-call:8 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x4) [ 270.046793][T22453] FAULT_INJECTION: forcing a failure. [ 270.046793][T22453] name failslab, interval 1, probability 0, space 0, times 0 03:33:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x40001) [ 270.137663][T22453] CPU: 1 PID: 22453 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 270.145687][T22453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.155743][T22453] Call Trace: [ 270.159038][T22453] dump_stack+0x1d8/0x2f8 [ 270.163363][T22453] should_fail+0x608/0x860 [ 270.167774][T22453] ? setup_fault_attr+0x2b0/0x2b0 [ 270.172797][T22453] __should_failslab+0x11a/0x160 [ 270.177725][T22453] should_failslab+0x9/0x20 [ 270.182220][T22453] kmem_cache_alloc_trace+0x5d/0x2c0 [ 270.187496][T22453] ? __list_lru_init+0x3e3/0x900 [ 270.192428][T22453] __list_lru_init+0x3e3/0x900 [ 270.197186][T22453] alloc_super+0x664/0x740 [ 270.201594][T22453] sget_userns+0x1bf/0x4f0 [ 270.205997][T22453] ? free_anon_bdev+0x30/0x30 [ 270.210664][T22453] mount_nodev+0xe5/0x1c0 [ 270.214980][T22453] ? devpts_kill_sb+0x70/0x70 [ 270.219648][T22453] devpts_mount+0x2c/0x40 [ 270.223971][T22453] legacy_get_tree+0xf9/0x1a0 [ 270.228629][T22453] ? devpts_pty_kill+0xe0/0xe0 [ 270.233385][T22453] vfs_get_tree+0x8f/0x360 [ 270.237791][T22453] do_mount+0x1813/0x2730 [ 270.242111][T22453] ? copy_mount_string+0x30/0x30 [ 270.247057][T22453] ? kasan_check_write+0x14/0x20 [ 270.252000][T22453] ? _copy_from_user+0xe0/0x120 [ 270.256835][T22453] ? copy_mount_options+0xcf/0x360 [ 270.261938][T22453] ksys_mount+0xcc/0x100 [ 270.266172][T22453] __x64_sys_mount+0xbf/0xd0 [ 270.270751][T22453] do_syscall_64+0xfe/0x140 [ 270.275263][T22453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.281146][T22453] RIP: 0033:0x459519 [ 270.285046][T22453] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.304640][T22453] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.313045][T22453] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 270.321002][T22453] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 270.328959][T22453] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 270.336913][T22453] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 270.344869][T22453] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:48 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={r1, 0x9}, &(0x7f00000000c0)=0x8) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) uselib(&(0x7f0000000000)='./file0\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2, 0x8}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 03:33:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x7fe00) 03:33:48 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x30000, 0x0) write$FUSE_OPEN(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @mcast2, 0x1}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:33:48 executing program 1: syz_open_dev$usb(0x0, 0xe7, 0xa0000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1000000000054}, 0x98) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) 03:33:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x80001) 03:33:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x5) 03:33:48 executing program 3 (fault-call:8 fault-nth:41): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xbfe00) 03:33:48 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000080)={r2, 0x1}, &(0x7f00000000c0)=0x8) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 271.358093][T22636] FAULT_INJECTION: forcing a failure. [ 271.358093][T22636] name failslab, interval 1, probability 0, space 0, times 0 [ 271.435293][T22636] CPU: 0 PID: 22636 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 271.443306][T22636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.453369][T22636] Call Trace: [ 271.456681][T22636] dump_stack+0x1d8/0x2f8 [ 271.461020][T22636] should_fail+0x608/0x860 [ 271.465428][T22636] ? setup_fault_attr+0x2b0/0x2b0 [ 271.470480][T22636] __should_failslab+0x11a/0x160 [ 271.475408][T22636] should_failslab+0x9/0x20 [ 271.479899][T22636] kmem_cache_alloc_trace+0x5d/0x2c0 [ 271.485265][T22636] ? __list_lru_init+0x3e3/0x900 [ 271.490195][T22636] __list_lru_init+0x3e3/0x900 [ 271.494957][T22636] alloc_super+0x664/0x740 [ 271.499368][T22636] sget_userns+0x1bf/0x4f0 [ 271.503773][T22636] ? free_anon_bdev+0x30/0x30 [ 271.508442][T22636] mount_nodev+0xe5/0x1c0 [ 271.512765][T22636] ? devpts_kill_sb+0x70/0x70 [ 271.517519][T22636] devpts_mount+0x2c/0x40 [ 271.521847][T22636] legacy_get_tree+0xf9/0x1a0 [ 271.526507][T22636] ? devpts_pty_kill+0xe0/0xe0 [ 271.531262][T22636] vfs_get_tree+0x8f/0x360 [ 271.535671][T22636] do_mount+0x1813/0x2730 [ 271.539995][T22636] ? copy_mount_string+0x30/0x30 [ 271.544949][T22636] ? kasan_check_write+0x14/0x20 [ 271.549873][T22636] ? _copy_from_user+0xe0/0x120 [ 271.554725][T22636] ? copy_mount_options+0xcf/0x360 [ 271.560002][T22636] ksys_mount+0xcc/0x100 [ 271.564242][T22636] __x64_sys_mount+0xbf/0xd0 [ 271.568834][T22636] do_syscall_64+0xfe/0x140 [ 271.573334][T22636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.579217][T22636] RIP: 0033:0x459519 [ 271.583101][T22636] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.602969][T22636] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 271.611402][T22636] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 271.619388][T22636] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 271.627367][T22636] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:33:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0xffe00) [ 271.635331][T22636] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 271.643292][T22636] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:49 executing program 1: syz_open_dev$usb(0x0, 0xe7, 0xa0000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1000000000054}, 0x98) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) 03:33:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x100000) 03:33:49 executing program 3 (fault-call:8 fault-nth:42): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:49 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffd, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x10000000, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xd63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x6) 03:33:49 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x100001) 03:33:49 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0), 0x24, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 272.271383][T22785] FAULT_INJECTION: forcing a failure. [ 272.271383][T22785] name failslab, interval 1, probability 0, space 0, times 0 [ 272.313747][T22785] CPU: 1 PID: 22785 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 272.321792][T22785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.331854][T22785] Call Trace: [ 272.335152][T22785] dump_stack+0x1d8/0x2f8 [ 272.339480][T22785] should_fail+0x608/0x860 [ 272.343907][T22785] ? setup_fault_attr+0x2b0/0x2b0 [ 272.348929][T22785] __should_failslab+0x11a/0x160 [ 272.353867][T22785] should_failslab+0x9/0x20 [ 272.358378][T22785] kmem_cache_alloc_trace+0x5d/0x2c0 [ 272.363664][T22785] ? __list_lru_init+0x3e3/0x900 [ 272.368622][T22785] __list_lru_init+0x3e3/0x900 [ 272.373387][T22785] alloc_super+0x664/0x740 [ 272.377794][T22785] sget_userns+0x1bf/0x4f0 [ 272.382200][T22785] ? free_anon_bdev+0x30/0x30 [ 272.386874][T22785] mount_nodev+0xe5/0x1c0 [ 272.391191][T22785] ? devpts_kill_sb+0x70/0x70 [ 272.395893][T22785] devpts_mount+0x2c/0x40 [ 272.400216][T22785] legacy_get_tree+0xf9/0x1a0 [ 272.404975][T22785] ? devpts_pty_kill+0xe0/0xe0 [ 272.409747][T22785] vfs_get_tree+0x8f/0x360 [ 272.414157][T22785] do_mount+0x1813/0x2730 [ 272.418503][T22785] ? copy_mount_string+0x30/0x30 [ 272.423441][T22785] ? kasan_check_write+0x14/0x20 [ 272.428365][T22785] ? _copy_from_user+0xe0/0x120 [ 272.433203][T22785] ? copy_mount_options+0xcf/0x360 [ 272.438304][T22785] ksys_mount+0xcc/0x100 [ 272.442545][T22785] __x64_sys_mount+0xbf/0xd0 [ 272.447131][T22785] do_syscall_64+0xfe/0x140 [ 272.451626][T22785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.459037][T22785] RIP: 0033:0x459519 [ 272.462921][T22785] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.482527][T22785] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 272.490938][T22785] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 272.498901][T22785] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 272.506870][T22785] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 272.514845][T22785] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 272.522804][T22785] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x7) 03:33:50 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x30000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000000)) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) [ 272.559240][T22858] overlayfs: lowerdir is in-use as upperdir/workdir [ 272.571449][T22859] overlayfs: workdir and upperdir must reside under the same mount 03:33:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x13fe00) 03:33:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x8) 03:33:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") seccomp(0x3, 0x0, &(0x7f0000000140)={0x0, 0x0}) 03:33:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x17fe00) 03:33:50 executing program 3 (fault-call:8 fault-nth:43): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:50 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x8000a, 0x2) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000000c0)={0x8, &(0x7f00000002c0)="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"}) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3, 0x2, 0xff, 0x1, 0x4, 0x3}, 0x20) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000080)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x8, 0x3, 0x400, 0x2, 0x20}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000100)={r4, @in={{0x2, 0x0, @empty}}, 0x8574, 0x8001, 0x3}, 0xfffffffffffffcc4) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x2, @broadcast, 'lapb0\x00'}}) 03:33:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000380)={0x26, 'aead\x00', 0x0, 0x0, 'morus640\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) read(r1, &(0x7f0000001480)=""/4096, 0x1000) 03:33:50 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x1bfe00) 03:33:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x9) [ 273.172212][T22979] FAULT_INJECTION: forcing a failure. [ 273.172212][T22979] name failslab, interval 1, probability 0, space 0, times 0 03:33:50 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8040, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 273.284767][T22979] CPU: 0 PID: 22979 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 273.296393][T22979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.306477][T22979] Call Trace: [ 273.309787][T22979] dump_stack+0x1d8/0x2f8 [ 273.314137][T22979] should_fail+0x608/0x860 [ 273.318563][T22979] ? setup_fault_attr+0x2b0/0x2b0 [ 273.325128][T22979] __should_failslab+0x11a/0x160 [ 273.330078][T22979] should_failslab+0x9/0x20 [ 273.334579][T22979] kmem_cache_alloc_trace+0x5d/0x2c0 [ 273.339961][T22979] ? __list_lru_init+0x3e3/0x900 [ 273.344901][T22979] __list_lru_init+0x3e3/0x900 [ 273.349671][T22979] alloc_super+0x664/0x740 [ 273.354089][T22979] sget_userns+0x1bf/0x4f0 [ 273.358503][T22979] ? free_anon_bdev+0x30/0x30 [ 273.363185][T22979] mount_nodev+0xe5/0x1c0 [ 273.367524][T22979] ? devpts_kill_sb+0x70/0x70 [ 273.372209][T22979] devpts_mount+0x2c/0x40 [ 273.376539][T22979] legacy_get_tree+0xf9/0x1a0 [ 273.381212][T22979] ? devpts_pty_kill+0xe0/0xe0 [ 273.381227][T22979] vfs_get_tree+0x8f/0x360 [ 273.381240][T22979] do_mount+0x1813/0x2730 [ 273.381255][T22979] ? copy_mount_string+0x30/0x30 [ 273.381274][T22979] ? kasan_check_write+0x14/0x20 [ 273.381290][T22979] ? _copy_from_user+0xe0/0x120 [ 273.404681][T22979] ? copy_mount_options+0xcf/0x360 [ 273.414634][T22979] ksys_mount+0xcc/0x100 [ 273.418877][T22979] __x64_sys_mount+0xbf/0xd0 [ 273.423479][T22979] do_syscall_64+0xfe/0x140 [ 273.427992][T22979] entry_SYSCALL_64_after_hwframe+0x49/0xbe 03:33:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 273.433916][T22979] RIP: 0033:0x459519 [ 273.437818][T22979] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.457639][T22979] RSP: 002b:00007f12e6bfcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 273.466068][T22979] RAX: ffffffffffffffda RBX: 00007f12e6bfcc90 RCX: 0000000000459519 [ 273.474075][T22979] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 03:33:51 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {}, [{}], {0x4, 0x4}, [{}, {0x8, 0x6}], {}, {0x20, 0x4}}, 0x3c, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='lowerdir', 0xfffffffffffffff8) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 273.482056][T22979] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 273.490024][T22979] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6bfd6d4 [ 273.497985][T22979] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000003 03:33:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x1ffe00) 03:33:51 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2000001, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) inotify_init1(0x80000) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x23fe00) 03:33:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xa) [ 273.839418][T23064] overlayfs: filesystem on './file0' not supported as upperdir 03:33:51 executing program 3 (fault-call:8 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:51 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000006c0)={{}, {}, [{}], {0x4, 0x4}, [{}, {0x8, 0x6}], {}, {0x20, 0x4}}, 0x3c, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='lowerdir', 0xfffffffffffffff8) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 03:33:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(0x0, 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x241800) 03:33:51 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80000, 0x1) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) setns(r0, 0x4000000) 03:33:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xb) 03:33:51 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x241a00) 03:33:52 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) recvfrom$ax25(r3, &(0x7f0000000000)=""/6, 0x6, 0x20, &(0x7f0000000040)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}, 0x48) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:52 executing program 1: ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1000000000054}, 0x98) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) [ 274.463795][T23255] FAULT_INJECTION: forcing a failure. [ 274.463795][T23255] name failslab, interval 1, probability 0, space 0, times 0 [ 274.546116][T23255] CPU: 1 PID: 23255 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 274.554140][T23255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.564189][T23255] Call Trace: [ 274.567504][T23255] dump_stack+0x1d8/0x2f8 [ 274.571859][T23255] should_fail+0x608/0x860 [ 274.576270][T23255] ? setup_fault_attr+0x2b0/0x2b0 [ 274.581317][T23255] __should_failslab+0x11a/0x160 [ 274.586245][T23255] should_failslab+0x9/0x20 [ 274.590736][T23255] kmem_cache_alloc_trace+0x5d/0x2c0 [ 274.596017][T23255] ? __list_lru_init+0x3e3/0x900 [ 274.600968][T23255] __list_lru_init+0x3e3/0x900 [ 274.605734][T23255] alloc_super+0x664/0x740 [ 274.610150][T23255] sget_userns+0x1bf/0x4f0 [ 274.614558][T23255] ? free_anon_bdev+0x30/0x30 [ 274.619233][T23255] mount_nodev+0xe5/0x1c0 [ 274.623571][T23255] ? devpts_kill_sb+0x70/0x70 [ 274.628241][T23255] devpts_mount+0x2c/0x40 [ 274.632564][T23255] legacy_get_tree+0xf9/0x1a0 [ 274.637231][T23255] ? devpts_pty_kill+0xe0/0xe0 [ 274.642006][T23255] vfs_get_tree+0x8f/0x360 [ 274.646413][T23255] do_mount+0x1813/0x2730 [ 274.650735][T23255] ? copy_mount_string+0x30/0x30 [ 274.655670][T23255] ? kasan_check_write+0x14/0x20 [ 274.660602][T23255] ? _copy_from_user+0xe0/0x120 [ 274.665446][T23255] ? copy_mount_options+0xcf/0x360 [ 274.670554][T23255] ksys_mount+0xcc/0x100 [ 274.674803][T23255] __x64_sys_mount+0xbf/0xd0 [ 274.679410][T23255] do_syscall_64+0xfe/0x140 [ 274.683914][T23255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.689797][T23255] RIP: 0033:0x459519 [ 274.693681][T23255] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.713291][T23255] RSP: 002b:00007f12e6bfcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 274.721710][T23255] RAX: ffffffffffffffda RBX: 00007f12e6bfcc90 RCX: 0000000000459519 [ 274.729672][T23255] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 274.737630][T23255] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 274.745587][T23255] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6bfd6d4 [ 274.753544][T23255] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000003 03:33:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x241c00) 03:33:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(0x0, 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xc) 03:33:52 executing program 3 (fault-call:8 fault-nth:45): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x241e00) 03:33:52 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000000)={@my=0x0}) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x849, 0x200000) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xd) 03:33:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(0x0, 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:52 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x242000) 03:33:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xe) 03:33:53 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x242200) 03:33:53 executing program 1: 03:33:53 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='./file1\x00') listen(r1, 0x8) recvfrom(r1, &(0x7f0000000100), 0x0, 0x62, &(0x7f0000000140)=@can, 0x80) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x80000000000000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000000)={0x8001, 0x0, 0x4a4, 0x2, 0xd, 0x1}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x1, 0x70, 0x9, 0x6, 0x100000000, 0x80000000, 0x0, 0x81, 0x0, 0x2, 0xfffffffffffff98b, 0x6, 0x80, 0x682e, 0x20, 0x1000, 0x6, 0x3ff, 0x2, 0x6, 0x1000, 0x6, 0x5ab1, 0x4, 0x1ff, 0x7fff, 0x1, 0x240, 0xfffffffffffffff8, 0x0, 0x2, 0x8, 0x8, 0x3, 0x4250, 0xfc, 0x400, 0x9, 0x0, 0x5, 0x4, @perf_config_ext={0x9, 0x4}, 0xc4a, 0x0, 0x1, 0x5, 0x5, 0x6, 0x6}) 03:33:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x10) 03:33:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 276.040481][T23551] FAULT_INJECTION: forcing a failure. [ 276.040481][T23551] name failslab, interval 1, probability 0, space 0, times 0 [ 276.059520][T23551] CPU: 0 PID: 23551 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 276.067529][T23551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.077584][T23551] Call Trace: [ 276.080873][T23551] dump_stack+0x1d8/0x2f8 [ 276.085203][T23551] should_fail+0x608/0x860 [ 276.089612][T23551] ? setup_fault_attr+0x2b0/0x2b0 [ 276.094637][T23551] __should_failslab+0x11a/0x160 [ 276.099566][T23551] should_failslab+0x9/0x20 [ 276.104079][T23551] kmem_cache_alloc_trace+0x5d/0x2c0 [ 276.109357][T23551] ? __list_lru_init+0x3e3/0x900 [ 276.114286][T23551] __list_lru_init+0x3e3/0x900 [ 276.119048][T23551] alloc_super+0x664/0x740 [ 276.123458][T23551] sget_userns+0x1bf/0x4f0 [ 276.127873][T23551] ? free_anon_bdev+0x30/0x30 [ 276.132545][T23551] mount_nodev+0xe5/0x1c0 [ 276.136859][T23551] ? devpts_kill_sb+0x70/0x70 [ 276.141526][T23551] devpts_mount+0x2c/0x40 [ 276.145843][T23551] legacy_get_tree+0xf9/0x1a0 [ 276.150507][T23551] ? devpts_pty_kill+0xe0/0xe0 [ 276.155266][T23551] vfs_get_tree+0x8f/0x360 [ 276.159924][T23551] do_mount+0x1813/0x2730 [ 276.164250][T23551] ? copy_mount_string+0x30/0x30 [ 276.169189][T23551] ? kasan_check_write+0x14/0x20 [ 276.174126][T23551] ? _copy_from_user+0xe0/0x120 [ 276.178994][T23551] ? copy_mount_options+0xcf/0x360 [ 276.184105][T23551] ksys_mount+0xcc/0x100 [ 276.188343][T23551] __x64_sys_mount+0xbf/0xd0 [ 276.192935][T23551] do_syscall_64+0xfe/0x140 [ 276.197435][T23551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.203319][T23551] RIP: 0033:0x459519 [ 276.207217][T23551] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.226833][T23551] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 276.235356][T23551] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 276.243316][T23551] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 276.251278][T23551] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 276.259241][T23551] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 276.267209][T23551] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:54 executing program 3 (fault-call:8 fault-nth:46): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x242400) 03:33:54 executing program 1: 03:33:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x11) 03:33:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:54 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0xbd}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={r4, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:54 executing program 1: 03:33:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x242600) [ 276.698672][T23687] FAULT_INJECTION: forcing a failure. [ 276.698672][T23687] name failslab, interval 1, probability 0, space 0, times 0 03:33:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x12) 03:33:54 executing program 1: [ 276.825473][T23687] CPU: 0 PID: 23687 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 276.833488][T23687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.843544][T23687] Call Trace: [ 276.846851][T23687] dump_stack+0x1d8/0x2f8 [ 276.851190][T23687] should_fail+0x608/0x860 [ 276.855613][T23687] ? setup_fault_attr+0x2b0/0x2b0 [ 276.860648][T23687] __should_failslab+0x11a/0x160 [ 276.865593][T23687] should_failslab+0x9/0x20 [ 276.870103][T23687] kmem_cache_alloc_trace+0x5d/0x2c0 [ 276.875389][T23687] ? __list_lru_init+0x3e3/0x900 [ 276.880325][T23687] __list_lru_init+0x3e3/0x900 [ 276.885101][T23687] alloc_super+0x664/0x740 [ 276.889524][T23687] sget_userns+0x1bf/0x4f0 [ 276.893936][T23687] ? free_anon_bdev+0x30/0x30 [ 276.898623][T23687] mount_nodev+0xe5/0x1c0 [ 276.902948][T23687] ? devpts_kill_sb+0x70/0x70 [ 276.907625][T23687] devpts_mount+0x2c/0x40 [ 276.912048][T23687] legacy_get_tree+0xf9/0x1a0 [ 276.916735][T23687] ? devpts_pty_kill+0xe0/0xe0 [ 276.921489][T23687] vfs_get_tree+0x8f/0x360 [ 276.925898][T23687] do_mount+0x1813/0x2730 [ 276.930415][T23687] ? copy_mount_string+0x30/0x30 [ 276.935365][T23687] ? kasan_check_write+0x14/0x20 [ 276.940295][T23687] ? _copy_from_user+0xe0/0x120 [ 276.945137][T23687] ? copy_mount_options+0xcf/0x360 [ 276.950240][T23687] ksys_mount+0xcc/0x100 [ 276.954496][T23687] __x64_sys_mount+0xbf/0xd0 [ 276.959101][T23687] do_syscall_64+0xfe/0x140 [ 276.963597][T23687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.969482][T23687] RIP: 0033:0x459519 [ 276.973365][T23687] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.992970][T23687] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 277.001385][T23687] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 277.009357][T23687] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 277.017326][T23687] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:33:54 executing program 1: [ 277.025295][T23687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 277.033259][T23687] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x242800) 03:33:54 executing program 3 (fault-call:8 fault-nth:47): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:54 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) getsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) fanotify_mark(r0, 0x2, 0x20, r0, &(0x7f0000000100)='./file0\x00') ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0xffffffffffffffe4, 0x200, 0x2, 0x8, r2}, &(0x7f00000000c0)=0x10) listen(r1, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:54 executing program 1: 03:33:54 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x242a00) 03:33:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x25) 03:33:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:55 executing program 1: [ 277.521101][T23832] FAULT_INJECTION: forcing a failure. [ 277.521101][T23832] name failslab, interval 1, probability 0, space 0, times 0 [ 277.542738][T23832] CPU: 0 PID: 23832 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 277.550772][T23832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.550779][T23832] Call Trace: [ 277.550807][T23832] dump_stack+0x1d8/0x2f8 [ 277.550831][T23832] should_fail+0x608/0x860 [ 277.550847][T23832] ? setup_fault_attr+0x2b0/0x2b0 [ 277.550869][T23832] __should_failslab+0x11a/0x160 [ 277.550891][T23832] should_failslab+0x9/0x20 [ 277.587394][T23832] kmem_cache_alloc_trace+0x5d/0x2c0 [ 277.592688][T23832] ? __list_lru_init+0x3e3/0x900 [ 277.597636][T23832] __list_lru_init+0x3e3/0x900 [ 277.602407][T23832] alloc_super+0x664/0x740 [ 277.606832][T23832] sget_userns+0x1bf/0x4f0 [ 277.611258][T23832] ? free_anon_bdev+0x30/0x30 [ 277.615936][T23832] mount_nodev+0xe5/0x1c0 [ 277.620265][T23832] ? devpts_kill_sb+0x70/0x70 [ 277.624951][T23832] devpts_mount+0x2c/0x40 [ 277.629293][T23832] legacy_get_tree+0xf9/0x1a0 [ 277.633990][T23832] ? devpts_pty_kill+0xe0/0xe0 [ 277.638760][T23832] vfs_get_tree+0x8f/0x360 [ 277.643177][T23832] do_mount+0x1813/0x2730 [ 277.647516][T23832] ? copy_mount_string+0x30/0x30 [ 277.652463][T23832] ? kasan_check_write+0x14/0x20 [ 277.657399][T23832] ? _copy_from_user+0xe0/0x120 [ 277.662247][T23832] ? copy_mount_options+0xcf/0x360 [ 277.667389][T23832] ksys_mount+0xcc/0x100 [ 277.671629][T23832] __x64_sys_mount+0xbf/0xd0 [ 277.676315][T23832] do_syscall_64+0xfe/0x140 [ 277.680832][T23832] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.686725][T23832] RIP: 0033:0x459519 [ 277.690615][T23832] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.717795][T23832] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 277.726208][T23832] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 277.734186][T23832] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 277.742149][T23832] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 277.750118][T23832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 277.758099][T23832] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:55 executing program 1: 03:33:55 executing program 1: 03:33:55 executing program 1: 03:33:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x28) 03:33:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x242c00) 03:33:55 executing program 3 (fault-call:8 fault-nth:48): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:55 executing program 1: 03:33:55 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x242e00) 03:33:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x48) 03:33:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:55 executing program 1: 03:33:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x4c) 03:33:56 executing program 1: 03:33:56 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0xd, &(0x7f0000000000)=' {[$#em1ppp1\x00', 0xffffffffffffffff}, 0x30) setpriority(0x2, r3, 0x8) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x243000) 03:33:56 executing program 1: [ 278.630268][T23998] FAULT_INJECTION: forcing a failure. [ 278.630268][T23998] name failslab, interval 1, probability 0, space 0, times 0 [ 278.717075][T23998] CPU: 1 PID: 23998 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 278.725090][T23998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.725097][T23998] Call Trace: [ 278.725118][T23998] dump_stack+0x1d8/0x2f8 [ 278.725137][T23998] should_fail+0x608/0x860 [ 278.747180][T23998] ? setup_fault_attr+0x2b0/0x2b0 [ 278.747203][T23998] __should_failslab+0x11a/0x160 [ 278.757145][T23998] should_failslab+0x9/0x20 [ 278.761650][T23998] kmem_cache_alloc_trace+0x5d/0x2c0 [ 278.766935][T23998] ? __list_lru_init+0x3e3/0x900 [ 278.771876][T23998] __list_lru_init+0x3e3/0x900 [ 278.776657][T23998] alloc_super+0x664/0x740 [ 278.781086][T23998] sget_userns+0x1bf/0x4f0 [ 278.785500][T23998] ? free_anon_bdev+0x30/0x30 [ 278.790184][T23998] mount_nodev+0xe5/0x1c0 [ 278.794515][T23998] ? devpts_kill_sb+0x70/0x70 [ 278.799190][T23998] devpts_mount+0x2c/0x40 [ 278.803517][T23998] legacy_get_tree+0xf9/0x1a0 [ 278.808187][T23998] ? devpts_pty_kill+0xe0/0xe0 [ 278.812956][T23998] vfs_get_tree+0x8f/0x360 [ 278.817377][T23998] do_mount+0x1813/0x2730 [ 278.821713][T23998] ? copy_mount_string+0x30/0x30 [ 278.826656][T23998] ? kasan_check_write+0x14/0x20 [ 278.831592][T23998] ? _copy_from_user+0xe0/0x120 [ 278.836430][T23998] ? copy_mount_options+0xcf/0x360 [ 278.841556][T23998] ksys_mount+0xcc/0x100 [ 278.845789][T23998] __x64_sys_mount+0xbf/0xd0 [ 278.850373][T23998] do_syscall_64+0xfe/0x140 [ 278.854868][T23998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.860767][T23998] RIP: 0033:0x459519 [ 278.864653][T23998] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.884257][T23998] RSP: 002b:00007f12e6bfcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 278.892669][T23998] RAX: ffffffffffffffda RBX: 00007f12e6bfcc90 RCX: 0000000000459519 [ 278.900636][T23998] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 278.908605][T23998] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 278.916584][T23998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6bfd6d4 [ 278.924555][T23998] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000003 03:33:56 executing program 3 (fault-call:8 fault-nth:49): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x5c) 03:33:56 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x243200) 03:33:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:56 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, 0x0, 0xfffffffffffffe33) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000400)) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) mq_open(&(0x7f0000000200)='#\x00', 0x2, 0xc2, &(0x7f0000000240)={0x1c0c, 0x0, 0x9, 0x1ff, 0x4b4, 0x1, 0x7, 0x5}) keyctl$get_persistent(0x16, r4, r5) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r6, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x90}, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000006c0)={0x4, 0x5, 0x9, 'queue1\x00', 0x8001}) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:56 executing program 1: 03:33:56 executing program 1: 03:33:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x243400) 03:33:57 executing program 1: [ 279.475374][T24121] FAULT_INJECTION: forcing a failure. [ 279.475374][T24121] name failslab, interval 1, probability 0, space 0, times 0 [ 279.560347][T24121] CPU: 0 PID: 24121 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 279.568368][T24121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.578517][T24121] Call Trace: [ 279.581833][T24121] dump_stack+0x1d8/0x2f8 [ 279.586172][T24121] should_fail+0x608/0x860 [ 279.590592][T24121] ? setup_fault_attr+0x2b0/0x2b0 [ 279.595631][T24121] __should_failslab+0x11a/0x160 [ 279.600585][T24121] should_failslab+0x9/0x20 [ 279.605096][T24121] kmem_cache_alloc_trace+0x5d/0x2c0 [ 279.610380][T24121] ? __list_lru_init+0x3e3/0x900 [ 279.615320][T24121] __list_lru_init+0x3e3/0x900 [ 279.620097][T24121] alloc_super+0x664/0x740 [ 279.624521][T24121] sget_userns+0x1bf/0x4f0 [ 279.628940][T24121] ? free_anon_bdev+0x30/0x30 [ 279.633623][T24121] mount_nodev+0xe5/0x1c0 [ 279.637950][T24121] ? devpts_kill_sb+0x70/0x70 [ 279.642628][T24121] devpts_mount+0x2c/0x40 [ 279.646957][T24121] legacy_get_tree+0xf9/0x1a0 [ 279.651632][T24121] ? devpts_pty_kill+0xe0/0xe0 [ 279.656407][T24121] vfs_get_tree+0x8f/0x360 [ 279.660842][T24121] do_mount+0x1813/0x2730 [ 279.665182][T24121] ? copy_mount_string+0x30/0x30 [ 279.670128][T24121] ? kasan_check_write+0x14/0x20 [ 279.675066][T24121] ? _copy_from_user+0xe0/0x120 [ 279.679921][T24121] ? copy_mount_options+0xcf/0x360 [ 279.685037][T24121] ksys_mount+0xcc/0x100 [ 279.689291][T24121] __x64_sys_mount+0xbf/0xd0 [ 279.693899][T24121] do_syscall_64+0xfe/0x140 [ 279.698418][T24121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.704492][T24121] RIP: 0033:0x459519 [ 279.708412][T24121] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.728049][T24121] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 279.736497][T24121] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 279.744511][T24121] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 279.752494][T24121] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 279.760481][T24121] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 279.768463][T24121] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:57 executing program 1: 03:33:57 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) pipe2(0x0, 0x800) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x40) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x10) syz_open_dev$admmidi(0x0, 0x0, 0x8000) getrandom(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001540)="c0dca5055e0bcfec7be070") unshare(0x24020400) r1 = socket$packet(0x11, 0x8000000000000003, 0x300) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp\x00') lseek(r2, 0x20400000, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00'}, 0x45c) syz_extract_tcp_res$synack(&(0x7f0000000a40), 0x1, 0x0) 03:33:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x60) 03:33:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:57 executing program 3 (fault-call:8 fault-nth:50): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x243600) 03:33:57 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0x0, 0x1}, 0x18) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x40) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x1d) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x68) 03:33:57 executing program 1: 03:33:57 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x243800) [ 280.271207][T24311] FAULT_INJECTION: forcing a failure. [ 280.271207][T24311] name failslab, interval 1, probability 0, space 0, times 0 03:33:57 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x50002, 0x4) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000180)={0x1, 0x0, 0x102, 0x0, {0x30000000, 0x1, 0x100000000, 0x800}}) r1 = syz_open_dev$usb(0x0, 0xe7, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f0000000000)={0x7fffffff, {{0xa, 0x4e24, 0x4, @rand_addr="56ed9781b48130d66ad6074ef51c6f4b", 0x80}}, {{0xa, 0x4e21, 0x9, @mcast2, 0x8000}}}, 0x108) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:57 executing program 1: 03:33:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 280.426932][T24311] CPU: 0 PID: 24311 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 280.434960][T24311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.445024][T24311] Call Trace: [ 280.448332][T24311] dump_stack+0x1d8/0x2f8 [ 280.452674][T24311] should_fail+0x608/0x860 [ 280.458463][T24311] ? setup_fault_attr+0x2b0/0x2b0 [ 280.463505][T24311] __should_failslab+0x11a/0x160 [ 280.468441][T24311] should_failslab+0x9/0x20 [ 280.472946][T24311] kmem_cache_alloc_trace+0x5d/0x2c0 [ 280.478227][T24311] ? __list_lru_init+0x3e3/0x900 [ 280.483177][T24311] __list_lru_init+0x3e3/0x900 [ 280.487952][T24311] alloc_super+0x664/0x740 [ 280.492376][T24311] sget_userns+0x1bf/0x4f0 [ 280.496800][T24311] ? free_anon_bdev+0x30/0x30 [ 280.501497][T24311] mount_nodev+0xe5/0x1c0 [ 280.505832][T24311] ? devpts_kill_sb+0x70/0x70 [ 280.510514][T24311] devpts_mount+0x2c/0x40 [ 280.514853][T24311] legacy_get_tree+0xf9/0x1a0 [ 280.519531][T24311] ? devpts_pty_kill+0xe0/0xe0 [ 280.524301][T24311] vfs_get_tree+0x8f/0x360 [ 280.528718][T24311] do_mount+0x1813/0x2730 [ 280.533056][T24311] ? copy_mount_string+0x30/0x30 [ 280.538001][T24311] ? kasan_check_write+0x14/0x20 [ 280.542941][T24311] ? _copy_from_user+0xe0/0x120 [ 280.547797][T24311] ? copy_mount_options+0xcf/0x360 [ 280.552949][T24311] ksys_mount+0xcc/0x100 [ 280.557227][T24311] __x64_sys_mount+0xbf/0xd0 [ 280.561834][T24311] do_syscall_64+0xfe/0x140 [ 280.566354][T24311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.572239][T24311] RIP: 0033:0x459519 [ 280.576306][T24311] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.595959][T24311] RSP: 002b:00007f12e6bfcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 280.604373][T24311] RAX: ffffffffffffffda RBX: 00007f12e6bfcc90 RCX: 0000000000459519 [ 280.612346][T24311] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 03:33:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x6c) [ 280.620321][T24311] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 280.628292][T24311] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6bfd6d4 [ 280.636263][T24311] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:58 executing program 1: 03:33:58 executing program 1: 03:33:58 executing program 3 (fault-call:8 fault-nth:51): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x27fe00) 03:33:58 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sysfs$1(0x1, &(0x7f0000000080)='[%@\x00') r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f00000000c0)={{0x20, 0x3f, 0x5, 0x31, 0x6, 0x1}, 0x7}) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000180)) 03:33:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x74) 03:33:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:33:58 executing program 1: syz_mount_image$gfs2(&(0x7f0000000300)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:33:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x2bfe00) [ 281.282898][T24517] gfs2: not a GFS2 filesystem 03:33:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x7a) 03:33:58 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000100)=0xb7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@bcast) ioctl$sock_netdev_private(r0, 0x89f6, &(0x7f0000000040)="ebf2589042bced939c67a37c52ccbff82e32a45353f16928e12a45f0962a4839a9524551a860509095e955ce9318dc886af95262acbe3b4a5de31bda856698cd03257e816456d2ef6e2b2a21a3a35cc43a2a7352db699ae4a47450848ba6e9a0cb42160f6a") bind$inet6(r1, &(0x7f0000000180)={0xa, 0x804e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0x9, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000000c0)={0x4}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000140)=0x8, 0x4) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 281.356405][T24517] gfs2: not a GFS2 filesystem 03:33:59 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xe7, 0xa0000) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000080)) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1000000000054}, 0x98) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000000c0)=0xfffffffffffffe00) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r4, 0x0, 0x2, 0x0) 03:33:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x2ffe00) [ 281.618826][T24639] FAULT_INJECTION: forcing a failure. [ 281.618826][T24639] name failslab, interval 1, probability 0, space 0, times 0 [ 281.753135][T24639] CPU: 0 PID: 24639 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 281.761195][T24639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.771266][T24639] Call Trace: [ 281.774566][T24639] dump_stack+0x1d8/0x2f8 [ 281.778906][T24639] should_fail+0x608/0x860 [ 281.783331][T24639] ? setup_fault_attr+0x2b0/0x2b0 [ 281.788370][T24639] __should_failslab+0x11a/0x160 [ 281.793319][T24639] should_failslab+0x9/0x20 [ 281.797823][T24639] kmem_cache_alloc_trace+0x5d/0x2c0 [ 281.803109][T24639] ? __list_lru_init+0x3e3/0x900 [ 281.808059][T24639] __list_lru_init+0x3e3/0x900 [ 281.812831][T24639] alloc_super+0x664/0x740 [ 281.817249][T24639] sget_userns+0x1bf/0x4f0 [ 281.821652][T24639] ? free_anon_bdev+0x30/0x30 [ 281.826328][T24639] mount_nodev+0xe5/0x1c0 [ 281.830644][T24639] ? devpts_kill_sb+0x70/0x70 [ 281.835313][T24639] devpts_mount+0x2c/0x40 [ 281.839645][T24639] legacy_get_tree+0xf9/0x1a0 [ 281.844315][T24639] ? devpts_pty_kill+0xe0/0xe0 [ 281.849076][T24639] vfs_get_tree+0x8f/0x360 [ 281.853481][T24639] do_mount+0x1813/0x2730 [ 281.857800][T24639] ? copy_mount_string+0x30/0x30 [ 281.862746][T24639] ? kasan_check_write+0x14/0x20 [ 281.867670][T24639] ? _copy_from_user+0xe0/0x120 [ 281.872514][T24639] ? copy_mount_options+0xcf/0x360 [ 281.877616][T24639] ksys_mount+0xcc/0x100 [ 281.881853][T24639] __x64_sys_mount+0xbf/0xd0 [ 281.886435][T24639] do_syscall_64+0xfe/0x140 [ 281.890935][T24639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.896833][T24639] RIP: 0033:0x459519 [ 281.900722][T24639] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.920325][T24639] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 281.928834][T24639] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 281.936795][T24639] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 281.944764][T24639] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:33:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 281.952727][T24639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 281.960698][T24639] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:33:59 executing program 3 (fault-call:8 fault-nth:52): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:33:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x300) 03:33:59 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x8400) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:33:59 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x33fe00) 03:33:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfec7be070") close(r0) 03:34:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 282.469635][T24763] FAULT_INJECTION: forcing a failure. [ 282.469635][T24763] name failslab, interval 1, probability 0, space 0, times 0 03:34:00 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, &(0x7f0000000200)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000006c0)={{}, {0x1, 0x4}, [{}], {0x4, 0x4}, [{0x8, 0x6}], {}, {0x20, 0x4}}, 0x34, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='ceph\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="85916cfdacd721879915b5bca7d979ee84d595c2fe332e117ea0c3facd872b631d4c0ff1df4cd5d48cbf755ddb7886bcb1cf657b9d56bb067e2ceec8d67b9fdf7b4f2752198348146e7ecfa6d3e36af869b230", 0x53, 0xfffffffffffffffa) r1 = request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='lowerdir', 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000540)={r0, r1}, &(0x7f0000000740)=""/174, 0xae, &(0x7f0000000640)={&(0x7f0000000580)={'sha512-generic\x00'}, &(0x7f00000005c0)="ebe9e8fbd6322dc5194a07a84ad38dd1da60f0ecc381f88d81bbe29cf71edcb6f9446485449f14f5d468f99e7dd2", 0x2e}) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 03:34:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x500) 03:34:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x37fe00) [ 282.624850][T24763] CPU: 0 PID: 24763 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 282.632866][T24763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.642926][T24763] Call Trace: [ 282.646229][T24763] dump_stack+0x1d8/0x2f8 [ 282.650566][T24763] should_fail+0x608/0x860 [ 282.654989][T24763] ? setup_fault_attr+0x2b0/0x2b0 [ 282.660029][T24763] __should_failslab+0x11a/0x160 [ 282.664971][T24763] should_failslab+0x9/0x20 [ 282.669470][T24763] kmem_cache_alloc_trace+0x5d/0x2c0 [ 282.674757][T24763] ? __list_lru_init+0x3e3/0x900 [ 282.679701][T24763] __list_lru_init+0x3e3/0x900 [ 282.684473][T24763] alloc_super+0x664/0x740 [ 282.688895][T24763] sget_userns+0x1bf/0x4f0 [ 282.693310][T24763] ? free_anon_bdev+0x30/0x30 [ 282.697988][T24763] mount_nodev+0xe5/0x1c0 [ 282.702315][T24763] ? devpts_kill_sb+0x70/0x70 [ 282.707001][T24763] devpts_mount+0x2c/0x40 [ 282.711336][T24763] legacy_get_tree+0xf9/0x1a0 [ 282.716015][T24763] ? devpts_pty_kill+0xe0/0xe0 [ 282.720877][T24763] vfs_get_tree+0x8f/0x360 [ 282.725304][T24763] do_mount+0x1813/0x2730 [ 282.729643][T24763] ? copy_mount_string+0x30/0x30 [ 282.734591][T24763] ? kasan_check_write+0x14/0x20 [ 282.739536][T24763] ? _copy_from_user+0xe0/0x120 [ 282.744392][T24763] ? copy_mount_options+0xcf/0x360 [ 282.749498][T24763] ksys_mount+0xcc/0x100 [ 282.753750][T24763] __x64_sys_mount+0xbf/0xd0 [ 282.758348][T24763] do_syscall_64+0xfe/0x140 [ 282.762859][T24763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.768757][T24763] RIP: 0033:0x459519 [ 282.772652][T24763] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.792268][T24763] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 282.800682][T24763] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 282.808645][T24763] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 282.816622][T24763] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:34:00 executing program 0: r0 = syz_open_dev$usb(0x0, 0x82, 0xffffffffffffffff) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x6) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000000)) r4 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 282.824594][T24763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 282.832555][T24763] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x3bfe00) 03:34:00 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x50002, 0x4) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000180)={0x1, 0x0, 0x102, 0x0, {0x30000000, 0x1, 0x100000000, 0x800}}) r1 = syz_open_dev$usb(0x0, 0xe7, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f0000000000)={0x7fffffff, {{0xa, 0x4e24, 0x4, @rand_addr="56ed9781b48130d66ad6074ef51c6f4b", 0x80}}, {{0xa, 0x4e21, 0x9, @mcast2, 0x8000}}}, 0x108) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r2, 0x0, 0x0, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 283.028067][T24900] overlayfs: filesystem on './file0' not supported as upperdir 03:34:00 executing program 3 (fault-call:8 fault-nth:53): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 03:34:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x600) 03:34:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x3ffe00) [ 283.288768][T24918] FAULT_INJECTION: forcing a failure. [ 283.288768][T24918] name failslab, interval 1, probability 0, space 0, times 0 [ 283.361431][T24918] CPU: 1 PID: 24918 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 283.369467][T24918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.379699][T24918] Call Trace: [ 283.383004][T24918] dump_stack+0x1d8/0x2f8 [ 283.387346][T24918] should_fail+0x608/0x860 [ 283.391769][T24918] ? setup_fault_attr+0x2b0/0x2b0 [ 283.396829][T24918] __should_failslab+0x11a/0x160 [ 283.401772][T24918] should_failslab+0x9/0x20 [ 283.406274][T24918] kmem_cache_alloc_trace+0x5d/0x2c0 [ 283.411556][T24918] ? __list_lru_init+0x3e3/0x900 [ 283.416493][T24918] __list_lru_init+0x3e3/0x900 [ 283.421265][T24918] alloc_super+0x664/0x740 [ 283.425680][T24918] sget_userns+0x1bf/0x4f0 [ 283.430091][T24918] ? free_anon_bdev+0x30/0x30 [ 283.434769][T24918] mount_nodev+0xe5/0x1c0 [ 283.439097][T24918] ? devpts_kill_sb+0x70/0x70 [ 283.443772][T24918] devpts_mount+0x2c/0x40 [ 283.448103][T24918] legacy_get_tree+0xf9/0x1a0 [ 283.452773][T24918] ? devpts_pty_kill+0xe0/0xe0 [ 283.457543][T24918] vfs_get_tree+0x8f/0x360 [ 283.461964][T24918] do_mount+0x1813/0x2730 [ 283.466300][T24918] ? copy_mount_string+0x30/0x30 [ 283.471253][T24918] ? kasan_check_write+0x14/0x20 [ 283.476188][T24918] ? _copy_from_user+0xe0/0x120 [ 283.481039][T24918] ? copy_mount_options+0xcf/0x360 [ 283.486148][T24918] ksys_mount+0xcc/0x100 [ 283.490392][T24918] __x64_sys_mount+0xbf/0xd0 [ 283.494987][T24918] do_syscall_64+0xfe/0x140 [ 283.499495][T24918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.505386][T24918] RIP: 0033:0x459519 [ 283.509278][T24918] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.528886][T24918] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 283.537313][T24918] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 283.545293][T24918] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 283.553269][T24918] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.561235][T24918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 283.569222][T24918] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x700) 03:34:01 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r0, 0x0, 0xd, &(0x7f0000000000)=' {[$#em1ppp1\x00', 0xffffffffffffffff}, 0x30) setpriority(0x2, r3, 0x8) r4 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:01 executing program 3 (fault-call:8 fault-nth:54): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400001) 03:34:01 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0xff, 0xff}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) [ 283.878597][T25035] FAULT_INJECTION: forcing a failure. [ 283.878597][T25035] name failslab, interval 1, probability 0, space 0, times 0 03:34:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x900) [ 283.982582][T25035] CPU: 0 PID: 25035 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 283.990713][T25035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.000771][T25035] Call Trace: [ 284.004104][T25035] dump_stack+0x1d8/0x2f8 [ 284.008444][T25035] should_fail+0x608/0x860 [ 284.013035][T25035] ? setup_fault_attr+0x2b0/0x2b0 [ 284.018063][T25035] __should_failslab+0x11a/0x160 [ 284.022998][T25035] should_failslab+0x9/0x20 [ 284.027516][T25035] kmem_cache_alloc_trace+0x5d/0x2c0 [ 284.032792][T25035] ? __list_lru_init+0x3e3/0x900 [ 284.037738][T25035] __list_lru_init+0x3e3/0x900 [ 284.042504][T25035] alloc_super+0x664/0x740 [ 284.046908][T25035] sget_userns+0x1bf/0x4f0 [ 284.051312][T25035] ? free_anon_bdev+0x30/0x30 [ 284.055983][T25035] mount_nodev+0xe5/0x1c0 [ 284.060301][T25035] ? devpts_kill_sb+0x70/0x70 [ 284.064972][T25035] devpts_mount+0x2c/0x40 [ 284.069290][T25035] legacy_get_tree+0xf9/0x1a0 [ 284.073955][T25035] ? devpts_pty_kill+0xe0/0xe0 [ 284.078712][T25035] vfs_get_tree+0x8f/0x360 [ 284.083128][T25035] do_mount+0x1813/0x2730 [ 284.090239][T25035] ? copy_mount_string+0x30/0x30 [ 284.095172][T25035] ? kasan_check_write+0x14/0x20 [ 284.100101][T25035] ? _copy_from_user+0xe0/0x120 [ 284.104943][T25035] ? copy_mount_options+0xcf/0x360 [ 284.112931][T25035] ksys_mount+0xcc/0x100 [ 284.117189][T25035] __x64_sys_mount+0xbf/0xd0 [ 284.121782][T25035] do_syscall_64+0xfe/0x140 [ 284.126279][T25035] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.132189][T25035] RIP: 0033:0x459519 [ 284.136083][T25035] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.155803][T25035] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 284.164222][T25035] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 284.172192][T25035] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 03:34:01 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400002) [ 284.180335][T25035] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.188309][T25035] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 284.196283][T25035] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 03:34:01 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{0x77359400}, {r2, r3+10000000}}, &(0x7f00000000c0)) finit_module(r0, &(0x7f0000000000)='eth0vmnet1cpuset\x00', 0x1) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r1, 0x0, 0x0, 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xa00) 03:34:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400003) 03:34:02 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) getsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) fanotify_mark(r0, 0x2, 0x20, r0, &(0x7f0000000100)='./file0\x00') ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0xffffffffffffffe4, 0x200, 0x2, 0x8, r2}, &(0x7f00000000c0)=0x10) listen(r1, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:02 executing program 3 (fault-call:8 fault-nth:55): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) [ 284.686216][T25117] FAULT_INJECTION: forcing a failure. [ 284.686216][T25117] name failslab, interval 1, probability 0, space 0, times 0 [ 284.767922][T25117] CPU: 0 PID: 25117 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 284.775946][T25117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.786023][T25117] Call Trace: [ 284.789334][T25117] dump_stack+0x1d8/0x2f8 [ 284.793676][T25117] should_fail+0x608/0x860 [ 284.798104][T25117] ? setup_fault_attr+0x2b0/0x2b0 [ 284.803184][T25117] __should_failslab+0x11a/0x160 [ 284.808132][T25117] should_failslab+0x9/0x20 [ 284.812651][T25117] kmem_cache_alloc_trace+0x5d/0x2c0 [ 284.817945][T25117] ? __list_lru_init+0x3e3/0x900 [ 284.822913][T25117] __list_lru_init+0x3e3/0x900 [ 284.827724][T25117] alloc_super+0x664/0x740 [ 284.832157][T25117] sget_userns+0x1bf/0x4f0 [ 284.836584][T25117] ? free_anon_bdev+0x30/0x30 [ 284.841319][T25117] mount_nodev+0xe5/0x1c0 [ 284.845663][T25117] ? devpts_kill_sb+0x70/0x70 [ 284.850347][T25117] devpts_mount+0x2c/0x40 [ 284.854678][T25117] legacy_get_tree+0xf9/0x1a0 [ 284.859351][T25117] ? devpts_pty_kill+0xe0/0xe0 [ 284.864118][T25117] vfs_get_tree+0x8f/0x360 [ 284.868535][T25117] do_mount+0x1813/0x2730 [ 284.872875][T25117] ? copy_mount_string+0x30/0x30 [ 284.877833][T25117] ? kasan_check_write+0x14/0x20 [ 284.882773][T25117] ? _copy_from_user+0xe0/0x120 [ 284.887623][T25117] ? copy_mount_options+0xcf/0x360 [ 284.892736][T25117] ksys_mount+0xcc/0x100 [ 284.896980][T25117] __x64_sys_mount+0xbf/0xd0 [ 284.901596][T25117] do_syscall_64+0xfe/0x140 [ 284.906103][T25117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.911996][T25117] RIP: 0033:0x459519 [ 284.915891][T25117] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.935500][T25117] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 284.943918][T25117] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 284.951890][T25117] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 284.959864][T25117] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.967840][T25117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 284.975812][T25117] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xb00) 03:34:02 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400004) 03:34:02 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) getsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) fanotify_mark(r0, 0x2, 0x20, r0, &(0x7f0000000100)='./file0\x00') ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0xffffffffffffffe4, 0x200, 0x2, 0x8, r2}, &(0x7f00000000c0)=0x10) listen(r1, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:02 executing program 4: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={r1, 0x9}, &(0x7f00000000c0)=0x8) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) uselib(&(0x7f0000000000)='./file0\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:02 executing program 0: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000000)={0x4, 0x3, 'client1\x00', 0xc7bbc2a4387473de, "d8033c93fff6ecf6", "16a6d46b6d0228db7c8d95785794fbcbb9557ec5feca2bbadcec9098f92a8470", 0x5, 0x9}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$LOOP_CLR_FD(r0, 0x4c01) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000000c0)={0x2db3fcc8, 0x9, 0x2724027d, 0x3, 0xd, 0x0, 0x3f, 0x201, 0x400, 0x9}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xc00) 03:34:03 executing program 3 (fault-call:8 fault-nth:56): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400005) [ 285.683851][T25304] FAULT_INJECTION: forcing a failure. [ 285.683851][T25304] name failslab, interval 1, probability 0, space 0, times 0 [ 285.696799][T25304] CPU: 0 PID: 25304 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 285.704789][T25304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.714848][T25304] Call Trace: [ 285.718146][T25304] dump_stack+0x1d8/0x2f8 [ 285.722473][T25304] should_fail+0x608/0x860 [ 285.726882][T25304] ? setup_fault_attr+0x2b0/0x2b0 [ 285.731926][T25304] __should_failslab+0x11a/0x160 [ 285.736881][T25304] should_failslab+0x9/0x20 [ 285.741377][T25304] kmem_cache_alloc_trace+0x5d/0x2c0 [ 285.746662][T25304] ? __list_lru_init+0x3e3/0x900 [ 285.751594][T25304] __list_lru_init+0x3e3/0x900 [ 285.756362][T25304] alloc_super+0x664/0x740 [ 285.760784][T25304] sget_userns+0x1bf/0x4f0 [ 285.765190][T25304] ? free_anon_bdev+0x30/0x30 [ 285.769863][T25304] mount_nodev+0xe5/0x1c0 [ 285.774188][T25304] ? devpts_kill_sb+0x70/0x70 [ 285.778870][T25304] devpts_mount+0x2c/0x40 [ 285.783219][T25304] legacy_get_tree+0xf9/0x1a0 [ 285.787886][T25304] ? devpts_pty_kill+0xe0/0xe0 [ 285.792645][T25304] vfs_get_tree+0x8f/0x360 [ 285.797094][T25304] do_mount+0x1813/0x2730 [ 285.801420][T25304] ? copy_mount_string+0x30/0x30 [ 285.806356][T25304] ? kasan_check_write+0x14/0x20 [ 285.811284][T25304] ? _copy_from_user+0xe0/0x120 [ 285.816139][T25304] ? copy_mount_options+0xcf/0x360 [ 285.821259][T25304] ksys_mount+0xcc/0x100 [ 285.825495][T25304] __x64_sys_mount+0xbf/0xd0 [ 285.830079][T25304] do_syscall_64+0xfe/0x140 [ 285.834577][T25304] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.840460][T25304] RIP: 0033:0x459519 [ 285.844341][T25304] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.863944][T25304] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 285.872349][T25304] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 285.880322][T25304] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 285.888282][T25304] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.896416][T25304] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 285.904377][T25304] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xd00) 03:34:03 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) getsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) fanotify_mark(r0, 0x2, 0x20, r0, &(0x7f0000000100)='./file0\x00') ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0xffffffffffffffe4, 0x200, 0x2, 0x8, r2}, &(0x7f00000000c0)=0x10) listen(r1, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:03 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400006) 03:34:03 executing program 4: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={r1, 0x9}, &(0x7f00000000c0)=0x8) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) uselib(&(0x7f0000000000)='./file0\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:03 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000300)='/dev/bus/usb/00#/00#\x00', 0x4, 0x200) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r1 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, 0x0) r2 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0xbc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x0, 0xfffffffffffffe00, 0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0xffffffffffffffff}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x5, 0x84) listen(r3, 0x8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000080)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000000180)=0xe8) fstat(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x40000, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@uname={'uname'}}, {@cache_mmap='cache=mmap'}, {@access_uid={'access', 0x3d, r4}}, {@dfltuid={'dfltuid', 0x3d, r5}}, {@cache_fscache='cache=fscache'}, {@uname={'uname', 0x3d, '.-\'\\mime_typecgroup'}}, {@dfltgid={'dfltgid', 0x3d, r6}}, {@aname={'aname'}}, {@loose='loose'}], [{@subj_role={'subj_role', 0x3d, 'mime_type.'}}, {@subj_user={'subj_user'}}, {@subj_user={'subj_user', 0x3d, '(ppp0bdevcpuset'}}]}}) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000540)) r8 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0xe00) 03:34:04 executing program 3 (fault-call:8 fault-nth:57): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400009) 03:34:04 executing program 1: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x1100) [ 286.874436][T25414] FAULT_INJECTION: forcing a failure. [ 286.874436][T25414] name failslab, interval 1, probability 0, space 0, times 0 [ 286.966102][T25414] CPU: 1 PID: 25414 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 286.974123][T25414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.984215][T25414] Call Trace: [ 286.987519][T25414] dump_stack+0x1d8/0x2f8 [ 286.991885][T25414] should_fail+0x608/0x860 [ 286.996313][T25414] ? setup_fault_attr+0x2b0/0x2b0 [ 287.001361][T25414] __should_failslab+0x11a/0x160 [ 287.006305][T25414] should_failslab+0x9/0x20 [ 287.010815][T25414] kmem_cache_alloc_trace+0x5d/0x2c0 [ 287.016101][T25414] ? __list_lru_init+0x3e3/0x900 [ 287.021044][T25414] __list_lru_init+0x3e3/0x900 [ 287.025848][T25414] alloc_super+0x664/0x740 [ 287.030267][T25414] sget_userns+0x1bf/0x4f0 [ 287.034680][T25414] ? free_anon_bdev+0x30/0x30 [ 287.039359][T25414] mount_nodev+0xe5/0x1c0 [ 287.043685][T25414] ? devpts_kill_sb+0x70/0x70 [ 287.048367][T25414] devpts_mount+0x2c/0x40 [ 287.052700][T25414] legacy_get_tree+0xf9/0x1a0 [ 287.057375][T25414] ? devpts_pty_kill+0xe0/0xe0 [ 287.062143][T25414] vfs_get_tree+0x8f/0x360 [ 287.064438][T25447] FAULT_INJECTION: forcing a failure. [ 287.064438][T25447] name failslab, interval 1, probability 0, space 0, times 0 [ 287.066561][T25414] do_mount+0x1813/0x2730 [ 287.066579][T25414] ? copy_mount_string+0x30/0x30 [ 287.066600][T25414] ? kasan_check_write+0x14/0x20 [ 287.066619][T25414] ? _copy_from_user+0xe0/0x120 [ 287.098275][T25414] ? copy_mount_options+0xcf/0x360 [ 287.103407][T25414] ksys_mount+0xcc/0x100 [ 287.107657][T25414] __x64_sys_mount+0xbf/0xd0 [ 287.112275][T25414] do_syscall_64+0xfe/0x140 [ 287.116781][T25414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.122686][T25414] RIP: 0033:0x459519 [ 287.126583][T25414] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.146196][T25414] RSP: 002b:00007f12e6bfcc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 287.154647][T25414] RAX: ffffffffffffffda RBX: 00007f12e6bfcc90 RCX: 0000000000459519 03:34:04 executing program 0 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 287.162628][T25414] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 287.170602][T25414] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 287.178575][T25414] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6bfd6d4 [ 287.186559][T25414] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 287.194576][T25447] CPU: 0 PID: 25447 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 287.202561][T25447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.202567][T25447] Call Trace: [ 287.202588][T25447] dump_stack+0x1d8/0x2f8 [ 287.202603][T25447] should_fail+0x608/0x860 [ 287.202616][T25447] ? setup_fault_attr+0x2b0/0x2b0 [ 287.202637][T25447] __should_failslab+0x11a/0x160 [ 287.234631][T25447] should_failslab+0x9/0x20 [ 287.239126][T25447] kmem_cache_alloc_node+0x65/0x270 [ 287.244317][T25447] ? copy_process+0x599/0x5c80 [ 287.249075][T25447] ? _raw_spin_unlock_irq+0x5f/0x80 [ 287.254280][T25447] copy_process+0x599/0x5c80 [ 287.258907][T25447] ? fsnotify+0x14b9/0x1580 [ 287.263409][T25447] ? fork_idle+0x1b0/0x1b0 [ 287.267824][T25447] ? kasan_check_write+0x14/0x20 [ 287.272752][T25447] ? __mutex_unlock_slowpath+0x18c/0x630 [ 287.278383][T25447] _do_fork+0x180/0x5f0 [ 287.282562][T25447] ? dup_mm+0x340/0x340 [ 287.286728][T25447] ? debug_smp_processor_id+0x1c/0x20 [ 287.292095][T25447] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 287.298157][T25447] ? check_preemption_disabled+0xb7/0x280 [ 287.303897][T25447] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 287.309608][T25447] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 287.315065][T25447] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 287.320880][T25447] __x64_sys_clone+0xc1/0xd0 [ 287.326995][T25447] do_syscall_64+0xfe/0x140 [ 287.331498][T25447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.337394][T25447] RIP: 0033:0x459519 [ 287.341289][T25447] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.360910][T25447] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 287.369327][T25447] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 287.377299][T25447] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 287.385269][T25447] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 287.393237][T25447] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 287.401201][T25447] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:05 executing program 4: r0 = syz_open_dev$usb(0x0, 0xe7, 0x0) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x1000, "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"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={r1, 0x9}, &(0x7f00000000c0)=0x8) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0x8) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) uselib(&(0x7f0000000000)='./file0\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x98) 03:34:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x40000b) 03:34:05 executing program 1: syz_read_part_table(0x8, 0xb3, &(0x7f00000000c0)=[{&(0x7f0000000000)="45f0af4ed4635425060592c7f3e89f14aecfac9bdbdf855d1a81cf61f8f89d856ec691d40b234f94f0ee63f7c82acd18e3c7e9bb7443110e8e5c8284019c6330896addd5211782dfa4e2e7e266a28947a215520b", 0x0, 0x6}]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_mems\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x8, @loopback, 0x7}, {0xa, 0x4e22, 0xc315, @remote, 0x5}, r1, 0xbf}}, 0x48) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat6\x00') fcntl$dupfd(r2, 0x2, r2) 03:34:05 executing program 0 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x1200) [ 287.881902][T25541] FAULT_INJECTION: forcing a failure. [ 287.881902][T25541] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 287.901372][T25541] CPU: 1 PID: 25541 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 287.909368][T25541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.919427][T25541] Call Trace: [ 287.922728][T25541] dump_stack+0x1d8/0x2f8 [ 287.927068][T25541] should_fail+0x608/0x860 [ 287.931488][T25541] ? setup_fault_attr+0x2b0/0x2b0 [ 287.936530][T25541] should_fail_alloc_page+0x55/0x60 [ 287.941734][T25541] prepare_alloc_pages+0x283/0x460 [ 287.946848][T25541] __alloc_pages_nodemask+0x11c/0x790 [ 287.952338][T25541] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 287.957921][T25541] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 287.963651][T25541] ? copy_process+0x599/0x5c80 [ 287.968422][T25541] copy_process+0x613/0x5c80 [ 287.973032][T25541] ? fsnotify+0x14b9/0x1580 [ 287.977544][T25541] ? fork_idle+0x1b0/0x1b0 [ 287.981976][T25541] ? kasan_check_write+0x14/0x20 [ 287.986911][T25541] ? __mutex_unlock_slowpath+0x18c/0x630 [ 287.992549][T25541] _do_fork+0x180/0x5f0 [ 287.996707][T25541] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 288.002173][T25541] ? dup_mm+0x340/0x340 [ 288.006334][T25541] ? trace_hardirqs_on_caller+0x74/0x80 [ 288.011888][T25541] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 288.017359][T25541] ? rcu_irq_exit+0x118/0x2b0 [ 288.022180][T25541] ? retint_kernel+0x2b/0x2b [ 288.026781][T25541] __x64_sys_clone+0xc1/0xd0 [ 288.031381][T25541] do_syscall_64+0xfe/0x140 [ 288.036014][T25541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.042094][T25541] RIP: 0033:0x459519 [ 288.045985][T25541] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.065599][T25541] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 288.074022][T25541] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 03:34:05 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x40000c) 03:34:05 executing program 3 (fault-call:8 fault-nth:58): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) [ 288.081998][T25541] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 288.089997][T25541] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 288.097969][T25541] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 288.105941][T25541] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpgrp(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETGROUP(r2, 0x400454ce, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 03:34:05 executing program 0 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 288.296225][T25613] FAULT_INJECTION: forcing a failure. [ 288.296225][T25613] name failslab, interval 1, probability 0, space 0, times 0 [ 288.390339][T25613] CPU: 0 PID: 25613 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 288.398374][T25613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.408432][T25613] Call Trace: [ 288.411728][T25613] dump_stack+0x1d8/0x2f8 [ 288.411746][T25613] should_fail+0x608/0x860 [ 288.411761][T25613] ? setup_fault_attr+0x2b0/0x2b0 [ 288.411786][T25613] __should_failslab+0x11a/0x160 [ 288.411825][T25613] should_failslab+0x9/0x20 [ 288.411837][T25613] kmem_cache_alloc_trace+0x5d/0x2c0 [ 288.411848][T25613] ? __list_lru_init+0x3e3/0x900 [ 288.411861][T25613] __list_lru_init+0x3e3/0x900 [ 288.411881][T25613] alloc_super+0x664/0x740 [ 288.411896][T25613] sget_userns+0x1bf/0x4f0 [ 288.460653][T25613] ? free_anon_bdev+0x30/0x30 [ 288.465341][T25613] mount_nodev+0xe5/0x1c0 [ 288.469664][T25613] ? devpts_kill_sb+0x70/0x70 [ 288.474341][T25613] devpts_mount+0x2c/0x40 [ 288.478670][T25613] legacy_get_tree+0xf9/0x1a0 [ 288.483346][T25613] ? devpts_pty_kill+0xe0/0xe0 03:34:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x40000d) [ 288.488114][T25613] vfs_get_tree+0x8f/0x360 [ 288.492531][T25613] do_mount+0x1813/0x2730 [ 288.496868][T25613] ? copy_mount_string+0x30/0x30 [ 288.501855][T25613] ? kasan_check_write+0x14/0x20 [ 288.506833][T25613] ? _copy_from_user+0xe0/0x120 [ 288.511688][T25613] ? copy_mount_options+0xcf/0x360 [ 288.516800][T25613] ksys_mount+0xcc/0x100 [ 288.521045][T25613] __x64_sys_mount+0xbf/0xd0 [ 288.521063][T25613] do_syscall_64+0xfe/0x140 [ 288.521081][T25613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.521091][T25613] RIP: 0033:0x459519 03:34:06 executing program 4: syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x6, &(0x7f0000000580)=[{&(0x7f0000000240)="19a33606bd4b4e84da54e912cfba965aeabb1f1ae3ce989273e763a4cc82ab3c2a438f90e450762b464658ec434084f593d107cc0b6149104cf91bafc551eea473d815b8fdc318c467703ffa1bcc4046c7e8a99ef8a0b2bc1ffca2b9334f38ab371a9744da8adacca7cc47cee8933e37a0533b80724a8537be958666e6d6c5cb0af48517e68b84fdbc127e283e92c7aeab3c082dab2349f6f983a344542eafa9c6c50c631577b902c84d01fee255346472b5e78d5fdad83f9eebec1095f95be7dfb9865ff37ae63eccb24600456b3025d222e8932f8c", 0xd6, 0x5836b1d}, {&(0x7f0000000340)="596690ca48dc4772120897799e26d4364f0a9a38f30c8ebfe0b0f029e4be09b3ee1320d0b37217edcdbb9571816e1b390702de1d520700f46e772af9e132f3311fc81a3db0ee1743e2c9bd7636bf4aacfc7c10c38d8e52e489532ed68242c359de991816878027c7be7f7b43957484a4ae723346e11e676c3552689912d5be6cb56d6bc1cf3119b6", 0x88, 0x798}, {&(0x7f00000000c0)="5d47b655ecd163c9b2170c3a3f16", 0xe, 0x4}, {&(0x7f0000000400)="1e660600a952c4f0b90a987d06342af676da70af4d116d80daf79fef97137d32e9a62047f48e9ec77780fa3840cc407746244626a1aee432571c623dbcf49f1173be42956b40d97995b5791082763fb91bd7b777ef08d011e009", 0x5a, 0x5}, {&(0x7f0000000100)="a85518ac808b28f1e8501073dc6f9bceae1af31e0ae093e5ba31fcfb2da7d8e4c50cd7912e4e0f3f0dd8bd6b3f5d9ffbb8f087956058b56e3c", 0x39, 0x8}, {&(0x7f0000000480)="f5fc18ecf117338f45654a0e573fd3a306830e393574fa2609a46dc3e0989eda4fd64631904681a86e1b24ad1ef2b706bbc166b0f26b8d28dab42f7f9466f8bb55482223306dbf7a8bd0513a5961a50019ad59ebf6966c6f8fc0f2aebee19c32294f0cf29b01cd111e97b1595899f5543a15cb5298f737c8cec396411ef99266b5d48b7c8e583568839697904ad09d2e8c5f54962d39d6e20ec4d4c21b99e7448df22ebae0e58486939cd488422c5da6f924296b300ce36e1bcd609c0773fccb9afff50ab7b77c4de83781e849eda123dceda9475c2952edfe4c65872cdf37e8cfadfd48526e5348cc4890d7d46d46c3d0d6a1d1ed152dc8c56ccb3751", 0xfd, 0x2}], 0x80008, &(0x7f00000001c0)='/dev/zero\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet6_mtu(r0, 0x29, 0x31, 0x0, &(0x7f0000000200)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) [ 288.521102][T25613] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.521107][T25613] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 288.521117][T25613] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 288.521123][T25613] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 03:34:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x2000) [ 288.521130][T25613] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 288.521136][T25613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 288.521142][T25613] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 288.646581][T25625] FAULT_INJECTION: forcing a failure. [ 288.646581][T25625] name failslab, interval 1, probability 0, space 0, times 0 [ 288.687034][T25625] CPU: 1 PID: 25625 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 288.695063][T25625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.695075][T25625] Call Trace: [ 288.708448][T25625] dump_stack+0x1d8/0x2f8 [ 288.712786][T25625] should_fail+0x608/0x860 [ 288.712802][T25625] ? setup_fault_attr+0x2b0/0x2b0 [ 288.712822][T25625] __should_failslab+0x11a/0x160 [ 288.712841][T25625] ? prepare_creds+0x3e/0x370 [ 288.731901][T25625] should_failslab+0x9/0x20 [ 288.736417][T25625] kmem_cache_alloc+0x56/0x2b0 [ 288.741232][T25625] prepare_creds+0x3e/0x370 [ 288.745748][T25625] copy_creds+0xf3/0x600 [ 288.750004][T25625] copy_process+0xdac/0x5c80 [ 288.754620][T25625] ? retint_kernel+0x2b/0x2b [ 288.759219][T25625] ? trace_hardirqs_on_caller+0x74/0x80 [ 288.764781][T25625] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 288.770262][T25625] ? fork_idle+0x1b0/0x1b0 [ 288.770281][T25625] ? kasan_check_write+0x14/0x20 [ 288.770292][T25625] ? __mutex_unlock_slowpath+0x18c/0x630 [ 288.770305][T25625] _do_fork+0x180/0x5f0 [ 288.770330][T25625] ? dup_mm+0x340/0x340 [ 288.793665][T25625] ? debug_smp_processor_id+0x1c/0x20 [ 288.799046][T25625] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 288.805130][T25625] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 288.810878][T25625] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 288.816362][T25625] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 288.822182][T25625] __x64_sys_clone+0xc1/0xd0 [ 288.826785][T25625] do_syscall_64+0xfe/0x140 [ 288.831336][T25625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.837230][T25625] RIP: 0033:0x459519 [ 288.841150][T25625] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.860763][T25625] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 288.869264][T25625] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 288.869271][T25625] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc 03:34:06 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000a00)='/dev/radio#\x00', 0x1, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") syz_emit_ethernet(0x46, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @initdev, {[@timestamp={0x44, 0x4}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000a80)={&(0x7f0000000a40)=[0x0, 0x0, 0x0], 0x3}) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000d40)={0xd47, 0x84}) r2 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@l2, &(0x7f0000000040)=0x80) sendto$inet(r2, &(0x7f0000000300)="87c9d7238faa414269eba083803c10c6258658268f355f5aabaa37ad38d98060b4d3b55961c61d9be63b020977608666c8b91d6e9e514cc5ead6ef5767c26386a6baf4aaadd8583905f06c0c8a18076b4b0d400a3af41ffc4f2c8bac5d319c4ac3adface7b3021c5ed0698d395c7fde9d63b494d0777379173edd8ce95667cd6474423e137e623a1d2e7378c32c8a3265c2ff64fab2d85c56fab0a058576e5e004066541", 0xa4, 0x1000000000010, &(0x7f0000000280)={0x2, 0x4e22, @broadcast}, 0x10) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r4, 0x0, 0x2, 0x4}}, 0x20) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x7a04, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b00)={0x0, r0, 0x0, 0x18, &(0x7f0000000ac0)='/dev/infiniband/rdma_cm\x00'}, 0x30) get_robust_list(r5, &(0x7f0000000c80)=&(0x7f0000000c40)={&(0x7f0000000b80)={&(0x7f0000000b40)}, 0x0, &(0x7f0000000c00)={&(0x7f0000000bc0)}}, &(0x7f0000000cc0)=0x18) openat$vsock(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/vsock\x00', 0x101000, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', 0x0, 0x20, 0x0) write$binfmt_elf64(r2, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0x7d, 0x1c43, 0x800, 0x100000001, 0x1000, 0x3, 0x3e, 0xe425, 0x288, 0x40, 0x369, 0x7fff, 0x10001, 0x38, 0x1, 0x9b23, 0xd2, 0x64f}, [{0x7474e555, 0x8, 0x3, 0x6, 0xe5, 0x9c, 0x3, 0xffffffffffffb3b0}, {0x2, 0x7ff, 0x6, 0x1, 0x6, 0x0, 0x18, 0x8}], "8568186503aa62a798", [[], [], [], [], []]}, 0x5b9) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r6, 0xae03, 0x7) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0)=0x10001, 0x4) 03:34:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400010) [ 288.869278][T25625] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 288.869284][T25625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 288.869296][T25625] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:06 executing program 3 (fault-call:8 fault-nth:59): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:06 executing program 0 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400012) 03:34:06 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x8200) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0xfddcc6f04937db9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x19d) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000080)=0x7fffffff) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000001d0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 03:34:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x2500) [ 289.107592][T25787] FAULT_INJECTION: forcing a failure. [ 289.107592][T25787] name failslab, interval 1, probability 0, space 0, times 0 03:34:06 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000c2) [ 289.207983][T25751] EXT4-fs (sda1): re-mounted. Opts: (null) [ 289.214465][T25787] CPU: 1 PID: 25787 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 289.222484][T25787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.232545][T25787] Call Trace: [ 289.235849][T25787] dump_stack+0x1d8/0x2f8 [ 289.240280][T25787] should_fail+0x608/0x860 [ 289.244721][T25787] ? setup_fault_attr+0x2b0/0x2b0 [ 289.249773][T25787] __should_failslab+0x11a/0x160 [ 289.254721][T25787] should_failslab+0x9/0x20 [ 289.259240][T25787] kmem_cache_alloc_trace+0x5d/0x2c0 [ 289.264521][T25787] ? devpts_fill_super+0x134/0x940 [ 289.264534][T25787] devpts_fill_super+0x134/0x940 [ 289.264544][T25787] ? sget_userns+0x4bd/0x4f0 [ 289.264552][T25787] ? free_anon_bdev+0x30/0x30 [ 289.264566][T25787] mount_nodev+0x10f/0x1c0 [ 289.264573][T25787] ? devpts_kill_sb+0x70/0x70 [ 289.264585][T25787] devpts_mount+0x2c/0x40 [ 289.264595][T25787] legacy_get_tree+0xf9/0x1a0 [ 289.264603][T25787] ? devpts_pty_kill+0xe0/0xe0 [ 289.264617][T25787] vfs_get_tree+0x8f/0x360 [ 289.311279][T25787] do_mount+0x1813/0x2730 [ 289.315630][T25787] ? copy_mount_string+0x30/0x30 [ 289.320566][T25787] ? kasan_check_write+0x14/0x20 [ 289.326186][T25787] ? _copy_from_user+0xe0/0x120 [ 289.331028][T25787] ? copy_mount_options+0xcf/0x360 [ 289.336149][T25787] ksys_mount+0xcc/0x100 [ 289.340471][T25787] __x64_sys_mount+0xbf/0xd0 [ 289.345054][T25787] do_syscall_64+0xfe/0x140 [ 289.349572][T25787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.355482][T25787] RIP: 0033:0x459519 [ 289.359370][T25787] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.378994][T25787] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.387406][T25787] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 289.395370][T25787] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 289.403337][T25787] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 289.411305][T25787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 289.419287][T25787] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 289.429525][T25877] FAULT_INJECTION: forcing a failure. [ 289.429525][T25877] name failslab, interval 1, probability 0, space 0, times 0 [ 289.504296][T25877] CPU: 0 PID: 25877 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 289.512338][T25877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.522396][T25877] Call Trace: [ 289.525693][T25877] dump_stack+0x1d8/0x2f8 [ 289.530017][T25877] should_fail+0x608/0x860 [ 289.534430][T25877] ? setup_fault_attr+0x2b0/0x2b0 [ 289.539450][T25877] ? kzalloc+0x26/0x40 [ 289.543515][T25877] __should_failslab+0x11a/0x160 [ 289.548443][T25877] ? kzalloc+0x26/0x40 [ 289.552591][T25877] should_failslab+0x9/0x20 [ 289.557084][T25877] __kmalloc+0x7a/0x310 [ 289.561228][T25877] ? refcount_add_checked+0x60/0x60 [ 289.566428][T25877] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 289.572146][T25877] kzalloc+0x26/0x40 [ 289.576037][T25877] security_prepare_creds+0x40/0x260 [ 289.581332][T25877] prepare_creds+0x29e/0x370 [ 289.585921][T25877] copy_creds+0xf3/0x600 [ 289.590165][T25877] copy_process+0xdac/0x5c80 [ 289.594771][T25877] ? fsnotify+0x14b9/0x1580 [ 289.599279][T25877] ? fork_idle+0x1b0/0x1b0 [ 289.603694][T25877] ? kasan_check_write+0x14/0x20 [ 289.608621][T25877] ? __mutex_unlock_slowpath+0x18c/0x630 [ 289.614287][T25877] _do_fork+0x180/0x5f0 [ 289.618625][T25877] ? dup_mm+0x340/0x340 [ 289.622788][T25877] ? debug_smp_processor_id+0x1c/0x20 [ 289.628155][T25877] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 289.634239][T25877] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 289.639984][T25877] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 289.645632][T25877] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 289.651100][T25877] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 289.656860][T25877] __x64_sys_clone+0xc1/0xd0 [ 289.661479][T25877] do_syscall_64+0xfe/0x140 [ 289.665985][T25877] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.671886][T25877] RIP: 0033:0x459519 [ 289.675790][T25877] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.695514][T25877] RSP: 002b:00007f3026d48c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 289.703946][T25877] RAX: ffffffffffffffda RBX: 00007f3026d48c90 RCX: 0000000000459519 [ 289.711916][T25877] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 289.719875][T25877] RBP: 000000000075c118 R08: ffffffffffffffff R09: 0000000000000000 [ 289.727853][T25877] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026d496d4 [ 289.735818][T25877] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x1) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000002000/0x18000)=nil, 0x0, 0xf6bba50b3a11194b, 0x3, 0x0, 0xffffffffffffffa5) 03:34:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000c3) 03:34:07 executing program 3 (fault-call:8 fault-nth:60): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x2800) 03:34:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000c4) [ 290.056558][T25897] FAULT_INJECTION: forcing a failure. [ 290.056558][T25897] name failslab, interval 1, probability 0, space 0, times 0 [ 290.139890][T25897] CPU: 0 PID: 25897 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 290.147916][T25897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.157979][T25897] Call Trace: [ 290.161278][T25897] dump_stack+0x1d8/0x2f8 [ 290.165612][T25897] should_fail+0x608/0x860 [ 290.170030][T25897] ? setup_fault_attr+0x2b0/0x2b0 [ 290.175072][T25897] __should_failslab+0x11a/0x160 [ 290.180097][T25897] ? __d_alloc+0x2d/0x6e0 [ 290.184421][T25897] should_failslab+0x9/0x20 [ 290.188923][T25897] kmem_cache_alloc+0x56/0x2b0 [ 290.193684][T25897] __d_alloc+0x2d/0x6e0 [ 290.197835][T25897] ? atime_needs_update+0x570/0x570 [ 290.203033][T25897] d_make_root+0x4a/0xe0 [ 290.207285][T25897] devpts_fill_super+0x401/0x940 [ 290.212306][T25897] ? sget_userns+0x4bd/0x4f0 [ 290.216902][T25897] ? free_anon_bdev+0x30/0x30 [ 290.221683][T25897] mount_nodev+0x10f/0x1c0 [ 290.226090][T25897] ? devpts_kill_sb+0x70/0x70 [ 290.230786][T25897] devpts_mount+0x2c/0x40 [ 290.235110][T25897] legacy_get_tree+0xf9/0x1a0 [ 290.239785][T25897] ? devpts_pty_kill+0xe0/0xe0 [ 290.244558][T25897] vfs_get_tree+0x8f/0x360 [ 290.248988][T25897] do_mount+0x1813/0x2730 [ 290.253324][T25897] ? copy_mount_string+0x30/0x30 [ 290.258265][T25897] ? kasan_check_write+0x14/0x20 [ 290.263211][T25897] ? _copy_from_user+0xe0/0x120 [ 290.268165][T25897] ? copy_mount_options+0xcf/0x360 [ 290.273289][T25897] ksys_mount+0xcc/0x100 [ 290.277540][T25897] __x64_sys_mount+0xbf/0xd0 [ 290.282134][T25897] do_syscall_64+0xfe/0x140 [ 290.286646][T25897] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.292532][T25897] RIP: 0033:0x459519 [ 290.296420][T25897] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.316285][T25897] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.325321][T25897] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 03:34:07 executing program 0 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) [ 290.333482][T25897] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 290.341625][T25897] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 290.349599][T25897] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 290.357571][T25897] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000c5) 03:34:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000c6) [ 290.542069][T25897] devpts: get root dentry failed 03:34:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x4000) [ 290.636008][T25919] FAULT_INJECTION: forcing a failure. [ 290.636008][T25919] name failslab, interval 1, probability 0, space 0, times 0 [ 290.737483][T25919] CPU: 1 PID: 25919 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 290.748360][T25919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.758630][T25919] Call Trace: [ 290.761953][T25919] dump_stack+0x1d8/0x2f8 [ 290.761974][T25919] should_fail+0x608/0x860 [ 290.761987][T25919] ? setup_fault_attr+0x2b0/0x2b0 [ 290.762011][T25919] __should_failslab+0x11a/0x160 [ 290.762030][T25919] ? __delayacct_tsk_init+0x20/0x90 [ 290.762047][T25919] should_failslab+0x9/0x20 [ 290.780964][T25919] kmem_cache_alloc+0x56/0x2b0 [ 290.780985][T25919] __delayacct_tsk_init+0x20/0x90 [ 290.781002][T25919] copy_process+0xe48/0x5c80 [ 290.781026][T25919] ? rcu_irq_exit+0x118/0x2b0 [ 290.795521][T25919] ? fork_idle+0x1b0/0x1b0 [ 290.814187][T25919] ? kasan_check_write+0x14/0x20 [ 290.819131][T25919] ? __mutex_unlock_slowpath+0x18c/0x630 [ 290.824854][T25919] _do_fork+0x180/0x5f0 [ 290.829012][T25919] ? dup_mm+0x340/0x340 [ 290.833166][T25919] ? debug_smp_processor_id+0x1c/0x20 [ 290.838536][T25919] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 290.844609][T25919] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 290.850339][T25919] ? retint_kernel+0x2b/0x2b [ 290.854965][T25919] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 290.860439][T25919] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 290.866162][T25919] __x64_sys_clone+0xc1/0xd0 [ 290.870754][T25919] do_syscall_64+0xfe/0x140 [ 290.875272][T25919] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.881160][T25919] RIP: 0033:0x459519 [ 290.885062][T25919] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.904669][T25919] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 290.913279][T25919] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 290.921257][T25919] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 290.929236][T25919] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 03:34:08 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x8200) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0xfddcc6f04937db9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x46, 0x0, 0x19d) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000080)=0x7fffffff) sendmmsg(r1, &(0x7f00000092c0), 0x4000000000001d0, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r0) 03:34:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000c7) 03:34:08 executing program 3 (fault-call:8 fault-nth:61): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:08 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x10000, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000080)={0x3, "2696bb143a78f5221ebc196517282697760460ec2a7beca9655751469367aac1", 0x3, 0x1, 0x3, 0xff00e0, 0xc06245fca80c19c8, 0xe}) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000340)=0x3f00, 0x4) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet_smc(0x2b, 0x1, 0x0) recvfrom$rxrpc(r1, &(0x7f0000000300)=""/56, 0x38, 0x10001, &(0x7f0000000380)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x0, @loopback, 0x2}}, 0x24) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000180)={0x3, 0x9, 0x0, 0x8, 0x3, 0x7f, 0x4, 0x800, 0x3f, 0x0, 0x8, 0x5, 0x3, 0x7fffffff, &(0x7f0000000100)=""/128, 0x8001, 0x388000000000, 0x4}) prctl$PR_GET_SECCOMP(0x15) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x6, 0x5, 0x9, 0x8}) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000200)={r2, r1}) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f00000002c0)={0x1, 0x7, "38f189d82f7387d9376db3c7e9cd950f27ffd4677fa7e817", {0x9, 0x8}, 0x1}) [ 290.937232][T25919] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 290.945221][T25919] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 [ 291.066503][T26041] FAULT_INJECTION: forcing a failure. [ 291.066503][T26041] name failslab, interval 1, probability 0, space 0, times 0 [ 291.095079][T26041] CPU: 1 PID: 26041 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 291.103105][T26041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.113164][T26041] Call Trace: [ 291.116479][T26041] dump_stack+0x1d8/0x2f8 [ 291.120810][T26041] should_fail+0x608/0x860 [ 291.125235][T26041] ? setup_fault_attr+0x2b0/0x2b0 [ 291.130257][T26041] __should_failslab+0x11a/0x160 [ 291.135187][T26041] ? new_inode_pseudo+0x135/0x240 [ 291.140198][T26041] should_failslab+0x9/0x20 [ 291.144692][T26041] kmem_cache_alloc+0x56/0x2b0 [ 291.149451][T26041] new_inode_pseudo+0x135/0x240 [ 291.154344][T26041] new_inode+0x28/0x1c0 [ 291.158500][T26041] devpts_fill_super+0x292/0x940 [ 291.163428][T26041] ? sget_userns+0x4bd/0x4f0 [ 291.168005][T26041] ? free_anon_bdev+0x30/0x30 [ 291.172677][T26041] mount_nodev+0x10f/0x1c0 [ 291.177082][T26041] ? devpts_kill_sb+0x70/0x70 [ 291.181839][T26041] devpts_mount+0x2c/0x40 [ 291.186161][T26041] legacy_get_tree+0xf9/0x1a0 [ 291.190848][T26041] ? devpts_pty_kill+0xe0/0xe0 [ 291.195628][T26041] vfs_get_tree+0x8f/0x360 [ 291.200057][T26041] do_mount+0x1813/0x2730 [ 291.204380][T26041] ? copy_mount_string+0x30/0x30 [ 291.209325][T26041] ? kasan_check_write+0x14/0x20 [ 291.214255][T26041] ? _copy_from_user+0xe0/0x120 [ 291.219094][T26041] ? copy_mount_options+0xcf/0x360 [ 291.224196][T26041] ksys_mount+0xcc/0x100 [ 291.228430][T26041] __x64_sys_mount+0xbf/0xd0 [ 291.233011][T26041] do_syscall_64+0xfe/0x140 [ 291.237516][T26041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.243394][T26041] RIP: 0033:0x459519 [ 291.247278][T26041] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.266880][T26041] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 291.275284][T26041] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 291.283242][T26041] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 291.291205][T26041] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 291.299173][T26041] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 291.307148][T26041] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 03:34:08 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000c8) 03:34:09 executing program 0 (fault-call:5 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp\x00') sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffdf6, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1d", 0x21}], 0x1, 0x0, 0xff53}, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x70, 0x9f, 0x200, 0xb0d, 0x1ff, 0x0, 0x4a46, 0x204, 0xc, 0x1, 0x8, 0x69, 0x400, 0x35b, 0x9, 0x1, 0x0, 0x400, 0x1a, 0x400, 0xfffffffffffffffc, 0x8, 0x6, 0x3, 0x349, 0x0, 0x400, 0x8, 0x5, 0x1, 0xfffffffffffffff9, 0x3, 0x7, 0x5, 0x1, 0x400, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140)}, 0x10000, 0x6, 0x1, 0x7, 0x2, 0x1, 0x3f}, r0, 0xd, r0, 0x2) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8955, &(0x7f0000000040)=0x2) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x8953, &(0x7f0000000040)=0x2) 03:34:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000c9) 03:34:09 executing program 3 (fault-call:8 fault-nth:62): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) [ 291.715190][T26158] FAULT_INJECTION: forcing a failure. [ 291.715190][T26158] name failslab, interval 1, probability 0, space 0, times 0 [ 291.743661][T26265] FAULT_INJECTION: forcing a failure. [ 291.743661][T26265] name failslab, interval 1, probability 0, space 0, times 0 [ 291.772392][T26265] CPU: 1 PID: 26265 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 291.780409][T26265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.790472][T26265] Call Trace: [ 291.793779][T26265] dump_stack+0x1d8/0x2f8 [ 291.798120][T26265] should_fail+0x608/0x860 [ 291.802547][T26265] ? setup_fault_attr+0x2b0/0x2b0 [ 291.807592][T26265] __should_failslab+0x11a/0x160 [ 291.812533][T26265] ? new_inode_pseudo+0x135/0x240 [ 291.817564][T26265] should_failslab+0x9/0x20 [ 291.822069][T26265] kmem_cache_alloc+0x56/0x2b0 [ 291.826831][T26265] ? _raw_spin_unlock+0x2c/0x50 [ 291.831695][T26265] new_inode_pseudo+0x135/0x240 [ 291.836548][T26265] new_inode+0x28/0x1c0 [ 291.840712][T26265] devpts_fill_super+0x5a7/0x940 [ 291.845660][T26265] mount_nodev+0x10f/0x1c0 [ 291.850072][T26265] ? devpts_kill_sb+0x70/0x70 [ 291.854761][T26265] devpts_mount+0x2c/0x40 [ 291.859102][T26265] legacy_get_tree+0xf9/0x1a0 [ 291.863778][T26265] ? devpts_pty_kill+0xe0/0xe0 [ 291.868548][T26265] vfs_get_tree+0x8f/0x360 [ 291.872971][T26265] do_mount+0x1813/0x2730 [ 291.877309][T26265] ? copy_mount_string+0x30/0x30 [ 291.882264][T26265] ? kasan_check_write+0x14/0x20 [ 291.887297][T26265] ? _copy_from_user+0xe0/0x120 [ 291.892179][T26265] ? copy_mount_options+0xcf/0x360 [ 291.897337][T26265] ksys_mount+0xcc/0x100 [ 291.901589][T26265] __x64_sys_mount+0xbf/0xd0 [ 291.906194][T26265] do_syscall_64+0xfe/0x140 [ 291.910704][T26265] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.916595][T26265] RIP: 0033:0x459519 [ 291.920488][T26265] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.940198][T26265] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 291.948621][T26265] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 291.956596][T26265] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 291.964573][T26265] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 291.972551][T26265] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 291.980534][T26265] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 291.988560][T26158] CPU: 0 PID: 26158 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 291.996566][T26158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.006648][T26158] Call Trace: [ 292.009966][T26158] dump_stack+0x1d8/0x2f8 [ 292.014305][T26158] should_fail+0x608/0x860 [ 292.018713][T26158] ? setup_fault_attr+0x2b0/0x2b0 [ 292.023734][T26158] __should_failslab+0x11a/0x160 [ 292.028663][T26158] should_failslab+0x9/0x20 [ 292.033155][T26158] kmem_cache_alloc_trace+0x5d/0x2c0 [ 292.038426][T26158] ? alloc_perf_context+0x56/0x280 [ 292.043530][T26158] alloc_perf_context+0x56/0x280 [ 292.048457][T26158] perf_event_init_task+0x58e/0xa20 [ 292.053651][T26158] ? perf_event_attrs+0x30/0x30 [ 292.058502][T26158] copy_process+0x17e7/0x5c80 [ 292.063204][T26158] ? fork_idle+0x1b0/0x1b0 [ 292.067617][T26158] ? kasan_check_write+0x14/0x20 [ 292.072562][T26158] ? __mutex_unlock_slowpath+0x18c/0x630 [ 292.078193][T26158] _do_fork+0x180/0x5f0 [ 292.082344][T26158] ? dup_mm+0x340/0x340 [ 292.086495][T26158] ? debug_smp_processor_id+0x1c/0x20 [ 292.091854][T26158] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 292.097906][T26158] ? check_preemption_disabled+0xb7/0x280 [ 292.103619][T26158] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 292.109332][T26158] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 292.114783][T26158] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 292.120493][T26158] __x64_sys_clone+0xc1/0xd0 [ 292.125164][T26158] do_syscall_64+0xfe/0x140 [ 292.129673][T26158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.135575][T26158] RIP: 0033:0x459519 [ 292.139458][T26158] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.159075][T26158] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 292.167481][T26158] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 292.175446][T26158] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 292.183412][T26158] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 292.191377][T26158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 292.199351][T26158] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 [ 292.210900][T26265] devpts: Unable to alloc inode for ptmx node 03:34:09 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x841) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000100)) exit_group(0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) 03:34:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) r2 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000002c0)={{0x8, 0x6, 0x642, 0xc4, '\x00', 0x1}, 0x3, 0x40, 0x2, r2, 0x7, 0xffff, 'syz1\x00', &(0x7f0000000400)=['/dev/dsp#\x00', '/dev/video1\x00', '/dev/dsp#\x00', 'self+proc&%)^$\x00', '\x00', 'bdev\x00', '/dev/video1\x00'], 0x41, [], [0xffffffffffffff7e, 0x2, 0x20000000, 0x3]}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) socket$inet_smc(0x2b, 0x1, 0x0) membarrier(0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, 0x0, 0xfffffffffffffc86) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x5, 0x408000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f00000001c0)={r4, 0x17}) sendmmsg(r0, &(0x7f00000092c0), 0x4000000000001d0, 0x0) r5 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000040)={0xe60a, 0x6, 0xc, "105aa24b3dafd518f4ca9eefccf11dce7ed76d5f9d8914cfb703168f62b38dacf5f3fc2ad24a27d970a6b018566711a05f856b89a7519d88dba8776f", 0x3c, "09c62cff93f0f0e33136837baf6ecdc12ea16f9255b077f29509d6b4f3a74b8e1b4b32d26a3a7a118e45c4f31be342f0a87eb8bf0f30763532cf37b1", 0x8}) 03:34:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x4800) 03:34:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000ca) 03:34:10 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="7f454c4600000000000000005bf8133bbbb62b01f5d200000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000000000000000000000000000000000000000000000000200"/120], 0x78) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) 03:34:10 executing program 3 (fault-call:8 fault-nth:63): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:10 executing program 0 (fault-call:5 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000cb) 03:34:10 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0xe7, 0x800) r1 = gettid() ptrace$getregs(0x3, r1, 0x1, &(0x7f0000000480)=""/221) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x6}}, 0xcbd, 0xffffffffffffff0a, 0x80000000, 0x31b, 0x20}, &(0x7f0000000400)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000440)={0xd0, 0x5, 0x200, 0x7, 0x20, 0x0, 0x1, 0xafc, r2}, 0x20) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000240)=0x69348e00) rt_sigsuspend(&(0x7f0000000280)={0x3}, 0x8) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x4) r5 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffff, 0x2080) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x7, @empty, 0x100000001}}, 0x7f, 0x100}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r6, &(0x7f0000000200)=0x4) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000580)=ANY=[@ANYBLOB="0160a3bc4b7845df89c7cd7b127fffffff0500000000000a010000006b0000090045150000000003000000396eea82045442a08f7ba2b2ff1bf4ffece4ff6f209d8d90ee32402af04a62ab14b6d8b5d57dbc3a3b891cda739c4ef61e362e1387c4a54abc503c2927880e70059e7a1c0672fcffffffffffffffba4115c009e87f00"/141]) [ 292.657480][T26355] FAULT_INJECTION: forcing a failure. [ 292.657480][T26355] name failslab, interval 1, probability 0, space 0, times 0 [ 292.715842][T26362] FAULT_INJECTION: forcing a failure. [ 292.715842][T26362] name failslab, interval 1, probability 0, space 0, times 0 [ 292.752959][T26355] CPU: 1 PID: 26355 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 292.760988][T26355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.771055][T26355] Call Trace: [ 292.774619][T26355] dump_stack+0x1d8/0x2f8 [ 292.778957][T26355] should_fail+0x608/0x860 [ 292.783377][T26355] ? setup_fault_attr+0x2b0/0x2b0 [ 292.788411][T26355] __should_failslab+0x11a/0x160 [ 292.793359][T26355] ? __d_alloc+0x2d/0x6e0 [ 292.797701][T26355] should_failslab+0x9/0x20 [ 292.802207][T26355] kmem_cache_alloc+0x56/0x2b0 [ 292.806997][T26355] __d_alloc+0x2d/0x6e0 [ 292.811151][T26355] ? atime_needs_update+0x570/0x570 [ 292.811164][T26355] d_make_root+0x4a/0xe0 [ 292.811175][T26355] devpts_fill_super+0x401/0x940 [ 292.811186][T26355] ? sget_userns+0x4bd/0x4f0 [ 292.811195][T26355] ? free_anon_bdev+0x30/0x30 [ 292.811208][T26355] mount_nodev+0x10f/0x1c0 [ 292.811216][T26355] ? devpts_kill_sb+0x70/0x70 [ 292.811229][T26355] devpts_mount+0x2c/0x40 [ 292.848375][T26355] legacy_get_tree+0xf9/0x1a0 [ 292.853070][T26355] ? devpts_pty_kill+0xe0/0xe0 [ 292.857837][T26355] vfs_get_tree+0x8f/0x360 [ 292.862257][T26355] do_mount+0x1813/0x2730 [ 292.866596][T26355] ? copy_mount_string+0x30/0x30 [ 292.871540][T26355] ? kasan_check_write+0x14/0x20 [ 292.876482][T26355] ? _copy_from_user+0xe0/0x120 [ 292.881362][T26355] ? copy_mount_options+0xcf/0x360 [ 292.886477][T26355] ksys_mount+0xcc/0x100 [ 292.890721][T26355] __x64_sys_mount+0xbf/0xd0 [ 292.895315][T26355] do_syscall_64+0xfe/0x140 [ 292.899839][T26355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.905740][T26355] RIP: 0033:0x459519 [ 292.909634][T26355] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.929260][T26355] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 292.937692][T26355] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 292.945670][T26355] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 292.953639][T26355] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 292.961612][T26355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 292.969587][T26355] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 292.977675][T26362] CPU: 0 PID: 26362 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 292.985669][T26362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.995729][T26362] Call Trace: [ 292.999029][T26362] dump_stack+0x1d8/0x2f8 [ 293.003366][T26362] should_fail+0x608/0x860 [ 293.007801][T26362] ? setup_fault_attr+0x2b0/0x2b0 [ 293.012886][T26362] __should_failslab+0x11a/0x160 [ 293.017834][T26362] should_failslab+0x9/0x20 [ 293.022343][T26362] kmem_cache_alloc_trace+0x5d/0x2c0 [ 293.027653][T26362] ? alloc_perf_context+0x56/0x280 [ 293.032768][T26362] alloc_perf_context+0x56/0x280 [ 293.037725][T26362] perf_event_init_task+0x58e/0xa20 [ 293.042922][T26362] ? perf_event_attrs+0x30/0x30 [ 293.047774][T26362] copy_process+0x17e7/0x5c80 [ 293.052439][T26362] ? retint_kernel+0x2b/0x2b [ 293.057142][T26362] ? fork_idle+0x1b0/0x1b0 [ 293.061551][T26362] ? kasan_check_write+0x14/0x20 [ 293.066480][T26362] ? __mutex_unlock_slowpath+0x18c/0x630 [ 293.072110][T26362] _do_fork+0x180/0x5f0 [ 293.076287][T26362] ? dup_mm+0x340/0x340 [ 293.080434][T26362] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 293.085877][T26362] ? rcu_irq_exit+0x118/0x2b0 [ 293.090543][T26362] ? retint_kernel+0x2b/0x2b [ 293.095131][T26362] __x64_sys_clone+0xc1/0xd0 [ 293.099716][T26362] do_syscall_64+0xfe/0x140 [ 293.104214][T26362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.110100][T26362] RIP: 0033:0x459519 [ 293.113984][T26362] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.133587][T26362] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 293.141991][T26362] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 293.149954][T26362] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 293.157916][T26362] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 03:34:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x4c00) 03:34:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000cc) 03:34:10 executing program 4: r0 = accept(0xffffffffffffffff, &(0x7f0000000580)=@can, &(0x7f0000000600)=0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000640), &(0x7f0000000680)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{0x8, 0x5, 0x0, 0x80000000}, {0x100, 0xbeb, 0x2, 0x1}]}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200000, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000240)='net/protocols\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x117, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x2, {0xa, 0x4e23, 0x1, @rand_addr="da292af58e343c37b5a34c04eebf7343", 0x7}, r5}}, 0x38) write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000440)={0x8, 0x120, 0xfa00, {0x3, {0x7b57, 0x8001, "3e8ed00c36cb8e2619f4730472934fc92b6ca6dba078f9fbad55db7d5119558123d5e892b59d164c92d9a59b103a864fa9ba354622e0f53205e93f0a935436dcda8e78062ec283e1a7ae6b4ad43165b43faf2d495fd70ff6b9d92a2e32c269c1481ca4e26256d1450c904792b6613b5a567e1d3b20bf10004c4bdf046007a5551cd8ee46b61e4af112ff21b13bc0db6befceadb38b4d42bf5a6959d5e28b7833fbf93e95ec1979194a85662fb92454529b00093663c939daa6932f54c8da8d8edbadd4adae580c2c0502681f565dcbfbcac07f4bfe7afd66c84eb6ecae3ef682609a4c1d7eb4e2bf5b6ce27a511f29553fd8079b7d42a9e267dbd457d030de85", 0xbd, 0x800, 0x0, 0x7fffffff, 0x60da, 0x73, 0x2, 0x1}, r5}}, 0x128) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f00000000c0)) [ 293.165877][T26362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 293.173846][T26362] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000cd) [ 293.277439][T26355] devpts: get root dentry failed 03:34:10 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendmsg$inet(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x4}) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2df, 0x80100) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000040)=0x5501) write$binfmt_elf64(r0, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 03:34:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x5c00) 03:34:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000ce) 03:34:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000cf) 03:34:11 executing program 3 (fault-call:8 fault-nth:64): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:11 executing program 0 (fault-call:5 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:11 executing program 4: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000001840)=ANY=[@ANYBLOB="2c00000000080501ff0080fffdffff2e0a0000000c00010001000e007d0a00010c00020000001aff02f10000"], 0x2c}}, 0x0) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000040)=0x4, 0x4) [ 293.792020][T26657] netlink: 'syz-executor.4': attribute type 2 has an invalid length. [ 293.851642][T26662] FAULT_INJECTION: forcing a failure. [ 293.851642][T26662] name failslab, interval 1, probability 0, space 0, times 0 [ 293.887119][T26656] FAULT_INJECTION: forcing a failure. [ 293.887119][T26656] name failslab, interval 1, probability 0, space 0, times 0 [ 293.907762][T26662] CPU: 0 PID: 26662 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 293.915897][T26662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.925963][T26662] Call Trace: [ 293.929267][T26662] dump_stack+0x1d8/0x2f8 [ 293.933603][T26662] should_fail+0x608/0x860 [ 293.938029][T26662] ? setup_fault_attr+0x2b0/0x2b0 [ 293.943088][T26662] __should_failslab+0x11a/0x160 [ 293.948029][T26662] ? __d_alloc+0x2d/0x6e0 [ 293.952359][T26662] should_failslab+0x9/0x20 [ 293.956964][T26662] kmem_cache_alloc+0x56/0x2b0 [ 293.961754][T26662] __d_alloc+0x2d/0x6e0 [ 293.965914][T26662] ? hashlen_string+0x55/0x120 [ 293.970683][T26662] d_alloc_name+0xe0/0x290 [ 293.975093][T26662] ? lock_acquire+0x158/0x250 [ 293.979762][T26662] ? devpts_fill_super+0x52e/0x940 [ 293.984873][T26662] ? d_alloc_pseudo+0x70/0x70 [ 293.989555][T26662] devpts_fill_super+0x592/0x940 [ 293.994512][T26662] ? sget_userns+0x4bd/0x4f0 [ 293.999121][T26662] mount_nodev+0x10f/0x1c0 [ 294.003538][T26662] ? devpts_kill_sb+0x70/0x70 [ 294.008217][T26662] devpts_mount+0x2c/0x40 [ 294.012549][T26662] legacy_get_tree+0xf9/0x1a0 [ 294.017233][T26662] ? devpts_pty_kill+0xe0/0xe0 [ 294.022037][T26662] vfs_get_tree+0x8f/0x360 [ 294.026457][T26662] do_mount+0x1813/0x2730 [ 294.030802][T26662] ? copy_mount_string+0x30/0x30 [ 294.035788][T26662] ? kasan_check_write+0x14/0x20 [ 294.040791][T26662] ? _copy_from_user+0xe0/0x120 [ 294.045661][T26662] ? copy_mount_options+0xcf/0x360 [ 294.050778][T26662] ksys_mount+0xcc/0x100 [ 294.055024][T26662] __x64_sys_mount+0xbf/0xd0 [ 294.059621][T26662] do_syscall_64+0xfe/0x140 [ 294.064141][T26662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.070039][T26662] RIP: 0033:0x459519 [ 294.073937][T26662] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.093550][T26662] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 294.101967][T26662] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 294.109938][T26662] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 294.117910][T26662] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 294.125901][T26662] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 294.133876][T26662] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 294.141899][T26656] CPU: 1 PID: 26656 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 294.149899][T26656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.149906][T26656] Call Trace: [ 294.149925][T26656] dump_stack+0x1d8/0x2f8 [ 294.149942][T26656] should_fail+0x608/0x860 [ 294.149958][T26656] ? setup_fault_attr+0x2b0/0x2b0 [ 294.177051][T26656] ? kzalloc+0x26/0x40 [ 294.177080][T26656] __should_failslab+0x11a/0x160 [ 294.186090][T26656] ? kzalloc+0x26/0x40 [ 294.190170][T26656] should_failslab+0x9/0x20 [ 294.194687][T26656] __kmalloc+0x7a/0x310 [ 294.198857][T26656] kzalloc+0x26/0x40 [ 294.202760][T26656] security_task_alloc+0x48/0x200 [ 294.207806][T26656] copy_process+0x189e/0x5c80 [ 294.212497][T26656] ? fork_idle+0x1b0/0x1b0 [ 294.216922][T26656] ? kasan_check_write+0x14/0x20 [ 294.221854][T26656] ? __mutex_unlock_slowpath+0x18c/0x630 [ 294.227483][T26656] _do_fork+0x180/0x5f0 [ 294.231635][T26656] ? dup_mm+0x340/0x340 [ 294.235784][T26656] ? debug_smp_processor_id+0x1c/0x20 [ 294.241162][T26656] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 294.247219][T26656] ? check_preemption_disabled+0xb7/0x280 [ 294.252930][T26656] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 294.258646][T26656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 294.264099][T26656] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 294.269817][T26656] __x64_sys_clone+0xc1/0xd0 [ 294.274403][T26656] do_syscall_64+0xfe/0x140 [ 294.278901][T26656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.284786][T26656] RIP: 0033:0x459519 [ 294.288686][T26656] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:34:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x6000) 03:34:11 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000d0) 03:34:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') fstat(r0, &(0x7f0000000000)) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000100)={0x0, 0x0, 0x2080}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000000c0)) 03:34:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f0000001780)=0xc) syz_mount_image$hfs(&(0x7f0000000180)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x8, &(0x7f00000016c0)=[{&(0x7f0000000600)="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", 0x1000, 0x10001}, {&(0x7f0000000240)="68536c05a7dd85ee8f80265fb00ba2e4858c3a22bc76cbc6003f0b8ed234342d10f1adcff0370b357a079bc389cca07d9fad6943", 0x34, 0x80}, {&(0x7f0000000280)="0005b92797f114d5a2646eca9a6794a23567db3e82b0be1e255b63cd786dc14d45e5e62d2d8af5aa62ba5294d736419f5e86735915aa2b45026e225f4dcd59d8912d116e82606691b2b70c3d0183adb282ac", 0x52, 0x3}, {0xfffffffffffffffd, 0x0, 0x2}, {&(0x7f0000000300)="e79ab9f3ccd97db785e038af1d441e38ead7b920ebf7644cd46b901c3e38d51406675218f97e3810f7f6af5932dad792498aea0925ff3012647d1bee6c259c60f212d0e28a406124", 0x48, 0x8}, {&(0x7f0000000400)="307d8a42efe4ddb47af8a96fdb63a7e4a40422b128afa3a1343b6cbcc706c2c2381364413137300bd05deef39370734d2aafc46c04969b4df26bb2544ba983eea37f2145eabe72a136fb11ffe7ca2b0b8cd17eb6b7908d640e81faf003aee8cae5405d1bc177b6f82b470ce02a153d53ac6b6bbdf659adc73f480f", 0x7b, 0x4}, {&(0x7f0000000480)="589e82c7a72b9a3d65c34ad0e262c515f43e03e577c754bc1cfaeb829beeb60b5cc9223549618fdc8405ee8abcd5d318c3dc97ddb54c37e4cc83c9a804c85bcbb2e859b4ed7b253231b4810f24fbd9d445b334910dca797a4cc83e045748389d075b0ceed52cae474009b0d0fffa5e5c2fe5fa6dfc244e8849cc17c799b3a538ac9f44341675402a646d6e64ef2af806cd43209608cdc193bf2fe5e2f7c19b57859db466820bb85e0f18b3cf4dc5af883c8d5811d9294320d41556d644b029f0400e875920942bbcc09c016bdf24e5e8f96403c0", 0xd4, 0x7}, {&(0x7f0000001600)="a4465bf49f457eae03d6de2a6ae91f7b079e4ff2686c918415e4bc9f08ccfa6fab3b9c03b70e4f438394cf83b514d646ca610904240985af7475761cd2489a3d526ba5ec92b672ddb14ebb51118f3f54f0125840b61116f0ba275e363141f3d089f2517709809f1b198e746b5c402f514115c615a0b19915863fe32688ed84495846659a375ab90c4a3c380f7ce86e288bd1b120cacb18ca8e4e3bbd60fe4d47b153acade10937b07f44c5", 0xab, 0x6}], 0x101060, &(0x7f0000001940)=ANY=[@ANYBLOB="6769643d3cc2827b72a5a23bc12298c8bb4412222ed75c64e60fa26f2be849e0749b55bd848b70525f7fc9582020d815e4dbc66d2d52a50a1a9627b1253ecad76256aa9dc9b420b51a8efc5f6be3f9664cd22f65695df7766b486d026b155d3c4c0192ed3dbaf7989dd2d38da7b252a543126c080ddd9ebce3c776f9c9e1cdbc7ba2ca86cb73059a6e3f3361bcb1da208b4b38542bbb0c7b8f765e9e841190f42c77d4f0c37987bd7d94ee4e13f0de184166edd8038627c571bda11566cc7ca900c4d43b9f8219ae4e284a545998d7002dd5e523afae5cfc5b82f57f3be274cfeef661e0c566f1a9ce5fb68b6b5f", @ANYRESHEX=r1, @ANYBLOB=',umask=00000000000000000003141,dir_umask=00000000000000000000271,smackfsroot=,hash,dont_measure,\x00']) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x119080, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x80000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x4000000000000000, &(0x7f00000017c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VT_RESIZE(r4, 0x5609, &(0x7f0000000080)={0x7, 0x6, 0x7}) [ 294.308289][T26656] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 294.316693][T26656] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 294.324655][T26656] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 294.332614][T26656] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 294.340572][T26656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 294.348538][T26656] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000d1) [ 294.480230][T26662] devpts: Unable to alloc dentry for ptmx node 03:34:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x8000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ipddp0\x00'}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000001c0)={@loopback}, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) getgid() listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) gettid() ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) close(r1) accept4(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) 03:34:12 executing program 0 (fault-call:5 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x6800) 03:34:12 executing program 3 (fault-call:8 fault-nth:65): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) [ 294.735879][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:34:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x4000ef) [ 294.915404][T26907] FAULT_INJECTION: forcing a failure. [ 294.915404][T26907] name failslab, interval 1, probability 0, space 0, times 0 [ 295.010616][T26907] CPU: 1 PID: 26907 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 295.011913][T26903] FAULT_INJECTION: forcing a failure. [ 295.011913][T26903] name failslab, interval 1, probability 0, space 0, times 0 [ 295.018665][T26907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.018682][T26907] Call Trace: [ 295.018705][T26907] dump_stack+0x1d8/0x2f8 [ 295.018723][T26907] should_fail+0x608/0x860 [ 295.018738][T26907] ? setup_fault_attr+0x2b0/0x2b0 [ 295.018761][T26907] __should_failslab+0x11a/0x160 [ 295.018775][T26907] ? new_inode_pseudo+0x135/0x240 [ 295.018798][T26907] should_failslab+0x9/0x20 [ 295.041449][T26907] kmem_cache_alloc+0x56/0x2b0 [ 295.041463][T26907] ? _raw_spin_unlock+0x2c/0x50 [ 295.041478][T26907] new_inode_pseudo+0x135/0x240 [ 295.041490][T26907] new_inode+0x28/0x1c0 [ 295.041509][T26907] devpts_fill_super+0x5a7/0x940 [ 295.096338][T26907] mount_nodev+0x10f/0x1c0 [ 295.100749][T26907] ? devpts_kill_sb+0x70/0x70 [ 295.105423][T26907] devpts_mount+0x2c/0x40 [ 295.109739][T26907] legacy_get_tree+0xf9/0x1a0 [ 295.114397][T26907] ? devpts_pty_kill+0xe0/0xe0 [ 295.119157][T26907] vfs_get_tree+0x8f/0x360 [ 295.123567][T26907] do_mount+0x1813/0x2730 [ 295.127891][T26907] ? copy_mount_string+0x30/0x30 [ 295.132827][T26907] ? kasan_check_write+0x14/0x20 [ 295.137755][T26907] ? _copy_from_user+0xe0/0x120 [ 295.142599][T26907] ? copy_mount_options+0xcf/0x360 [ 295.147702][T26907] ksys_mount+0xcc/0x100 [ 295.151935][T26907] __x64_sys_mount+0xbf/0xd0 [ 295.156547][T26907] do_syscall_64+0xfe/0x140 [ 295.161047][T26907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.166935][T26907] RIP: 0033:0x459519 [ 295.170820][T26907] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.190443][T26907] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 295.198856][T26907] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 03:34:12 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x6c00) 03:34:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400300) [ 295.206913][T26907] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 295.214880][T26907] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 295.222840][T26907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 [ 295.230801][T26907] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 295.289540][T26903] CPU: 0 PID: 26903 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 295.297558][T26903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.307620][T26903] Call Trace: [ 295.310923][T26903] dump_stack+0x1d8/0x2f8 [ 295.315272][T26903] should_fail+0x608/0x860 [ 295.319690][T26903] ? setup_fault_attr+0x2b0/0x2b0 [ 295.326195][T26903] __should_failslab+0x11a/0x160 [ 295.331138][T26903] ? copy_process+0x1d86/0x5c80 [ 295.335990][T26903] should_failslab+0x9/0x20 [ 295.340493][T26903] kmem_cache_alloc+0x56/0x2b0 [ 295.345262][T26903] copy_process+0x1d86/0x5c80 [ 295.349972][T26903] ? fork_idle+0x1b0/0x1b0 [ 295.354390][T26903] ? kasan_check_write+0x14/0x20 [ 295.359326][T26903] ? __mutex_unlock_slowpath+0x18c/0x630 [ 295.364982][T26903] _do_fork+0x180/0x5f0 [ 295.369144][T26903] ? dup_mm+0x340/0x340 [ 295.373305][T26903] ? debug_smp_processor_id+0x1c/0x20 [ 295.378677][T26903] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 295.384749][T26903] ? check_preemption_disabled+0xb7/0x280 [ 295.390472][T26903] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 295.396194][T26903] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 295.401658][T26903] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 295.407383][T26903] __x64_sys_clone+0xc1/0xd0 [ 295.411985][T26903] do_syscall_64+0xfe/0x140 [ 295.416494][T26903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.422390][T26903] RIP: 0033:0x459519 [ 295.426312][T26903] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.445306][T26907] devpts: Unable to alloc inode for ptmx node [ 295.445925][T26903] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 295.460395][T26903] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 295.468365][T26903] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 295.476336][T26903] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 03:34:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x8000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ipddp0\x00'}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000001c0)={@loopback}, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) getgid() listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) gettid() ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) close(r1) accept4(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) [ 295.484313][T26903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 295.492287][T26903] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x8000400) ioctl(r0, 0x7, &(0x7f0000000040)="000000805e0bcfec7be070") r1 = dup(r0) r2 = memfd_create(&(0x7f0000000140)='\x18u(3vmnet\xdc+]\x00\xf9n\xb9\xe6(1\xb9\xe6<\xca\xbb\xab\x8b8L\xf0\xdb(.\xa7\x85\x00\xf53\x0e2\xe4\xd3\xfd4\xff\x95QG\x90\xd8x\xbdHR*/\x10p\xbc\x84sX\x98\xff\xa1VeH\x06@GK\x10[>\xbcmh\xd4v\x15\xe4\xf4e', 0x0) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f00000000c0)={0xffff, 0x5, 0x0, 0x5, 0x3, 0x81, 0x8, 0x40, 0x2, 0x81, 0x5, 0x40, 0x200, 0x0, &(0x7f0000000000)=""/64, 0x20, 0x40, 0x401}) lseek(r2, 0xfffffffffff7fffd, 0x4) 03:34:13 executing program 3 (fault-call:8 fault-nth:66): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:13 executing program 0 (fault-call:5 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400408) 03:34:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x8000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ipddp0\x00'}) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000001c0)={@loopback}, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) getgid() listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) gettid() ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) close(r1) accept4(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008d80)=[{{&(0x7f0000004b80)=@nl, 0x80, &(0x7f0000006100), 0x0, &(0x7f0000006140)=""/105, 0x69}}], 0x8000000000003bf, 0x0, 0x0) [ 295.811836][T27122] FAULT_INJECTION: forcing a failure. [ 295.811836][T27122] name failslab, interval 1, probability 0, space 0, times 0 03:34:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x7400) [ 295.921528][T27122] CPU: 1 PID: 27122 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #11 [ 295.929563][T27122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.939630][T27122] Call Trace: [ 295.942931][T27122] dump_stack+0x1d8/0x2f8 [ 295.946380][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 295.947270][T27122] should_fail+0x608/0x860 [ 295.947288][T27122] ? setup_fault_attr+0x2b0/0x2b0 [ 295.947313][T27122] __should_failslab+0x11a/0x160 [ 295.947335][T27122] ? alloc_vfsmnt+0x27/0x4a0 [ 295.947352][T27122] should_failslab+0x9/0x20 [ 295.981822][T27122] kmem_cache_alloc+0x56/0x2b0 [ 295.986598][T27122] alloc_vfsmnt+0x27/0x4a0 [ 295.991021][T27122] vfs_create_mount+0x87/0x440 [ 295.995784][T27122] ? up_write+0xb0/0x1b0 [ 296.000032][T27122] do_mount+0x200c/0x2730 [ 296.004371][T27122] ? copy_mount_string+0x30/0x30 [ 296.009318][T27122] ? kasan_check_write+0x14/0x20 [ 296.014265][T27122] ? _copy_from_user+0xe0/0x120 [ 296.017423][T27151] FAULT_INJECTION: forcing a failure. [ 296.017423][T27151] name failslab, interval 1, probability 0, space 0, times 0 [ 296.019115][T27122] ? copy_mount_options+0xcf/0x360 [ 296.019128][T27122] ksys_mount+0xcc/0x100 [ 296.019142][T27122] __x64_sys_mount+0xbf/0xd0 [ 296.019162][T27122] do_syscall_64+0xfe/0x140 [ 296.019187][T27122] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.056062][T27122] RIP: 0033:0x459519 03:34:13 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r1 = dup(r0) fspick(r1, &(0x7f00000000c0)='./file0\x00', 0x1) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000040)=""/49) ioctl$SIOCAX25GETINFOOLD(r0, 0x891b, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) [ 296.059957][T27122] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.079571][T27122] RSP: 002b:00007f12e6c1dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 296.087988][T27122] RAX: ffffffffffffffda RBX: 00007f12e6c1dc90 RCX: 0000000000459519 [ 296.088000][T27122] RDX: 0000000020000480 RSI: 0000000020000200 RDI: 0000000000000000 [ 296.103954][T27122] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.111947][T27122] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f12e6c1e6d4 03:34:13 executing program 1: r0 = socket(0x42200000013, 0x805, 0x0) getsockopt(r0, 0x114, 0x2717, 0x0, &(0x7f0000000000)) [ 296.111954][T27122] R13: 00000000004c595e R14: 00000000004d9fe0 R15: 0000000000000004 [ 296.130466][T27151] CPU: 0 PID: 27151 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 296.138460][T27151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.148520][T27151] Call Trace: [ 296.151829][T27151] dump_stack+0x1d8/0x2f8 [ 296.156155][T27151] should_fail+0x608/0x860 [ 296.160563][T27151] ? setup_fault_attr+0x2b0/0x2b0 [ 296.165584][T27151] __should_failslab+0x11a/0x160 [ 296.170522][T27151] ? create_new_namespaces+0x35/0x700 [ 296.175882][T27151] should_failslab+0x9/0x20 [ 296.180376][T27151] kmem_cache_alloc+0x56/0x2b0 [ 296.185128][T27151] ? cap_capable+0x250/0x290 [ 296.189714][T27151] create_new_namespaces+0x35/0x700 [ 296.194899][T27151] ? security_capable+0xa2/0xd0 [ 296.199746][T27151] ? ns_capable+0x91/0xf0 [ 296.204067][T27151] copy_namespaces+0x2bb/0x300 [ 296.208832][T27151] copy_process+0x2699/0x5c80 [ 296.213523][T27151] ? fork_idle+0x1b0/0x1b0 [ 296.217933][T27151] ? kasan_check_write+0x14/0x20 [ 296.222857][T27151] ? __mutex_unlock_slowpath+0x18c/0x630 [ 296.228491][T27151] _do_fork+0x180/0x5f0 [ 296.232647][T27151] ? dup_mm+0x340/0x340 [ 296.236793][T27151] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 296.242329][T27151] ? rcu_irq_exit+0x118/0x2b0 [ 296.246997][T27151] ? retint_kernel+0x2b/0x2b [ 296.251605][T27151] __x64_sys_clone+0xc1/0xd0 [ 296.256186][T27151] do_syscall_64+0xfe/0x140 [ 296.260686][T27151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.266567][T27151] RIP: 0033:0x459519 [ 296.270452][T27151] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.290057][T27151] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 296.298470][T27151] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 296.306451][T27151] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 296.314420][T27151] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 03:34:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400500) [ 296.322870][T27151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 296.330839][T27151] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="07000015499457148f3fbb74f1f1b85c1eedb17687bb75e72945daa61caed8feca58cfef4623097d391dd38a1a90ff", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000014c0), 0x1000) stat(&(0x7f0000000080)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0xffffffffffffffff, 0x0) utimes(&(0x7f00000001c0)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000000340), 0x1000) close(r0) 03:34:14 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) r1 = socket(0x8, 0x1, 0x600000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @dev}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000180)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000440)={@multicast1, @dev={0xac, 0x14, 0x14, 0x15}, r2}, 0xc) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xfffffffffffffde7) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") move_pages(0x0, 0x4, &(0x7f0000000100)=[&(0x7f0000ff0000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fee000/0x1000)=nil, &(0x7f0000ff1000/0x2000)=nil], 0x0, &(0x7f0000000180), 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) 03:34:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400600) 03:34:14 executing program 3 (fault-call:8 fault-nth:67): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:14 executing program 0 (fault-call:5 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x7a00) 03:34:14 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x40001) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000100)) r1 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0xbfc3, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc4c85512, &(0x7f0000000200)={{0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 03:34:14 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400002, 0x0) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000200)={0x6, 0x71, 0x100000000, 0x60, &(0x7f0000000040)=""/96, 0x33, &(0x7f00000000c0)=""/51, 0xe1, &(0x7f0000000100)=""/225}) syz_emit_ethernet(0x93, &(0x7f0000000440)=ANY=[@ANYBLOB="31dd9638e37fffffffffffff0004aa064f305b9ec90e1707e832eb8b692a6aa6e09eb8f5257bbda292c4d3a10b308f697bf2206c5e93ee37ce0df269ceaefdecff70674bab8e9e7fa217ceb6f7a69702c177e1d635d3e33eb16734c2ed72d3ff4c89e40a5542ef8bddbb2f222e4f8801b355dd1523496c84438fd4b1ba7070181ea7bef39176d03b9d121b75cb1f93b05b4740"], 0x0) 03:34:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400804) 03:34:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x231860) 03:34:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") keyctl$dh_compute(0x18, 0x0, &(0x7f0000000280)=""/243, 0xf3, 0x0) 03:34:14 executing program 1: r0 = socket$inet(0x2, 0x4040000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f00000002c0)=0x40000000000ffb, 0x4) bind$inet(r0, &(0x7f0000001280)={0x2, 0x8000004e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x200000004e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto(r0, &(0x7f00000022c0)="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", 0xffb, 0x0, 0x0, 0x0) socket$inet(0x2, 0x1, 0x8) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000012c0)=""/4096, 0xffb}], 0x1}, 0x400100) [ 296.941007][T27348] FAULT_INJECTION: forcing a failure. [ 296.941007][T27348] name failslab, interval 1, probability 0, space 0, times 0 03:34:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000580)="0fcc1047a38429a2687d52eceb8aadf7a61adc67f9e09ea69a32d367fff5a0f41fc02409d80fb33fc672d8878617dea718fdfc970605984c2e64a596f8f6149e0e761cc4a35ba29d4fd6a7016e8277471c725d76765f48a828fc4332524efa7f7662ff9028acbab8a40a4649775c5d33f1c371cd69d46e3b3606e4e89740738fa1bf48f3ebbc1f094c058710a1d716ea84f4df478d3aec6b0b466d01589c32fd58a64389306f48312784e9feb63ab31b87bde59229d4e0715416971c112dea2a569b98cc62d608", 0xc7, r0}, 0x68) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x7, 0x0, "daf2c82ef0a4a7fc37bd440c2ea6593f9e24d66405bb48bcfa18288ee8607032d55e3c40da1ab81fef5b37f7d17e608c345d496f6975ffe9d2166bb2e38910798fc7454ae92070dbaa7e5e92da221017"}, 0xd8) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) vmsplice(0xffffffffffffffff, 0x0, 0x1c, 0x8) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r2 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x29d) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x8}, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'vxcan1\x00', 0x0}) getpeername$netrom(r2, &(0x7f00000000c0)={{0x3, @default}, [@remote, @rose, @null, @netrom, @null, @remote, @bcast, @netrom]}, &(0x7f0000000040)=0x48) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x3) sendmsg$can_bcm(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020000000e0000000800000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a001005300040000c010010000a1f83df680454631b90a8eccaaca6d6aacae61a2af7de377141237b46954b2a3ae788a5fd840dd50b593d3ace2b0c06a59f826eb43d7cdd5736539aaf6fffee2a3796a3fe57649a36094afbbf9136cb18da00f76768092d9"], 0x80}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendto$inet6(r0, &(0x7f0000000000)="ccf96200", 0x4, 0x11, 0x0, 0x0) close(r0) [ 297.021282][T27348] CPU: 1 PID: 27348 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 297.029346][T27348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.039416][T27348] Call Trace: [ 297.042734][T27348] dump_stack+0x1d8/0x2f8 [ 297.047079][T27348] should_fail+0x608/0x860 [ 297.051507][T27348] ? setup_fault_attr+0x2b0/0x2b0 [ 297.056566][T27348] __should_failslab+0x11a/0x160 [ 297.061514][T27348] should_failslab+0x9/0x20 [ 297.066193][T27348] kmem_cache_alloc_trace+0x5d/0x2c0 [ 297.071477][T27348] ? copy_cgroup_ns+0x261/0x4b0 [ 297.076363][T27348] ? _raw_spin_unlock_irq+0x5f/0x80 [ 297.081644][T27348] copy_cgroup_ns+0x261/0x4b0 [ 297.086318][T27348] create_new_namespaces+0x40e/0x700 [ 297.091604][T27348] copy_namespaces+0x2bb/0x300 [ 297.096361][T27348] copy_process+0x2699/0x5c80 [ 297.101049][T27348] ? fork_idle+0x1b0/0x1b0 [ 297.105458][T27348] ? kasan_check_write+0x14/0x20 [ 297.110381][T27348] ? __mutex_unlock_slowpath+0x18c/0x630 [ 297.116008][T27348] _do_fork+0x180/0x5f0 [ 297.120174][T27348] ? dup_mm+0x340/0x340 [ 297.124323][T27348] ? debug_smp_processor_id+0x1c/0x20 [ 297.129716][T27348] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 297.135782][T27348] ? check_preemption_disabled+0xb7/0x280 [ 297.141514][T27348] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 297.147249][T27348] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 297.152713][T27348] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 297.158431][T27348] __x64_sys_clone+0xc1/0xd0 [ 297.163068][T27348] do_syscall_64+0xfe/0x140 [ 297.167568][T27348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.173466][T27348] RIP: 0033:0x459519 [ 297.177378][T27348] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.196981][T27348] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 297.205385][T27348] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 297.213355][T27348] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc 03:34:14 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400900) 03:34:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x80ffff) [ 297.221332][T27348] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 297.229296][T27348] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 297.237264][T27348] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:15 executing program 0 (fault-call:5 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400b00) 03:34:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:34:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x1000000) 03:34:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000100000890e, &(0x7f0000000000)='\x00\x00\x00\x00\x00') r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) dup2(r0, r2) 03:34:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:34:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='\x12evpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) 03:34:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 297.918303][T27667] FAULT_INJECTION: forcing a failure. [ 297.918303][T27667] name failslab, interval 1, probability 0, space 0, times 0 [ 297.976444][T27667] CPU: 0 PID: 27667 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 297.984486][T27667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.994563][T27667] Call Trace: [ 297.997872][T27667] dump_stack+0x1d8/0x2f8 [ 298.002244][T27667] should_fail+0x608/0x860 [ 298.006667][T27667] ? setup_fault_attr+0x2b0/0x2b0 [ 298.011693][T27667] __should_failslab+0x11a/0x160 [ 298.016621][T27667] ? alloc_pid+0x4b/0x860 [ 298.020952][T27667] should_failslab+0x9/0x20 [ 298.025448][T27667] kmem_cache_alloc+0x56/0x2b0 [ 298.030207][T27667] alloc_pid+0x4b/0x860 [ 298.034352][T27667] ? copy_thread_tls+0x2ff/0x600 [ 298.039302][T27667] copy_process+0x2a1d/0x5c80 [ 298.044008][T27667] ? fork_idle+0x1b0/0x1b0 [ 298.048425][T27667] ? kasan_check_write+0x14/0x20 [ 298.053379][T27667] ? __mutex_unlock_slowpath+0x18c/0x630 [ 298.059007][T27667] _do_fork+0x180/0x5f0 [ 298.063163][T27667] ? dup_mm+0x340/0x340 [ 298.067318][T27667] ? debug_smp_processor_id+0x1c/0x20 [ 298.072777][T27667] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 298.078851][T27667] ? check_preemption_disabled+0xb7/0x280 [ 298.084566][T27667] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 298.090277][T27667] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 298.095746][T27667] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 298.101478][T27667] __x64_sys_clone+0xc1/0xd0 [ 298.106062][T27667] do_syscall_64+0xfe/0x140 [ 298.110567][T27667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.116546][T27667] RIP: 0033:0x459519 [ 298.120440][T27667] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.140048][T27667] RSP: 002b:00007f3026dabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 298.148476][T27667] RAX: ffffffffffffffda RBX: 00007f3026dabc90 RCX: 0000000000459519 [ 298.156440][T27667] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 298.164404][T27667] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 03:34:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x2000000) 03:34:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 298.172369][T27667] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026dac6d4 [ 298.180328][T27667] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000004 03:34:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400d00) 03:34:16 executing program 0 (fault-call:5 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file0\x00', 0x3) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='#/fimm0'], 0x7) close(r0) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getpeername$netlink(r0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x8000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 03:34:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ftruncate(0xffffffffffffffff, 0x0) unshare(0x20020000) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000480)='\\evpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}, 0x167}, {{&(0x7f0000000a00)=@hci, 0x80, &(0x7f0000000cc0)=[{0x0}, {&(0x7f0000000ac0)=""/253, 0xfd}], 0x2, &(0x7f0000000d00)=""/159, 0x9f}, 0x8}], 0x2, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) io_setup(0xdee, &(0x7f0000000040)) syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x4, 0x80000000003) 03:34:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x401200) 03:34:16 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:34:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000100000890e, &(0x7f0000000000)='\x00\x00\x00\x00\x00') r1 = getpgrp(0x0) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) dup2(r0, r2) 03:34:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x3000000) 03:34:16 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:34:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x401fff) 03:34:16 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 298.733891][T27737] FAULT_INJECTION: forcing a failure. [ 298.733891][T27737] name failslab, interval 1, probability 0, space 0, times 0 03:34:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000180)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000080)={[], 0x0, 0xbfce97a397c94b22}) ioctl$KVM_RUN(r2, 0xae80, 0x4000000) [ 298.896467][T27737] CPU: 0 PID: 27737 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 298.904490][T27737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.914541][T27737] Call Trace: [ 298.917844][T27737] dump_stack+0x1d8/0x2f8 [ 298.922178][T27737] should_fail+0x608/0x860 [ 298.926603][T27737] ? setup_fault_attr+0x2b0/0x2b0 [ 298.931663][T27737] __should_failslab+0x11a/0x160 [ 298.936887][T27737] ? security_file_alloc+0x36/0x200 [ 298.942091][T27737] should_failslab+0x9/0x20 [ 298.946619][T27737] kmem_cache_alloc+0x56/0x2b0 [ 298.951391][T27737] security_file_alloc+0x36/0x200 [ 298.956421][T27737] __alloc_file+0xb1/0x350 [ 298.960848][T27737] alloc_empty_file+0xac/0x1b0 [ 298.965607][T27737] alloc_file+0x60/0x4c0 [ 298.969853][T27737] alloc_file_pseudo+0x25b/0x310 [ 298.974790][T27737] ? alloc_empty_file_noaccount+0x80/0x80 [ 298.980508][T27737] ? __alloc_fd+0x523/0x5d0 [ 298.985012][T27737] anon_inode_getfile+0xad/0x180 [ 298.989994][T27737] copy_process+0x2a93/0x5c80 [ 298.994689][T27737] ? fork_idle+0x1b0/0x1b0 [ 298.999109][T27737] ? kasan_check_write+0x14/0x20 [ 299.004041][T27737] ? __mutex_unlock_slowpath+0x18c/0x630 [ 299.009670][T27737] _do_fork+0x180/0x5f0 [ 299.013834][T27737] ? dup_mm+0x340/0x340 [ 299.017990][T27737] ? debug_smp_processor_id+0x1c/0x20 [ 299.023370][T27737] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 299.029435][T27737] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 299.035154][T27737] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 299.040782][T27737] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 299.046235][T27737] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 299.051950][T27737] __x64_sys_clone+0xc1/0xd0 [ 299.056539][T27737] do_syscall_64+0xfe/0x140 [ 299.061050][T27737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.066937][T27737] RIP: 0033:0x459519 [ 299.070834][T27737] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:34:16 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x88, 0x80000005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x402000) 03:34:16 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x14, 0x2f, 0x3ff, 0x0, 0x0, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 299.090444][T27737] RSP: 002b:00007f3026d8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 299.098861][T27737] RAX: ffffffffffffffda RBX: 00007f3026d8ac90 RCX: 0000000000459519 [ 299.106851][T27737] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 299.114831][T27737] RBP: 000000000075bfc8 R08: ffffffffffffffff R09: 0000000000000000 [ 299.122893][T27737] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026d8b6d4 [ 299.130867][T27737] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 [ 299.178221][T27737] kasan: CONFIG_KASAN_INLINE enabled [ 299.184297][T27737] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 299.241051][T27737] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 299.248030][T27737] CPU: 1 PID: 27737 Comm: syz-executor.0 Not tainted 5.2.0-rc6+ #11 [ 299.255998][T27737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.266067][T27737] RIP: 0010:get_task_pid+0xe1/0x210 [ 299.267843][T27757] kobject: 'kvm' (000000009310a913): kobject_uevent_env [ 299.271258][T27737] Code: 89 ff e8 62 27 5f 00 49 8b 07 44 89 f1 4c 8d bc c8 90 01 00 00 eb 0c e8 0d fe 25 00 49 81 c7 38 05 00 00 4c 89 f8 48 c1 e8 03 <80> 3c 18 00 74 08 4c 89 ff e8 31 27 5f 00 4d 8b 37 e8 f9 47 12 00 [ 299.271265][T27737] RSP: 0018:ffff88805c61fd78 EFLAGS: 00010203 [ 299.271273][T27737] RAX: 00000000000000a7 RBX: dffffc0000000000 RCX: 0000000000040000 [ 299.271279][T27737] RDX: ffffc90005fda000 RSI: 000000000003ffff RDI: 0000000000040000 [ 299.271284][T27737] RBP: ffff88805c61fd90 R08: ffffffff814fb358 R09: ffffed1015d66bf8 [ 299.271289][T27737] R10: ffffed1015d66bf8 R11: 1ffff11015d66bf7 R12: 0010002102001ffc [ 299.271295][T27737] R13: 1ffff1100b8c3fbc R14: 0000000000000000 R15: 000000000000053e [ 299.271307][T27737] FS: 00007f3026d8b700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 299.278397][T27757] kobject: 'kvm' (000000009310a913): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 299.297878][T27737] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 299.297884][T27737] CR2: 0000000020000000 CR3: 0000000088153000 CR4: 00000000001426e0 [ 299.297892][T27737] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 299.297896][T27737] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 299.297901][T27737] Call Trace: [ 299.297925][T27737] _do_fork+0x1b9/0x5f0 [ 299.297936][T27737] ? dup_mm+0x340/0x340 [ 299.297949][T27737] ? debug_smp_processor_id+0x1c/0x20 [ 299.297958][T27737] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 299.297971][T27737] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 299.297989][T27737] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 299.427984][T27737] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 299.433459][T27737] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 299.439172][T27737] __x64_sys_clone+0xc1/0xd0 [ 299.443771][T27737] do_syscall_64+0xfe/0x140 [ 299.448273][T27737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.454644][T27737] RIP: 0033:0x459519 [ 299.458526][T27737] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.478122][T27737] RSP: 002b:00007f3026d8ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 299.486522][T27737] RAX: ffffffffffffffda RBX: 00007f3026d8ac90 RCX: 0000000000459519 [ 299.494487][T27737] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0010002102001ffc [ 299.502461][T27737] RBP: 000000000075bfc8 R08: ffffffffffffffff R09: 0000000000000000 [ 299.510419][T27737] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3026d8b6d4 [ 299.518387][T27737] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000005 [ 299.526524][T27737] Modules linked in: [ 299.533403][ T3879] kobject: 'loop4' (000000009aca8565): kobject_uevent_env [ 299.546907][ T3879] kobject: 'loop4' (000000009aca8565): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 299.548597][T27737] ---[ end trace ddd3a9d4986bf97d ]--- [ 299.563628][ T3879] kobject: 'loop1' (00000000219f3fcb): kobject_uevent_env [ 299.565680][T27737] RIP: 0010:get_task_pid+0xe1/0x210 [ 299.576032][T27737] Code: 89 ff e8 62 27 5f 00 49 8b 07 44 89 f1 4c 8d bc c8 90 01 00 00 eb 0c e8 0d fe 25 00 49 81 c7 38 05 00 00 4c 89 f8 48 c1 e8 03 <80> 3c 18 00 74 08 4c 89 ff e8 31 27 5f 00 4d 8b 37 e8 f9 47 12 00 [ 299.578238][ T3879] kobject: 'loop1' (00000000219f3fcb): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 299.598231][T27737] RSP: 0018:ffff88805c61fd78 EFLAGS: 00010203 [ 299.617695][T27737] RAX: 00000000000000a7 RBX: dffffc0000000000 RCX: 0000000000040000 [ 299.625900][T27737] RDX: ffffc90005fda000 RSI: 000000000003ffff RDI: 0000000000040000 [ 299.635782][T27737] RBP: ffff88805c61fd90 R08: ffffffff814fb358 R09: ffffed1015d66bf8 [ 299.639128][ T3879] kobject: 'loop2' (00000000a3a1ec6b): kobject_uevent_env [ 299.643801][T27737] R10: ffffed1015d66bf8 R11: 1ffff11015d66bf7 R12: 0010002102001ffc [ 299.643808][T27737] R13: 1ffff1100b8c3fbc R14: 0000000000000000 R15: 000000000000053e [ 299.643816][T27737] FS: 00007f3026d8b700(0000) GS:ffff8880aea00000(0000) knlGS:0000000000000000 [ 299.643822][T27737] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 299.643836][T27737] CR2: 00007f3026d6a9d0 CR3: 0000000088153000 CR4: 00000000001406f0 [ 299.653078][ T3879] kobject: 'loop2' (00000000a3a1ec6b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 299.659674][T27737] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 299.708784][T27737] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 299.716786][T27737] Kernel panic - not syncing: Fatal exception [ 299.724047][T27737] Kernel Offset: disabled [ 299.728369][T27737] Rebooting in 86400 seconds..