0', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0xa0, 0x10001, 0x6, 0x8000, 0x0, 0x5, 0x40, 0x1, 0x2, 0x5, 0x0, 0x4, 0x7fffffff, 0x7, 0x4, 0x3, 0x9fe, 0x80000000000, 0x3, 0x6, 0x20ad, 0xfffffffffffffffa, 0xff, 0xfffffffffffffff9, 0x9, 0x3ff, 0x0, 0x40, 0x10000, 0x1, 0x4, 0x3, 0x6597, 0x200, 0x100000000, 0xcf, 0x0, 0x9, 0x7, @perf_bp={&(0x7f0000000040), 0xc}, 0x100, 0x7fffffff, 0x5, 0x2, 0x4, 0x200, 0xb87d}, r1, 0x2, r0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4000, 0x0) sendmsg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:08 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x0, 0x7}, 0xffffffffffffff94) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) write$FUSE_POLL(r1, &(0x7f0000000000)={0x18, 0x0, 0x7, {0x24d4}}, 0x18) 07:50:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000003c0)="11dca5055e0bcfec3897dd14af3726f56ff35a7aea0ef3848d70496881e85fb5fd9d51eb039c4bac9013369a817d40346d15652a88f6819406bb2ef90adf30908e63c69e000000000000eb12ae98688c651650f77d7845e9d41a233bf0fd308743a59de99f1d7710eaebad74447fde6eea7b13e8a9b0f237072e525e01b655e6c0c2b8eadc872ef4") mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:08 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0xe000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:08 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) lsetxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64\x00', &(0x7f0000000440)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80', 0x54, 0x1) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = accept(r1, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f00000000c0)=0x80) open_by_handle_at(r3, &(0x7f00000004c0)={0xf3, 0xff, "0efc235ed078355ce53a331581e10fc0c6d586ed0b57c16d26c4469cf97f711001867b7eaf936fb4f1f0648d4b63d05e9f0d61411ff1fd5c9f9143fb17585afd8549d64478225047952d482b4c3f9e00ca1cdccee2dc93d8c2b3fd8623acc6e7605ea14fbab9cf12c53f74cb267d3d6daf147e72137bbefd682714c3c13b4d5fcb75b14bf0175a7ac04f19103a1b06f54eaf5fcbf5e6133925f023324842c8fac3cbc9b8ed302cd35075e7ba262a596b0fb589283f6e0afe9f1fe7cedb959639f439801e9b8047aaeabba801e2d5f011a0cddda5394ded947da109c0619fa0a884f72968b5c67cac69cfdf"}, 0x440400) 07:50:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000040)={@loopback, @broadcast}, &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000100)={0x4}) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000003c0)="11dca5055e0bcfec3897dd14af3726f56ff35a7aea0ef3848d70496881e85fb5fd9d51eb039c4bac9013369a817d40346d15652a88f6819406bb2ef90adf30908e63c69e000000000000eb12ae98688c651650f77d7845e9d41a233bf0fd308743a59de99f1d7710eaebad74447fde6eea7b13e8a9b0f237072e525e01b655e6c0c2b8eadc872ef4") mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:08 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) getsockname$unix(r1, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:09 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000180)='c\xb37Z \xc8Z\x16>tat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f0000000140)) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x6b6b6b00}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:09 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000480)={'vcan0\x00', 0x0}) getsockname$packet(r0, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000d80)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000dc0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000ec0)=0xe8) getsockname$packet(r0, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000f40)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000f80)={@multicast2, @rand_addr, 0x0}, &(0x7f0000000fc0)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000001000)={@local, @rand_addr, 0x0}, &(0x7f0000001040)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000001080)={@rand_addr, 0x0}, &(0x7f00000010c0)=0x14) recvmmsg(r0, &(0x7f0000008740)=[{{&(0x7f0000002a80)=@nl, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000002b00)=""/87, 0x57}, {&(0x7f0000002b80)}], 0x2}}, {{&(0x7f0000002c00)=@nfc, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/107, 0x6b}], 0x2, &(0x7f0000003d40)=""/21, 0x15}, 0x10001}, {{&(0x7f0000003d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000041c0)=[{&(0x7f0000003e00)=""/190, 0xbe}, {&(0x7f0000003ec0)=""/170, 0xaa}, {&(0x7f0000003f80)=""/240, 0xf0}, {&(0x7f0000004080)=""/154, 0x9a}, {&(0x7f0000004140)=""/10, 0xa}, {&(0x7f0000004180)=""/26, 0x1a}], 0x6}, 0xffffffffffffff9e}, {{&(0x7f0000004240)=@nfc, 0x80, &(0x7f0000004640)=[{&(0x7f00000042c0)=""/67, 0x43}, {&(0x7f0000004340)=""/125, 0x7d}, {&(0x7f00000043c0)=""/192, 0xc0}, {&(0x7f0000004480)=""/240, 0xf0}, {&(0x7f0000004580)=""/37, 0x25}, {&(0x7f00000045c0)=""/38, 0x26}, {&(0x7f0000004600)=""/18, 0x12}], 0x7, &(0x7f00000046c0)=""/184, 0xb8}, 0x8000}, {{&(0x7f0000004780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000004b80)=[{&(0x7f0000004800)=""/192, 0xc0}, {&(0x7f00000048c0)=""/37, 0x25}, {&(0x7f0000004900)=""/216, 0xd8}, {&(0x7f0000004a00)=""/199, 0xc7}, {&(0x7f0000004b00)=""/122, 0x7a}], 0x5}, 0x1}, {{&(0x7f0000004c00)=@nfc_llcp, 0x80, &(0x7f0000004d40)=[{&(0x7f0000004c80)=""/174, 0xae}, {&(0x7f0000005740)=""/4096, 0x1000}], 0x2, &(0x7f0000004d80)=""/248, 0xf8}, 0x1}, {{0x0, 0x0, &(0x7f0000004f40)=[{&(0x7f0000004e80)=""/98, 0x62}, {&(0x7f0000004f00)=""/20, 0x14}], 0x2, &(0x7f0000004f80)=""/183, 0xb7}, 0x7fffffff}, {{&(0x7f0000005040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000005500)=[{&(0x7f00000050c0)=""/131, 0x83}, {&(0x7f0000005180)=""/6, 0x6}, {&(0x7f0000006740)=""/4096, 0x1000}, {&(0x7f00000051c0)=""/13, 0xd}, {&(0x7f0000007740)=""/4096, 0x1000}, {&(0x7f0000005200)=""/224, 0xe0}, {&(0x7f0000005300)=""/94, 0x5e}, {&(0x7f0000005380)=""/58, 0x3a}, {&(0x7f00000053c0)=""/189, 0xbd}, {&(0x7f0000005480)=""/111, 0x6f}], 0xa, &(0x7f00000055c0)=""/72, 0x48}, 0x1}], 0x8, 0x2000, 0x0) accept$packet(r2, &(0x7f000000be40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000be80)=0x14) recvmmsg(r0, &(0x7f0000011500)=[{{&(0x7f000000c180)=@rc, 0x80, &(0x7f000000c300)=[{&(0x7f000000c200)=""/193, 0xc1}], 0x1, &(0x7f000000c340)=""/4096, 0x1000}, 0x2}, {{&(0x7f000000d340)=@can, 0x80, &(0x7f000000f400)=[{&(0x7f000000d3c0)=""/4096, 0x1000}, {&(0x7f000000e3c0)=""/16, 0x10}, {&(0x7f000000e400)=""/4096, 0x1000}], 0x3}, 0x1}, {{&(0x7f000000f440)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000f940)=[{&(0x7f000000f4c0)=""/68, 0x44}, {&(0x7f000000f540)=""/193, 0xc1}, {&(0x7f000000f640)=""/110, 0x6e}, {&(0x7f000000f6c0)=""/168, 0xa8}, {&(0x7f000000f780)=""/203, 0xcb}, {&(0x7f000000f880)=""/17, 0x11}, {&(0x7f000000f8c0)=""/88, 0x58}], 0x7, &(0x7f000000f9c0)=""/66, 0x42}, 0x2008}, {{0x0, 0x0, &(0x7f000000fe80)=[{&(0x7f000000fa40)=""/23, 0x17}, {&(0x7f000000fa80)=""/220, 0xdc}, {&(0x7f000000fb80)=""/153, 0x99}, {&(0x7f000000fc40)=""/142, 0x8e}, {&(0x7f000000fd00)=""/122, 0x7a}, {&(0x7f000000fd80)=""/49, 0x31}, {&(0x7f000000fdc0)=""/177, 0xb1}], 0x7}, 0x1ff}, {{&(0x7f000000ff00)=@isdn, 0x80, &(0x7f0000011440)=[{&(0x7f000000ff80)=""/235, 0xeb}, {&(0x7f0000010080)=""/250, 0xfa}, {&(0x7f0000010180)=""/182, 0xb6}, {&(0x7f0000010240)=""/4096, 0x1000}, {&(0x7f0000011240)=""/253, 0xfd}, {&(0x7f0000011340)=""/210, 0xd2}], 0x6, &(0x7f00000114c0)=""/27, 0x1b}, 0x206}], 0x5, 0x2, &(0x7f0000011640)) getpeername$packet(r0, &(0x7f0000011680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000116c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000011700)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000011740)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000011840)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000011880)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000011980)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000119c0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000011ac0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000011b00)={{{@in6=@ipv4={[], [], @dev}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000011c00)=0xe8) getpeername$packet(r0, &(0x7f0000011c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000011c80)=0x14) getsockname$packet(r2, &(0x7f0000011cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000011d00)=0x14) getsockname$packet(r0, &(0x7f0000011e00)={0x11, 0x0, 0x0}, &(0x7f0000011e40)=0x14) accept4$packet(r0, &(0x7f0000011e80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000011ec0)=0x14, 0x80800) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000012780)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000012880)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000013d00)={{{@in=@broadcast, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in=@local}}, &(0x7f0000013e00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000013ec0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000013f00)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000013f40)={{{@in6=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000014040)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000014080)={{{@in=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000014180)=0xe8) accept$packet(r0, &(0x7f00000141c0)={0x11, 0x0, 0x0}, &(0x7f0000014200)=0x14) clock_gettime(0x0, &(0x7f000001a200)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000019fc0)=[{{&(0x7f0000014240)=@ipx, 0x80, &(0x7f0000014380)=[{&(0x7f00000142c0)=""/128, 0x80}, {&(0x7f0000014340)=""/5, 0x5}], 0x2, &(0x7f00000143c0)=""/196, 0xc4}, 0x3}, {{&(0x7f00000144c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f00000146c0)=[{&(0x7f0000014540)=""/233, 0xe9}, {&(0x7f0000014640)=""/127, 0x7f}], 0x2, &(0x7f0000014700)=""/120, 0x78}, 0x3}, {{&(0x7f0000014780)=@tipc, 0x80, &(0x7f0000014900)=[{&(0x7f0000014800)=""/195, 0xc3}], 0x1}, 0x80}, {{&(0x7f0000014940)=@nl=@proc, 0x80, &(0x7f0000016c80)=[{&(0x7f00000149c0)=""/37, 0x25}, {&(0x7f0000014a00)=""/150, 0x96}, {&(0x7f0000014ac0)=""/4096, 0x1000}, {&(0x7f0000015ac0)=""/169, 0xa9}, {&(0x7f0000015b80)=""/4096, 0x1000}, {&(0x7f0000016b80)=""/187, 0xbb}, {&(0x7f0000016c40)=""/28, 0x1c}], 0x7, &(0x7f0000016d00)=""/17, 0x11}, 0x4553}, {{&(0x7f0000016d40)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f00000170c0)=[{&(0x7f0000016dc0)=""/26, 0x1a}, {&(0x7f0000016e00)=""/98, 0x62}, {&(0x7f0000016e80)=""/85, 0x55}, {&(0x7f0000016f00)=""/37, 0x25}, {&(0x7f0000016f40)=""/182, 0xb6}, {&(0x7f0000017000)=""/9, 0x9}, {&(0x7f0000017040)=""/118, 0x76}], 0x7, &(0x7f0000017140)=""/189, 0xbd}, 0x100000001}, {{&(0x7f0000017200)=@caif, 0x80, &(0x7f0000018500)=[{&(0x7f0000017280)=""/4096, 0x1000}, {&(0x7f0000018280)=""/117, 0x75}, {&(0x7f0000018300)=""/153, 0x99}, {&(0x7f00000183c0)=""/249, 0xf9}, {&(0x7f00000184c0)=""/54, 0x36}], 0x5, &(0x7f0000018580)=""/53, 0x35}, 0x24}, {{&(0x7f00000185c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000018900)=[{&(0x7f0000018640)=""/114, 0x72}, {&(0x7f00000186c0)=""/144, 0x90}, {&(0x7f0000018780)=""/59, 0x3b}, {&(0x7f00000187c0)=""/127, 0x7f}, {&(0x7f0000018840)=""/158, 0x9e}], 0x5, &(0x7f0000018980)}, 0x1}, {{&(0x7f00000189c0)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000018b40)=[{&(0x7f0000018a40)=""/217, 0xd9}], 0x1, &(0x7f0000018b80)=""/145, 0x91}, 0x9}, {{&(0x7f0000018c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000019f40)=[{&(0x7f0000018cc0)=""/252, 0xfc}, {&(0x7f0000018dc0)=""/4096, 0x1000}, {&(0x7f0000019dc0)=""/239, 0xef}, {&(0x7f0000019ec0)=""/72, 0x48}], 0x4, &(0x7f0000019f80)=""/47, 0x2f}, 0x7fffffff}], 0x9, 0x0, &(0x7f000001a240)={r33, r34+10000000}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000001a280)={{{@in6, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f000001a380)=0xe8) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f000001d940)={@mcast2, 0x0}, &(0x7f000001d980)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000001da80)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f000001db80)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000001e600)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f000001e5c0)={&(0x7f000001dbc0)={0x9c8, r3, 0x3, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r4}, {0xb8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}, {{0x8, 0x1, r8}, {0x108, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x1000, 0xf4, 0x1, 0x8}, {0xffff, 0x1781c19c, 0x9, 0x2}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0xfc, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0xf4, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x74}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r16}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0x1b0, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9b70}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r22}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r26}}}]}}, {{0x8, 0x1, r27}, {0x1a8, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0xbd5c, 0x3, 0x2, 0x1}, {0xaf0, 0x7fffffff, 0xae, 0x1}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r28}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r30}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r31}, {0x22c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r32}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3c7d}}, {0x8, 0x6, r36}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r37}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r38}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}]}}]}, 0x9c8}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) 07:50:09 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000440)={"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"}) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) getsockname$tipc(r0, &(0x7f0000000040)=@name, &(0x7f00000000c0)=0x10) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000100)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:09 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000140)={0x7, 0xf0, 0x1, 0x91, 0x10000, 0x1f}) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x1dc}, 0x1, 0x0, 0x0, 0x8084}, 0x4011) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:09 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0xa0010000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:09 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:10 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000180)='c\xb37Z \xc8Z\x16>tat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f0000000140)) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0xfeffffff}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:10 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:10 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x20, 0x4000) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x1) write$P9_RAUTH(r1, &(0x7f0000000380)={0x14, 0x67, 0x2, {0x4a, 0x4, 0x1}}, 0x14) mremap(&(0x7f00006c9000/0x2000)=nil, 0x2000, 0x3000, 0x0, &(0x7f00006b5000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f00005b2000/0x3000)=nil, 0x3000) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x7, &(0x7f000024e000/0x3000)=nil) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x5) ioctl$SIOCNRDECOBS(r1, 0x89e2) openat$vfio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vfio/vfio\x00', 0x1, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) accept$nfc_llcp(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x60) 07:50:10 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000300800000000000"], 0x18}, 0x0) 07:50:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:10 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:10 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:10 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x1a0ffffffff}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:10 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000180)='c\xb37Z \xc8Z\x16>tat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f0000000140)) 07:50:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:10 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:10 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x0, 0x3) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00004e0000/0x4000)=nil, 0x4000, 0x64) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:10 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000100)={0x2, 0x1, 0x7, 0x0, 0xd}) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b1000000000000e46e69b60001060000159029a8264aa5b0"], 0x18}, 0x0) socket$isdn(0x22, 0x3, 0x25) 07:50:10 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x6b6b6b00000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:10 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x1, 0x1}, 0xf) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:10 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:11 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x100000000000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:11 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000180)='c\xb37Z \xc8Z\x16>tat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f0000000140)) 07:50:11 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x200000000000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:11 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000000)={0x3, 0x4f, "21f4536513d1d3ac2e9352587f641451f7a17abe184015146246d68ab324a380ea7ce78517618e2347931c741ab72ef51634b12b649321c9e6c539cf6175f85cf966fc9dddcd0ad78329b3bd5b3eb1"}) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f000046a000/0x8000)=nil, 0x8000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x8) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:11 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000010000000100000003000000030000002b0e46a44e58ba6235430f4726de8e1ad4c6bfa6d57ccae5f380964dc63192bd50d6b4ac7eb6f01e9265a8cbe380871c31ca0fcf8cd5da9fa1a6d1762cca628a045d81ac113e43aefe03e72330c992ff010000217c1059a704f548a501bdf4a21ea8b6fba5e7db4a3a7286ed3094c2649e68db060cd5"], 0x18}, 0x0) 07:50:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:11 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000cc0)=""/4096) 07:50:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:11 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0xe00000000000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 294.474028] cgroup: fork rejected by pids controller in /syz2 07:50:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:12 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:12 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000000)={0x5c, "5fbbb774ac26e61bd729e47d24b9cb097a2418b48511244d065e7548572b2725", 0x5, 0x8, 0x81, 0x6, 0x10, 0x1, 0x40, 0x9}) 07:50:12 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000180)='c\xb37Z \xc8Z\x16>tat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f0000000140)) 07:50:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$pptp(r0, &(0x7f0000000200)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0xff}}}, 0x1e) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80010000}, 0x30e, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r3, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffffff8}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x4000) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e23, 0xffff, @empty, 0x3}, @in6={0xa, 0x4e22, 0x2, @mcast1, 0xd0a3}], 0x48) write$FUSE_LSEEK(r0, &(0x7f0000000240)={0x18, 0x0, 0x4, {0x2}}, 0x18) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x82040, 0x0) 07:50:12 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x7fffffffffffffff}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x0, 0x0}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:12 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:12 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/context\x00', 0x2, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:12 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101000, 0x0) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000040)=']cgroupvmnet1mime_typesystem\x00', 0x1d) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:12 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0xfeffffff00000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x0, 0x0}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:12 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:12 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='cpuacct.usage_user\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000040), 0x1a227fc6) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:13 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x100, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000ff7f000000000000030f000003000000"], 0x18}, 0x0) 07:50:13 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0xffffffff00000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x0, 0x0}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:13 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000180)='c\xb37Z \xc8Z\x16>tat\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:13 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:13 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) r2 = gettid() syz_open_procfs(r2, &(0x7f0000000000)='schedstat\x00') ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:13 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0xffffffffa0010000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x0, &(0x7f0000000240)}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000080)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000010000000100000003000000030000003f3961ea46438ac67120cff2fe382ee140d003d83354df0413be30882b1ec07ddd69461372f2"], 0x18}, 0x0) 07:50:13 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:13 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x100, 0x8) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000440)=""/197) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:13 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000180)='c\xb37Z \xc8Z\x16>tat\x00', 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:13 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffff7f}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x800, 0x420000) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/71) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0xffffffffffffffac, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:13 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000180)='c\xb37Z \xc8Z\x16>tat\x00', 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x0, &(0x7f0000000240)}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:14 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:14 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0xffffff4c, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xffffffffffffffff, 0x0, 0x0, 0xd60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xb) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:14 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r0, &(0x7f0000000180)='c\xb37Z \xc8Z\x16>tat\x00', 0x26e1, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x9, 0x8) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18005c3b0000000001a1a12aa91988794a7dd01e39cf0000"], 0x18}, 0x0) 07:50:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x0, &(0x7f0000000240)}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:14 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:14 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:14 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f00000d9000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000334000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:14 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:14 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1a0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:14 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:14 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe00}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x0, 0x0, 0xffffffffffffff8c, 0xfffffffffffffffd}, 0x0) r3 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x2, 0x11) getsockname$packet(r0, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001a40)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000003c40)={0x0, @dev, @multicast1}, &(0x7f0000003c80)=0xc) bind$pptp(r3, &(0x7f0000000440)={0x18, 0x2, {0x2, @loopback}}, 0x1e) getsockname$packet(r0, &(0x7f0000003cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003d00)=0x14) sendmmsg$inet6(r3, &(0x7f0000003dc0)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x9, @remote, 0x643f}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000100)="a5a4592de117e97a00b441c107473c7161dccd920a2529754de41fdcec460e44aa035ccb21e5aa2d50664589274256b5d81aa6243047fb4e1109a386215adefaa0eb8fbbb9c5d0aff2da4d8af6cba9c00e9e197799ab611cee835ee6b87052e9cb56d999830bd38bbad494129d8e57eebb05528418ecc6ba63ac8d80650263c19f677c917ee4cd7703", 0x89}, {&(0x7f00000001c0)="dd3465bdaa4309035fdfb875db9c722fe970dd174d999ec9f782b8fb1493d7f461b01e658e13c2eaadb2b6d7f3b4a76070b75b48333420daef6495d834ea0028e221d1e1c2a65b40ddb7dbae02c156a506da2de640961935b3ec1f7f4c84f2b34ac0c129fabe6a0c678af2d9c9b7c4659004be8215fc6ea59981baffb440d27593265c95d25c8bcb1c2e9fa5182944346fe7608b1c158774cfe9c55bf4cc1143dd4d9f6b4f1789945258ad252ad108d1344464e5626f", 0xb6}, {&(0x7f0000000280)="010b707996ce64b42d369d614d3659de0233c6a0dc2de748b23d67fb3b0073bd8f71290a005fd5672840b6a4f0a64917e5f9b0cbe67a2a571423c496dc4e76499d6b6d7cedebc6e24f48a64c66d89d6070e306a6e497ffbab568b99dae57c834e70ad6355979db76fde2d00e9118ae8f72348f711b618c4efce5c235508c657f01cfd083c53de0dbf2d681e08507c85f8782dd", 0x93}], 0x3, &(0x7f00000003c0)=[@tclass={{0x14, 0x29, 0x43, 0x7ff}}], 0x18}}, {{&(0x7f0000000400)={0xa, 0x4e24, 0x400, @rand_addr="69f09e8653055c2c020485939d65157b", 0x9}, 0x1c, &(0x7f0000000440), 0x0, &(0x7f0000000480)=[@dstopts_2292={{0x140, 0x29, 0x4, {0x2b, 0x24, [], [@hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @remote}, @generic={0x7da4, 0x16, "5be077487b7d4c676c2a3821e1ea9a8629a73ab44f9b"}, @ra={0x5, 0x2, 0x7}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x1}, @pad1, @generic={0x20, 0x69, "8f29b05eff79e253ccb7b6dc41bb7a1770c77c347ae29e342f84239e44c9ce0a99e604be0d2add4c1c766cebba00bbc72fc2124a16106fa16daec9fbdf3d007fbe44eb7c761f740d21c04ae892dc219262301fd5e1f36e8eca63767758b626f1739504f959933f324b"}, @generic={0x1000, 0x63, "feee64052dff1ba6eaa1c888d5a55145bb327c1145a2e23eb476e85c1685ad2cfe863416d00f99f582b6cc194fc085c065d805194d7d8e8fffc969afb3a82367fa7e83767ab5b57b929018477d4a17cb5277498d5e264fff9506d9ec056b27f856599d"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xd0}}], 0x158}}, {{&(0x7f0000000600)={0xa, 0x4e23, 0xc81, @mcast2, 0x6}, 0x1c, &(0x7f0000000640), 0x0, &(0x7f0000001a80)=[@dontfrag={{0x14, 0x29, 0x3e, 0x1631}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r4}}}], 0x40}}, {{&(0x7f0000001ac0)={0xa, 0x4e23, 0x1, @loopback, 0x5}, 0x1c, &(0x7f0000001d00)=[{&(0x7f0000001b00)="9480cab565124584293a575eab35c835009496f7c0b20edbb74007ca71b3582ae380e5be0ff9b969a75a8c7f8a9ecc314381b313", 0x34}, {&(0x7f0000001b40)="3085133e6a817e16ff1e42bcb2382068d828f12ae500dcc1f976f59133a56acc168ac502ae1f6523e183a890969b327ff5c37a71600e5b815e421b57f66b99e502c9b29b3ec8e1a5adfc4ce79bd63c866e3a192580758be0b464f2aad53e73cfdbdf015e6758bb946080129af06c7c34eba069d4495f9671f2059340aba3fc7f31c3c65eda23fe59012420eaa8abd7d28a5cbfc8657cfaba084e6210fc9e8bf901fddb27b6acc07cb232ada1efe5ddd83c637589b9496196b7d8231d067caddabb822f09b712be4020b6fa2f42158ffd0fe5d1a0136972b503c3bd3028b4", 0xde}, {&(0x7f0000001c40)="50e0f1349f67b0dfa5c710ca71a250430a3b64a60f3a8162c4ca85a3cc3ad706851dc677398b5a94610594fd2ada44809d33dc394abe7e95be632e3929589576f9e83c1377ddfe545ca715661498d95be0ed3b7906d68b155519ad89f02f71b1418c601f86f7861c17a519465b71c7e41d6f9c3d0650b64aff42081918e781295078cd9b69d2a1656291f1300a5544de75d4841533710a55", 0x98}], 0x3, &(0x7f0000001d40)=[@rthdr={{0x38, 0x29, 0x39, {0x11, 0x4, 0x0, 0x6, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @mcast1]}}}, @hopopts_2292={{0x2a8, 0x29, 0x36, {0x2e, 0x52, [], [@pad1, @generic={0xff, 0x5c, "54ce3f68ff262f46b86a9a15db3653dd2495ea66399e50b8720090b3cb5a94ddc3367a9ab82b8e93299332a814741757cc7473aecde587c9bf085f07476f05a7826f51ae5e9aef0de595c686cf6913792e7a6d6dee4725b435a52831"}, @generic={0x4, 0x5b, "dc781f57230c7e2eeba8929f40fe82797d2069b43eedd11948bde86670c709a4e4f212168819944b6edcbeb15146e7484012fee9f39fd5192374909be8b8ac2c5f016e963ad7bd83aa98190bcd0ceabe5329ca9ecbb9e31a3aa14c"}, @generic={0xfffffffffffffff7, 0xd5, "8dbcf5403a81bfa91a7a5ece782bcc185bf3c4979bd66bcea37882a37a57538efd77d713a5757b8c2beb9078f9346d8d346e63f858141c40e6827d21d0981978ef018c499d79a76f12ffdcca59201d6419d91bf7dd69f0ba37b2457c507ec7b9b0eaa9de7cc59f6cc3692722cdeb8dbdbecf3ecc8fb1d9d83a7632f072ccb0f20672716bdf3191a42fcd0dfe6a0cb6acfc000a8320bf88cc453a2fda3be92020f5c7a41b83006e1bd3e9539606f19351437429882c09a62ac1a9f81141b99ed663e38003611758a3b90683317b5ae7b6d046b0cd73"}, @generic={0x7fff, 0xf9, "1fb8c6fabe11786a667ecc008fc8e7aec1c5391bdea3f75bb01e36d145457619e88ad032c8e3be5fba3f80d49524dc3ab10e39bcf51e98cff7b992568dd6ab768029c0715ad82f74314cbcdff1897a066da9a7ab01c8431626bc198c0a176f805185324eb4be691ff839af83c0837187e318baf71aa5311fa2f8e8e09a469cfb867ff50b0a264c2148668ebbc779ee5bd3aefa285d9f644576199c2d07da321705a32a4c8e6de606e6c0179465255cee70cae379d363a5152b6b00849c4c666a32e6f2b56aa498fbf6dbaa6ad01a41758870d967c734ce4e5a03f99620cd30bf1c22e46c075b30407dbe828e1e6cc00e9f26a023ecdf0aa987"}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x1}}, @flowinfo={{0x14, 0x29, 0xb, 0x3}}, @hopopts={{0xa0, 0x29, 0x36, {0xcabfcc429ab692bb, 0x10, [], [@calipso={0x7, 0x38, {0x4, 0xc, 0x2, 0xab, [0x945, 0x2, 0x1000, 0xffffffff, 0x60ca, 0x100]}}, @enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x18, {0x3, 0x4, 0x0, 0x401, [0x7, 0x100]}}, @calipso={0x7, 0x28, {0x7, 0x8, 0x3, 0x0, [0x6, 0x4, 0x8, 0x5]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}], 0x3b0}}, {{&(0x7f0000002100)={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4b}, 0x1c, &(0x7f0000002240)=[{&(0x7f0000002140)="3c0214dfd2a2042da5000fa0a43a118d44e6810246cd4395b535bd756660cb6fc371dd4d843d6add4ef56c84ce4cc00eac480e89b52d8defe62098082f385a824644f96eba1e6c20b9edb9be7cdaf12339970d0a19b834b57f91387101a598118fcb119c4db62b573ae0e19686f0d8ce38fd37db0ff054d5a759dc735e370d111723e6b04c9cb06cafabdb37b0118d12cdc61636cbaff958479578626de58049c164f8841f012632795993f0851d0e4620c38194a12d4b90bf8ed036763b63da70bfde6222d1cec33d73cdaa41ae1ec223", 0xd1}], 0x1, &(0x7f0000002280)=[@hopopts_2292={{0x28, 0x29, 0x36, {0x88, 0x1, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x7fff}]}}}, @hopopts={{0x30, 0x29, 0x36, {0x62, 0x2, [], [@hao={0xc9, 0x10, @rand_addr="2ccaced0241eaa5b14001d5a89f292d4"}]}}}], 0x58}}, {{&(0x7f0000002300)={0xa, 0x4e23, 0x0, @mcast2, 0xd40}, 0x1c, &(0x7f00000024c0)=[{&(0x7f0000002340)}, {&(0x7f0000002380)="d788c54cae067a3cf651031827bca18d2058e615f4907f456d1e0524ebf1f204c457ca34f9", 0x25}, {&(0x7f00000023c0)="44e95568d47c6cb72961b721aa897088574b73fbeb05bf61a6268090209df4ca314c9adadb7fa83ce41f6b7534e03c084e3ac7a3a14a147d79a64273d1f82db7b95a24efe8ce64e3379ed446e67241b34532d03ae06af75a957e956dfe0794f44e3e18c407a417880d086c29cb0e7fe2693d9c08593388c84ad2eabe73062cae47fa698213cb117be33703c0b2f0a72a3beb73ade1d39bc329f3b9cfb200ce73599d578e2e8464f0ecd825fbfb6c76d3f934a364b84d031966e97d0b5b45b2c7b43553d73318fe5cae3499428e761ffc382356ef8354bc41cf10e5ab0c5b496c2611a6d8b0aecb5076c3b99545ba72", 0xef}], 0x3, &(0x7f0000002500)=[@hoplimit={{0x14, 0x29, 0x34, 0x6}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}], 0x30}}, {{&(0x7f0000002540)={0xa, 0x4e24, 0x674, @mcast1, 0x800}, 0x1c, &(0x7f0000003ac0)=[{&(0x7f0000002580)="ba35895c128c85f1740b8ca9f973346b671223e3c10dc602d09851e6080854e3dd5282657a722b88bd102519603d88528b815bae5b45a9404588f1fe9d3ebae4183f542d5f1f66ecbef39ee7d14cb8b82c7b08204d2903bda9fc78a5bd201f97383b685b360ec0787de9efb978a1180be8f54f151d031da1c25f872a4888f54e26a7633d44dba79a1e881984ad513bc180e6e8cb7d6db1e4ed0691f24a", 0x9d}, {&(0x7f0000002640)="8af4808b78fa2cadfcf7a9d32128ad09408defe6df1344f5e1a7698e39bf88a45921f199f0cafc60cabc2d966b609133458c3055b16ff67c93bb04d1e6729092a9c3f8045e30fd2f713509b9af3f2c9e60605b90b551b9d126a289e6da264511cc8960b5080d9eef22de7800f7ba03961dd3702548419cca07f56cb2818138811a6d8c60da1211de298d39df0660ee69d86dd2c8d298784f73", 0x99}, {&(0x7f0000002700)="ddb808bc4cf5d84bf3449a1215c2f5a828fef6db8fa2b0dc84ab9362d8c3b3ff8ef8cc49d8ca6fd351", 0x29}, {&(0x7f0000002740)="9929a5b589dd8c95cc197770aa70d66419c8fe6d321fe38cdde12207cf77270d8a91c46b62e75d3b3499e8168376ace17b898073192ce7a9c0877bdd19bc8575eb911e19ff52dd5f65987463f4b6963406307f711df4136b7d46b99e2dd97cc708adb9e57271c3495749c91cd4db3daa429d58f1bf5e1961e6465aa3af4ec785ab181ff4bdbf988b8e163accfe92d361e8bf38232098bc38f9a5132244eaa490043fa1e5940ec088a042a95cee2b648d72779bb9d008a0afa2781ddc4c5ae7757ab5c0bd28453bcdc6d4dff7325a06909613a64b42d7f02aa6bec70f80", 0xdd}, {&(0x7f0000002840)="e6c7b4d7a15cb178eefd501a19488d314b2b283285249cb01118ffc269099d086d646dac72c264335cfbae31e1189c9376eb0fadbddec069e74f7ff2e3d5f993743fe15eaaba716e0d38907d4d78b86d957c9062a91ccc767b89c64836e9636ad5197051bfd2e41325c9a8c9061d792f726437dc3a1fea169acef4aa71b52e141ef6e9f81336fffb60cd5cd7a14a7b3f27", 0x91}, {&(0x7f0000002900)='n', 0x1}, {&(0x7f0000002940)="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", 0x1000}, {&(0x7f0000003940)="f3729fc67f95f05b66f08084b3f251dda22f1bc1c31d81c25a789f1d61b162be71ae60ad056ee11f91f0475a13a5e6bcb55a85c2ef35b75f1c205f2c0801095c1785ee4c1b7eeb7af471d611a1b3b9cd9a6bd590779a4e0930d098389d8ea80f9d9c45d6db4934b8f9ef33d21e473849dd5ecb79bdb21a65a2fc47527483ef3130", 0x81}, {&(0x7f0000003a00)="d933cddad907bc9932cd5ce8082912bccdddff4ffe4d04e641c695602761eba68b387bb6bd0ef4d821c3ad7de8aa7210c1146b649a03f8325f490b0f15c6f6ada5b121535d3ce414273425e3f92f859d86d55dbc145d249c7cdb01255b44b7437184b71ebea856adca0121137cbaa53998468ccfb8893bb9bc5da5f78ecacdda50e2977ad6ec79d5878dd4004d9cff72a6a24fa07fb896ad239f80986e65faf0c27440a9d0f304e36a8ff4", 0xab}], 0x9, &(0x7f0000003d40)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2, r5}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast1, r6}}}], 0x50}}], 0x7, 0x9c320fcb32b82327) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:15 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x0, 0x2) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x402, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) setsockopt$bt_hci_HCI_TIME_STAMP(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000000)=0x8a308d9, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 07:50:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:15 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:15 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:15 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6b6b6b}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) renameat2(r0, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000040)=0x4) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0300000003000000000000000000000000000000000000003f052198731875cf9e7c8cfafbfdb316f6bfd363f759e19fdb72ff7c341c74abcc26033f484b5e13f3c8fbac125570d81b60c205d364517cc26f3acf12d4c674637a0060b6668edb5a6b8be9ab053e5843264a23add496d790ecbb9b51dc31ed97951cc2b22474d3a6da6830a4768ec407b6e3189c71214f869f39ca1d30af082abee884a016"], 0x18}, 0x20008001) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={@mcast1, 0x2b, r3}) 07:50:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:15 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:15 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:15 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:15 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f00005d4000/0x4000)=nil, 0x4000, 0x3000, 0x2, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000), 0x4) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xd) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:15 executing program 4: pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:15 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:15 executing program 4: pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:15 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:15 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) msync(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x5) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:16 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00\xc4o\xc0\x9aCt\x80\x1bD\x1dXthwR=\x10e[\xff{\xbf\xad(\xee\xd7}F~D\xeb\x1e\xb8\x98\xdb\f<\x89\x955Y\x1c\xba\xfc?\x90\xdc\xf6\x91f\xf9\x97\r\xf7\xc6\xf4qj\xed\xd1\x050xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000040)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x2, 0x2, 0x3}}, 0x80) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:16 executing program 4: pipe(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:16 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:16 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000140)={0x7fff, 0x2ca}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf, 0x1f, 0x1, 0x200000a702}, 0x20a) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f0000000100)='bdevcpusetqselfa#posix_acl_access\x00', 0x22) openat$fuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/fuse\x00', 0x2, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$IMGETDEVINFO(r0, 0x80044944, &(0x7f0000000000)={0x1e528767}) ioctl$TCGETS2(r0, 0x802c542a, &(0x7f00000000c0)) ioctl$VIDIOC_G_CTRL(r2, 0xc008561b, &(0x7f0000000380)={0x5, 0xf}) 07:50:16 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:16 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6b6b6b00}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:16 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) sendto$packet(r0, &(0x7f0000000100)="8c0abe82f9fe7cbe90b07c8d20124aa91841496afbba72e6ff592dfb604d7c61f604a5c32ac3795c86673df0d9e533c3d94ab69e1403", 0xffffffb8, 0x50000, 0x0, 0xc8f823ab) 07:50:16 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xa001, 0x5) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f000040b000/0x4000)=nil, 0x4000}, 0x3}) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400000, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:16 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 07:50:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:16 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000080)='trusted&\'\x00', 0xffffffffffffffff}, 0x30) ptrace$getenv(0x4201, r3, 0x4, &(0x7f0000000140)) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000040)) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000000000100000000000000000000000000006b2275618d10e000f015327e7019945934a0624546b115a6a303a97f4312245c3c519875327368eba94de7c1818a6e104d3e5f9d8da4c3b3bd02318abed578b8d1e0b6ea911b699212b2dd35b6f43622beb12e4bb840ef28482833b059385190743d30ebb8bab3481f02d5"], 0x18}, 0x0) 07:50:16 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:16 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xa0010000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:16 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200080, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000900)={&(0x7f0000000040)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, &(0x7f0000000840)=[{&(0x7f00000000c0)="f772e40e4c8c05e85ebef6dfc3482234298bb34c80c43f09790d28760eb26e440cf73a0b81c3d81e205d6a540ec43447bc8a71c62441face25635821a83ed5c5d95670175c5c7b9bf488942fdb31f947ac962906982a092b2885b35f862b233d8043eb6aedcdcc40df5c30783b7e6f077e4fdc3c1392852315704099c66ac20fbd91e39c6dc5f921752fc0ba153ab7511826a2", 0x93}, {&(0x7f0000000440)="deaf8f86335c00c602492c350dc0be59bebe3a75405cecd849693c5b3f10ac7567e9e8d50fc5def5aae75174f879e0d6d6b96f876de8fbaeb7fdc79815e856ae41aea475d68fa4e013dfa5d4b3fb01d037b94ceae767fb2a04729bb36416f1f288b77127cf411039761f86d06f31cfc3cbce21a2d0ad90f96672d565ff5fd4bc5968a4b3961772dc3ce3943e10beabc644385dc40ea6c672c90cfbd86123c2d452422aa10fe6441d7d72e030cd00c4f59201586324933c3488bc", 0xba}, {&(0x7f0000000500)="414eb5fa35cd9a80a917e072c0ec9c030582f470b2109243e4aa7a51aafc1e0e471f77ce33e7b7076355049fe1cdc4c786fc61f34e58d11245ac52c15424e5edce85fd4ed01ba1ec24474ea81161cc7f2aa27c5e6f6d67b86f64789937fd264eb3473cc7e5cd2edb5c7498caecf261b97910038881c933778f", 0x79}, {&(0x7f0000000580)="20d64ab0226c06c7a4663348f66132f753674cb0f5747d42a0e0aa6562a3763589cbe0b56a69c3bcaefc7f281a20f31034762a3d05ac2a6e889277242d346c7e7954c881c5920459af1dda2284f5ad7c331f21b9633033ae007a30d7dd7f622bbc2a602cd22ffd124b2b876ad5f8416c", 0x70}, {&(0x7f0000000600)="dd312fda5ee28c16a0fcb69053f481722b310b77124992155752d324c7802e3171c5ce539d58f3c47943f139149c4b9fe983cac1fee9c03909529719bf5da136298f0af895ee90520b15288a4c5c6b3e8aecc7f73019b2b0f3ba8381189bab95fc492b01994358afd0c856419655a78bd21855aca886f420c63f9b88b5197ae9903c81137ca742fea716dae39f483ccf9ecc0c95269df10acc3dfa06092db2b9e61ee865273dd426ee5e3019840f79093d01b0532dd22613076529a6c062bfd8a074c42882f6233cdc14f26a", 0xcc}, {&(0x7f0000000700)="b53bea7b1313575ea13d0323df54d0ee4c41619c69bdc9368ac21d32acab43cb35090f1271e2537550c07cbe9241d191dd5b2da367b75f3512ef6500fdb30877b0e3cf24b791cf095b57b1362cb0d9c4f0a4fbf5d64533eb63c3e84c39969de62e91468127bc420b8adbec202e1da9da5b5e95490efa5baecfe0cfc56126ba36035aeb645d3abf909f385033a5fd2d8c", 0x90}, {&(0x7f00000007c0)="e15af8887dd6442fef0c3d65fe24d64aff263767ddd958e8a9c90182f2aa90550dc55fb818380571b9ec32b1378830b0b34f47645e4962fd1b7ac56c0d04569a2e00e47f6f04507890bb5b2d13a088", 0x4f}], 0x7, &(0x7f00000008c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7f}}], 0x38}, 0x80) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 07:50:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:16 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:16 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfeffffff}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:16 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:17 executing program 2: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000140)={0x7, 0xf0, 0x1, 0x91, 0x10000, 0x1f}) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x1dc}, 0x1, 0x0, 0x0, 0x8084}, 0x4011) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 07:50:17 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)="e69d3cc123179de252861b16428880615b19fe8fd6aafe2ace5d02deaae6166d5661d02f28c609a5e74f215678bbaf14ad05d5f0111bf3b7310b5e"}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ftruncate(r0, 0x1000) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:17 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) poll(&(0x7f0000000000)=[{r1, 0x100}, {r0, 0x4}], 0x2, 0x0) 07:50:17 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffe}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00'}) 07:50:17 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:17 executing program 2: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000140)={0x7, 0xf0, 0x1, 0x91, 0x10000, 0x1f}) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x1dc}, 0x1, 0x0, 0x0, 0x8084}, 0x4011) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:17 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00'}) 07:50:17 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, 0x0, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:17 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1a0ffffffff}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:17 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0xfffffffffffffffd, 0x1, 0x4c6c, 0x10000, 0x1, 0x7, 0x5, 0x7, 0x200, 0x8, 0x5c8}, 0xb) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="180000200000008001000c0001000000034000000300005c3e697700500caaaa6f1c5d7f39b9af11de76b276645b4f2167f196b0ed7313cbf45438f71977f9e764dd517b"], 0x18}, 0x0) 07:50:17 executing program 2: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000140)={0x7, 0xf0, 0x1, 0x91, 0x10000, 0x1f}) sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x1dc}, 0x1, 0x0, 0x0, 0x8084}, 0x4011) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:17 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, 0x0, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:18 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/btrfs-control\x00', 0xbd72157e8008825b, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x85, 0x1, 0x240000000000000, 0x3, 0x1}, &(0x7f0000000000)=0x98) acct(&(0x7f0000000500)='./file0\x00') getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={r4, 0x6}, &(0x7f0000000380)=0x8) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000440)={r4, 0x2}, &(0x7f0000000480)=0x8) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r3, 0x7005) socket$xdp(0x2c, 0x3, 0x0) 07:50:18 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6b6b6b00000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:18 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, 0x0, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00'}) 07:50:18 executing program 2: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0xe0700000000000}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:18 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:18 executing program 0: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x1000000}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:18 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x100000000000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:18 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xd) ioctl$RTC_PIE_ON(r1, 0x7005) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), 0x4) 07:50:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000002000/0x1000)=nil, 0x1000}, 0x1}) 07:50:18 executing program 2: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0xe0700000000000}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:18 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x20400000, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:18 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x200000000000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:18 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x10, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:18 executing program 0: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x760000}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:18 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000005700)={0x0, 0xffffffffffffff07, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x20000090) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) 07:50:18 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe00000000000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:19 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:19 executing program 2: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0xe0700000000000}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:19 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000100)=""/57) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000000c0)=0x5, 0x4) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:19 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7fffffffffffffff}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:19 executing program 0: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x760000}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:19 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0x400, &(0x7f0000000440)="49bc8f38d27ea5d6c43a9c226be35a41589249212de1d31a91605d6f44b360210c278fef61bc7452eb54739a28b66bcc5bde8ab507433d783f673fa88171786911675ef0d2f150fdb03381d6424c7c98e208ce78eeba922f84956469e9e7d1788be7966c7592aee0380e552a995ae8d9a51c57684a97326a79c5227d01041f4eeddfaeefc071d80b254414e0d8c9fd5d4391919ab1ca32eff9b8139775e7443cc594108b37cfa4e7e333d5536b6dd98d49d27fa39521898c69b9157350adfcea94566018596f1d9ee872deea713a6b99fac57c39890c1fddd1040c0b10ba8c3539ea7574f7062f406b9c9f34c0910fb6aee0163a6f"}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) ioctl$RTC_VL_CLR(r1, 0x7014) madvise(&(0x7f000055b000/0x4000)=nil, 0x4000, 0x8) r3 = semget(0x2, 0xd0c88f987d221e43, 0x100000040) semctl$SEM_INFO(r3, 0x2, 0x13, &(0x7f0000000040)=""/11) ioctl$RTC_PIE_ON(r2, 0x7005) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000540)={0x15c, r4, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x43}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8dc8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1fffc0000000}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x88}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x15c}, 0x1, 0x0, 0x0, 0x800}, 0xad4b83e6ad84ea9d) 07:50:19 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfeffffff00000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x23, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") 07:50:19 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffff00000000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:19 executing program 2 (fault-call:5 fault-nth:0): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 302.331842] FAULT_INJECTION: forcing a failure. [ 302.331842] name failslab, interval 1, probability 0, space 0, times 0 [ 302.344012] CPU: 0 PID: 15533 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 302.351152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.360533] Call Trace: [ 302.363160] dump_stack+0x172/0x1f0 [ 302.366817] should_fail.cold+0xa/0x1b [ 302.371087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 302.376233] ? lock_downgrade+0x810/0x810 07:50:19 executing program 3 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:19 executing program 0: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x760000}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) [ 302.380419] __should_failslab+0x121/0x190 [ 302.384963] should_failslab+0x9/0x14 [ 302.388943] kmem_cache_alloc_node_trace+0x274/0x720 [ 302.394081] __get_vm_area_node+0x12b/0x3a0 [ 302.398424] __vmalloc_node_range+0xc7/0x790 [ 302.402921] ? bpf_prog_alloc+0x65/0x2a0 [ 302.407020] __vmalloc+0x44/0x50 [ 302.410412] ? bpf_prog_alloc+0x65/0x2a0 [ 302.414645] bpf_prog_alloc+0x65/0x2a0 [ 302.418671] __get_filter+0xe8/0x280 [ 302.422593] sk_attach_filter+0x1e/0xa0 [ 302.426931] tun_attach+0xaa3/0x1370 [ 302.430691] ? lock_downgrade+0x810/0x810 [ 302.434874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.440454] __tun_chr_ioctl+0x1d89/0x3d40 [ 302.444822] ? tun_select_queue+0x6e0/0x6e0 [ 302.449185] ? proc_cwd_link+0x1d0/0x1d0 [ 302.453297] ? tun_chr_compat_ioctl+0x30/0x30 [ 302.457941] tun_chr_ioctl+0x2b/0x40 [ 302.461688] do_vfs_ioctl+0xd5f/0x1380 [ 302.465666] ? selinux_file_ioctl+0x46f/0x5e0 [ 302.470201] ? selinux_file_ioctl+0x125/0x5e0 [ 302.474826] ? ioctl_preallocate+0x210/0x210 [ 302.479264] ? selinux_file_mprotect+0x620/0x620 [ 302.484125] ? iterate_fd+0x360/0x360 [ 302.487966] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.493682] ? fput+0x128/0x1a0 [ 302.496261] FAULT_INJECTION: forcing a failure. [ 302.496261] name failslab, interval 1, probability 0, space 0, times 0 [ 302.497090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.513959] ? security_file_ioctl+0x8d/0xc0 [ 302.518408] ksys_ioctl+0xab/0xd0 [ 302.521918] __x64_sys_ioctl+0x73/0xb0 [ 302.525833] do_syscall_64+0xfd/0x620 [ 302.529918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.535122] RIP: 0033:0x459879 [ 302.538538] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.557569] RSP: 002b:00007f701856ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.565305] RAX: ffffffffffffffda RBX: 00007f701856ec90 RCX: 0000000000459879 [ 302.572589] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 302.579875] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.587331] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f701856f6d4 [ 302.594631] R13: 00000000004c43e5 R14: 00000000004d86b0 R15: 0000000000000005 [ 302.604132] CPU: 1 PID: 15542 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 302.611189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.620735] Call Trace: [ 302.622509] syz-executor.2: vmalloc: allocation failure: 4096 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 302.623360] dump_stack+0x172/0x1f0 [ 302.634844] syz-executor.2 cpuset= [ 302.638326] should_fail.cold+0xa/0x1b [ 302.638345] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 302.638368] ? lock_downgrade+0x810/0x810 [ 302.642197] syz2 [ 302.645913] __should_failslab+0x121/0x190 [ 302.645932] should_failslab+0x9/0x14 [ 302.645945] kmem_cache_alloc_node+0x26c/0x710 [ 302.652415] mems_allowed=0-1 [ 302.656437] ? lockdep_hardirqs_on+0x415/0x5d0 [ 302.656511] ? trace_hardirqs_on+0x67/0x220 [ 302.656527] ? kasan_check_read+0x11/0x20 [ 302.687935] copy_process.part.0+0x1ce0/0x7a30 [ 302.692543] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.698094] ? proc_fail_nth_write+0x9d/0x1e0 [ 302.702599] ? proc_cwd_link+0x1d0/0x1d0 [ 302.706901] ? __f_unlock_pos+0x19/0x20 [ 302.711031] ? find_held_lock+0x35/0x130 [ 302.715116] ? __cleanup_sighand+0x70/0x70 [ 302.719365] ? lock_downgrade+0x810/0x810 [ 302.723563] ? kasan_check_write+0x14/0x20 [ 302.727906] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 302.732766] _do_fork+0x257/0xfd0 [ 302.736587] ? fork_idle+0x1d0/0x1d0 [ 302.740311] ? fput+0x128/0x1a0 [ 302.743690] ? ksys_write+0x1f1/0x2d0 [ 302.747506] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.752273] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 302.757079] ? do_syscall_64+0x26/0x620 [ 302.761065] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.766440] ? do_syscall_64+0x26/0x620 [ 302.770428] __x64_sys_clone+0xbf/0x150 [ 302.774548] do_syscall_64+0xfd/0x620 [ 302.778557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 302.783994] RIP: 0033:0x459879 [ 302.787202] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.806121] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 302.813846] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 302.821131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:50:20 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:20 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10040, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000140)={r1, 0x9, 0x5, [0x3ff, 0x3ea6, 0x7, 0x5, 0x4dc0b55c]}, &(0x7f0000000380)=0x12) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r3 = openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) munlock(&(0x7f00006ae000/0x1000)=nil, 0x1000) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000080)=0x4) lseek(r4, 0x203ffffd, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) mmap(&(0x7f00006ae000/0x3000)=nil, 0x3000, 0x2, 0x11, r5, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f000039c000/0x2000)=nil, 0x2000, 0x4) ioctl$RTC_PIE_ON(r4, 0x7005) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000440)={0x1, @bcast, @rose={'rose', 0x0}, 0x3f, 'syz1\x00', @default, 0xa1, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 07:50:20 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffa0010000}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 302.828570] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.835949] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 302.843241] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 302.850556] CPU: 0 PID: 15533 Comm: syz-executor.2 Not tainted 4.19.69 #43 [ 302.857923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.867735] Call Trace: [ 302.867767] dump_stack+0x172/0x1f0 [ 302.867784] warn_alloc.cold+0x7b/0x173 [ 302.867798] ? zone_watermark_ok_safe+0x260/0x260 [ 302.867809] ? __get_vm_area_node+0x12b/0x3a0 [ 302.867827] ? rcu_read_lock_sched_held+0x110/0x130 [ 302.893051] ? __get_vm_area_node+0x2df/0x3a0 [ 302.897766] __vmalloc_node_range+0x486/0x790 [ 302.902314] __vmalloc+0x44/0x50 [ 302.905717] ? bpf_prog_alloc+0x65/0x2a0 [ 302.909817] bpf_prog_alloc+0x65/0x2a0 [ 302.913903] __get_filter+0xe8/0x280 [ 302.917652] sk_attach_filter+0x1e/0xa0 [ 302.921662] tun_attach+0xaa3/0x1370 [ 302.925667] ? lock_downgrade+0x810/0x810 07:50:20 executing program 3 (fault-call:5 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 302.929842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.935563] __tun_chr_ioctl+0x1d89/0x3d40 [ 302.939852] ? tun_select_queue+0x6e0/0x6e0 [ 302.944440] ? proc_cwd_link+0x1d0/0x1d0 [ 302.949045] ? tun_chr_compat_ioctl+0x30/0x30 [ 302.953843] tun_chr_ioctl+0x2b/0x40 [ 302.957621] do_vfs_ioctl+0xd5f/0x1380 [ 302.961645] ? selinux_file_ioctl+0x46f/0x5e0 [ 302.966398] ? selinux_file_ioctl+0x125/0x5e0 [ 302.970939] ? ioctl_preallocate+0x210/0x210 [ 302.975385] ? selinux_file_mprotect+0x620/0x620 [ 302.980176] ? iterate_fd+0x360/0x360 [ 302.984009] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 302.989578] ? fput+0x128/0x1a0 [ 302.992901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.998612] ? security_file_ioctl+0x8d/0xc0 [ 303.003069] ksys_ioctl+0xab/0xd0 [ 303.006559] __x64_sys_ioctl+0x73/0xb0 [ 303.010488] do_syscall_64+0xfd/0x620 [ 303.014485] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.020210] RIP: 0033:0x459879 [ 303.027443] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.046553] RSP: 002b:00007f701856ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.054604] RAX: ffffffffffffffda RBX: 00007f701856ec90 RCX: 0000000000459879 [ 303.062068] RDX: 0000000020000000 RSI: 00000000400454ca RDI: 0000000000000004 [ 303.069547] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 303.076947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f701856f6d4 07:50:20 executing program 0 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 303.085680] R13: 00000000004c43e5 R14: 00000000004d86b0 R15: 0000000000000005 [ 303.111389] Mem-Info: [ 303.114075] active_anon:113753 inactive_anon:7566 isolated_anon:0 [ 303.114075] active_file:12939 inactive_file:34080 isolated_file:0 [ 303.114075] unevictable:1536 dirty:185 writeback:0 unstable:0 [ 303.114075] slab_reclaimable:13975 slab_unreclaimable:112366 [ 303.114075] mapped:58999 shmem:245 pagetables:1815 bounce:0 [ 303.114075] free:1232756 free_pcp:667 free_cma:0 [ 303.159074] audit: type=1400 audit(1567497020.613:56): avc: denied { map } for pid=15549 comm="syz-executor.5" path="socket:[52798]" dev="sockfs" ino=52798 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1 07:50:20 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:20 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffff7f}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 303.170437] Node 0 active_anon:452956kB inactive_anon:30264kB active_file:51620kB inactive_file:136320kB unevictable:6144kB isolated(anon):0kB isolated(file):0kB mapped:235996kB dirty:740kB writeback:0kB shmem:980kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 178176kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 303.255466] FAULT_INJECTION: forcing a failure. [ 303.255466] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 303.257525] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 303.311590] FAULT_INJECTION: forcing a failure. [ 303.311590] name failslab, interval 1, probability 0, space 0, times 0 [ 303.339108] CPU: 1 PID: 15557 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 303.346188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.355708] Call Trace: [ 303.358427] dump_stack+0x172/0x1f0 [ 303.362086] should_fail.cold+0xa/0x1b [ 303.366093] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.371227] ? __might_sleep+0x95/0x190 [ 303.375240] __alloc_pages_nodemask+0x1ee/0x750 [ 303.377365] Node 0 [ 303.380129] ? __alloc_pages_slowpath+0x2870/0x2870 [ 303.380150] ? lockdep_hardirqs_on+0x415/0x5d0 [ 303.380165] ? trace_hardirqs_on+0x67/0x220 [ 303.380182] ? kasan_check_read+0x11/0x20 [ 303.392769] DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 303.396620] copy_process.part.0+0x3e0/0x7a30 [ 303.396645] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.396662] ? proc_fail_nth_write+0x9d/0x1e0 [ 303.408807] lowmem_reserve[]: [ 303.428589] ? proc_cwd_link+0x1d0/0x1d0 [ 303.428606] ? __f_unlock_pos+0x19/0x20 [ 303.428624] ? find_held_lock+0x35/0x130 [ 303.428647] ? __cleanup_sighand+0x70/0x70 [ 303.428657] ? lock_downgrade+0x810/0x810 [ 303.428679] ? kasan_check_write+0x14/0x20 [ 303.428696] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 303.428718] _do_fork+0x257/0xfd0 [ 303.475737] 0 [ 303.476509] ? fork_idle+0x1d0/0x1d0 [ 303.476526] ? fput+0x128/0x1a0 [ 303.488871] ? ksys_write+0x1f1/0x2d0 [ 303.489169] 2555 [ 303.492700] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.492717] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.492730] ? do_syscall_64+0x26/0x620 [ 303.492743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.492756] ? do_syscall_64+0x26/0x620 [ 303.492772] __x64_sys_clone+0xbf/0x150 [ 303.501713] 2557 [ 303.504579] do_syscall_64+0xfd/0x620 [ 303.504600] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.504614] RIP: 0033:0x459879 [ 303.515695] 2557 [ 303.518189] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.518199] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 303.518215] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 303.518223] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 303.518236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 303.536604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 303.536616] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 303.544479] Node 0 [ 303.574893] CPU: 1 PID: 15566 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 303.582819] DMA32 free:1120072kB min:36248kB low:45308kB high:54368kB active_anon:460268kB inactive_anon:30264kB active_file:51620kB inactive_file:141596kB unevictable:6144kB writepending:740kB present:3129332kB managed:2619972kB mlocked:6144kB kernel_stack:8800kB pagetables:7408kB bounce:0kB free_pcp:2280kB local_pcp:968kB free_cma:0kB [ 303.588628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.588636] Call Trace: [ 303.588666] dump_stack+0x172/0x1f0 [ 303.588688] should_fail.cold+0xa/0x1b [ 303.588711] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.596755] lowmem_reserve[]: [ 303.603546] ? lock_downgrade+0x810/0x810 [ 303.603575] __should_failslab+0x121/0x190 [ 303.603592] should_failslab+0x9/0x14 [ 303.603606] kmem_cache_alloc_node+0x26c/0x710 [ 303.603707] __alloc_skb+0xd5/0x5f0 [ 303.606103] 0 [ 303.613150] ? skb_scrub_packet+0x490/0x490 [ 303.613171] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.613262] ? netlink_autobind.isra.0+0x228/0x310 07:50:21 executing program 3 (fault-call:5 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 303.613282] netlink_sendmsg+0x97b/0xd70 [ 303.643838] 0 [ 303.656049] ? netlink_unicast+0x720/0x720 [ 303.656073] ? selinux_socket_sendmsg+0x36/0x40 [ 303.656088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.656101] ? security_socket_sendmsg+0x8d/0xc0 [ 303.656115] ? netlink_unicast+0x720/0x720 [ 303.656130] sock_sendmsg+0xd7/0x130 [ 303.656143] ___sys_sendmsg+0x803/0x920 [ 303.656157] ? copy_msghdr_from_user+0x430/0x430 [ 303.656175] ? lock_downgrade+0x810/0x810 [ 303.658952] 2 [ 303.662487] ? kasan_check_read+0x11/0x20 [ 303.662509] ? __fget+0x367/0x540 [ 303.662529] ? iterate_fd+0x360/0x360 [ 303.662552] ? __fget_light+0x1a9/0x230 [ 303.662569] ? __fdget+0x1b/0x20 [ 303.666576] 2 [ 303.671722] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.671743] __sys_sendmsg+0x105/0x1d0 [ 303.671760] ? __ia32_sys_shutdown+0x80/0x80 [ 303.671789] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 303.671807] ? do_syscall_64+0x26/0x620 [ 303.679336] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:50:21 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 303.679351] ? do_syscall_64+0x26/0x620 [ 303.679373] __x64_sys_sendmsg+0x78/0xb0 [ 303.679389] do_syscall_64+0xfd/0x620 [ 303.679407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.683902] Node 0 [ 303.687595] RIP: 0033:0x459879 [ 303.687612] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.687620] RSP: 002b:00007f301baeac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 303.687636] RAX: ffffffffffffffda RBX: 00007f301baeac90 RCX: 0000000000459879 [ 303.687644] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 303.687655] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 303.692410] Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 303.695992] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f301baeb6d4 [ 303.696000] R13: 00000000004ce968 R14: 00000000004dcc10 R15: 0000000000000005 [ 303.925868] lowmem_reserve[]: 0 0 0 0 [ 303.937150] Node 1 Normal free:3784212kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 303.969497] lowmem_reserve[]: 0 0 0 0 [ 303.980139] FAULT_INJECTION: forcing a failure. [ 303.980139] name failslab, interval 1, probability 0, space 0, times 0 [ 303.980562] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 304.004829] CPU: 1 PID: 15574 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 304.013230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.013237] Call Trace: [ 304.013263] dump_stack+0x172/0x1f0 [ 304.013284] should_fail.cold+0xa/0x1b [ 304.025550] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.025568] ? lock_downgrade+0x810/0x810 [ 304.025596] __should_failslab+0x121/0x190 [ 304.033334] should_failslab+0x9/0x14 [ 304.033351] kmem_cache_alloc+0x2ae/0x700 [ 304.033366] ? creds_are_invalid+0x59/0x150 [ 304.033385] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.033397] ? __validate_process_creds+0x1d9/0x300 [ 304.033416] prepare_creds+0x3e/0x400 [ 304.038884] Node 0 [ 304.042680] copy_creds+0x7b/0x610 [ 304.042698] ? lockdep_init_map+0x9/0x10 [ 304.042717] copy_process.part.0+0xb54/0x7a30 [ 304.042742] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.042760] ? proc_fail_nth_write+0x9d/0x1e0 [ 304.050796] ? proc_cwd_link+0x1d0/0x1d0 [ 304.050814] ? __f_unlock_pos+0x19/0x20 [ 304.050833] ? find_held_lock+0x35/0x130 [ 304.055185] DMA32: [ 304.059321] ? __cleanup_sighand+0x70/0x70 [ 304.059338] ? lock_downgrade+0x810/0x810 [ 304.073015] 9129*4kB [ 304.074122] ? kasan_check_write+0x14/0x20 [ 304.074138] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 304.074158] _do_fork+0x257/0xfd0 [ 304.076577] (UME) [ 304.080157] ? fork_idle+0x1d0/0x1d0 [ 304.080173] ? fput+0x128/0x1a0 [ 304.080186] ? ksys_write+0x1f1/0x2d0 [ 304.080206] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.084561] 3142*8kB [ 304.088761] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.088777] ? do_syscall_64+0x26/0x620 [ 304.088791] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.088806] ? do_syscall_64+0x26/0x620 [ 304.095144] (UME) [ 304.099349] __x64_sys_clone+0xbf/0x150 [ 304.099370] do_syscall_64+0xfd/0x620 [ 304.099396] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.103645] 1583*16kB [ 304.107544] RIP: 0033:0x459879 [ 304.107559] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.107567] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 304.107585] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 304.111851] (UME) [ 304.113878] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 304.113886] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.113894] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 304.113903] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 304.235367] 1126*32kB [ 304.252087] (UME) 762*64kB (UME) 503*128kB (UME) 485*256kB (UM) 376*512kB (ME) 101*1024kB (ME) 1*2048kB (M) 115*4096kB (M) = 1129348kB [ 304.252182] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB [ 304.294544] 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 304.301279] Node 1 Normal: 67*4kB (UME) 261*8kB (UE) 250*16kB (UE) 54*32kB (UME) 22*64kB (UME) 6*128kB (UE) 10*256kB (UME) 4*512kB (UM) 3*1024kB (UM) 1*2048kB (E) 919*4096kB (M) = 3784212kB [ 304.319313] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 304.328511] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 304.338266] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 304.347807] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 304.356491] 47266 total pagecache pages [ 304.360483] 0 pages in swap cache [ 304.364730] Swap cache stats: add 0, delete 0, find 0/0 [ 304.370191] Free swap = 0kB [ 304.373300] Total swap = 0kB [ 304.376414] 1965979 pages RAM [ 304.379722] 0 pages HighMem/MovableOnly [ 304.383837] 338856 pages reserved [ 304.387307] 0 pages cma reserved 07:50:21 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:21 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000040)={0x1, 0x20, 0x100000000, 0x9, 0x3d9}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:21 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, 0x0, 0x0) 07:50:21 executing program 3 (fault-call:5 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:21 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:21 executing program 0 (fault-call:4 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 304.499530] FAULT_INJECTION: forcing a failure. [ 304.499530] name failslab, interval 1, probability 0, space 0, times 0 [ 304.514573] FAULT_INJECTION: forcing a failure. [ 304.514573] name failslab, interval 1, probability 0, space 0, times 0 [ 304.535130] CPU: 1 PID: 15594 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 304.542359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.551977] Call Trace: [ 304.554704] dump_stack+0x172/0x1f0 [ 304.558369] should_fail.cold+0xa/0x1b [ 304.562289] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.567429] ? lock_downgrade+0x810/0x810 [ 304.571615] __should_failslab+0x121/0x190 [ 304.576318] should_failslab+0x9/0x14 [ 304.580141] kmem_cache_alloc_node_trace+0x274/0x720 [ 304.585426] ? __alloc_skb+0xd5/0x5f0 [ 304.589292] __kmalloc_node_track_caller+0x3d/0x80 [ 304.594258] __kmalloc_reserve.isra.0+0x40/0xf0 [ 304.598969] __alloc_skb+0x10b/0x5f0 [ 304.602714] ? skb_scrub_packet+0x490/0x490 [ 304.607072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.612643] ? netlink_autobind.isra.0+0x228/0x310 [ 304.617616] netlink_sendmsg+0x97b/0xd70 [ 304.621709] ? netlink_unicast+0x720/0x720 [ 304.625976] ? selinux_socket_sendmsg+0x36/0x40 [ 304.630669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.636233] ? security_socket_sendmsg+0x8d/0xc0 [ 304.641012] ? netlink_unicast+0x720/0x720 [ 304.645283] sock_sendmsg+0xd7/0x130 [ 304.649267] ___sys_sendmsg+0x803/0x920 [ 304.653278] ? copy_msghdr_from_user+0x430/0x430 [ 304.658066] ? lock_downgrade+0x810/0x810 [ 304.662330] ? kasan_check_read+0x11/0x20 [ 304.666501] ? __fget+0x367/0x540 [ 304.669978] ? iterate_fd+0x360/0x360 [ 304.673808] ? __fget_light+0x1a9/0x230 [ 304.677950] ? __fdget+0x1b/0x20 [ 304.681492] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 304.687241] __sys_sendmsg+0x105/0x1d0 [ 304.691181] ? __ia32_sys_shutdown+0x80/0x80 [ 304.695635] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.700410] ? do_syscall_64+0x26/0x620 [ 304.704406] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.709792] ? do_syscall_64+0x26/0x620 [ 304.713797] __x64_sys_sendmsg+0x78/0xb0 [ 304.718014] do_syscall_64+0xfd/0x620 [ 304.721976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.727267] RIP: 0033:0x459879 [ 304.730476] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.749485] RSP: 002b:00007f301bb0bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 304.757339] RAX: ffffffffffffffda RBX: 00007f301bb0bc90 RCX: 0000000000459879 [ 304.764837] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 304.772143] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.779696] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f301bb0c6d4 [ 304.786989] R13: 00000000004ce968 R14: 00000000004dcc10 R15: 0000000000000005 [ 304.805985] CPU: 0 PID: 15589 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 304.813065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.822748] Call Trace: [ 304.825381] dump_stack+0x172/0x1f0 [ 304.829055] should_fail.cold+0xa/0x1b [ 304.832986] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.838425] ? lock_downgrade+0x810/0x810 [ 304.842616] __should_failslab+0x121/0x190 [ 304.846887] should_failslab+0x9/0x14 [ 304.850720] __kmalloc_track_caller+0x2de/0x750 [ 304.855610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.861288] ? selinux_cred_prepare+0x49/0xb0 [ 304.865943] kmemdup+0x27/0x60 [ 304.869165] selinux_cred_prepare+0x49/0xb0 [ 304.873527] security_prepare_creds+0x77/0xc0 [ 304.878270] prepare_creds+0x32a/0x400 [ 304.882308] copy_creds+0x7b/0x610 [ 304.885878] ? lockdep_init_map+0x9/0x10 [ 304.890059] copy_process.part.0+0xb54/0x7a30 [ 304.894614] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.900175] ? proc_fail_nth_write+0x9d/0x1e0 07:50:22 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 304.904707] ? proc_cwd_link+0x1d0/0x1d0 [ 304.909349] ? __f_unlock_pos+0x19/0x20 [ 304.913364] ? find_held_lock+0x35/0x130 [ 304.917603] ? __cleanup_sighand+0x70/0x70 [ 304.921960] ? lock_downgrade+0x810/0x810 [ 304.926151] ? kasan_check_write+0x14/0x20 [ 304.926172] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 304.926192] _do_fork+0x257/0xfd0 [ 304.926209] ? fork_idle+0x1d0/0x1d0 [ 304.935500] ? fput+0x128/0x1a0 [ 304.935517] ? ksys_write+0x1f1/0x2d0 [ 304.935536] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.935549] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 304.935562] ? do_syscall_64+0x26/0x620 [ 304.935576] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.935588] ? do_syscall_64+0x26/0x620 [ 304.935607] __x64_sys_clone+0xbf/0x150 [ 304.935624] do_syscall_64+0xfd/0x620 [ 304.935645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.935660] RIP: 0033:0x459879 07:50:22 executing program 0 (fault-call:4 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 304.989551] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.008726] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 305.016554] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 305.024639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 305.032518] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 305.039810] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 305.047327] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:22 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e20, 0xffffffff, @mcast1, 0x401}}, 0x6, 0x7}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x401, 0x40) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000100)={0x8000, 0x8, 0x8}) ioctl$VIDIOC_G_TUNER(r3, 0xc054561d, &(0x7f0000000440)={0x5, "e96a632ec70e8cb9bff21a580a85646ed9dbd7ab9b5c63bee2bfc0fdc400705f", 0x4, 0x1, 0x6, 0x1, 0x1, 0x2, 0x8000, 0x1000000000000}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00@\x00\x00\x00\xbdh\x00', 0x1000}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000002c0)={'veth1\x00', 0x200}) 07:50:22 executing program 3 (fault-call:5 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 305.179038] FAULT_INJECTION: forcing a failure. [ 305.179038] name failslab, interval 1, probability 0, space 0, times 0 [ 305.218986] CPU: 1 PID: 15712 Comm: syz-executor.0 Not tainted 4.19.69 #43 07:50:22 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f0000000000)=0x4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) [ 305.226076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.226086] Call Trace: [ 305.238085] dump_stack+0x172/0x1f0 [ 305.241762] should_fail.cold+0xa/0x1b [ 305.245692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.250927] ? netlink_deliver_tap+0x146/0xc20 [ 305.250952] __should_failslab+0x121/0x190 [ 305.250973] should_failslab+0x9/0x14 [ 305.263765] kmem_cache_alloc+0x47/0x700 [ 305.267859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.273439] ? check_preemption_disabled+0x48/0x290 [ 305.278719] ? lock_acquire+0x16f/0x3f0 [ 305.282725] skb_clone+0x156/0x3e0 [ 305.286291] netlink_deliver_tap+0x97b/0xc20 [ 305.290819] netlink_unicast+0x5a8/0x720 [ 305.294922] ? netlink_attachskb+0x770/0x770 [ 305.299354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.304945] netlink_sendmsg+0x8ae/0xd70 [ 305.309034] ? netlink_unicast+0x720/0x720 [ 305.313295] ? selinux_socket_sendmsg+0x36/0x40 [ 305.317994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.323569] ? security_socket_sendmsg+0x8d/0xc0 [ 305.328356] ? netlink_unicast+0x720/0x720 [ 305.332714] sock_sendmsg+0xd7/0x130 [ 305.336616] ___sys_sendmsg+0x803/0x920 [ 305.340732] ? copy_msghdr_from_user+0x430/0x430 [ 305.345544] ? lock_downgrade+0x810/0x810 [ 305.349726] ? kasan_check_read+0x11/0x20 [ 305.353900] ? __fget+0x367/0x540 [ 305.357379] ? iterate_fd+0x360/0x360 [ 305.361221] ? __fget_light+0x1a9/0x230 [ 305.365215] ? __fdget+0x1b/0x20 [ 305.368736] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 305.374305] __sys_sendmsg+0x105/0x1d0 [ 305.378301] ? __ia32_sys_shutdown+0x80/0x80 [ 305.382749] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 305.388128] ? do_syscall_64+0x26/0x620 [ 305.392137] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.397655] ? do_syscall_64+0x26/0x620 [ 305.401716] __x64_sys_sendmsg+0x78/0xb0 [ 305.406495] do_syscall_64+0xfd/0x620 [ 305.410316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.417086] RIP: 0033:0x459879 [ 305.420371] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.439792] RSP: 002b:00007f301bb0bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.447532] RAX: ffffffffffffffda RBX: 00007f301bb0bc90 RCX: 0000000000459879 [ 305.454817] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 305.462101] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:50:22 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, 0x0, 0x0) [ 305.475813] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f301bb0c6d4 [ 305.483488] R13: 00000000004ce968 R14: 00000000004dcc10 R15: 0000000000000005 07:50:23 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:23 executing program 0 (fault-call:4 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:23 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'veth1_to_hsr\x00', 0x200}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 305.801136] FAULT_INJECTION: forcing a failure. [ 305.801136] name failslab, interval 1, probability 0, space 0, times 0 [ 305.840419] CPU: 0 PID: 15838 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 305.847494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.857117] Call Trace: [ 305.860061] dump_stack+0x172/0x1f0 [ 305.863736] should_fail.cold+0xa/0x1b [ 305.867741] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.869815] FAULT_INJECTION: forcing a failure. [ 305.869815] name failslab, interval 1, probability 0, space 0, times 0 [ 305.872880] ? lock_downgrade+0x810/0x810 [ 305.872966] __should_failslab+0x121/0x190 [ 305.872984] should_failslab+0x9/0x14 [ 305.873006] kmem_cache_alloc_node+0x26c/0x710 [ 305.901304] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.906859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.912523] ? cred_has_capability+0x193/0x320 [ 305.917133] __alloc_skb+0xd5/0x5f0 [ 305.920779] ? skb_scrub_packet+0x490/0x490 [ 305.925167] ? __kasan_slab_free+0x102/0x150 [ 305.929591] ? kasan_slab_free+0xe/0x10 [ 305.933655] ? kmem_cache_free+0x86/0x260 [ 305.937857] tipc_nl_compat_doit+0x19e/0x5e0 [ 305.946415] ? selinux_capable+0x36/0x40 [ 305.950494] ? tipc_nl_compat_link_stat_dump+0x20e0/0x20e0 [ 305.956137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.961765] ? ns_capable_common+0x141/0x170 [ 305.966450] ? ns_capable+0x23/0x30 [ 305.970121] ? __netlink_ns_capable+0x104/0x140 [ 305.974912] tipc_nl_compat_recv+0x514/0xaf0 [ 305.979441] ? tipc_nl_compat_doit+0x5e0/0x5e0 [ 305.984050] ? __lock_is_held+0xb6/0x140 [ 305.988298] ? tipc_nl_node_dump+0xe50/0xe50 [ 305.992722] ? tipc_nl_compat_bearer_enable+0x5f0/0x5f0 [ 305.998828] ? genl_rcv_msg+0x13e/0x170 [ 306.002989] genl_family_rcv_msg+0x6db/0xd30 [ 306.007429] ? genl_unregister_family+0x790/0x790 [ 306.012291] ? __local_bh_enable_ip+0x15a/0x270 [ 306.017224] ? __dev_queue_xmit+0x892/0x2fe0 [ 306.021672] genl_rcv_msg+0xca/0x170 [ 306.025690] netlink_rcv_skb+0x17d/0x460 [ 306.029786] ? genl_family_rcv_msg+0xd30/0xd30 [ 306.034410] ? netlink_ack+0xb30/0xb30 [ 306.038335] genl_rcv+0x29/0x40 [ 306.041726] netlink_unicast+0x537/0x720 [ 306.045974] ? netlink_attachskb+0x770/0x770 [ 306.050407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.055970] netlink_sendmsg+0x8ae/0xd70 [ 306.060054] ? netlink_unicast+0x720/0x720 [ 306.064310] ? selinux_socket_sendmsg+0x36/0x40 [ 306.068992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.074542] ? security_socket_sendmsg+0x8d/0xc0 [ 306.079493] ? netlink_unicast+0x720/0x720 [ 306.083832] sock_sendmsg+0xd7/0x130 [ 306.087563] ___sys_sendmsg+0x803/0x920 [ 306.091645] ? copy_msghdr_from_user+0x430/0x430 [ 306.096421] ? lock_downgrade+0x810/0x810 [ 306.100700] ? kasan_check_read+0x11/0x20 [ 306.104865] ? __fget+0x367/0x540 [ 306.108335] ? iterate_fd+0x360/0x360 [ 306.112282] ? __fget_light+0x1a9/0x230 [ 306.116366] ? __fdget+0x1b/0x20 [ 306.119749] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 306.125305] __sys_sendmsg+0x105/0x1d0 [ 306.129207] ? __ia32_sys_shutdown+0x80/0x80 [ 306.133734] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 306.138500] ? do_syscall_64+0x26/0x620 [ 306.142488] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.147864] ? do_syscall_64+0x26/0x620 [ 306.151860] __x64_sys_sendmsg+0x78/0xb0 [ 306.155939] do_syscall_64+0xfd/0x620 [ 306.159757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.165083] RIP: 0033:0x459879 [ 306.168287] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.187374] RSP: 002b:00007f301bb0bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 306.195240] RAX: ffffffffffffffda RBX: 00007f301bb0bc90 RCX: 0000000000459879 07:50:23 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:23 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0x9763}, 0x2) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) [ 306.202527] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 306.209879] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.217190] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f301bb0c6d4 [ 306.224684] R13: 00000000004ce968 R14: 00000000004dcc10 R15: 0000000000000005 [ 306.233061] CPU: 1 PID: 15841 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 306.240251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.249747] Call Trace: [ 306.252376] dump_stack+0x172/0x1f0 [ 306.256047] should_fail.cold+0xa/0x1b [ 306.259982] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 306.265121] ? lock_downgrade+0x810/0x810 [ 306.269307] __should_failslab+0x121/0x190 [ 306.273660] should_failslab+0x9/0x14 [ 306.277478] kmem_cache_alloc+0x2ae/0x700 [ 306.281647] ? creds_are_invalid+0x59/0x150 [ 306.285997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.291611] ? selinux_is_enabled+0x43/0x60 [ 306.296060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.301651] ? creds_are_invalid+0x59/0x150 [ 306.306063] __delayacct_tsk_init+0x20/0x80 [ 306.310581] copy_process.part.0+0x350b/0x7a30 [ 306.315211] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 306.320896] ? proc_fail_nth_write+0x9d/0x1e0 [ 306.325417] ? proc_cwd_link+0x1d0/0x1d0 [ 306.329500] ? __f_unlock_pos+0x19/0x20 [ 306.333505] ? find_held_lock+0x35/0x130 [ 306.337836] ? __cleanup_sighand+0x70/0x70 [ 306.342124] ? lock_downgrade+0x810/0x810 [ 306.346503] ? kasan_check_write+0x14/0x20 [ 306.351036] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 306.356135] _do_fork+0x257/0xfd0 [ 306.359613] ? fork_idle+0x1d0/0x1d0 [ 306.363340] ? fput+0x128/0x1a0 [ 306.366657] ? ksys_write+0x1f1/0x2d0 [ 306.370633] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 306.375596] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 306.380720] ? do_syscall_64+0x26/0x620 [ 306.384748] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.390878] ? do_syscall_64+0x26/0x620 [ 306.394901] __x64_sys_clone+0xbf/0x150 [ 306.398908] do_syscall_64+0xfd/0x620 [ 306.404056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.409401] RIP: 0033:0x459879 [ 306.412620] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.431911] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 306.439756] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 306.447359] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 306.454830] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.462202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 306.469639] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:24 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, 0x0, 0x0) 07:50:24 executing program 0 (fault-call:4 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:24 executing program 3 (fault-call:5 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r1 = syz_open_dev$cec(&(0x7f0000004e40)='/dev/cec#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="440000000402fb6b06ef0b996f5517852647830f22eb7432fcea6bd3e6cc57553ec5d2d0a3067382a459cc9edc0ac64be86c9becbc9963daffcf34de3c574fb02291fd9cf631fd490a2fe0c92fb198b81fdf6f015c"], &(0x7f0000004f00)=0x4c) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000004f40)={r2}, &(0x7f0000004f80)=0x8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) r4 = dup(r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x9, 0x80, 0x2, 0x2, 0xfffffffffffffffd}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000100)={r5, 0x5}, 0x8) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:24 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 306.874709] FAULT_INJECTION: forcing a failure. [ 306.874709] name failslab, interval 1, probability 0, space 0, times 0 [ 306.888777] FAULT_INJECTION: forcing a failure. [ 306.888777] name failslab, interval 1, probability 0, space 0, times 0 [ 306.902587] CPU: 0 PID: 15967 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 306.909662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.919047] Call Trace: [ 306.919076] dump_stack+0x172/0x1f0 [ 306.919099] should_fail.cold+0xa/0x1b [ 306.919117] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 306.919135] ? lock_downgrade+0x810/0x810 [ 306.934613] __should_failslab+0x121/0x190 [ 306.934630] should_failslab+0x9/0x14 [ 306.934645] kmem_cache_alloc_node_trace+0x274/0x720 [ 306.934663] ? __alloc_skb+0xd5/0x5f0 [ 306.934683] __kmalloc_node_track_caller+0x3d/0x80 [ 306.934701] __kmalloc_reserve.isra.0+0x40/0xf0 [ 306.934719] __alloc_skb+0x10b/0x5f0 [ 306.934736] ? skb_scrub_packet+0x490/0x490 [ 306.934761] tipc_nl_compat_doit+0x19e/0x5e0 [ 306.979450] ? selinux_capable+0x36/0x40 [ 306.983546] ? tipc_nl_compat_link_stat_dump+0x20e0/0x20e0 [ 306.989202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.994765] ? ns_capable_common+0x141/0x170 [ 306.999193] ? ns_capable+0x23/0x30 [ 307.003150] ? __netlink_ns_capable+0x104/0x140 [ 307.007861] tipc_nl_compat_recv+0x514/0xaf0 [ 307.012303] ? tipc_nl_compat_doit+0x5e0/0x5e0 [ 307.017027] ? __lock_is_held+0xb6/0x140 [ 307.021195] ? tipc_nl_node_dump+0xe50/0xe50 [ 307.025621] ? tipc_nl_compat_bearer_enable+0x5f0/0x5f0 [ 307.031204] ? genl_rcv_msg+0x13e/0x170 [ 307.035240] genl_family_rcv_msg+0x6db/0xd30 [ 307.039680] ? genl_unregister_family+0x790/0x790 [ 307.044651] ? trace_hardirqs_on_caller+0x6a/0x220 [ 307.049694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 307.054666] genl_rcv_msg+0xca/0x170 [ 307.058488] netlink_rcv_skb+0x17d/0x460 [ 307.062587] ? genl_family_rcv_msg+0xd30/0xd30 [ 307.067193] ? netlink_ack+0xb30/0xb30 [ 307.071273] genl_rcv+0x29/0x40 [ 307.074574] netlink_unicast+0x537/0x720 [ 307.078656] ? netlink_attachskb+0x770/0x770 [ 307.083176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.088845] netlink_sendmsg+0x8ae/0xd70 [ 307.092949] ? netlink_unicast+0x720/0x720 [ 307.097209] ? selinux_socket_sendmsg+0x36/0x40 [ 307.101898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.107773] ? security_socket_sendmsg+0x8d/0xc0 [ 307.112647] ? netlink_unicast+0x720/0x720 [ 307.117036] sock_sendmsg+0xd7/0x130 [ 307.120773] ___sys_sendmsg+0x803/0x920 [ 307.124958] ? copy_msghdr_from_user+0x430/0x430 [ 307.129744] ? lock_downgrade+0x810/0x810 [ 307.133919] ? kasan_check_read+0x11/0x20 [ 307.138088] ? __fget+0x367/0x540 [ 307.141562] ? iterate_fd+0x360/0x360 [ 307.145383] ? __fget_light+0x1a9/0x230 [ 307.149384] ? __fdget+0x1b/0x20 [ 307.152767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.158343] __sys_sendmsg+0x105/0x1d0 [ 307.162266] ? __ia32_sys_shutdown+0x80/0x80 [ 307.166724] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 307.172008] ? do_syscall_64+0x26/0x620 [ 307.176012] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.181412] ? do_syscall_64+0x26/0x620 [ 307.185568] __x64_sys_sendmsg+0x78/0xb0 [ 307.189660] do_syscall_64+0xfd/0x620 [ 307.193586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.198789] RIP: 0033:0x459879 [ 307.202001] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:50:24 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ioctl$VFIO_IOMMU_MAP_DMA(r1, 0x3b71, &(0x7f0000000000)={0x20, 0x2, 0xfffffffffffffeb1, 0x7f, 0x4d}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) [ 307.221009] RSP: 002b:00007f301bb0bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 307.228742] RAX: ffffffffffffffda RBX: 00007f301bb0bc90 RCX: 0000000000459879 [ 307.236032] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 307.243588] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 307.251300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f301bb0c6d4 [ 307.258599] R13: 00000000004ce968 R14: 00000000004dcc10 R15: 0000000000000005 [ 307.266036] CPU: 1 PID: 15969 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 307.273191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.282566] Call Trace: [ 307.285196] dump_stack+0x172/0x1f0 [ 307.288860] should_fail.cold+0xa/0x1b [ 307.292951] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 307.292968] ? lock_downgrade+0x810/0x810 [ 307.302503] __should_failslab+0x121/0x190 [ 307.307712] should_failslab+0x9/0x14 [ 307.307728] kmem_cache_alloc+0x2ae/0x700 [ 307.307744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.307762] ? perf_event_init_task+0x19f/0x7a0 [ 307.326172] ? trace_hardirqs_on+0x67/0x220 [ 307.326191] dup_fd+0x85/0xb30 [ 307.326212] ? selinux_task_alloc+0xaf/0xd0 [ 307.338206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.343768] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.343788] copy_process.part.0+0x1e6a/0x7a30 [ 307.343809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.359736] ? proc_fail_nth_write+0x9d/0x1e0 [ 307.359751] ? proc_cwd_link+0x1d0/0x1d0 [ 307.359766] ? __f_unlock_pos+0x19/0x20 [ 307.359791] ? __cleanup_sighand+0x70/0x70 [ 307.376836] ? lock_downgrade+0x810/0x810 [ 307.381104] ? kasan_check_write+0x14/0x20 [ 307.385372] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 307.390472] _do_fork+0x257/0xfd0 [ 307.390494] ? fork_idle+0x1d0/0x1d0 [ 307.390512] ? fput+0x128/0x1a0 [ 307.390531] ? ksys_write+0x1f1/0x2d0 [ 307.405114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 307.409893] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 307.409910] ? do_syscall_64+0x26/0x620 [ 307.409926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.409937] ? do_syscall_64+0x26/0x620 [ 307.409954] __x64_sys_clone+0xbf/0x150 [ 307.432135] do_syscall_64+0xfd/0x620 [ 307.436041] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.436055] RIP: 0033:0x459879 [ 307.436068] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.436075] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:50:24 executing program 0 (fault-call:4 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:24 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 307.436089] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 307.436101] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 307.463949] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 307.463958] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 307.463967] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:25 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 307.594788] FAULT_INJECTION: forcing a failure. [ 307.594788] name failslab, interval 1, probability 0, space 0, times 0 [ 307.661286] CPU: 1 PID: 15989 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 307.668366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.678279] Call Trace: [ 307.680906] dump_stack+0x172/0x1f0 [ 307.684577] should_fail.cold+0xa/0x1b [ 307.688500] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 307.693639] ? lock_downgrade+0x810/0x810 [ 307.697826] __should_failslab+0x121/0x190 [ 307.702084] should_failslab+0x9/0x14 [ 307.705996] __kmalloc+0x2e2/0x750 [ 307.709654] ? skb_scrub_packet+0x490/0x490 [ 307.714233] ? __kasan_slab_free+0x102/0x150 [ 307.718671] ? kasan_slab_free+0xe/0x10 [ 307.722662] ? tipc_nl_compat_doit+0x1f8/0x5e0 [ 307.727274] tipc_nl_compat_doit+0x1f8/0x5e0 [ 307.731700] ? selinux_capable+0x36/0x40 [ 307.735879] ? tipc_nl_compat_link_stat_dump+0x20e0/0x20e0 [ 307.741529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.747089] ? ns_capable_common+0x141/0x170 [ 307.751554] ? ns_capable+0x23/0x30 [ 307.755411] ? __netlink_ns_capable+0x104/0x140 [ 307.760115] tipc_nl_compat_recv+0x514/0xaf0 [ 307.764554] ? tipc_nl_compat_doit+0x5e0/0x5e0 [ 307.771229] ? __lock_is_held+0xb6/0x140 [ 307.775410] ? tipc_nl_node_dump+0xe50/0xe50 [ 307.779839] ? tipc_nl_compat_bearer_enable+0x5f0/0x5f0 [ 307.785235] ? genl_rcv_msg+0x13e/0x170 [ 307.789247] genl_family_rcv_msg+0x6db/0xd30 [ 307.793858] ? genl_unregister_family+0x790/0x790 [ 307.798724] ? __local_bh_enable_ip+0x15a/0x270 [ 307.803412] ? __dev_queue_xmit+0x892/0x2fe0 [ 307.807855] genl_rcv_msg+0xca/0x170 07:50:25 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 307.811750] netlink_rcv_skb+0x17d/0x460 [ 307.815830] ? genl_family_rcv_msg+0xd30/0xd30 [ 307.820459] ? netlink_ack+0xb30/0xb30 [ 307.824381] genl_rcv+0x29/0x40 [ 307.828641] netlink_unicast+0x537/0x720 [ 307.832745] ? netlink_attachskb+0x770/0x770 [ 307.837187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.842755] netlink_sendmsg+0x8ae/0xd70 [ 307.846854] ? netlink_unicast+0x720/0x720 [ 307.851245] ? selinux_socket_sendmsg+0x36/0x40 [ 307.856025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.861682] ? security_socket_sendmsg+0x8d/0xc0 [ 307.866472] ? netlink_unicast+0x720/0x720 [ 307.870733] sock_sendmsg+0xd7/0x130 [ 307.874563] ___sys_sendmsg+0x803/0x920 [ 307.878649] ? copy_msghdr_from_user+0x430/0x430 [ 307.883437] ? lock_downgrade+0x810/0x810 [ 307.887787] ? kasan_check_read+0x11/0x20 [ 307.891964] ? __fget+0x367/0x540 [ 307.895448] ? iterate_fd+0x360/0x360 [ 307.899554] ? __fget_light+0x1a9/0x230 [ 307.904520] ? __fdget+0x1b/0x20 07:50:25 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 307.907999] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 307.913584] __sys_sendmsg+0x105/0x1d0 [ 307.917500] ? __ia32_sys_shutdown+0x80/0x80 [ 307.922052] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 307.926941] ? do_syscall_64+0x26/0x620 [ 307.930941] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.936326] ? do_syscall_64+0x26/0x620 [ 307.940854] __x64_sys_sendmsg+0x78/0xb0 [ 307.944940] do_syscall_64+0xfd/0x620 [ 307.948774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.954143] RIP: 0033:0x459879 07:50:25 executing program 3 (fault-call:5 fault-nth:6): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 307.957361] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.976539] RSP: 002b:00007f301bb0bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 307.984459] RAX: ffffffffffffffda RBX: 00007f301bb0bc90 RCX: 0000000000459879 [ 307.991752] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 307.999071] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 308.006352] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f301bb0c6d4 [ 308.006360] R13: 00000000004ce968 R14: 00000000004dcc10 R15: 0000000000000005 07:50:25 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:25 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'bridge_slave\x00', 0x43732e5398416f1a}) 07:50:25 executing program 0 (fault-call:4 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 308.125058] FAULT_INJECTION: forcing a failure. [ 308.125058] name failslab, interval 1, probability 0, space 0, times 0 07:50:25 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000393000/0x2000)=nil, 0x2000, 0x4000, 0x4, &(0x7f000061f000/0x4000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000000)) 07:50:25 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 308.194478] CPU: 1 PID: 16099 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 308.201727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.211102] Call Trace: [ 308.211132] dump_stack+0x172/0x1f0 [ 308.211153] should_fail.cold+0xa/0x1b [ 308.211173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 308.226488] ? lock_downgrade+0x810/0x810 [ 308.226514] __should_failslab+0x121/0x190 [ 308.226530] should_failslab+0x9/0x14 [ 308.226546] kmem_cache_alloc_trace+0x2cc/0x760 [ 308.235025] ? lock_downgrade+0x810/0x810 [ 308.235039] ? __lock_is_held+0xb6/0x140 [ 308.235057] alloc_fdtable+0x86/0x290 [ 308.235073] dup_fd+0x743/0xb30 [ 308.235098] copy_process.part.0+0x1e6a/0x7a30 [ 308.235119] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 308.243844] ? proc_fail_nth_write+0x9d/0x1e0 [ 308.243859] ? proc_cwd_link+0x1d0/0x1d0 [ 308.243878] ? __f_unlock_pos+0x19/0x20 [ 308.252281] ? __cleanup_sighand+0x70/0x70 [ 308.252294] ? lock_downgrade+0x810/0x810 [ 308.252317] ? kasan_check_write+0x14/0x20 [ 308.252336] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 308.259575] _do_fork+0x257/0xfd0 [ 308.259596] ? fork_idle+0x1d0/0x1d0 [ 308.259609] ? fput+0x128/0x1a0 [ 308.259625] ? ksys_write+0x1f1/0x2d0 [ 308.270704] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 308.270720] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 308.270735] ? do_syscall_64+0x26/0x620 [ 308.270749] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.270765] ? do_syscall_64+0x26/0x620 [ 308.279499] __x64_sys_clone+0xbf/0x150 [ 308.279520] do_syscall_64+0xfd/0x620 [ 308.279540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.279556] RIP: 0033:0x459879 [ 308.287821] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.287829] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 308.287845] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 07:50:25 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x0) [ 308.287853] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 308.287861] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 308.287870] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 308.287877] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 308.425216] FAULT_INJECTION: forcing a failure. [ 308.425216] name failslab, interval 1, probability 0, space 0, times 0 [ 308.473581] CPU: 1 PID: 16123 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 308.481169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.490547] Call Trace: [ 308.493176] dump_stack+0x172/0x1f0 [ 308.497160] should_fail.cold+0xa/0x1b [ 308.501282] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 308.506517] ? lock_downgrade+0x810/0x810 [ 308.511034] __should_failslab+0x121/0x190 [ 308.515670] should_failslab+0x9/0x14 [ 308.519498] __kmalloc+0x2e2/0x750 [ 308.523079] ? skb_scrub_packet+0x490/0x490 [ 308.527552] ? __kasan_slab_free+0x102/0x150 [ 308.532000] ? kasan_slab_free+0xe/0x10 [ 308.536013] ? tipc_nl_compat_doit+0x1f8/0x5e0 [ 308.540675] tipc_nl_compat_doit+0x1f8/0x5e0 [ 308.545364] ? selinux_capable+0x36/0x40 [ 308.549555] ? tipc_nl_compat_link_stat_dump+0x20e0/0x20e0 [ 308.558524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.564264] ? ns_capable_common+0x141/0x170 [ 308.568863] ? ns_capable+0x23/0x30 [ 308.572511] ? __netlink_ns_capable+0x104/0x140 [ 308.577394] tipc_nl_compat_recv+0x514/0xaf0 [ 308.581825] ? tipc_nl_compat_doit+0x5e0/0x5e0 [ 308.587095] ? __lock_is_held+0xb6/0x140 [ 308.591188] ? tipc_nl_node_dump+0xe50/0xe50 [ 308.595625] ? tipc_nl_compat_bearer_enable+0x5f0/0x5f0 [ 308.601019] ? genl_rcv_msg+0x13e/0x170 [ 308.605034] genl_family_rcv_msg+0x6db/0xd30 [ 308.609473] ? genl_unregister_family+0x790/0x790 [ 308.614387] ? __local_bh_enable_ip+0x15a/0x270 [ 308.619110] ? __dev_queue_xmit+0x892/0x2fe0 [ 308.623570] genl_rcv_msg+0xca/0x170 [ 308.627318] netlink_rcv_skb+0x17d/0x460 [ 308.631877] ? genl_family_rcv_msg+0xd30/0xd30 [ 308.636592] ? netlink_ack+0xb30/0xb30 [ 308.640524] genl_rcv+0x29/0x40 [ 308.643983] netlink_unicast+0x537/0x720 [ 308.648121] ? netlink_attachskb+0x770/0x770 [ 308.652559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.658416] netlink_sendmsg+0x8ae/0xd70 [ 308.662526] ? netlink_unicast+0x720/0x720 [ 308.666788] ? selinux_socket_sendmsg+0x36/0x40 [ 308.671854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 308.677531] ? security_socket_sendmsg+0x8d/0xc0 [ 308.682457] ? netlink_unicast+0x720/0x720 [ 308.686714] sock_sendmsg+0xd7/0x130 [ 308.690452] ___sys_sendmsg+0x803/0x920 [ 308.694540] ? copy_msghdr_from_user+0x430/0x430 [ 308.699321] ? lock_downgrade+0x810/0x810 [ 308.703496] ? kasan_check_read+0x11/0x20 [ 308.707680] ? __fget+0x367/0x540 [ 308.711254] ? iterate_fd+0x360/0x360 [ 308.716223] ? __fget_light+0x1a9/0x230 [ 308.720220] ? __fdget+0x1b/0x20 [ 308.723605] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 308.729351] __sys_sendmsg+0x105/0x1d0 [ 308.733273] ? __ia32_sys_shutdown+0x80/0x80 [ 308.737822] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 308.742603] ? do_syscall_64+0x26/0x620 [ 308.746725] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.752117] ? do_syscall_64+0x26/0x620 [ 308.756241] __x64_sys_sendmsg+0x78/0xb0 [ 308.760328] do_syscall_64+0xfd/0x620 [ 308.764156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 308.769364] RIP: 0033:0x459879 [ 308.772575] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.791912] RSP: 002b:00007f301baeac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 308.799659] RAX: ffffffffffffffda RBX: 00007f301baeac90 RCX: 0000000000459879 [ 308.807183] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 308.814560] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 07:50:25 executing program 3 (fault-call:5 fault-nth:7): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:25 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 308.821860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f301baeb6d4 [ 308.829283] R13: 00000000004ce968 R14: 00000000004dcc10 R15: 0000000000000005 07:50:26 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = request_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000540)='GPL\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r2) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000380)={[], 0x6, 0x4, 0x9, 0x0, 0xbd31, 0x5000, 0xd000, [], 0x10b}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000000c0)=0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) kcmp(r3, r4, 0x0, r0, r0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r5 = pkey_alloc(0x0, 0x3) pkey_free(r5) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000005c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000580)={0xffffffffffffffff}, 0x0, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000600)={0x8, 0x120, 0xfa00, {0x4, {0x10001, 0x8, "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", 0xaf, 0x7, 0x1, 0x1000, 0xa2, 0x219, 0x73, 0x1}, r7}}, 0x128) 07:50:26 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x0) 07:50:26 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:26 executing program 0 (fault-call:4 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 309.068579] FAULT_INJECTION: forcing a failure. [ 309.068579] name failslab, interval 1, probability 0, space 0, times 0 [ 309.083110] FAULT_INJECTION: forcing a failure. [ 309.083110] name failslab, interval 1, probability 0, space 0, times 0 [ 309.094601] CPU: 0 PID: 16242 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 309.101642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.111308] Call Trace: [ 309.114086] dump_stack+0x172/0x1f0 07:50:26 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x301000, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f00000000c0)={&(0x7f000019b000/0x1000)=nil, 0x5, 0x5, 0x0, &(0x7f000063b000/0x1000)=nil, 0xff}) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000100)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r3 = openat$cgroup_ro(r2, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000080)={0xf}, 0x1541546d) write$selinux_load(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9090000005345204c696e75784ca0171231f30aae2b9c66d4b0e61dc08ced2628639c7e6a99137a46"], 0x2c) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r4, 0x7005) [ 309.117755] should_fail.cold+0xa/0x1b [ 309.121676] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 309.126811] ? lock_downgrade+0x810/0x810 [ 309.130998] __should_failslab+0x121/0x190 [ 309.135352] should_failslab+0x9/0x14 [ 309.139310] kmem_cache_alloc_node_trace+0x274/0x720 [ 309.144744] ? alloc_fdtable+0x86/0x290 [ 309.148859] __kmalloc_node+0x3d/0x80 [ 309.152705] kvmalloc_node+0x68/0x100 [ 309.156542] alloc_fdtable+0xd6/0x290 [ 309.160380] dup_fd+0x743/0xb30 [ 309.163788] copy_process.part.0+0x1e6a/0x7a30 [ 309.170083] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.178027] ? proc_fail_nth_write+0x9d/0x1e0 [ 309.183043] ? proc_cwd_link+0x1d0/0x1d0 [ 309.187131] ? __f_unlock_pos+0x19/0x20 [ 309.191464] ? __cleanup_sighand+0x70/0x70 [ 309.199021] ? lock_downgrade+0x810/0x810 [ 309.204006] ? kasan_check_write+0x14/0x20 [ 309.208576] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 309.213726] _do_fork+0x257/0xfd0 [ 309.218251] ? fork_idle+0x1d0/0x1d0 [ 309.222004] ? fput+0x128/0x1a0 [ 309.226384] ? ksys_write+0x1f1/0x2d0 [ 309.230321] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 309.235806] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 309.240770] ? do_syscall_64+0x26/0x620 [ 309.244864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.250697] ? do_syscall_64+0x26/0x620 [ 309.255010] __x64_sys_clone+0xbf/0x150 [ 309.259216] do_syscall_64+0xfd/0x620 [ 309.263237] entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:50:26 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 309.268528] RIP: 0033:0x459879 [ 309.271739] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.293800] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 309.304799] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 309.312099] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:50:26 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x0) [ 309.319501] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 309.326801] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 309.334242] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 309.362022] CPU: 1 PID: 16244 Comm: syz-executor.0 Not tainted 4.19.69 #43 [ 309.369109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.378621] Call Trace: [ 309.381261] dump_stack+0x172/0x1f0 [ 309.384931] should_fail.cold+0xa/0x1b [ 309.388962] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 309.394092] ? lock_downgrade+0x810/0x810 [ 309.398298] __should_failslab+0x121/0x190 [ 309.402745] should_failslab+0x9/0x14 [ 309.406671] kmem_cache_alloc_node_trace+0x274/0x720 [ 309.411805] ? __alloc_skb+0xd5/0x5f0 [ 309.415651] __kmalloc_node_track_caller+0x3d/0x80 [ 309.420712] __kmalloc_reserve.isra.0+0x40/0xf0 [ 309.425580] __alloc_skb+0x10b/0x5f0 [ 309.429335] ? skb_scrub_packet+0x490/0x490 [ 309.433688] ? __kasan_slab_free+0x102/0x150 [ 309.438208] ? tipc_nl_compat_doit+0x1f8/0x5e0 [ 309.442819] tipc_nl_compat_doit+0x21f/0x5e0 [ 309.447248] ? selinux_capable+0x36/0x40 [ 309.451341] ? tipc_nl_compat_link_stat_dump+0x20e0/0x20e0 [ 309.457146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.462707] ? ns_capable_common+0x141/0x170 [ 309.467284] ? ns_capable+0x23/0x30 [ 309.470937] ? __netlink_ns_capable+0x104/0x140 [ 309.475765] tipc_nl_compat_recv+0x514/0xaf0 [ 309.480213] ? tipc_nl_compat_doit+0x5e0/0x5e0 [ 309.484837] ? __lock_is_held+0xb6/0x140 [ 309.488920] ? tipc_nl_node_dump+0xe50/0xe50 [ 309.493476] ? tipc_nl_compat_bearer_enable+0x5f0/0x5f0 [ 309.498872] ? genl_rcv_msg+0x13e/0x170 [ 309.502908] genl_family_rcv_msg+0x6db/0xd30 [ 309.507448] ? genl_unregister_family+0x790/0x790 [ 309.512414] ? __local_bh_enable_ip+0x15a/0x270 [ 309.517125] ? __dev_queue_xmit+0x892/0x2fe0 [ 309.521581] genl_rcv_msg+0xca/0x170 [ 309.525344] netlink_rcv_skb+0x17d/0x460 [ 309.529436] ? genl_family_rcv_msg+0xd30/0xd30 [ 309.534183] ? netlink_ack+0xb30/0xb30 [ 309.538119] genl_rcv+0x29/0x40 [ 309.541440] netlink_unicast+0x537/0x720 [ 309.545549] ? netlink_attachskb+0x770/0x770 [ 309.550172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.555745] netlink_sendmsg+0x8ae/0xd70 [ 309.559854] ? netlink_unicast+0x720/0x720 [ 309.564136] ? selinux_socket_sendmsg+0x36/0x40 [ 309.568835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 309.574538] ? security_socket_sendmsg+0x8d/0xc0 [ 309.579415] ? netlink_unicast+0x720/0x720 [ 309.583690] sock_sendmsg+0xd7/0x130 [ 309.587442] ___sys_sendmsg+0x803/0x920 [ 309.591441] ? copy_msghdr_from_user+0x430/0x430 [ 309.596354] ? lock_downgrade+0x810/0x810 [ 309.600525] ? kasan_check_read+0x11/0x20 [ 309.605801] ? __fget+0x367/0x540 [ 309.610413] ? iterate_fd+0x360/0x360 [ 309.614256] ? __fget_light+0x1a9/0x230 [ 309.618344] ? __fdget+0x1b/0x20 [ 309.621844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 309.627850] __sys_sendmsg+0x105/0x1d0 [ 309.631765] ? __ia32_sys_shutdown+0x80/0x80 [ 309.636212] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 309.641171] ? do_syscall_64+0x26/0x620 [ 309.645479] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.651059] ? do_syscall_64+0x26/0x620 [ 309.655267] __x64_sys_sendmsg+0x78/0xb0 [ 309.659459] do_syscall_64+0xfd/0x620 [ 309.663423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 309.670186] RIP: 0033:0x459879 [ 309.673547] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.692886] RSP: 002b:00007f301bb0bc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 309.701119] RAX: ffffffffffffffda RBX: 00007f301bb0bc90 RCX: 0000000000459879 07:50:27 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:27 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]}, 0x0) 07:50:27 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:27 executing program 3 (fault-call:5 fault-nth:8): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:27 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 309.708599] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 309.715981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 309.723284] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f301bb0c6d4 [ 309.730672] R13: 00000000004ce968 R14: 00000000004dcc10 R15: 0000000000000005 [ 309.857947] FAULT_INJECTION: forcing a failure. [ 309.857947] name failslab, interval 1, probability 0, space 0, times 0 [ 309.886152] CPU: 1 PID: 16371 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 309.893234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.902750] Call Trace: [ 309.905455] dump_stack+0x172/0x1f0 [ 309.909199] should_fail.cold+0xa/0x1b [ 309.913109] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 309.918252] ? lock_downgrade+0x810/0x810 [ 309.922444] __should_failslab+0x121/0x190 [ 309.922461] should_failslab+0x9/0x14 [ 309.922479] kmem_cache_alloc_node_trace+0x274/0x720 [ 309.930749] ? alloc_fdtable+0x86/0x290 [ 309.930768] ? kasan_unpoison_shadow+0x35/0x50 [ 309.944713] __kmalloc_node+0x3d/0x80 [ 309.948553] kvmalloc_node+0x68/0x100 [ 309.952509] alloc_fdtable+0x142/0x290 [ 309.956519] dup_fd+0x743/0xb30 [ 309.959928] copy_process.part.0+0x1e6a/0x7a30 [ 309.964580] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.970150] ? proc_fail_nth_write+0x9d/0x1e0 [ 309.974678] ? proc_cwd_link+0x1d0/0x1d0 [ 309.979036] ? __f_unlock_pos+0x19/0x20 [ 309.983224] ? __cleanup_sighand+0x70/0x70 [ 309.987666] ? lock_downgrade+0x810/0x810 [ 309.991855] ? kasan_check_write+0x14/0x20 [ 309.996230] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 310.001250] _do_fork+0x257/0xfd0 [ 310.004740] ? fork_idle+0x1d0/0x1d0 [ 310.008515] ? fput+0x128/0x1a0 [ 310.011950] ? ksys_write+0x1f1/0x2d0 [ 310.015927] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 310.021096] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 310.027421] ? do_syscall_64+0x26/0x620 [ 310.034281] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.039812] ? do_syscall_64+0x26/0x620 [ 310.043903] __x64_sys_clone+0xbf/0x150 [ 310.047899] do_syscall_64+0xfd/0x620 [ 310.051872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.057424] RIP: 0033:0x459879 [ 310.060635] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.079926] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 310.087641] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 310.094912] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:50:27 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x2001) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f00000000c0)={0x4337, "ccaba789317f7a5ffc833d35494678c6ba51d605df8215738b56962da439e5ff", 0x2, 0x9, 0x3ff, 0xffffff, 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:27 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) 07:50:27 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]}, 0x0) 07:50:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:27 executing program 3 (fault-call:5 fault-nth:9): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:27 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 310.102182] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 310.109547] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 310.116820] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:27 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]}, 0x0) [ 310.290493] FAULT_INJECTION: forcing a failure. [ 310.290493] name failslab, interval 1, probability 0, space 0, times 0 [ 310.349568] CPU: 1 PID: 16402 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 310.356652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.366028] Call Trace: [ 310.368651] dump_stack+0x172/0x1f0 [ 310.372311] should_fail.cold+0xa/0x1b [ 310.376258] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 310.381395] ? lock_downgrade+0x810/0x810 [ 310.385584] __should_failslab+0x121/0x190 [ 310.389848] should_failslab+0x9/0x14 [ 310.393673] kmem_cache_alloc+0x2ae/0x700 [ 310.397879] ? dup_fd+0x5c1/0xb30 [ 310.401676] copy_fs_struct+0x43/0x2d0 [ 310.408544] copy_process.part.0+0x377d/0x7a30 [ 310.413467] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 310.421316] ? proc_fail_nth_write+0x9d/0x1e0 [ 310.427991] ? proc_cwd_link+0x1d0/0x1d0 [ 310.435154] ? __f_unlock_pos+0x19/0x20 [ 310.441723] ? __cleanup_sighand+0x70/0x70 [ 310.446272] ? lock_downgrade+0x810/0x810 [ 310.450460] ? kasan_check_write+0x14/0x20 [ 310.454721] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 310.461428] _do_fork+0x257/0xfd0 [ 310.464908] ? fork_idle+0x1d0/0x1d0 [ 310.469611] ? fput+0x128/0x1a0 [ 310.472922] ? ksys_write+0x1f1/0x2d0 [ 310.477730] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 310.483909] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 310.489922] ? do_syscall_64+0x26/0x620 [ 310.495771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.501246] ? do_syscall_64+0x26/0x620 [ 310.505456] __x64_sys_clone+0xbf/0x150 [ 310.509472] do_syscall_64+0xfd/0x620 [ 310.513399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.518612] RIP: 0033:0x459879 [ 310.521817] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.540738] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:50:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x2, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:27 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f000033f000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00006d8000/0x4000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:28 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 310.548496] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 310.555803] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 310.563083] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 310.570366] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 310.577737] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:28 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000"], 0xc}, 0x0) 07:50:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x3, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) socket$rxrpc(0x21, 0x2, 0xa) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="e46ea10a9aa71259a270ed1348ec584a1b02147d185bfc425ddd1d9c6bb885e41826685ba4b0e1b3c76e39bf904031e9cd4ad7f4f73ad2b0b4791c28324b81", 0x3f}, {&(0x7f00000000c0)="10abbbf4cec4286d79de54a30b7fb611343cf753bff7630b3a4135bcdbcebc8bc6aba918db20e565515ebb9920dc8caccc024a738e6a4843c1a2fdc9757dd6dff92409f03f15dcbdd2595d845302324b099fe1f1792c970472e985ae4af0ea20c43ae4314faec4b1d13de1328f26272d59b8f4", 0x73}, {&(0x7f0000000140)="1f2e881318351d10b327edb951c513e7ed9ff86973d761ec0c27b079d0e99f0699983b54f0a27b7e7bf8dc7360fa109eb8923b1ada0a9478f729b125ad431c5b22998641a2a6184663f85d62acceb2cd93dc7b7c8a36b6b0c34d0522b0b4ce7954d22659f89eed3e0472f3fb0e63450cda067df925c07ca1e89f658f288eb96317597db44754371d485fea1c", 0x8c}], 0x3, 0x4) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'}et\x00\xe1\aCL\xd9\xaf\xd7\x00', 0x4000}) 07:50:28 executing program 3 (fault-call:5 fault-nth:10): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x4, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:28 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000"], 0xc}, 0x0) 07:50:28 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 310.900037] FAULT_INJECTION: forcing a failure. [ 310.900037] name failslab, interval 1, probability 0, space 0, times 0 07:50:28 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/sockstat\x00') ioctl$TIOCSCTTY(r1, 0x540e, 0x20) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) [ 310.961922] CPU: 0 PID: 16532 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 310.968988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.978359] Call Trace: [ 310.981009] dump_stack+0x172/0x1f0 [ 310.984665] should_fail.cold+0xa/0x1b [ 310.988576] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 310.993698] ? lock_downgrade+0x810/0x810 [ 310.997877] __should_failslab+0x121/0x190 [ 311.002136] should_failslab+0x9/0x14 [ 311.005950] kmem_cache_alloc+0x2ae/0x700 [ 311.010115] ? do_raw_spin_unlock+0x57/0x270 [ 311.014540] ? _raw_spin_unlock+0x2d/0x50 [ 311.018717] copy_process.part.0+0x1fd7/0x7a30 [ 311.023341] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 311.028904] ? proc_fail_nth_write+0x9d/0x1e0 [ 311.033421] ? proc_cwd_link+0x1d0/0x1d0 [ 311.033437] ? __f_unlock_pos+0x19/0x20 [ 311.033463] ? __cleanup_sighand+0x70/0x70 [ 311.045706] ? lock_downgrade+0x810/0x810 [ 311.045733] ? kasan_check_write+0x14/0x20 [ 311.045754] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 311.058963] _do_fork+0x257/0xfd0 [ 311.058985] ? fork_idle+0x1d0/0x1d0 [ 311.059000] ? fput+0x128/0x1a0 [ 311.059022] ? ksys_write+0x1f1/0x2d0 [ 311.073262] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 311.078038] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 311.078055] ? do_syscall_64+0x26/0x620 [ 311.078072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.078085] ? do_syscall_64+0x26/0x620 [ 311.078102] __x64_sys_clone+0xbf/0x150 [ 311.078119] do_syscall_64+0xfd/0x620 [ 311.103940] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.109136] RIP: 0033:0x459879 [ 311.109153] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.109161] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 311.109177] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 311.109185] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 311.109193] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:50:28 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000"], 0xc}, 0x0) [ 311.109205] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 311.131282] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:28 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xa, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:28 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300"], 0x12}, 0x0) 07:50:28 executing program 3 (fault-call:5 fault-nth:11): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:28 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) getpid() ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:28 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5, 0x0, 0x0, 0x1}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xe, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:29 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xf, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:29 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203efffd, 0x1) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000040)={0x3ff, 0x80000001, [0x9, 0x6, 0x81, 0xfffffffffffffffa, 0x7f], 0x4}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x7, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000, 0x2, &(0x7f000007f000/0x1000)=nil) listen(r2, 0x2) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 311.697762] FAULT_INJECTION: forcing a failure. [ 311.697762] name failslab, interval 1, probability 0, space 0, times 0 [ 311.736300] CPU: 0 PID: 16789 Comm: syz-executor.3 Not tainted 4.19.69 #43 07:50:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x60, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 311.743639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.754574] Call Trace: [ 311.757643] dump_stack+0x172/0x1f0 [ 311.761867] should_fail.cold+0xa/0x1b [ 311.767086] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 311.772572] ? lock_downgrade+0x810/0x810 [ 311.777396] __should_failslab+0x121/0x190 [ 311.781755] should_failslab+0x9/0x14 [ 311.785773] kmem_cache_alloc+0x2ae/0x700 [ 311.789977] ? trace_hardirqs_on+0x67/0x220 [ 311.794764] ? kasan_check_read+0x11/0x20 [ 311.798956] copy_process.part.0+0x2139/0x7a30 [ 311.803672] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 311.809233] ? proc_fail_nth_write+0x9d/0x1e0 [ 311.813750] ? proc_cwd_link+0x1d0/0x1d0 [ 311.818447] ? __f_unlock_pos+0x19/0x20 [ 311.822719] ? __cleanup_sighand+0x70/0x70 [ 311.827409] ? lock_downgrade+0x810/0x810 [ 311.836727] ? kasan_check_write+0x14/0x20 [ 311.841188] ? __mutex_unlock_slowpath+0xf8/0x6b0 07:50:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xf0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 311.846106] _do_fork+0x257/0xfd0 [ 311.849575] ? fork_idle+0x1d0/0x1d0 [ 311.853315] ? fput+0x128/0x1a0 [ 311.856623] ? ksys_write+0x1f1/0x2d0 [ 311.860445] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 311.865220] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 311.865239] ? do_syscall_64+0x26/0x620 [ 311.865254] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.865266] ? do_syscall_64+0x26/0x620 [ 311.865283] __x64_sys_clone+0xbf/0x150 [ 311.865300] do_syscall_64+0xfd/0x620 [ 311.865318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.865330] RIP: 0033:0x459879 [ 311.865343] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.865354] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 311.926300] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 311.933586] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 311.940872] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:50:29 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000000)={{0x8, 0x7}, {0x80, 0x7}, 0xe7, 0x1, 0x5}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x101a00, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000140)={0xf000, 0x0, 0x0, 0xfffffffffffffffe, 0x3}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) r3 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f00000000c0)=0x1e) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 311.948157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 311.955445] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:29 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300"], 0x12}, 0x0) 07:50:29 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:29 executing program 3 (fault-call:5 fault-nth:12): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x1a0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:29 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000440)='\x00\x00\xc6U\xe2\xa0R\x00\x00\x00e\x02\x00\xc5\x8e\xcb\x1c\xf8\x8f\xca;\"\xdazV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x0, &(0x7f0000000040)}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x300, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:29 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 312.400098] FAULT_INJECTION: forcing a failure. [ 312.400098] name failslab, interval 1, probability 0, space 0, times 0 [ 312.431459] CPU: 1 PID: 16938 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 312.438533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.448073] Call Trace: [ 312.450701] dump_stack+0x172/0x1f0 [ 312.454353] should_fail.cold+0xa/0x1b [ 312.458273] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 312.463395] ? lock_downgrade+0x810/0x810 [ 312.467577] __should_failslab+0x121/0x190 [ 312.471840] should_failslab+0x9/0x14 [ 312.475658] kmem_cache_alloc+0x2ae/0x700 [ 312.479823] ? trace_hardirqs_on+0x67/0x220 [ 312.484159] ? kasan_check_read+0x11/0x20 [ 312.488322] copy_process.part.0+0x2139/0x7a30 [ 312.492924] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 312.498470] ? proc_fail_nth_write+0x9d/0x1e0 [ 312.502966] ? proc_cwd_link+0x1d0/0x1d0 [ 312.502981] ? __f_unlock_pos+0x19/0x20 [ 312.503008] ? __cleanup_sighand+0x70/0x70 [ 312.503019] ? lock_downgrade+0x810/0x810 [ 312.503042] ? kasan_check_write+0x14/0x20 [ 312.523679] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 312.529539] _do_fork+0x257/0xfd0 [ 312.533021] ? fork_idle+0x1d0/0x1d0 [ 312.536757] ? fput+0x128/0x1a0 [ 312.540054] ? ksys_write+0x1f1/0x2d0 [ 312.543874] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 312.548651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 312.553428] ? do_syscall_64+0x26/0x620 [ 312.557427] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.562819] ? do_syscall_64+0x26/0x620 [ 312.566815] __x64_sys_clone+0xbf/0x150 [ 312.570807] do_syscall_64+0xfd/0x620 [ 312.574630] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.579834] RIP: 0033:0x459879 07:50:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x373, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xa00, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:30 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0xfffffffffffffffe}, 0xfffffffffffffe8c) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 312.583032] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.601931] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 312.601945] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 312.601953] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 312.601961] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 312.601968] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 312.601975] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x400002, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000002c0), &(0x7f0000000300)=0xb) r2 = getpgid(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000380)={0x2, 0x1, 0x401, 0x8, r2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x84000, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000100)={0x48, 0x0, [], {0x0, @reserved}}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f00000000c0)={0x9, 0x7}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:30 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300"], 0x12}, 0x0) 07:50:30 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xe00, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:30 executing program 3 (fault-call:5 fault-nth:13): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:30 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000000)) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mq_open(&(0x7f0000000440)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00', 0x0, 0xa816fb26266d20bc, &(0x7f0000000040)={0x38, 0x8, 0x400, 0x7fff, 0x7fffffff, 0x0, 0xfffffffffffffffb, 0x7ff}) recvmmsg(r1, &(0x7f00000029c0)=[{{&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f00000005c0)=""/173, 0xad}, {&(0x7f0000000140)=""/53, 0x35}, {&(0x7f0000000680)=""/114, 0x72}, {&(0x7f0000000700)=""/71, 0x47}, {&(0x7f0000000780)=""/134, 0x86}, {&(0x7f0000000840)=""/174, 0xae}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000000900)=""/235, 0xeb}, {&(0x7f0000000a00)=""/200, 0xc8}], 0x9, &(0x7f0000001d80)=""/167, 0xa7}, 0x1c}, {{0x0, 0x0, &(0x7f0000002440)=[{&(0x7f0000001e40)=""/178, 0xb2}, {&(0x7f0000001f00)=""/146, 0x92}, {&(0x7f0000000380)=""/17, 0x11}, {&(0x7f0000001fc0)=""/207, 0xcf}, {&(0x7f00000020c0)=""/172, 0xac}, {&(0x7f0000002180)=""/83, 0x53}, {&(0x7f0000002200)=""/174, 0xae}, {&(0x7f00000022c0)=""/117, 0x75}, {&(0x7f0000002340)=""/246, 0xf6}], 0x9}}, {{&(0x7f0000002500)=@nfc_llcp, 0x80, &(0x7f0000002780)=[{&(0x7f0000002580)=""/160, 0xa0}, {&(0x7f0000002640)=""/78, 0x4e}, {&(0x7f00000026c0)=""/163, 0xa3}], 0x3, &(0x7f00000027c0)=""/143, 0x8f}, 0x6}, {{&(0x7f0000002880)=@tipc, 0x80, &(0x7f0000002940)=[{&(0x7f0000002900)=""/64, 0x40}], 0x1, &(0x7f0000002980)=""/5, 0x5}, 0x3}], 0x4, 0x1, &(0x7f0000002ac0)={0x77359400}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f00000000c0)) [ 313.203411] FAULT_INJECTION: forcing a failure. [ 313.203411] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 313.243860] CPU: 1 PID: 17174 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 313.243872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.260289] Call Trace: [ 313.262889] dump_stack+0x172/0x1f0 [ 313.262911] should_fail.cold+0xa/0x1b [ 313.262927] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 313.262946] ? __might_sleep+0x95/0x190 [ 313.262965] __alloc_pages_nodemask+0x1ee/0x750 [ 313.263011] ? __alloc_pages_slowpath+0x2870/0x2870 [ 313.263034] ? find_held_lock+0x35/0x130 [ 313.270562] ? percpu_ref_put_many+0x94/0x190 [ 313.270579] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 313.270599] alloc_pages_current+0x107/0x210 [ 313.280536] __get_free_pages+0xc/0x40 [ 313.280554] pgd_alloc+0x8b/0x3f0 [ 313.280568] ? pgd_page_get_mm+0x40/0x40 [ 313.280586] ? __lockdep_init_map+0x10c/0x5b0 [ 313.324579] ? __lockdep_init_map+0x10c/0x5b0 [ 313.329094] mm_init+0x59e/0x9d0 [ 313.332478] copy_process.part.0+0x2b3d/0x7a30 [ 313.337082] ? proc_fail_nth_write+0x9d/0x1e0 [ 313.341604] ? __cleanup_sighand+0x70/0x70 [ 313.345842] ? lock_downgrade+0x810/0x810 [ 313.350005] ? kasan_check_write+0x14/0x20 [ 313.354248] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 313.359105] _do_fork+0x257/0xfd0 [ 313.362578] ? fork_idle+0x1d0/0x1d0 [ 313.366300] ? fput+0x128/0x1a0 [ 313.369585] ? ksys_write+0x1f1/0x2d0 [ 313.373396] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 313.378161] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 313.382925] ? do_syscall_64+0x26/0x620 [ 313.386904] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.392271] ? do_syscall_64+0x26/0x620 [ 313.396254] __x64_sys_clone+0xbf/0x150 [ 313.400247] do_syscall_64+0xfd/0x620 [ 313.404060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.409261] RIP: 0033:0x459879 [ 313.412459] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.431369] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:50:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xf00, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 313.439095] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 313.446375] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 313.453653] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 313.460927] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 313.468223] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:31 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5, 0x400000}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x53c, 0x20000) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000180)=@get={0x1, &(0x7f0000000380)=""/182, 0x1}) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0xfffffffffffffff5) openat$cgroup_int(r2, &(0x7f00000000c0)='memory.high\x00', 0x2, 0x0) 07:50:31 executing program 3 (fault-call:5 fault-nth:14): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x6000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 313.762958] FAULT_INJECTION: forcing a failure. [ 313.762958] name failslab, interval 1, probability 0, space 0, times 0 [ 313.780399] CPU: 1 PID: 17264 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 313.787560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.796933] Call Trace: [ 313.799554] dump_stack+0x172/0x1f0 [ 313.803536] should_fail.cold+0xa/0x1b [ 313.807458] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 313.812587] ? lock_downgrade+0x810/0x810 [ 313.816766] __should_failslab+0x121/0x190 [ 313.821022] should_failslab+0x9/0x14 [ 313.824844] kmem_cache_alloc+0x2ae/0x700 [ 313.829008] ? get_mm_exe_file+0x289/0x3e0 [ 313.833254] ? trace_event_raw_event_task_newtask+0x440/0x440 [ 313.839156] __khugepaged_enter+0x3b/0x390 [ 313.843406] copy_process.part.0+0x7299/0x7a30 [ 313.848002] ? proc_fail_nth_write+0x9d/0x1e0 [ 313.852522] ? __cleanup_sighand+0x70/0x70 [ 313.856761] ? lock_downgrade+0x810/0x810 [ 313.860928] ? kasan_check_write+0x14/0x20 [ 313.865178] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 313.870032] _do_fork+0x257/0xfd0 [ 313.873501] ? fork_idle+0x1d0/0x1d0 [ 313.877218] ? fput+0x128/0x1a0 [ 313.880522] ? ksys_write+0x1f1/0x2d0 [ 313.884336] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 313.889098] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 313.893865] ? do_syscall_64+0x26/0x620 [ 313.897844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.903215] ? do_syscall_64+0x26/0x620 [ 313.907198] __x64_sys_clone+0xbf/0x150 [ 313.911180] do_syscall_64+0xfd/0x620 [ 313.914999] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.920193] RIP: 0033:0x459879 [ 313.923392] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.942306] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 313.950042] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 313.957319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 313.964600] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 313.971878] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 313.979157] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:31 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_gettime(0x7, &(0x7f00000000c0)) tkill(r2, 0x1000000000014) close(r1) 07:50:31 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x410000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x58, r3, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @broadcast}, @FOU_ATTR_PEER_V6={0x14, 0x9, @local}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e23}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast1}]}, 0x58}, 0x1, 0x0, 0x0, 0x45}, 0x1) 07:50:31 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003"], 0x15}, 0x0) 07:50:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x7303, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:31 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f000034e000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:31 executing program 3 (fault-call:5 fault-nth:15): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xf000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:31 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x3d) close(r1) 07:50:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x30000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:31 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f00000000c0)={0x4, &(0x7f0000000140)=[{}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @broadcast}]}) tkill(r2, 0x1000000000014) close(r1) [ 314.441957] FAULT_INJECTION: forcing a failure. [ 314.441957] name failslab, interval 1, probability 0, space 0, times 0 [ 314.472292] CPU: 1 PID: 17443 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 314.479363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.488726] Call Trace: [ 314.491331] dump_stack+0x172/0x1f0 [ 314.495066] should_fail.cold+0xa/0x1b [ 314.498985] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 314.504125] ? lock_downgrade+0x810/0x810 [ 314.508306] __should_failslab+0x121/0x190 [ 314.512563] should_failslab+0x9/0x14 [ 314.516379] kmem_cache_alloc+0x2ae/0x700 [ 314.520534] ? get_mm_exe_file+0x289/0x3e0 [ 314.524778] ? trace_event_raw_event_task_newtask+0x440/0x440 [ 314.530670] __khugepaged_enter+0x3b/0x390 [ 314.534919] copy_process.part.0+0x7299/0x7a30 [ 314.539549] ? proc_fail_nth_write+0x9d/0x1e0 [ 314.544096] ? __cleanup_sighand+0x70/0x70 [ 314.548353] ? lock_downgrade+0x810/0x810 [ 314.552549] ? kasan_check_write+0x14/0x20 [ 314.556811] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 314.561677] _do_fork+0x257/0xfd0 [ 314.565145] ? fork_idle+0x1d0/0x1d0 [ 314.568888] ? fput+0x128/0x1a0 [ 314.572195] ? ksys_write+0x1f1/0x2d0 [ 314.576018] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 314.580781] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 314.585543] ? do_syscall_64+0x26/0x620 [ 314.589524] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.594894] ? do_syscall_64+0x26/0x620 [ 314.598879] __x64_sys_clone+0xbf/0x150 [ 314.603046] do_syscall_64+0xfd/0x620 [ 314.607206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.612400] RIP: 0033:0x459879 [ 314.615602] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.634608] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:50:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000100)={'\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x200000) bind$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2710}, 0x10) 07:50:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x34000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 314.642414] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 314.649686] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 314.656960] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 314.664236] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 314.671780] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x400300, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:32 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000240), 0x4) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e20, 0x101, @mcast1, 0x1ff}}, 0x200, 0x4, 0xffe, 0x3ff, 0xbc}, &(0x7f0000000340)=0x98) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000380)={r3, 0xae}, &(0x7f00000003c0)=0x8) tkill(r2, 0x1000000000014) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x8, 0x0, 0x200, 0x3, 0xec9, 0xfff, 0x80000000, 0xe52, 0x0}, &(0x7f0000000140)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x3, 0xc402, 0x200, 0x727, 0x1, 0x9, 0x7, 0x4, r4}, &(0x7f00000001c0)=0x20) close(r1) 07:50:32 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003"], 0x15}, 0x0) 07:50:32 executing program 3 (fault-call:5 fault-nth:16): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:32 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000440)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000006c0)={'veth0_to_hsr\x00', 0x600}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x181000, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000680)) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x18042, 0x0) r4 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)="7fb4406c81cdaf112c9115047f78a7d3b7ce3a2b", 0xffffff63, 0x0) r5 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$negate(0xd, r4, 0x8, r5) ioctl$VIDIOC_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f00000000c0)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) r6 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000380)="01b8c18af341517a839f7f0224393304f73efe683332ca829062ff208016293bbe50b6811e2da7ea6a52e0610fb9f00f0afd1cd7c011e869871cadba60aa7e7f39581b22789642a10444c72cfc014ae2b55153616ef0f9439650c46f98e15eae3ad40ee29788b0cb1c2e6e7b285b1fb829ded2aea7af4cb55112888741e84bc511d47b49deb6312210c8b2ea6faf7853f4b5fbfdde0f3d319fd465d3d53ad90cb2c9e6f683d0f1e7c7eb1500a52c99948f2cc558b1a3d8881f4831b07c9333649d8273846dca", 0xc6, 0xfffffffffffffffd) r7 = request_key(&(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000480)='veth1_to_team\x00', 0xfffffffffffffff9) keyctl$assume_authority(0x10, r5) keyctl$reject(0x13, r6, 0x1, 0x9, r7) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000600)) 07:50:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xf0ffff, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 315.131313] FAULT_INJECTION: forcing a failure. [ 315.131313] name failslab, interval 1, probability 0, space 0, times 0 [ 315.199764] CPU: 1 PID: 17569 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 315.206837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.206843] Call Trace: [ 315.206873] dump_stack+0x172/0x1f0 [ 315.206897] should_fail.cold+0xa/0x1b [ 315.206919] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 315.232036] ? lock_downgrade+0x810/0x810 [ 315.236220] __should_failslab+0x121/0x190 [ 315.236242] should_failslab+0x9/0x14 [ 315.236257] kmem_cache_alloc+0x2ae/0x700 [ 315.236277] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 315.248480] ? __vm_enough_memory+0x324/0x5a0 [ 315.248505] vm_area_dup+0x21/0x170 [ 315.248522] copy_process.part.0+0x3407/0x7a30 [ 315.248561] ? __cleanup_sighand+0x70/0x70 [ 315.262507] ? lock_downgrade+0x810/0x810 [ 315.262534] ? kasan_check_write+0x14/0x20 [ 315.262551] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 315.262577] _do_fork+0x257/0xfd0 [ 315.262597] ? fork_idle+0x1d0/0x1d0 [ 315.262610] ? fput+0x128/0x1a0 [ 315.262626] ? ksys_write+0x1f1/0x2d0 07:50:32 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x100000001}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000180)) close(r0) ioctl$SIOCX25SCAUSEDIAG(r0, 0x89ec, &(0x7f00000000c0)={0x8, 0x1}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 07:50:32 executing program 3 (fault-call:5 fault-nth:17): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 315.271475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 315.271492] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 315.271508] ? do_syscall_64+0x26/0x620 [ 315.271524] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.271536] ? do_syscall_64+0x26/0x620 [ 315.271553] __x64_sys_clone+0xbf/0x150 [ 315.271571] do_syscall_64+0xfd/0x620 [ 315.271587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.271598] RIP: 0033:0x459879 [ 315.271612] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.271621] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 315.271635] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 315.271641] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 315.271653] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 315.271660] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 315.271668] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x1000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 315.547763] FAULT_INJECTION: forcing a failure. [ 315.547763] name failslab, interval 1, probability 0, space 0, times 0 [ 315.615268] CPU: 1 PID: 17610 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 315.622333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.631705] Call Trace: [ 315.634319] dump_stack+0x172/0x1f0 [ 315.637972] should_fail.cold+0xa/0x1b [ 315.641878] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 315.647003] ? find_held_lock+0x35/0x130 [ 315.651085] ? percpu_ref_put_many+0x94/0x190 [ 315.655599] __should_failslab+0x121/0x190 [ 315.659852] should_failslab+0x9/0x14 [ 315.663672] kmem_cache_alloc+0x47/0x700 [ 315.667828] ? __lock_is_held+0xb6/0x140 [ 315.671916] anon_vma_clone+0xde/0x480 [ 315.675839] anon_vma_fork+0x8f/0x4a0 [ 315.679713] ? dup_userfaultfd+0x15e/0x6c0 [ 315.684255] ? memcpy+0x46/0x50 [ 315.687597] copy_process.part.0+0x34e5/0x7a30 [ 315.692230] ? __cleanup_sighand+0x70/0x70 [ 315.696616] ? lock_downgrade+0x810/0x810 [ 315.700805] ? kasan_check_write+0x14/0x20 [ 315.705055] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 315.709916] _do_fork+0x257/0xfd0 [ 315.713390] ? fork_idle+0x1d0/0x1d0 [ 315.717110] ? fput+0x128/0x1a0 [ 315.720397] ? ksys_write+0x1f1/0x2d0 [ 315.724208] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 315.728989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 315.733852] ? do_syscall_64+0x26/0x620 [ 315.737850] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.743237] ? do_syscall_64+0x26/0x620 [ 315.747230] __x64_sys_clone+0xbf/0x150 [ 315.751228] do_syscall_64+0xfd/0x620 [ 315.755044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.760239] RIP: 0033:0x459879 [ 315.763437] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.782357] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 315.790774] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 315.798060] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 315.805358] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 315.812665] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 315.820036] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x2000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:33 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x14000, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x5, 0x0, &(0x7f0000fff000/0x1000)=nil}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) fcntl$setflags(r0, 0x2, 0x3a0d32f3424b7eaf) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:33 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003"], 0x15}, 0x0) 07:50:33 executing program 3 (fault-call:5 fault-nth:18): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x3000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:33 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000580)={&(0x7f0000000380), 0xc, &(0x7f0000000540)={&(0x7f0000000740)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) write(r1, &(0x7f00000000c0)="959a482ee5489d0e4c57d34ecfa1102ba0e2581d00feca185dc378910e733d209fb13852064c10db47fb88229ad150a3ff670b3b6e743f0e059ef19be2f93abd467922f8f5e275a5961779682aa44bff2e3ded41cd92c96d9d97f32f2ab42fde475403039b7f09ca556edc209765c35e2c1ef696338dfcccb5fd1156da7fe24b701e956007", 0x85) mkdir(&(0x7f0000000b00)='./file0\x00', 0x20) lgetxattr(0x0, &(0x7f0000000280)=@known='trusted.syz\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x1c4) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x5, &(0x7f0000000480)=0x0) io_destroy(r4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000640), 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xcec04c3309da2f9f, 0xb, 0xd213df26a0c8a8a9, "7a78b17d0a66b8c2d1293c8ca3e28b693ef3eb56164d86fa00c0ca36f38fe90d72b7d9e23216749a4d08c26cd47ea8c28aedb6e8a5e17fbb9242fa3966a51ce5", "5cd71195c833278a2ce742c6fcd042c0d588f14b7b5c290ef440cf3c1e66bd40", [0x0, 0x3f]}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 316.209593] FAULT_INJECTION: forcing a failure. [ 316.209593] name failslab, interval 1, probability 0, space 0, times 0 [ 316.231696] CPU: 1 PID: 17818 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 316.238850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.248222] Call Trace: [ 316.250844] dump_stack+0x172/0x1f0 [ 316.254521] should_fail.cold+0xa/0x1b [ 316.258444] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.263598] ? __lock_is_held+0xb6/0x140 [ 316.267695] ? __lock_is_held+0xb6/0x140 [ 316.271780] __should_failslab+0x121/0x190 [ 316.276036] should_failslab+0x9/0x14 [ 316.279849] kmem_cache_alloc+0x47/0x700 [ 316.283932] ? anon_vma_chain_link+0x154/0x1c0 [ 316.288533] anon_vma_clone+0xde/0x480 [ 316.292445] anon_vma_fork+0x8f/0x4a0 [ 316.296261] ? dup_userfaultfd+0x15e/0x6c0 [ 316.300508] ? memcpy+0x46/0x50 [ 316.303809] copy_process.part.0+0x34e5/0x7a30 [ 316.308449] ? __cleanup_sighand+0x70/0x70 [ 316.312704] ? lock_downgrade+0x810/0x810 [ 316.316890] ? kasan_check_write+0x14/0x20 [ 316.321149] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 316.326023] _do_fork+0x257/0xfd0 [ 316.329521] ? fork_idle+0x1d0/0x1d0 [ 316.333537] ? fput+0x128/0x1a0 [ 316.336852] ? ksys_write+0x1f1/0x2d0 [ 316.340681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 316.345455] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 316.350230] ? do_syscall_64+0x26/0x620 [ 316.354218] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.359588] ? do_syscall_64+0x26/0x620 [ 316.363577] __x64_sys_clone+0xbf/0x150 [ 316.367565] do_syscall_64+0xfd/0x620 [ 316.371376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.376570] RIP: 0033:0x459879 [ 316.379766] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.398684] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:50:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x4000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:33 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$RTC_WIE_ON(r0, 0x700f) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000140)={0x0, 0xffff, 0x2, 0x0, 0x8}) 07:50:33 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0106401, &(0x7f00000000c0)={0xc9, &(0x7f00000013c0)=""/201}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x4, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000140)) write$UHID_INPUT(r3, &(0x7f0000000380)={0x8, "683223b7cc26a96f1a62f815fdd21009835501ad731479506884cc9a17c6f5b0c276e7c88fa4d6113f01d1cb6713b8a6f9170b69a03cac57a9f75b598daa422040e9a70f25fa3a11f95a57af70d2afa3f8131890e03447c5d7c475f10a6c724fc9c620f8dc045d0891cbaaaf17ab04d62eb766e3187609258d78162980257c6f06f7f15ed7807c8d595549a45ff1affad67537daa74e58ef0b4881b78fdb370b268863a982dced666cf97016797835bf56e45e80df5912b66018a6920656990f45ff38e0e1fdb157a7bf8dd3112cb139352b2d7f5fd8c1895c0292e81dd552d9149bd749358c378e8d3edd8cf1f6067278fe15b84cefbc72cf45e8b5df47ed3641d50d6168225ce30a0e257424c8173f61a20b3069950c9ff2ea53e0dce8e710afafee963c9fdad1020c5d54ba60f8a52c55aa4c6611185a7f09c96c6fc7c7d582ad086df3a75d2374056570c40c7744a742736b00ef809358b6fec59a6a667362b102fcadaea24006ba75b2108087c1dfc3b7a5d0fc6673bc7adf2964571786a3ddc993892d7a899e344fcef8bb51a7370518ff2448254cc5681da4c52aa2045d73c0f015d50959831f14081920cb60d458161ea20f35a776a7856bf1df7fdae373fb1cc97bf3497b0f152c8f743858cd9fdf7a5e0624d4d6c98d1c83eb821047d3152c21cdc5db6329261b3fc7ec214cae12b61ac43820173a313914f6ec405279a416b0e0d73ed6c047fa87c18feb233f01b9bf5e5b2b779a890160ee65610e32c80fe2115b86810febfac43ad427c840bc9bfb1d856962d8ab42d2a4970e6f1f90c58d8f02a71112d947a8ba99ed6a902175ced9d35d0bb78959223098df77caf94092a95f9bf651cbfc98aa73eac8645e751126ff0ac5d2548c7905304a38c78c474aa70ea6758d45463c1cfd119daf4769cf36852480f98ddc783bdc9190df143dfa5e591fa61c178d7674cd9b177503a1245d9be11ef8101f758b6f9526f450f223ff17c77220579d16f6b5ad9149571492d3a080c2923995510ce33e50befdb7fada947e2a206dec0d33e659857faebd7a79bdd123e5e0b5f776d312aab0589593072aa5198850abb14ab64324b1f98470c29637567c524e5021d1d4eb5c1fe3b670b602ea056d9a2e12279a8d3cb127e8a39bb78813f808cf1614e8c2a089f22833ac12a840649c38d917100c84d8ddb54902d2ecfac7b88e95f0dac278f289972abcdd6b312bae223a70f98283fb63d69e4951854931a8e57fbb239ab7fa9b15ebf8011722270fec71ab5d9fe213f25962028db03efab40e03f280bea61c3a112d59fa29e66a51e8ef8083d3044a152d7af2b2d5a5e2b2f7dce8304c1a71b04fc69ea19b94ab209ffc4d4f58de9a21ef8a73d442524abbf42e7c598b5bdce0410d5c3eb511603250a3b31b4368be21ff202659e648c53317b03743cc456fc49283d341f038edf9d5c3d7a76bc0cffaa4c9afa04c9ff3418a302499b620cec2ff640c12466ba9e2c3897a9e73cbd67deadb458ccc7721f185b0226f6ea268d3f5ae7fffe1ae2f37d0bb386097d557a3b66053c34cd979799325196a89b09b88be8c87d99234f54f7a1e81141ac431b1e8f3553477f5338c9c879b7f2c4a92de743125ca617144f6e3b9a784635653f6b99a555bdac264fab4847f1b7d2fa8a1825b0914a08986a26fa7f05d11df1ceb14e48b65b1b3408d8280cef74ecd44dcbe8c15e803a0a27b5d6bc7b194aa9082d74ed16373f0212426d0468516e425e5c9fe31e961889887d8f23f1a08d2c5ac16c731dd3842eed96d2c3443fa57a6b980583fcd76fed53ba8e44b4fb8cfe794212e64f239015763854558fd9cbcb3f2fabc9122c1a33c0a3740deb6e20d3461959fe5cea58000fbeea6c7ca5d7182d0587e5970ad39642f246b0aa8ef1c5fe34db380a2e4c16426aea3cee211ef6aeaabe0056d4b9c842ac349693e1b82350c4b55c3de56e48345714bf26c7039a7e8229ef54039e58f619ec42129bcdd727b810fe9aede5a79130cf7a26925ed487b2a65acfd9b3f5f9dd3cb948ba0550d5eea842ef60e684215386082b3d50369b416d1c1f696dd6162c8f27a507a49301a7b08de9b32354987fb188f61688f46a66ed050e8869aff0d96d22de66829d77e47cb8ce1285c3da68aca73fec0250dd6da6fc15ac4a394d6c8edb00848456cd334720b147359b0cd18901597692a80365bc0cf0086e522f660d294b0db37dea37c6e90d3740c5f3139b4996911bfee766ef2de9ae006b2519ea2c20b331c9381f07fd83fb8726d7bdf5baed6ee5fe0f26620f471dad2bb39e9854b39a3e0ea0fb45a81520d3fde0f5be7e21f5ee945347058670a49ffc746ceebea663747b791c3682bc1b85bd71511c1338fcb25b06729000eca5c0e9249cf4458393e7c90fedc7d29f9d715b8f2c3ed351d3c3cddcbeb725dc02b03b7bc33b9759c7706b551a76c0539ebc96afeea6472a69b0d27a54ca0d33f0c762b2c40a29df2b7bb86ff40c32b2aabea95b39215eeab1611ca59da51df2c6baeffac4e7b2784dddd1021ba65d5730e0431165796e5fed58c222b5f4a5a0eb515d50d39df42aa41faac58852c2443f0a70949c7a758aa95011ca7a1ad57f25b0c93372478cfa23cd66c043da0d017dccedf207ed2e6bd63dad513da2f4c4f3d8eae15602aaa67a6d5f30220cb132e723235417f4283e8f657d2e4cb457c43f64a4916503a9ec42d934bdad456260d8b4afab5ed96b648d7b91710101cd8d8fb1c8afc801b6922ab2b08fe1ba9a3f38cc13440ed9d276928a9673cdfe2eb75965c3f7c3b2c2b51a071482920af51b4a5ae4928072625e6d61eefd7ef9cac3e1f7b2a08c20b8d2e840d88a9b5354eb19a86893824e20cc2dfff37b065edc1c7690a88687f26a18e002370b5de0847ee95adc3370cd02ffd87479126f27c5c6b506f67f909d2e7604706a79d333de58c44fe9cd026c840aa3a87a01b28d515aadef0b59f1cf48dc1d46d8064722e8f7f4e98b31e02977790c749ac4774fffa94bb71a5a70e2edb2e03d0ad0985e544bfa9ed5bc6a676c11491270b4ec2f0cc99139529951413f35f1fd4fa4e525c18f14f567b82cbe9a3af841c09b9cdb2f007133e9c9857b0a1e9646b3b088fe85c914b699869572ff257818b1d6f1e0f1a7ec548fb1ec639d7ca4913b81b976134f8b5746c9a641d4c8a3be6a6b98188ba9ab36cf51814f28c5d2d8eb0b2401b5e6499f6903ccaf59b58533575b2aac4ffabc02cd0597d7c1c4b3f70fe132d8fe699dc22fc4b56b444decbdeee5b283cc972f14d69f7f0816da6033c983892f8b54835ba6d515e7b78836d6fabf33e077df202702bdd72c3bbf866c087e1df5400c09573a348b50aa0a3d39fc75bb5525bfa2e4e45029a2a1b556dd86a66ac49720999ed88fd3ef42cb0bb25fb0d53e0f4f9d57efb95a6e820030f3e7f917be633bc411ddef03c6dbe89603c7b9cfca94e74fee38da0fb9a8ce086f12047599dcacdd6f35e1a6b3e6d04c43a7e1538db38991ff97ef9940297992c758d3e3b323d8db0fb897a614a21cd221bf7846014a42b42ff8bbcd402e27a1e86c07a0fa89645e5ae22e2afca3a6417459ec0cf18f45a8124f21158331847835c33905b4eb78c6df56dbef7a4e645f4a6acdef519047cf61c9f38788105e55014070f0a79f06e213b75711d166743c5f31488d53f37d5c360c32f5debaafd90f61961298db917798ca950c07f869bf89d70eccfa11c6aca1ddc236e5699a0c74355a563fd40f0a8f28551d3c927a39cfeff5de309b5c37800e691cf265474b662c22f4a396c39f8724e215ee6925a8bb059a867909011acf7bcfbe5c92e93f6e1a0eecb8b299d0db1029038722a5429323894465431853e7c9b6d48466c70d4714303fb7d9be1877bbf246f561728c138c3502e07cc5122d9909e8e54a941a11c6a4ae07905f481be8257a678b26796273f8e2d00afaa838247799350b49ecf524d2da92ba93fc3198e4a414b8b99d3a1cb529f75cc7dd4681433f7ce6f2f58adc2443f2a11baf162b60356c40c40cbf6cd8998c414a4da16538a64aa7494d275a654a333a3d1cc549c8e25f844fd3205a8c3252939794449e626cddccac50bf6b09e7bb53af88dc76932d7b335647fb59f7de22d70313d12e976d340702bdf343691569851ea7ee651450d48a9c2e462560136c82c6fa9244fc1e519dff91a139139fc6750258550407205856d0232bd3c5640268657eb52b49cbb53c7982c9499e5deb95dca72c679da6175f72796d07e97e4ef76715f8310660d905a266740c93f3661c30e6e01c9cd0b4cdd0a7d1db967f42eed03d80f5e7ef132583858b66f992bf7cd869de29cb2b8015578d94e688609e1c5c9384213224dd8e4b80f61df0684dd027d785de2757e199b914b50312358e45553b97d1e8b05393e2ac78c70dd312e0afa52fcf902549e0e8bda7036756c978e24f5bf66f5c13d3fc85966960411ddb5a66eb107ddcab321be6cb8d5a5b7803230142c00e1b4dd98857887c5aaf7d29b926db384078c3b84351ef3bc0bd18d6e154b4216af30b7453ab9fdc37f8ef0e0a5fc527410406bb5d7968bff61da18d11b436173aec89f2634468863a05480162f4971a48766e3f664962bf17dee937dd6cb59584900b5eaae8a5800c9d151296fe3ada46e4ca0eae6d7c0e830cfc77370052bfcaf973ae0d4eb1e0b84f31dccfab5daa096f01c86826b914bb6ed5c7c0c02384fe5f924722ae91d516403a5c24d44f86782796401a5f0d3b10d0d502f255609fc71c9275a3daeb69a119c5dd9d7123bd4c404b7a0d452061a9ddde1d88e7c99768c53083ddede279edfa116d6523e830aa7404dd7126925b83679de5a890e82e5feac3ae37a6c2efc14d0c93a2492cb2f56a5c01e647b46105d6f0b7676a8c03de8b100d056aac447603f745e3a69e7d03ca774b5784061c1e9a8c76924eee37942ec0a30c1ce47297b1714115fe2ac934b61fd03a5eae50545cdc4b2534232e777c7d60ed698cdbd48163f7efbbd1d9e6692aa78ce10e05a3791fdc0d393336e89882c9905f969fae59820edf8c1469d0234043c139127754bab7974b84d69775beab8b4b216057629704b27efd27c12b15bf04b08fb68b535547a1621d1545e7412d38b68e6ba12e86fd15e9d2720d607bea731d85a681d8e408a60b1e771b9c6f65df0f98bc2a04595ab677670184c2e8da980162c47aea7c067df0f9451a6577f2505e674492b3d137c5bd2e7f1f7631848cb2fca9d5255f8251df4a2b157358fe4ebe5f0ec23418b7905c973a2c39187c08caac6e03ab4f7cd9854fad0dd9279e73d0fded665d3c65e6ed7d5f6c044f50ec99c79a3ede1fb4945268be38e4729fa837c2db08ffc1868571f06c63974b24c0b2dc955d88ed58455c93dd3cccf1ed8e431cbd460e82771a3bd260843aff53d032f90f8cad4fd6a3b305935f465a15a39829bf4c7c9ccc1a9be29f1f0dd3ee11c4ade088264bded21f2492bc61367459fd661fb3186867de9facf76c3ab14fdb96229cfebe1afe24264c823cf6d419e7b1df765ed10ab0c85168c8707aae27ddf5b8ad6788da211b769afc0fe4553ffd36a337eabb14c83b52408fbd31fbc81cbf6b92556398d43a2b2dce363c18b728579e564afeeb2d2fd2f2f77755ced30b83eec0b8a012364078262ea2f179ac49e6bd164c0dccbce1fd6d804771ddf51faa634970cdfb120e77c5abaf56c7ed98835cb76b8bdab366ed8f1ba393308485efe", 0xae}, 0x1006) [ 316.406409] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 316.413778] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 316.421057] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 316.428511] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 316.436744] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:34 executing program 3 (fault-call:5 fault-nth:19): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xa000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:34 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) init_module(&(0x7f00000000c0)='\x00', 0x1, &(0x7f0000000140)='loproc/\x00') fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000340)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x100, 0x208, 0x1, 0x3, 0x0}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r3, &(0x7f0000000280)=0x4) socket(0x2, 0x2, 0x3f) close(r1) 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xe000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 316.737947] FAULT_INJECTION: forcing a failure. [ 316.737947] name failslab, interval 1, probability 0, space 0, times 0 [ 316.777636] CPU: 0 PID: 17942 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 316.784725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.794101] Call Trace: [ 316.796719] dump_stack+0x172/0x1f0 [ 316.800473] should_fail.cold+0xa/0x1b [ 316.804395] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 316.809630] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 316.815991] __should_failslab+0x121/0x190 [ 316.820259] should_failslab+0x9/0x14 [ 316.824086] kmem_cache_alloc+0x47/0x700 [ 316.828170] ? anon_vma_chain_link+0x154/0x1c0 [ 316.832777] anon_vma_clone+0xde/0x480 [ 316.836684] anon_vma_fork+0x8f/0x4a0 [ 316.840516] ? dup_userfaultfd+0x15e/0x6c0 [ 316.844760] ? memcpy+0x46/0x50 [ 316.848052] copy_process.part.0+0x34e5/0x7a30 [ 316.852702] ? __cleanup_sighand+0x70/0x70 [ 316.856961] ? lock_downgrade+0x810/0x810 [ 316.861155] ? kasan_check_write+0x14/0x20 [ 316.865424] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 316.870291] _do_fork+0x257/0xfd0 [ 316.873764] ? fork_idle+0x1d0/0x1d0 [ 316.877494] ? fput+0x128/0x1a0 [ 316.880797] ? ksys_write+0x1f1/0x2d0 [ 316.884618] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 316.889396] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 316.894213] ? do_syscall_64+0x26/0x620 [ 316.898211] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.903600] ? do_syscall_64+0x26/0x620 [ 316.907601] __x64_sys_clone+0xbf/0x150 [ 316.911634] do_syscall_64+0xfd/0x620 [ 316.915459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.920670] RIP: 0033:0x459879 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xf000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:34 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000010000000100000003000000030000"], 0x17}, 0x0) 07:50:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) syncfs(r0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4100, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000140)={r2, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1d}}}, 0xffffffff, 0x7}, 0x90) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r2, 0x8, 0x4}, &(0x7f0000000300)=0xc) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000004c0)={r2, 0x4}, 0x8) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="232166696c6530202f6465762f6e65742f74756e00206d696d655f74797065f27b5d73797374656d5d776c616e309b240a800c8044abdeb4277e5bf743e4376ef060d4205c0df3cf6e521e0db44a0852d31dcbb1e2c82a118949f0c918f42d4febe68099780e5752a2a3d536ab012d69972cc6ade59b88b98f8ea0895b81e32ffbf96084671e686b8861e3403e82c17875649c6f2b2e3554016b34aa51e6212ed4f79e52fde59e1cb22a841b04bf7a810bf02a261cf90526b2dcb7b031a211df8417a35a352705768671edf589dbdd93ab96f7b2ee3dcd35399fcbc75eac014d010c35000000"], 0xe6) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000480)={0x3, 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 316.923885] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.942958] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 316.950701] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 316.957986] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 316.965273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 316.972552] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 316.979835] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:34 executing program 5: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400000, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x101) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) msync(&(0x7f0000561000/0x4000)=nil, 0x4000, 0x0) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x60000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:34 executing program 3 (fault-call:5 fault-nth:20): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f00000000c0)=0x9bd, 0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x73030000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:34 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$KVM_NMI(r0, 0xae9a) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000500)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000600)=0xe8) sendmsg$nl_route_sched(r2, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x11000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="bc0100e3dfa500000000000000000000000000006361efae78d12e09c714a588f29bc64d3302057e106e1cb53aecd10eacc189c2b19d3ee2fb944e730368e1ad8c49debe03c21e64763100bdb0d2fe1e641fb68b00616a8469d982700cdd0241980fb8130d9a2f0d9411f60d959cbe552fddf7259b2e2187038e2d85e59d", @ANYRES32=r3, @ANYBLOB="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"], 0x1bc}, 0x1, 0x0, 0x0, 0x4000055}, 0x4040) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf, 0x1f, 0x0, 0xcaad}, 0xf) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) ioctl$RTC_PIE_ON(r2, 0x7005) [ 317.329241] FAULT_INJECTION: forcing a failure. [ 317.329241] name failslab, interval 1, probability 0, space 0, times 0 [ 317.346950] CPU: 0 PID: 18080 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 317.354035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.354041] Call Trace: [ 317.354069] dump_stack+0x172/0x1f0 [ 317.354087] should_fail.cold+0xa/0x1b [ 317.354105] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 317.354120] ? lock_downgrade+0x810/0x810 [ 317.354146] __should_failslab+0x121/0x190 [ 317.354164] should_failslab+0x9/0x14 [ 317.354176] kmem_cache_alloc+0x2ae/0x700 [ 317.354188] ? anon_vma_clone+0x320/0x480 [ 317.354210] anon_vma_fork+0xfc/0x4a0 [ 317.354224] ? dup_userfaultfd+0x15e/0x6c0 [ 317.354235] ? memcpy+0x46/0x50 [ 317.354254] copy_process.part.0+0x34e5/0x7a30 [ 317.383215] ? __cleanup_sighand+0x70/0x70 [ 317.399545] ? lock_downgrade+0x810/0x810 [ 317.399574] ? kasan_check_write+0x14/0x20 [ 317.399591] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 317.399610] _do_fork+0x257/0xfd0 [ 317.410933] ? fork_idle+0x1d0/0x1d0 [ 317.410951] ? fput+0x128/0x1a0 [ 317.410965] ? ksys_write+0x1f1/0x2d0 [ 317.410984] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 317.452040] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 317.456824] ? do_syscall_64+0x26/0x620 [ 317.460829] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.466207] ? do_syscall_64+0x26/0x620 [ 317.470193] __x64_sys_clone+0xbf/0x150 [ 317.474191] do_syscall_64+0xfd/0x620 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x9effffff, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 317.478016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.483234] RIP: 0033:0x459879 [ 317.486436] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.505422] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 317.505437] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 317.505444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 317.505452] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 317.505459] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 317.505466] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:37 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x10000000}) r2 = gettid() setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000080)=0x9, 0x4) timer_create(0x3, &(0x7f00000002c0)={0x0, 0x12, 0x4, @thr={0x0, 0x0}}, &(0x7f0000000300)) timer_settime(0x0, 0x1, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) tkill(r2, 0x1000000000014) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x54, 0x5, 0x200, {0x77359400}, 0x1}) close(r1) 07:50:37 executing program 3 (fault-call:5 fault-nth:21): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xa0010000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:37 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_int(r1, 0x0, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:37 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000010000000100000003000000030000"], 0x17}, 0x0) [ 319.855972] FAULT_INJECTION: forcing a failure. [ 319.855972] name failslab, interval 1, probability 0, space 0, times 0 [ 319.885865] CPU: 0 PID: 18206 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 319.892955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.902328] Call Trace: [ 319.904946] dump_stack+0x172/0x1f0 [ 319.908606] should_fail.cold+0xa/0x1b [ 319.912523] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 319.917652] ? lock_downgrade+0x810/0x810 [ 319.921834] __should_failslab+0x121/0x190 [ 319.926092] should_failslab+0x9/0x14 [ 319.929916] kmem_cache_alloc+0x2ae/0x700 [ 319.934078] ? anon_vma_clone+0x320/0x480 [ 319.938253] anon_vma_fork+0x1ea/0x4a0 [ 319.942161] ? dup_userfaultfd+0x15e/0x6c0 [ 319.946421] copy_process.part.0+0x34e5/0x7a30 [ 319.951052] ? __cleanup_sighand+0x70/0x70 [ 319.955446] ? lock_downgrade+0x810/0x810 [ 319.959632] ? kasan_check_write+0x14/0x20 [ 319.963893] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 319.968767] _do_fork+0x257/0xfd0 [ 319.972254] ? fork_idle+0x1d0/0x1d0 [ 319.975983] ? fput+0x128/0x1a0 [ 319.979285] ? ksys_write+0x1f1/0x2d0 [ 319.983117] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 319.987896] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 319.992688] ? do_syscall_64+0x26/0x620 [ 319.997201] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.002606] ? do_syscall_64+0x26/0x620 [ 320.006602] __x64_sys_clone+0xbf/0x150 [ 320.010583] do_syscall_64+0xfd/0x620 [ 320.014391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.019584] RIP: 0033:0x459879 [ 320.022778] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.042252] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:50:37 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xfffff000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 320.280506] FAULT_INJECTION: forcing a failure. [ 320.280506] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 320.354820] CPU: 0 PID: 18327 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 320.361887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.371259] Call Trace: [ 320.373872] dump_stack+0x172/0x1f0 [ 320.377523] should_fail.cold+0xa/0x1b [ 320.381575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.386716] ? __might_sleep+0x95/0x190 [ 320.390722] __alloc_pages_nodemask+0x1ee/0x750 [ 320.395419] ? __alloc_pages_slowpath+0x2870/0x2870 [ 320.400459] ? kasan_slab_alloc+0xf/0x20 07:50:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xffffff7f, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 320.404533] ? kmem_cache_alloc+0x12e/0x700 [ 320.408865] ? anon_vma_fork+0x1ea/0x4a0 [ 320.412947] ? __lock_acquire+0x6ee/0x49c0 [ 320.417203] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 320.422847] alloc_pages_current+0x107/0x210 [ 320.427275] get_zeroed_page+0x14/0x50 [ 320.431174] __pud_alloc+0x3b/0x250 [ 320.431193] pud_alloc+0xde/0x150 [ 320.431211] copy_page_range+0x37a/0x1f90 [ 320.431223] ? anon_vma_fork+0x371/0x4a0 [ 320.431240] ? find_held_lock+0x35/0x130 [ 320.431252] ? anon_vma_fork+0x371/0x4a0 [ 320.431270] ? copy_process.part.0+0x30f9/0x7a30 [ 320.442515] ? copy_process.part.0+0x30f9/0x7a30 [ 320.442539] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 320.442558] ? pmd_alloc+0x180/0x180 [ 320.473334] ? __vma_link_rb+0x279/0x370 [ 320.477430] copy_process.part.0+0x543d/0x7a30 [ 320.482065] ? __cleanup_sighand+0x70/0x70 [ 320.486322] ? lock_downgrade+0x810/0x810 [ 320.490499] ? kasan_check_write+0x14/0x20 [ 320.494754] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 320.499615] _do_fork+0x257/0xfd0 [ 320.503216] ? fork_idle+0x1d0/0x1d0 [ 320.506945] ? fput+0x128/0x1a0 [ 320.510228] ? ksys_write+0x1f1/0x2d0 [ 320.514039] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.518811] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.523572] ? do_syscall_64+0x26/0x620 [ 320.527543] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.532903] ? do_syscall_64+0x26/0x620 [ 320.536874] __x64_sys_clone+0xbf/0x150 [ 320.540840] do_syscall_64+0xfd/0x620 [ 320.544642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.549840] RIP: 0033:0x459879 [ 320.553029] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.572455] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 320.580178] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 320.587696] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 320.594962] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 320.602833] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 320.610108] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:40 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x2, 0x0, 0x8, 0x100000000}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) mkdirat$cgroup(r4, &(0x7f0000000000)='syz\xff\xda', 0x1ff) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000180)) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000380)={0x6, 0x7f, "36e193d30ee269b1f8cc023aed0c152c352f600019c42b094b0ceb2a2f236fd93008da5af187f45e8756340fa57ac8098817bd8cfe5d1047ca6d6f7720acc3bf2cad2dbc1425a518c4c91f709d60c57b40ef96801958aa752fe18e1fd8a4024cad86b4ec262a4381e0488dd95d8ba706d68289417ac4fd19007858c0242877"}) r5 = getpid() fcntl$lock(r3, 0x7, &(0x7f00000001c0)={0x1, 0x0, 0xfffffffffffffffe, 0x3ff, r5}) ioctl$RTC_SET_TIME(r4, 0x4024700a, 0x0) listen(r3, 0x200) sched_setaffinity(0x0, 0x8, &(0x7f0000000780)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(r4, 0x4b32, 0x3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) preadv(r4, &(0x7f00000017c0), 0x1fe, 0x500) r6 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r6, 0x1000000000014) close(r1) getrusage(0x1, &(0x7f0000000140)) 07:50:40 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000440)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:40 executing program 3 (fault-call:5 fault-nth:23): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xffffff9e, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:40 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000010000000100000003000000030000"], 0x17}, 0x0) 07:50:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'lapb0\x00', 0x43732e539841ef1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) connect$ax25(r2, &(0x7f00000002c0)={{0x3, @bcast}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0xbb1f, 0x0) ioctl$CAPI_INSTALLED(r3, 0x80024322) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x31b, &(0x7f0000000240)}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'b\xfe\x0f\x00', 0xc40db1e4b6d1debd}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000180)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}, 0x8, 0xa4aa, 0x2, 0xb5, 0x21}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000480)={r4, 0x80000000, 0x2, 0x3, 0x0, 0x0, 0x1, 0x0, {r5, @in6={{0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}}, 0x6, 0x4, 0x400, 0x4, 0x3f}}, &(0x7f0000000540)=0xb0) open(&(0x7f0000000040)='./file0\x00', 0x80, 0x80) [ 322.920324] FAULT_INJECTION: forcing a failure. [ 322.920324] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 322.934632] CPU: 0 PID: 18453 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 322.941699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.951065] Call Trace: [ 322.953676] dump_stack+0x172/0x1f0 [ 322.957330] should_fail.cold+0xa/0x1b [ 322.961249] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 322.966393] ? __might_sleep+0x95/0x190 [ 322.970399] __alloc_pages_nodemask+0x1ee/0x750 [ 322.975095] ? __pud_alloc+0x1d3/0x250 [ 322.979016] ? __alloc_pages_slowpath+0x2870/0x2870 [ 322.984060] ? __pud_alloc+0x1d3/0x250 [ 322.987982] ? lock_downgrade+0x810/0x810 [ 322.992159] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 322.997727] alloc_pages_current+0x107/0x210 [ 323.002178] ? do_raw_spin_unlock+0x57/0x270 [ 323.006586] __pmd_alloc+0x41/0x460 [ 323.010209] ? pmd_val+0x100/0x100 [ 323.013760] pmd_alloc+0x10c/0x180 [ 323.017295] copy_page_range+0x633/0x1f90 [ 323.021435] ? anon_vma_fork+0x371/0x4a0 [ 323.025511] ? find_held_lock+0x35/0x130 [ 323.029562] ? anon_vma_fork+0x371/0x4a0 [ 323.033631] ? copy_process.part.0+0x30f9/0x7a30 [ 323.038384] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 323.043423] ? pmd_alloc+0x180/0x180 [ 323.047147] ? __vma_link_rb+0x279/0x370 [ 323.051215] copy_process.part.0+0x543d/0x7a30 [ 323.055811] ? __cleanup_sighand+0x70/0x70 [ 323.060042] ? lock_downgrade+0x810/0x810 [ 323.064189] ? kasan_check_write+0x14/0x20 [ 323.068437] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 323.073274] _do_fork+0x257/0xfd0 [ 323.076722] ? fork_idle+0x1d0/0x1d0 [ 323.080425] ? fput+0x128/0x1a0 [ 323.083695] ? ksys_write+0x1f1/0x2d0 [ 323.087493] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.092242] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.096990] ? do_syscall_64+0x26/0x620 [ 323.100955] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.106306] ? do_syscall_64+0x26/0x620 [ 323.110284] __x64_sys_clone+0xbf/0x150 [ 323.114262] do_syscall_64+0xfd/0x620 [ 323.118059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.123238] RIP: 0033:0x459879 [ 323.126421] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.145328] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 323.153065] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 323.160348] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:50:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xfffffff0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 323.167613] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 323.174871] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 323.182149] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:40 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x1f, 0xdd9, 0x401, 0xfffffffffffffff8, 0x0, 0x7, 0x4008, 0x1, 0x1, 0xffffffffffffbe6f, 0x3f, 0x80000000, 0x4, 0x2, 0x1, 0x2, 0x4, 0x80c, 0x5, 0x10000, 0x1, 0x100000000, 0x9, 0x20, 0x3, 0xb8de, 0x7ff, 0x8000, 0x9, 0x7fff, 0x9, 0x4, 0x7ff, 0x101, 0x3, 0x5, 0x0, 0x36800000, 0x1, @perf_config_ext={0x0, 0x5}, 0x1000, 0x101, 0xfffffffffffff71f, 0x7, 0x2, 0x2, 0x81}, r3, 0x10, r1, 0x9) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x1a0ffffffff, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:40 executing program 3 (fault-call:5 fault-nth:24): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = add_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="ca920a43c858fd1b884419fda0f211c60e790a0d2ee910ed28b98b9bd9db043facbff32ce475c1d39db09619f3716f7899278f7e1bda", 0x36, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000140)=""/132, 0x84) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x4, 0x3}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x3000000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 323.423960] FAULT_INJECTION: forcing a failure. [ 323.423960] name failslab, interval 1, probability 0, space 0, times 0 [ 323.505775] CPU: 1 PID: 18579 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 323.513129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.522495] Call Trace: [ 323.522523] dump_stack+0x172/0x1f0 [ 323.522546] should_fail.cold+0xa/0x1b [ 323.522564] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 323.522582] ? lock_downgrade+0x810/0x810 [ 323.541914] __should_failslab+0x121/0x190 [ 323.546163] should_failslab+0x9/0x14 [ 323.549991] kmem_cache_alloc+0x2ae/0x700 [ 323.554170] ? alloc_pages_current+0x10f/0x210 [ 323.558757] ? do_raw_spin_unlock+0x57/0x270 [ 323.563179] __pmd_alloc+0xc9/0x460 [ 323.566817] ? pmd_val+0x100/0x100 [ 323.570381] pmd_alloc+0x10c/0x180 [ 323.573940] copy_page_range+0x633/0x1f90 [ 323.578114] ? anon_vma_fork+0x371/0x4a0 [ 323.582238] ? find_held_lock+0x35/0x130 [ 323.586337] ? anon_vma_fork+0x371/0x4a0 [ 323.590436] ? copy_process.part.0+0x30f9/0x7a30 [ 323.595219] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 323.600261] ? pmd_alloc+0x180/0x180 [ 323.603992] ? __vma_link_rb+0x279/0x370 [ 323.608066] copy_process.part.0+0x543d/0x7a30 [ 323.612686] ? __cleanup_sighand+0x70/0x70 [ 323.616925] ? lock_downgrade+0x810/0x810 [ 323.621089] ? kasan_check_write+0x14/0x20 [ 323.625332] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 323.630200] _do_fork+0x257/0xfd0 [ 323.633668] ? fork_idle+0x1d0/0x1d0 [ 323.637388] ? fput+0x128/0x1a0 [ 323.640682] ? ksys_write+0x1f1/0x2d0 [ 323.644505] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.649271] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.654035] ? do_syscall_64+0x26/0x620 [ 323.658027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.663419] ? do_syscall_64+0x26/0x620 [ 323.667426] __x64_sys_clone+0xbf/0x150 [ 323.671421] do_syscall_64+0xfd/0x620 [ 323.671441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.671452] RIP: 0033:0x459879 [ 323.671465] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.671471] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 323.671485] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 323.671492] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 323.671499] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 323.671512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 323.683669] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:41 executing program 1: r0 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x9, 0x103000) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000440)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000014) close(r2) fstatfs(r1, &(0x7f0000000340)=""/197) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f0000000140)={0x1, 0x8, &(0x7f0000000240)="0c89d7a7f5257a980caf577fd6080e5066e8447b8742c8ff14b90bf1eb7ec071e5b56e3c03ace94b44043193bc221da09dbff9b8c73a92a098366503112c14c8bf99a060dff093c0d90b2e8882bf7541d558bddf61906630c2494b47f83992060d4995fc82252470e62759c98c9807ed67d82a69b7d3bb54b4f8e0dbb01e1a08dc0b287e7249fecc922964ad00420dae680212f90a9b622592d451f63a922a17078fb56f50d53db1ea56b5b92d52610929c2443f680903da7a76a46f65366d555af990b68d6984786109672e46783dca", {0x4, 0x0, 0x42475251, 0x5, 0x2, 0x7, 0xc, 0xffffffff00000000}}) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f00000000c0)={0x3a, 0x8, 0x3}) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000180)=r3) 07:50:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f00000000c0)) 07:50:41 executing program 3 (fault-call:5 fault-nth:25): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x40030000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:41 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) fcntl$setflags(r0, 0x2, 0x1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xf0ffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 323.944465] FAULT_INJECTION: forcing a failure. [ 323.944465] name fail_page_alloc, interval 1, probability 0, space 0, times 0 07:50:41 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000440)='|\x00\x00\x1b\xe4\xc0\x00\x00\x00\x00\x00\x00\b\x00\xae\xeb\xdamK\xae\x1e6\x10\xce.dz\xb2\x1cC2j\xd5h\xee\xd5\xa1\xe2\xa2\x98\xf6f\x894z\xccDS?`Q%\x91D\xb12\x80y\xe7O:\x8bx9\xeb\xcfjf.\xc5\x91B\xf0\xb8\xa6\xe6`\xb7j\xb9\b)\xb1\xae\x81\xbc\xd5o\x03\xe4\x9b\xcf\x1cL\xb9\r$\xf3\x1a\x96 \xf7@\xfb\x9f\x97\xa0\x1fJ/\x1d\x17%\x94\x19QWA\xa9\xf0g\xa4\'\xa1\xbeF\xe9\xc9eM\x9f\x149\x9fe\x96\xc1\b\xce\xae\xad\xdbE\x83\xf3m=\xaaH\x93\xc8\xc0\x88\xbex\x95\xfe;\xbc\v\xa2\xa2\x97\f\x1b;\x1a\xf0\x00\x80S\xb5\xda\xed\x99\r\xe0\xa4\x1a\xa5\xacX$\xaa\xdf\x8f\xe7\x96\x8aY\xec\r\xc4\xf6\x0e[\xc7I\x9d\x95c\xd3?\xd1\xeb\vY\x02f!cqe\f%\x1fQ\x9d\x02;h|\xe8E\xafT\\\x05J\xfb\x96\xfa\xd3>\x03\xfb\xb0\xc9\x93M\xde', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) [ 323.987945] CPU: 0 PID: 18705 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 323.995017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.004385] Call Trace: [ 324.007026] dump_stack+0x172/0x1f0 [ 324.010690] should_fail.cold+0xa/0x1b [ 324.014665] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 324.019805] ? __might_sleep+0x95/0x190 [ 324.023807] __alloc_pages_nodemask+0x1ee/0x750 [ 324.028930] ? find_held_lock+0x35/0x130 [ 324.033009] ? __alloc_pages_slowpath+0x2870/0x2870 [ 324.038053] ? lock_downgrade+0x810/0x810 [ 324.042231] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 324.047799] alloc_pages_current+0x107/0x210 [ 324.052243] pte_alloc_one+0x1b/0x1a0 [ 324.056077] __pte_alloc+0x2a/0x360 [ 324.059734] copy_page_range+0x151f/0x1f90 [ 324.063989] ? anon_vma_fork+0x371/0x4a0 [ 324.068076] ? find_held_lock+0x35/0x130 [ 324.072177] ? anon_vma_fork+0x371/0x4a0 [ 324.076264] ? copy_process.part.0+0x30f9/0x7a30 [ 324.081049] ? pmd_alloc+0x180/0x180 07:50:41 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r0, 0x7005) [ 324.084779] ? __vma_link_rb+0x279/0x370 [ 324.089474] copy_process.part.0+0x543d/0x7a30 [ 324.094103] ? __cleanup_sighand+0x70/0x70 [ 324.098354] ? lock_downgrade+0x810/0x810 [ 324.102546] ? kasan_check_write+0x14/0x20 [ 324.106806] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 324.116553] _do_fork+0x257/0xfd0 [ 324.120040] ? fork_idle+0x1d0/0x1d0 [ 324.123779] ? fput+0x128/0x1a0 [ 324.127081] ? ksys_write+0x1f1/0x2d0 [ 324.130912] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 324.135691] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 324.140479] ? do_syscall_64+0x26/0x620 [ 324.144475] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.149868] ? do_syscall_64+0x26/0x620 [ 324.153877] __x64_sys_clone+0xbf/0x150 [ 324.157890] do_syscall_64+0xfd/0x620 [ 324.161731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.166947] RIP: 0033:0x459879 [ 324.170170] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.189098] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 324.196835] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 324.204131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 324.211423] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 324.218713] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 324.226005] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:41 executing program 3 (fault-call:5 fault-nth:26): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x100000000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:41 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000240)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0], 0x4, 0x4, 0x4, 0x3}) 07:50:41 executing program 4: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000000)={{0x8, 0x7}, {0x80, 0x7}, 0xe7, 0x1, 0x5}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:41 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/215, 0xd7}], 0x1) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 324.495212] FAULT_INJECTION: forcing a failure. [ 324.495212] name failslab, interval 1, probability 0, space 0, times 0 [ 324.518112] CPU: 0 PID: 18838 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 324.525183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.534552] Call Trace: [ 324.537168] dump_stack+0x172/0x1f0 [ 324.541868] should_fail.cold+0xa/0x1b [ 324.545784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 324.550908] ? lock_downgrade+0x810/0x810 [ 324.555085] __should_failslab+0x121/0x190 [ 324.559345] should_failslab+0x9/0x14 [ 324.563172] kmem_cache_alloc+0x2ae/0x700 [ 324.567432] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 324.572999] ptlock_alloc+0x20/0x70 [ 324.576644] pte_alloc_one+0x6d/0x1a0 [ 324.580465] __pte_alloc+0x2a/0x360 [ 324.584117] copy_page_range+0x151f/0x1f90 [ 324.588368] ? anon_vma_fork+0x371/0x4a0 [ 324.592461] ? find_held_lock+0x35/0x130 [ 324.596554] ? anon_vma_fork+0x371/0x4a0 [ 324.600643] ? copy_process.part.0+0x30f9/0x7a30 [ 324.605463] ? pmd_alloc+0x180/0x180 [ 324.609215] ? __vma_link_rb+0x279/0x370 [ 324.613306] copy_process.part.0+0x543d/0x7a30 [ 324.617931] ? __cleanup_sighand+0x70/0x70 [ 324.622192] ? lock_downgrade+0x810/0x810 [ 324.626370] ? kasan_check_write+0x14/0x20 [ 324.630627] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 324.635497] _do_fork+0x257/0xfd0 [ 324.638987] ? fork_idle+0x1d0/0x1d0 [ 324.642722] ? fput+0x128/0x1a0 [ 324.646026] ? ksys_write+0x1f1/0x2d0 [ 324.649854] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 324.654634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 324.659418] ? do_syscall_64+0x26/0x620 [ 324.663413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.668800] ? do_syscall_64+0x26/0x620 [ 324.672803] __x64_sys_clone+0xbf/0x150 [ 324.676811] do_syscall_64+0xfd/0x620 [ 324.680636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.685839] RIP: 0033:0x459879 07:50:41 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000040)={0x0, {0x255}}) r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) close(r2) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000000)) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:42 executing program 4: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) [ 324.689041] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.707955] RSP: 002b:00007f4ba9041c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 324.716007] RAX: ffffffffffffffda RBX: 00007f4ba9041c90 RCX: 0000000000459879 [ 324.716016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 324.716023] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 324.716030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90426d4 07:50:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x200000000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 324.716037] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:42 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) r3 = geteuid() fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r2, r3, r4}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001400)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000001500)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0}, &(0x7f0000001580)=0xc) ptrace(0x4208, r6) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000015c0)={{{@in6=@dev={0xfe, 0x80, [], 0xd}, @in=@multicast2, 0x4e23, 0x200, 0x4e21, 0x1000, 0x2, 0x20, 0x80, 0x3a, r5, r7}, {0x47, 0x1, 0x40, 0x3, 0x1, 0x9, 0x1, 0x40}, {0x6, 0x9, 0x101, 0x1}, 0x823, 0x6e6bbb, 0x1, 0x0, 0x1, 0x3}, {{@in6=@rand_addr="d1150bee5b7cf1560e1389a29e211d54", 0x4d5, 0x33}, 0xa, @in6=@ipv4={[], [], @loopback}, 0x3501, 0x0, 0x0, 0x1000, 0xc84, 0x0, 0x8000}}, 0xe8) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r8 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r8, 0x1000000000014) close(r1) 07:50:42 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x0, 0x2}, 0x6) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x300000000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:42 executing program 3 (fault-call:5 fault-nth:27): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x24) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000180)={{0x4, 0xff}, {0x8000, 0x7}, 0x0, 0x2, 0x80000000000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000080)=0x800, 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100020}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000427bd0100fddbdf25010000000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000400)) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) pipe2(&(0x7f0000000040), 0x0) 07:50:42 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) sysfs$1(0x1, &(0x7f00000000c0)='\x00') close(r1) [ 325.069087] FAULT_INJECTION: forcing a failure. [ 325.069087] name failslab, interval 1, probability 0, space 0, times 0 [ 325.114757] CPU: 0 PID: 18973 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 325.121831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.131207] Call Trace: [ 325.133826] dump_stack+0x172/0x1f0 [ 325.137481] should_fail.cold+0xa/0x1b [ 325.141395] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 325.146520] ? lock_downgrade+0x810/0x810 [ 325.150703] __should_failslab+0x121/0x190 [ 325.155169] should_failslab+0x9/0x14 [ 325.159001] kmem_cache_alloc+0x2ae/0x700 [ 325.163167] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 325.168731] ptlock_alloc+0x20/0x70 [ 325.172395] pte_alloc_one+0x6d/0x1a0 [ 325.176220] __pte_alloc+0x2a/0x360 [ 325.179997] copy_page_range+0x151f/0x1f90 [ 325.184233] ? anon_vma_fork+0x371/0x4a0 [ 325.188653] ? find_held_lock+0x35/0x130 [ 325.192710] ? anon_vma_fork+0x371/0x4a0 [ 325.196767] ? copy_process.part.0+0x30f9/0x7a30 [ 325.201755] ? pmd_alloc+0x180/0x180 [ 325.205494] ? __vma_link_rb+0x279/0x370 [ 325.209615] copy_process.part.0+0x543d/0x7a30 [ 325.214208] ? __cleanup_sighand+0x70/0x70 [ 325.218436] ? lock_downgrade+0x810/0x810 [ 325.222607] ? kasan_check_write+0x14/0x20 [ 325.226858] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 325.231709] _do_fork+0x257/0xfd0 [ 325.235181] ? fork_idle+0x1d0/0x1d0 [ 325.238911] ? fput+0x128/0x1a0 [ 325.242204] ? ksys_write+0x1f1/0x2d0 [ 325.246036] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.250805] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.255745] ? do_syscall_64+0x26/0x620 [ 325.259723] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:50:42 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) [ 325.265103] ? do_syscall_64+0x26/0x620 [ 325.269092] __x64_sys_clone+0xbf/0x150 [ 325.273079] do_syscall_64+0xfd/0x620 [ 325.276893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.282112] RIP: 0033:0x459879 [ 325.286273] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.305212] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:50:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x400000000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:42 executing program 4: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ioctl$KVM_RUN(r1, 0xae80, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 325.312953] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 325.320222] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 325.320234] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 325.334776] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 325.342154] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:42 executing program 3 (fault-call:5 fault-nth:28): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:42 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() fcntl$lock(r1, 0x6, &(0x7f0000000040)={0x1, 0x2, 0x0, 0x8, r2}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000014) close(r1) [ 325.524030] FAULT_INJECTION: forcing a failure. [ 325.524030] name failslab, interval 1, probability 0, space 0, times 0 [ 325.562575] CPU: 0 PID: 19064 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 325.569652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.579019] Call Trace: [ 325.581638] dump_stack+0x172/0x1f0 [ 325.585291] should_fail.cold+0xa/0x1b [ 325.589320] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 325.594461] ? find_held_lock+0x35/0x130 [ 325.598554] ? percpu_ref_put_many+0x94/0x190 [ 325.603084] __should_failslab+0x121/0x190 [ 325.607334] should_failslab+0x9/0x14 [ 325.611154] kmem_cache_alloc+0x47/0x700 [ 325.615240] ? __lock_is_held+0xb6/0x140 [ 325.619324] anon_vma_clone+0xde/0x480 07:50:43 executing program 5: syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1000, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000001240)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f0000000440)={{0x7, 0x1, 0x8, 0x2, 'syz1\x00', 0x77}, 0x1, [0x2, 0x3f, 0x3ff, 0x100, 0x5fb, 0x4ca7, 0x3, 0x40, 0x3, 0xbba9, 0x10000, 0x0, 0xffff, 0x4, 0x0, 0x3, 0x1c00000000000, 0x6, 0x200, 0x7, 0x3, 0x3, 0x3f, 0x1, 0x0, 0x80, 0xffffffffffffffff, 0x20, 0x800, 0xfffffffffffeffff, 0x4, 0x7, 0x3, 0xfffffffffffff984, 0x5, 0x0, 0x2e94, 0x6, 0x0, 0x1000, 0x6, 0x4f, 0x4b, 0x4, 0x2ae, 0x1, 0x8001, 0x1, 0x467, 0x800, 0x1cfa000000, 0x5, 0x7, 0x101, 0x6, 0x6, 0x4, 0x8, 0x8, 0x0, 0x7fffffff, 0x2, 0x3ff, 0x7, 0x4b, 0x101, 0x5a, 0x0, 0x100000000, 0x0, 0x0, 0x9, 0x80000000, 0x5, 0x10000, 0x401, 0x1000000, 0xa31d, 0x7fff, 0x20, 0x8, 0x5, 0x3, 0x6, 0xffffffffffff0001, 0xfffffffffffffe01, 0x2, 0x0, 0x800, 0xffffffffffffff00, 0x7, 0xff, 0xbcce, 0x9, 0xf8c5, 0x9, 0x7, 0x3f, 0x8, 0xc0, 0x0, 0x7ff, 0x100000000, 0x7ff, 0x1, 0x7ff, 0x6, 0x0, 0x4, 0x49f, 0x1, 0x60, 0x9, 0x2, 0x40000000000, 0x800, 0x51d, 0x2, 0x7f, 0x3f, 0x0, 0x24, 0x7, 0x1207caf8, 0x80, 0x2, 0x6, 0x4]}) [ 325.623235] anon_vma_fork+0x8f/0x4a0 [ 325.627046] ? dup_userfaultfd+0x15e/0x6c0 [ 325.631298] ? memcpy+0x46/0x50 [ 325.634598] copy_process.part.0+0x34e5/0x7a30 [ 325.639223] ? __cleanup_sighand+0x70/0x70 [ 325.643475] ? lock_downgrade+0x810/0x810 [ 325.647653] ? kasan_check_write+0x14/0x20 [ 325.651893] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 325.651914] _do_fork+0x257/0xfd0 [ 325.651931] ? fork_idle+0x1d0/0x1d0 [ 325.651945] ? fput+0x128/0x1a0 [ 325.651964] ? ksys_write+0x1f1/0x2d0 [ 325.663967] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.663982] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.663996] ? do_syscall_64+0x26/0x620 [ 325.664012] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.664026] ? do_syscall_64+0x26/0x620 [ 325.664044] __x64_sys_clone+0xbf/0x150 [ 325.664060] do_syscall_64+0xfd/0x620 [ 325.664078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.664090] RIP: 0033:0x459879 [ 325.664104] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.664111] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 325.664128] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 325.744128] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 325.751423] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 325.758715] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 325.766007] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth0_to_bond\x00', 0x1000}) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:43 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000001c0)={0x1, r0}) r2 = gettid() openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f00000000c0)={0x1, r0}) close(r1) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000180)=0x92e6) 07:50:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xe00000000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:43 executing program 3 (fault-call:5 fault-nth:29): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:43 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_cache\x00') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) splice(r3, &(0x7f0000000000), r0, &(0x7f0000000040), 0x2, 0x1) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:43 executing program 4: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000000)={0x0, 0x9763}, 0x2) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xf00000000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 325.978155] FAULT_INJECTION: forcing a failure. [ 325.978155] name failslab, interval 1, probability 0, space 0, times 0 [ 326.063584] CPU: 1 PID: 19164 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 326.070668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.080040] Call Trace: [ 326.082677] dump_stack+0x172/0x1f0 [ 326.086332] should_fail.cold+0xa/0x1b [ 326.090229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.095375] ? __lock_is_held+0xb6/0x140 [ 326.099459] ? __lock_is_held+0xb6/0x140 [ 326.103538] __should_failslab+0x121/0x190 [ 326.107780] should_failslab+0x9/0x14 [ 326.111593] kmem_cache_alloc+0x47/0x700 [ 326.115754] ? anon_vma_chain_link+0x154/0x1c0 [ 326.120343] anon_vma_clone+0xde/0x480 [ 326.124242] anon_vma_fork+0x8f/0x4a0 [ 326.128042] ? dup_userfaultfd+0x15e/0x6c0 [ 326.132292] ? memcpy+0x46/0x50 [ 326.135580] copy_process.part.0+0x34e5/0x7a30 [ 326.140210] ? __cleanup_sighand+0x70/0x70 [ 326.144467] ? lock_downgrade+0x810/0x810 [ 326.148673] ? kasan_check_write+0x14/0x20 [ 326.152925] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 326.157788] _do_fork+0x257/0xfd0 [ 326.161252] ? fork_idle+0x1d0/0x1d0 [ 326.164978] ? fput+0x128/0x1a0 [ 326.168273] ? ksys_write+0x1f1/0x2d0 [ 326.172093] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 326.176869] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 326.181656] ? do_syscall_64+0x26/0x620 [ 326.185639] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.191018] ? do_syscall_64+0x26/0x620 [ 326.195267] __x64_sys_clone+0xbf/0x150 [ 326.199268] do_syscall_64+0xfd/0x620 [ 326.203095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.208303] RIP: 0033:0x459879 [ 326.211511] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.230434] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 326.238169] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 326.245448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 326.252727] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:50:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x6000000000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:43 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x8000, 0x3, &(0x7f00006d8000/0x8000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:43 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x3}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) recvfrom$llc(r0, &(0x7f00000002c0)=""/174, 0xae, 0x2001, &(0x7f00000000c0)={0x1a, 0xf, 0xffff, 0x1, 0x80000001, 0x401, @local}, 0x10) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200, 0x0) fstat(r1, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$VFIO_SET_IOMMU(r0, 0x3b66, 0x3) tkill(r2, 0x1d) getsockopt$packet_buf(r0, 0x107, 0x2, &(0x7f00000001c0)=""/51, &(0x7f0000000240)=0x33) close(r1) 07:50:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000380)=0x1, 0x4) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x22000) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r2, 0x1b, 0x1, 0x2, &(0x7f00000000c0)=[0x0, 0x0], 0x2}, 0x20) mkdirat$cgroup(r2, &(0x7f0000000300)='syz0\x00', 0x1ff) getsockopt$XDP_MMAP_OFFSETS(r2, 0x11b, 0x1, &(0x7f0000000140), &(0x7f00000001c0)=0x60) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f00000002c0)={0x800, 0x2d, 0x4}) [ 326.252798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 326.267365] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:43 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) fcntl$lock(r0, 0x26, &(0x7f00000000c0)={0x0, 0x0, 0x2000000000000000, 0x0, r2}) r3 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000014) close(r1) 07:50:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x7303000000000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x9effffff00000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:44 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:44 executing program 3 (fault-call:5 fault-nth:30): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:44 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000240)={0xf948b340bcc87eea, 0x4, &(0x7f0000000140)="520e765a52c5d0c3e9cc232341fb78be732ec46aa96ffd672280bd32ee3555ffa50d5f78f0061bb2e104de3f3ae3e36b8ee982cbca078c1f1e6d52d0c1492d0e19b90d2df2374ea41e90284449086614322acf1c238baa19626aa41ac456d0c7eb67f512908599c1649e3f0a2033191a87e9fb4be4910119f6e934d015f13058a1a2b8d163ff450601964df4a3affe83f149154a7abd73b4", {0x3, 0xffff, 0x32314d48, 0x8, 0x7, 0x3f, 0x6, 0x1}}) tkill(r2, 0x1000000000014) close(r1) connect$rxrpc(r0, &(0x7f0000000200)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x3, @rand_addr="68690fd4a57eff7c5995f51c687181a3", 0x7d1c}}, 0x24) 07:50:44 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0xfffffffffffff26b, 0x1, 0x400, 0x6, 0x0, 0x2}) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) recvfrom$netrom(r1, &(0x7f0000000100)=""/237, 0xed, 0x20, &(0x7f00000002c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x1}, [@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}, 0x48) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xf0ffffff00000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:44 executing program 4 (fault-call:2 fault-nth:0): pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xffffff7f00000000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 326.892048] FAULT_INJECTION: forcing a failure. [ 326.892048] name failslab, interval 1, probability 0, space 0, times 0 [ 326.937790] CPU: 0 PID: 19400 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 326.944859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.944866] Call Trace: [ 326.944901] dump_stack+0x172/0x1f0 [ 326.944921] should_fail.cold+0xa/0x1b [ 326.944938] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.944957] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 326.944980] __should_failslab+0x121/0x190 [ 326.944993] should_failslab+0x9/0x14 [ 326.945004] kmem_cache_alloc+0x47/0x700 [ 326.945019] ? anon_vma_chain_link+0x154/0x1c0 [ 326.945038] anon_vma_clone+0xde/0x480 [ 326.945059] anon_vma_fork+0x8f/0x4a0 [ 326.945073] ? dup_userfaultfd+0x15e/0x6c0 [ 326.945085] ? memcpy+0x46/0x50 [ 326.945103] copy_process.part.0+0x34e5/0x7a30 [ 326.945139] ? __cleanup_sighand+0x70/0x70 [ 326.980345] ? lock_downgrade+0x810/0x810 [ 326.980372] ? kasan_check_write+0x14/0x20 [ 326.980391] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 327.030132] _do_fork+0x257/0xfd0 [ 327.033614] ? fork_idle+0x1d0/0x1d0 07:50:44 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 327.037344] ? fput+0x128/0x1a0 [ 327.040634] ? ksys_write+0x1f1/0x2d0 [ 327.044464] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.049532] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.054320] ? do_syscall_64+0x26/0x620 [ 327.058327] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.063720] ? do_syscall_64+0x26/0x620 [ 327.067726] __x64_sys_clone+0xbf/0x150 [ 327.071730] do_syscall_64+0xfd/0x620 [ 327.075570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.080764] RIP: 0033:0x459879 07:50:44 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 327.084134] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.103115] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 327.110839] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 327.118383] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 327.125668] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:50:44 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x141, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x400, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f000061d000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 327.132958] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 327.140238] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:44 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bond_slave_0\x00', 0x20}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x200}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xffffffffa0010000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:44 executing program 3 (fault-call:5 fault-nth:31): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 327.305996] audit: type=1400 audit(1567497044.753:57): avc: denied { attach_queue } for pid=19520 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=tun_socket permissive=1 [ 327.403736] FAULT_INJECTION: forcing a failure. [ 327.403736] name failslab, interval 1, probability 0, space 0, times 0 [ 327.424893] CPU: 0 PID: 19528 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 327.431976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.441343] Call Trace: [ 327.441372] dump_stack+0x172/0x1f0 [ 327.441392] should_fail.cold+0xa/0x1b [ 327.441409] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.441424] ? lock_downgrade+0x810/0x810 [ 327.441448] __should_failslab+0x121/0x190 [ 327.441465] should_failslab+0x9/0x14 [ 327.441479] kmem_cache_alloc+0x2ae/0x700 [ 327.441492] ? anon_vma_clone+0x320/0x480 [ 327.441513] anon_vma_fork+0xfc/0x4a0 [ 327.441526] ? dup_userfaultfd+0x15e/0x6c0 [ 327.441542] ? memcpy+0x46/0x50 [ 327.456763] copy_process.part.0+0x34e5/0x7a30 [ 327.456801] ? __cleanup_sighand+0x70/0x70 [ 327.468974] ? lock_downgrade+0x810/0x810 [ 327.469002] ? kasan_check_write+0x14/0x20 [ 327.505918] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 327.510777] _do_fork+0x257/0xfd0 [ 327.510795] ? fork_idle+0x1d0/0x1d0 [ 327.510813] ? fput+0x128/0x1a0 [ 327.521237] ? ksys_write+0x1f1/0x2d0 [ 327.525057] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.529844] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 327.529865] ? do_syscall_64+0x26/0x620 [ 327.529884] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.543972] ? do_syscall_64+0x26/0x620 [ 327.548043] __x64_sys_clone+0xbf/0x150 [ 327.552047] do_syscall_64+0xfd/0x620 [ 327.556401] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.561603] RIP: 0033:0x459879 [ 327.564809] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.584425] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 327.592195] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 327.599485] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 327.606791] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 327.614308] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 327.621715] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:47 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) read$eventfd(r1, &(0x7f00000000c0), 0x8) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x14c9) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)=0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000000140)=""/173) timer_settime(r3, 0x0, &(0x7f0000000200)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:47 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:47 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ftruncate(r0, 0x81) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) process_vm_writev(r2, &(0x7f0000000640)=[{&(0x7f00000000c0)=""/86, 0x56}, {&(0x7f0000000440)=""/150, 0x96}, {&(0x7f0000000500)=""/70, 0x46}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000000580)=""/180, 0xb4}], 0x5, &(0x7f0000001e80)=[{&(0x7f0000000040)=""/50, 0x32}, {&(0x7f00000006c0)=""/118, 0x76}, {&(0x7f0000000740)=""/234, 0xea}, {&(0x7f0000000840)=""/255, 0xff}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000940)=""/153, 0x99}, {&(0x7f0000000a00)=""/159, 0x9f}, {&(0x7f0000001cc0)=""/193, 0xc1}, {&(0x7f0000001dc0)=""/155, 0x9b}], 0x9, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0xfffffffffffff000, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:47 executing program 3 (fault-call:5 fault-nth:32): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000100)=0xa4) write$UHID_DESTROY(r1, &(0x7f00000000c0), 0x4) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 329.800032] FAULT_INJECTION: forcing a failure. [ 329.800032] name failslab, interval 1, probability 0, space 0, times 0 [ 329.824103] CPU: 0 PID: 19643 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 329.831173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.840547] Call Trace: [ 329.843173] dump_stack+0x172/0x1f0 [ 329.846841] should_fail.cold+0xa/0x1b [ 329.850763] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 329.855898] ? lock_downgrade+0x810/0x810 [ 329.860096] __should_failslab+0x121/0x190 [ 329.864360] should_failslab+0x9/0x14 [ 329.868187] kmem_cache_alloc+0x2ae/0x700 [ 329.872364] ? anon_vma_clone+0x320/0x480 [ 329.876557] anon_vma_fork+0x1ea/0x4a0 [ 329.880470] ? dup_userfaultfd+0x15e/0x6c0 [ 329.885000] copy_process.part.0+0x34e5/0x7a30 [ 329.889644] ? __cleanup_sighand+0x70/0x70 [ 329.894252] ? lock_downgrade+0x810/0x810 07:50:47 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0x62bee17e, 0x1, 0xfff, 0x4, 0x4, 0xffffffffffff06f2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) [ 329.898513] ? kasan_check_write+0x14/0x20 [ 329.902780] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 329.907673] _do_fork+0x257/0xfd0 [ 329.911151] ? fork_idle+0x1d0/0x1d0 [ 329.914894] ? fput+0x128/0x1a0 [ 329.918199] ? ksys_write+0x1f1/0x2d0 [ 329.922024] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.926805] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.931579] ? do_syscall_64+0x26/0x620 [ 329.935615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.941005] ? do_syscall_64+0x26/0x620 [ 329.945009] __x64_sys_clone+0xbf/0x150 [ 329.949176] do_syscall_64+0xfd/0x620 [ 329.953015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.958226] RIP: 0033:0x459879 [ 329.961435] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.980353] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 329.988191] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 329.995575] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 330.002862] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 330.010154] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 330.017440] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:47 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) bind$xdp(r3, &(0x7f0000000240)={0x2c, 0x4, r4, 0x2a, r1}, 0x10) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:47 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:47 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x200, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:47 executing program 3 (fault-call:5 fault-nth:33): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x200) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f00000000c0)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f3a}) 07:50:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:47 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r4, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r3, 0x26, &(0x7f0000000000)) r5 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r5, 0x1000000000014) close(r4) [ 330.364343] FAULT_INJECTION: forcing a failure. [ 330.364343] name failslab, interval 1, probability 0, space 0, times 0 [ 330.407678] CPU: 1 PID: 19781 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 330.414750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.424291] Call Trace: [ 330.426911] dump_stack+0x172/0x1f0 [ 330.430570] should_fail.cold+0xa/0x1b [ 330.434484] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 330.439606] ? lock_downgrade+0x810/0x810 [ 330.443785] __should_failslab+0x121/0x190 [ 330.448044] should_failslab+0x9/0x14 [ 330.451945] kmem_cache_alloc+0x2ae/0x700 [ 330.456111] ? pmd_alloc+0x180/0x180 [ 330.459848] vm_area_dup+0x21/0x170 [ 330.463488] copy_process.part.0+0x3407/0x7a30 [ 330.468118] ? __cleanup_sighand+0x70/0x70 [ 330.472366] ? lock_downgrade+0x810/0x810 [ 330.476541] ? kasan_check_write+0x14/0x20 [ 330.480816] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 330.485684] _do_fork+0x257/0xfd0 [ 330.489155] ? fork_idle+0x1d0/0x1d0 [ 330.492880] ? fput+0x128/0x1a0 [ 330.496174] ? ksys_write+0x1f1/0x2d0 [ 330.500010] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 330.504781] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 330.509557] ? do_syscall_64+0x26/0x620 [ 330.513545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.518927] ? do_syscall_64+0x26/0x620 [ 330.522922] __x64_sys_clone+0xbf/0x150 [ 330.526998] do_syscall_64+0xfd/0x620 [ 330.530820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.536016] RIP: 0033:0x459879 [ 330.539218] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:50:48 executing program 3 (fault-call:5 fault-nth:34): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 330.558131] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 330.565964] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 330.573251] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 330.580544] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 330.587830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 330.595119] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x1}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:48 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:48 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r2 = semget$private(0x0, 0x0, 0x200) getsockopt$inet6_mreq(r1, 0x29, 0x49e2128b5fab9bab, &(0x7f00000000c0)={@local, 0x0}, &(0x7f0000000140)=0x14) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@mcast1, @in6=@rand_addr="6041f19fce32c3ebebca06744e3ee8bc", 0x4e24, 0x40, 0x4e23, 0x9, 0x2, 0x80, 0xa0, 0x2c, r3, r4}, {0x7266, 0x9, 0x7, 0x1, 0x9, 0x4, 0x0, 0xfffffffffffffffe}, {0x0, 0x3, 0x9, 0x672}, 0x1, 0x6e6bb5, 0x0, 0x0, 0x1, 0x2}, {{@in=@broadcast, 0x4d6, 0x32}, 0xa, @in=@multicast1, 0x34ff, 0x2, 0x1, 0x0, 0x7, 0x1, 0x9}}, 0xe8) semctl$IPC_RMID(r2, 0x0, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RATTACH(r5, &(0x7f00000003c0)={0x14, 0x69, 0x2, {0x40, 0x0, 0x2}}, 0x14) close(r1) 07:50:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:48 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) clock_gettime(0x0, &(0x7f0000000040)) write$FUSE_LSEEK(r0, &(0x7f0000000000)={0x18, 0x0, 0x8, {0x3}}, 0x18) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:48 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 331.118441] FAULT_INJECTION: forcing a failure. [ 331.118441] name failslab, interval 1, probability 0, space 0, times 0 [ 331.171987] CPU: 0 PID: 20024 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 331.179053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.188403] Call Trace: [ 331.188437] dump_stack+0x172/0x1f0 [ 331.188459] should_fail.cold+0xa/0x1b [ 331.188477] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.188492] ? lock_downgrade+0x810/0x810 [ 331.188512] __should_failslab+0x121/0x190 [ 331.188531] should_failslab+0x9/0x14 [ 331.198640] kmem_cache_alloc+0x2ae/0x700 [ 331.207883] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 331.207901] ? __vm_enough_memory+0x324/0x5a0 [ 331.207924] vm_area_dup+0x21/0x170 [ 331.215952] copy_process.part.0+0x3407/0x7a30 [ 331.215999] ? __cleanup_sighand+0x70/0x70 [ 331.225147] ? lock_downgrade+0x810/0x810 [ 331.225173] ? kasan_check_write+0x14/0x20 [ 331.225193] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 331.233306] _do_fork+0x257/0xfd0 [ 331.233325] ? fork_idle+0x1d0/0x1d0 [ 331.233341] ? fput+0x128/0x1a0 [ 331.233356] ? ksys_write+0x1f1/0x2d0 07:50:48 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x100037) close(r1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x401, 0x8, 0x8000, 0x27a, 0x861, 0x7, 0x3, 0x3ff, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000140)={r3, 0x3}, 0x8) [ 331.233378] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.242168] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.242184] ? do_syscall_64+0x26/0x620 [ 331.242199] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.242212] ? do_syscall_64+0x26/0x620 [ 331.242228] __x64_sys_clone+0xbf/0x150 [ 331.242246] do_syscall_64+0xfd/0x620 [ 331.250608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.250622] RIP: 0033:0x459879 [ 331.250634] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.250645] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 [ 331.258908] ORIG_RAX: 0000000000000038 [ 331.258918] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 331.258928] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 331.258936] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 331.258945] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 07:50:48 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 331.258961] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:48 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) readahead(r0, 0x100000000, 0x11) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) munlockall() ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:49 executing program 3 (fault-call:5 fault-nth:35): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:49 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x7, &(0x7f0000000080)={0x0, 0xf, 0x0, @tid=r2}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:49 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:49 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f00002e3000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000000)="d8cfc4c1422a870200000066ba420066ed66baf80cb8d0f6a783ef66bafc0ced0f2097c4e1445f250f0000000f20d835200000000f22d8660f3a60210dc4e3354a2231b8861e7c9e0f23c80f21f8350000c0000f23f8", 0x56}], 0x1, 0x10, &(0x7f0000000100), 0x0) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in=@dev, @in=@loopback}}, {{@in6=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000000380)=0xe8) mremap(&(0x7f00003ba000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f00005d5000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000100)) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@loopback, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) 07:50:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 331.666900] FAULT_INJECTION: forcing a failure. [ 331.666900] name failslab, interval 1, probability 0, space 0, times 0 07:50:49 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:49 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) time(&(0x7f00000000c0)) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000140)) [ 331.778923] CPU: 0 PID: 20135 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 331.785997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.795368] Call Trace: [ 331.798123] dump_stack+0x172/0x1f0 [ 331.801806] should_fail.cold+0xa/0x1b [ 331.805718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 331.810850] ? lock_downgrade+0x810/0x810 [ 331.815037] __should_failslab+0x121/0x190 [ 331.819298] should_failslab+0x9/0x14 [ 331.823126] kmem_cache_alloc+0x2ae/0x700 [ 331.827294] ? pmd_alloc+0x180/0x180 [ 331.831034] vm_area_dup+0x21/0x170 [ 331.834682] copy_process.part.0+0x3407/0x7a30 [ 331.839424] ? __cleanup_sighand+0x70/0x70 [ 331.843691] ? lock_downgrade+0x810/0x810 [ 331.849091] ? kasan_check_write+0x14/0x20 [ 331.853365] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 331.858240] _do_fork+0x257/0xfd0 [ 331.861722] ? fork_idle+0x1d0/0x1d0 [ 331.865459] ? fput+0x128/0x1a0 [ 331.868758] ? ksys_write+0x1f1/0x2d0 [ 331.872671] ? trace_hardirqs_on_thunk+0x1a/0x1c 07:50:49 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x66, "96c6beba2dfe994eb06a84c63897beead874ac833eb1d98eb6607ae6da87686a4cd0cfd539f35004f03385614f48b86de68d9a3e31901c8c8522d8ff2e20ac53613e04ab8bb85abe0c0e9c5917e77f27a04867300d9eded041b7cbcb2add7197765a7ecd2468"}, &(0x7f0000000380)=0x6e) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000440)={r3, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x84) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) write$smack_current(r1, &(0x7f00000000c0)='cpuset\x00', 0x7) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101000, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) [ 331.877447] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 331.882220] ? do_syscall_64+0x26/0x620 [ 331.886238] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.891621] ? do_syscall_64+0x26/0x620 [ 331.895712] __x64_sys_clone+0xbf/0x150 [ 331.895733] do_syscall_64+0xfd/0x620 [ 331.895754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.903766] RIP: 0033:0x459879 07:50:49 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 331.903781] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.903788] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 331.903802] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 331.903809] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 331.903816] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 331.903824] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 331.903833] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x20000) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f00000000c0)={0x0, 0x0, {0x3, 0x760d2b4c, 0x8, 0x84b9}}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:49 executing program 3 (fault-call:5 fault-nth:36): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:49 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RSYMLINK(r1, &(0x7f00000000c0)={0x14, 0x11, 0x2, {0x0, 0x2, 0x2}}, 0x14) sched_getscheduler(r2) tkill(r2, 0x1000000000014) close(r1) 07:50:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 332.159569] FAULT_INJECTION: forcing a failure. [ 332.159569] name failslab, interval 1, probability 0, space 0, times 0 07:50:49 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 332.210404] CPU: 1 PID: 20197 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 332.217483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.217490] Call Trace: [ 332.217521] dump_stack+0x172/0x1f0 [ 332.233104] should_fail.cold+0xa/0x1b [ 332.233123] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 332.233144] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 332.248514] __should_failslab+0x121/0x190 [ 332.248534] should_failslab+0x9/0x14 [ 332.248548] kmem_cache_alloc+0x47/0x700 [ 332.248562] ? anon_vma_chain_link+0x154/0x1c0 [ 332.248580] anon_vma_clone+0xde/0x480 [ 332.260670] anon_vma_fork+0x8f/0x4a0 [ 332.260686] ? dup_userfaultfd+0x15e/0x6c0 [ 332.260699] ? memcpy+0x46/0x50 [ 332.260720] copy_process.part.0+0x34e5/0x7a30 [ 332.269200] ? __cleanup_sighand+0x70/0x70 [ 332.277198] ? lock_downgrade+0x810/0x810 [ 332.277227] ? kasan_check_write+0x14/0x20 [ 332.277246] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 332.277267] _do_fork+0x257/0xfd0 [ 332.285123] ? fork_idle+0x1d0/0x1d0 [ 332.285140] ? fput+0x128/0x1a0 [ 332.285156] ? ksys_write+0x1f1/0x2d0 [ 332.285175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 332.285193] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 332.293573] ? do_syscall_64+0x26/0x620 [ 332.293591] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.293605] ? do_syscall_64+0x26/0x620 [ 332.293624] __x64_sys_clone+0xbf/0x150 [ 332.293639] do_syscall_64+0xfd/0x620 [ 332.293655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.293668] RIP: 0033:0x459879 07:50:49 executing program 3 (fault-call:5 fault-nth:37): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 332.293682] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.293689] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 332.302741] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 332.302750] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 332.302758] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:50:49 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:49 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) eventfd2(0x9, 0x800) write$eventfd(r0, &(0x7f00000000c0)=0x101, 0x8) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) fcntl$setown(r1, 0x8, r2) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) fstatfs(r1, &(0x7f0000000140)=""/146) tkill(r3, 0x1000000000014) close(r1) [ 332.302767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 332.302775] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:49 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 332.504495] FAULT_INJECTION: forcing a failure. [ 332.504495] name failslab, interval 1, probability 0, space 0, times 0 07:50:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 332.641872] CPU: 1 PID: 20278 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 332.648959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.658329] Call Trace: [ 332.660945] dump_stack+0x172/0x1f0 [ 332.664601] should_fail.cold+0xa/0x1b [ 332.668507] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 332.673633] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 332.679995] __should_failslab+0x121/0x190 [ 332.684247] should_failslab+0x9/0x14 [ 332.688061] kmem_cache_alloc+0x47/0x700 07:50:50 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') getegid() openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000000)={0xf}, 0xf) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 332.692136] ? anon_vma_chain_link+0x154/0x1c0 [ 332.696742] anon_vma_clone+0xde/0x480 [ 332.700655] anon_vma_fork+0x8f/0x4a0 [ 332.707337] ? dup_userfaultfd+0x15e/0x6c0 [ 332.711584] ? memcpy+0x46/0x50 [ 332.714886] copy_process.part.0+0x34e5/0x7a30 [ 332.719516] ? __cleanup_sighand+0x70/0x70 [ 332.723768] ? lock_downgrade+0x810/0x810 [ 332.727945] ? kasan_check_write+0x14/0x20 [ 332.734210] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 332.739255] _do_fork+0x257/0xfd0 [ 332.742740] ? fork_idle+0x1d0/0x1d0 [ 332.746470] ? fput+0x128/0x1a0 [ 332.749764] ? ksys_write+0x1f1/0x2d0 [ 332.753585] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 332.758358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 332.763142] ? do_syscall_64+0x26/0x620 [ 332.767136] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.772517] ? do_syscall_64+0x26/0x620 [ 332.776523] __x64_sys_clone+0xbf/0x150 [ 332.780517] do_syscall_64+0xfd/0x620 [ 332.780539] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.780549] RIP: 0033:0x459879 [ 332.780565] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.792716] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 332.792732] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 332.792740] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 332.792748] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:50:50 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)=0x0) timer_settime(r3, 0x3, &(0x7f0000000200)={{0x0, 0x8}, {0x77359400}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:50 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 332.792755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 332.792762] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:50 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000530000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000140)={@remote, 0x0}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000440)={@dev={0xfe, 0x80, [], 0x1d}, 0x4b, r3}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00005e0000/0x4000)=nil) openat$uinput(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uinput\x00', 0x802, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$VIDIOC_ENUM_FMT(r2, 0xc0405602, &(0x7f00000004c0)={0x7, 0x6, 0x1, "07036226fbefdfb5b1da0601d88c650d850697877588f4b7c4db8a98a8504309", 0x52424752}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x84}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={r4, 0x4}, &(0x7f0000000100)=0x8) 07:50:50 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:50 executing program 3 (fault-call:5 fault-nth:38): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x2, 0x8000, 0x5, 0x4, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000100)={r2, 0x2, 0xf0, "90630bfe04adfb6ae99c14321b8fbe91c09356eb3a31d09e9ff8dc5874fac5fd67c97c787f0da385df1cc9a3cdfcf470c159f77e2fa881beb4dcfe2766b877e7c2653217d326f64dda4f0ce00c8c76c7e68ad13f9756d596f764cdc44a2aa629780ea6625278db11ec84e5398fde41e5aa83a2ef45c65fed65a99a07c22b614f1c61a08c3d06aff9fba002bfa0fcc63539b0cb35c89a4d8c3278c4bb307d9b51e447104e99f9cd1cbf13bf57d06fa865a0f0ab501512954dac58e52c0050e1108dacd5e09e4cfa51c3bc8c225c39d088a582425f06286b040467c4490959b2551127313e9cfddd0eae5c315a38cba681"}, 0xf8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000002c0)=0x1f) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:50 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 333.213141] FAULT_INJECTION: forcing a failure. [ 333.213141] name failslab, interval 1, probability 0, space 0, times 0 [ 333.230786] CPU: 1 PID: 20466 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 333.237866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.247239] Call Trace: [ 333.249856] dump_stack+0x172/0x1f0 [ 333.253515] should_fail.cold+0xa/0x1b [ 333.257453] ? fault_create_debugfs_attr+0x1e0/0x1e0 07:50:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 333.262577] ? lock_downgrade+0x810/0x810 [ 333.266757] __should_failslab+0x121/0x190 [ 333.271008] should_failslab+0x9/0x14 [ 333.274825] kmem_cache_alloc+0x2ae/0x700 [ 333.278987] ? anon_vma_clone+0x320/0x480 [ 333.283159] anon_vma_fork+0xfc/0x4a0 [ 333.286971] ? dup_userfaultfd+0x15e/0x6c0 [ 333.291213] ? memcpy+0x46/0x50 [ 333.294511] copy_process.part.0+0x34e5/0x7a30 [ 333.299169] ? __cleanup_sighand+0x70/0x70 [ 333.303424] ? lock_downgrade+0x810/0x810 [ 333.307605] ? kasan_check_write+0x14/0x20 [ 333.311869] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 333.316742] _do_fork+0x257/0xfd0 [ 333.320218] ? fork_idle+0x1d0/0x1d0 [ 333.323955] ? fput+0x128/0x1a0 [ 333.327251] ? ksys_write+0x1f1/0x2d0 [ 333.331072] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 333.335841] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 333.340610] ? do_syscall_64+0x26/0x620 [ 333.344598] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.349977] ? do_syscall_64+0x26/0x620 [ 333.353972] __x64_sys_clone+0xbf/0x150 [ 333.357967] do_syscall_64+0xfd/0x620 [ 333.361781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.366974] RIP: 0033:0x459879 [ 333.370172] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.389081] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 333.396806] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 333.404083] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 333.411364] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 333.418639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 333.425922] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x1, [0x0]}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={r2, 0x5f, "0437fb8b790f84b9d5b1628bde3c127c6bc56a92b53f2c9d4cbc6668adf42e93dd6409fd0f84ee87a6338e7f7e32d7783f2e15aa9570256810f5047d01b62717f77c46bc4e8471b067809621270a25ecb39f8bbe2981d46e427128f638e3a2"}, &(0x7f00000001c0)=0x67) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:53 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:53 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:53 executing program 3 (fault-call:5 fault-nth:39): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:53 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0xc) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) accept4$bt_l2cap(r0, &(0x7f0000000040), &(0x7f00000000c0)=0xe, 0x800) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x3, 0x430080) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000140)={0x1, 0x0, 0x10001, 0x5}) [ 335.969845] FAULT_INJECTION: forcing a failure. [ 335.969845] name failslab, interval 1, probability 0, space 0, times 0 [ 335.988792] CPU: 0 PID: 20704 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 335.996026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.996033] Call Trace: [ 335.996058] dump_stack+0x172/0x1f0 [ 335.996080] should_fail.cold+0xa/0x1b [ 336.015848] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 336.020976] ? lock_downgrade+0x810/0x810 [ 336.025171] __should_failslab+0x121/0x190 [ 336.029429] should_failslab+0x9/0x14 [ 336.034290] kmem_cache_alloc+0x2ae/0x700 [ 336.038655] ? anon_vma_clone+0x320/0x480 [ 336.042842] anon_vma_fork+0x1ea/0x4a0 [ 336.046758] ? dup_userfaultfd+0x15e/0x6c0 [ 336.051024] copy_process.part.0+0x34e5/0x7a30 [ 336.055926] ? __cleanup_sighand+0x70/0x70 [ 336.060200] ? lock_downgrade+0x810/0x810 [ 336.064383] ? kasan_check_write+0x14/0x20 07:50:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 336.068643] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 336.073517] _do_fork+0x257/0xfd0 [ 336.077109] ? fork_idle+0x1d0/0x1d0 [ 336.080836] ? fput+0x128/0x1a0 [ 336.084126] ? ksys_write+0x1f1/0x2d0 [ 336.088039] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 336.092825] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 336.097614] ? do_syscall_64+0x26/0x620 [ 336.101631] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.107718] ? do_syscall_64+0x26/0x620 [ 336.111715] __x64_sys_clone+0xbf/0x150 [ 336.115706] do_syscall_64+0xfd/0x620 [ 336.119526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.125127] RIP: 0033:0x459879 [ 336.128334] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.147341] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 336.155074] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 336.162364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:50:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:53 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000), 0x4) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 336.169757] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 336.177126] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 336.184600] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:53 executing program 3 (fault-call:5 fault-nth:40): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:53 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 336.427819] FAULT_INJECTION: forcing a failure. [ 336.427819] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.455772] CPU: 1 PID: 20831 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 336.462840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.472199] Call Trace: [ 336.472227] dump_stack+0x172/0x1f0 [ 336.472251] should_fail.cold+0xa/0x1b [ 336.472272] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 336.472293] ? __might_sleep+0x95/0x190 [ 336.472315] __alloc_pages_nodemask+0x1ee/0x750 [ 336.478515] ? save_stack+0xa9/0xd0 [ 336.499845] ? __alloc_pages_slowpath+0x2870/0x2870 [ 336.504887] ? copy_process.part.0+0x34e5/0x7a30 [ 336.509677] ? mark_held_locks+0x100/0x100 [ 336.513939] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 336.519505] alloc_pages_current+0x107/0x210 [ 336.523945] pte_alloc_one+0x1b/0x1a0 [ 336.527764] __pte_alloc+0x2a/0x360 [ 336.531405] copy_page_range+0x151f/0x1f90 [ 336.535645] ? anon_vma_fork+0x371/0x4a0 [ 336.539715] ? find_held_lock+0x35/0x130 [ 336.543791] ? anon_vma_fork+0x371/0x4a0 [ 336.547866] ? vma_compute_subtree_gap+0x158/0x230 [ 336.552813] ? vma_gap_callbacks_rotate+0x62/0x80 [ 336.557669] ? pmd_alloc+0x180/0x180 [ 336.561399] ? __vma_link_rb+0x279/0x370 [ 336.565477] copy_process.part.0+0x543d/0x7a30 [ 336.570095] ? __cleanup_sighand+0x70/0x70 [ 336.574336] ? lock_downgrade+0x810/0x810 [ 336.578514] ? kasan_check_write+0x14/0x20 [ 336.582762] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 336.587626] _do_fork+0x257/0xfd0 [ 336.591096] ? fork_idle+0x1d0/0x1d0 [ 336.594851] ? fput+0x128/0x1a0 [ 336.598138] ? ksys_write+0x1f1/0x2d0 [ 336.601959] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 336.606742] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 336.611510] ? do_syscall_64+0x26/0x620 [ 336.615492] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.620877] ? do_syscall_64+0x26/0x620 [ 336.624893] __x64_sys_clone+0xbf/0x150 [ 336.628971] do_syscall_64+0xfd/0x620 [ 336.632791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.638013] RIP: 0033:0x459879 [ 336.641213] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.660110] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 336.660125] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 07:50:53 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x800) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 336.660132] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 336.660140] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 336.660147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 336.660160] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x400000, 0x8) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x40001, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x620002, 0x0) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000000c0)={0x0, 0x8001}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000140)={0xb2c3, 0x8fa, 0x6, 0x1ff}, 0x8) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:56 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:56 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x0, 0x4000}, 0x24e) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:56 executing program 3 (fault-call:5 fault-nth:41): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:56 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 339.019631] FAULT_INJECTION: forcing a failure. [ 339.019631] name failslab, interval 1, probability 0, space 0, times 0 [ 339.052382] CPU: 1 PID: 20857 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 339.060364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.069735] Call Trace: [ 339.072347] dump_stack+0x172/0x1f0 [ 339.076002] should_fail.cold+0xa/0x1b [ 339.079913] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 339.085039] ? lock_downgrade+0x810/0x810 [ 339.089217] __should_failslab+0x121/0x190 [ 339.093462] should_failslab+0x9/0x14 [ 339.097265] kmem_cache_alloc+0x2ae/0x700 [ 339.101447] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 339.106999] ptlock_alloc+0x20/0x70 [ 339.110641] pte_alloc_one+0x6d/0x1a0 [ 339.114449] __pte_alloc+0x2a/0x360 [ 339.118097] copy_page_range+0x151f/0x1f90 [ 339.122332] ? anon_vma_fork+0x371/0x4a0 [ 339.126401] ? find_held_lock+0x35/0x130 [ 339.130467] ? anon_vma_fork+0x371/0x4a0 [ 339.134562] ? vma_compute_subtree_gap+0x158/0x230 [ 339.139601] ? vma_gap_callbacks_rotate+0x62/0x80 [ 339.144478] ? pmd_alloc+0x180/0x180 [ 339.148213] ? __vma_link_rb+0x279/0x370 [ 339.152295] copy_process.part.0+0x543d/0x7a30 [ 339.157105] ? __cleanup_sighand+0x70/0x70 [ 339.161341] ? lock_downgrade+0x810/0x810 [ 339.165508] ? kasan_check_write+0x14/0x20 [ 339.169757] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 339.174703] _do_fork+0x257/0xfd0 [ 339.178169] ? fork_idle+0x1d0/0x1d0 [ 339.181887] ? fput+0x128/0x1a0 [ 339.185170] ? ksys_write+0x1f1/0x2d0 [ 339.188981] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 339.193745] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 339.199026] ? do_syscall_64+0x26/0x620 [ 339.203010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.208376] ? do_syscall_64+0x26/0x620 [ 339.212374] __x64_sys_clone+0xbf/0x150 [ 339.216361] do_syscall_64+0xfd/0x620 [ 339.220177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.225365] RIP: 0033:0x459879 [ 339.228559] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.247559] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 339.255274] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 339.262564] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:50:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 339.269836] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 339.277113] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 339.284386] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:56 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:56 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x3) lseek(r1, 0x203ffffd, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000000)={0x10004, 0x0, &(0x7f0000ffb000/0x4000)=nil}) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x4000, 0x2, &(0x7f000020e000/0x4000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:50:56 executing program 3 (fault-call:5 fault-nth:42): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:56 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) accept$packet(r1, &(0x7f0000000e80)={0x11, 0x0, 0x0}, &(0x7f0000000ec0)=0x14) bind$bt_hci(r0, &(0x7f0000000f00)={0x1f, r3, 0x2}, 0xc) tkill(r2, 0x1000000000014) close(r1) 07:50:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 339.590870] FAULT_INJECTION: forcing a failure. [ 339.590870] name failslab, interval 1, probability 0, space 0, times 0 [ 339.604462] CPU: 0 PID: 20990 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 339.611527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.620901] Call Trace: [ 339.623511] dump_stack+0x172/0x1f0 [ 339.627154] should_fail.cold+0xa/0x1b [ 339.631036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 339.636132] ? lock_downgrade+0x810/0x810 [ 339.640278] __should_failslab+0x121/0x190 [ 339.644592] should_failslab+0x9/0x14 [ 339.648387] kmem_cache_alloc+0x2ae/0x700 [ 339.652542] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 339.658073] ptlock_alloc+0x20/0x70 [ 339.661693] pte_alloc_one+0x6d/0x1a0 [ 339.665493] __pte_alloc+0x2a/0x360 [ 339.669132] copy_page_range+0x151f/0x1f90 [ 339.673354] ? anon_vma_fork+0x371/0x4a0 [ 339.677410] ? find_held_lock+0x35/0x130 [ 339.681466] ? anon_vma_fork+0x371/0x4a0 [ 339.685521] ? vma_compute_subtree_gap+0x158/0x230 [ 339.690455] ? vma_gap_callbacks_rotate+0x62/0x80 [ 339.696567] ? pmd_alloc+0x180/0x180 [ 339.701936] ? __vma_link_rb+0x279/0x370 [ 339.706049] copy_process.part.0+0x543d/0x7a30 [ 339.710686] ? __cleanup_sighand+0x70/0x70 [ 339.714925] ? lock_downgrade+0x810/0x810 [ 339.719080] ? kasan_check_write+0x14/0x20 [ 339.723314] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 339.728159] _do_fork+0x257/0xfd0 [ 339.731610] ? fork_idle+0x1d0/0x1d0 [ 339.735324] ? fput+0x128/0x1a0 [ 339.738602] ? ksys_write+0x1f1/0x2d0 [ 339.742397] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 339.747579] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 339.752347] ? do_syscall_64+0x26/0x620 [ 339.756338] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.761708] ? do_syscall_64+0x26/0x620 [ 339.765691] __x64_sys_clone+0xbf/0x150 [ 339.770846] do_syscall_64+0xfd/0x620 [ 339.776093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.781279] RIP: 0033:0x459879 [ 339.784465] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.803356] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 339.811070] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 339.818335] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 339.826115] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 339.833381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 339.840647] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) write$eventfd(r1, &(0x7f00000000c0)=0x81, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:50:57 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:57 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f0000000140), 0x26e56e96089dad7, 0x1) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:50:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x2b, 0x4, @thr={&(0x7f0000000140)="86dc7871ee0e83fb5b97ffd4ec3acebf1c605b9c28cd2ea99c99f7014f33a6eec381d1bbbc635ffcce6130cdad38632098d40ecec3955a9281e5f8b47cb8a37708a4f8928a4935ebdf27d987dfe9b82588c50221fdaa46eea3d9843bebb64b7e14ec8ff092885c73430edde0a7f7e189aaab55931a4e61e6dc3acd20ebc6c530b5855608f7dcea4df594139fca2385fad6d9cd9893da7ea1451144c19050f38c8b29ffe4af8fc88379514a81dfa584d1f68b08e743fe8089", &(0x7f0000000240)="45fc23dd64885c3ec9fc1775f01dcd163133af93f5a4241b2c0c04ff1465ad5538cf9cb012aaa4ab1c219ece758ae82bc230eaadaf25c1d2bfdf735c8de1400fbeff9af1f9b109e2dcbebb48670106a3359d905ba8cff7a25afe18a5bb8e1043fe42f42b52bf8207515598fb4f2c34a942a0cf4698056c6b7214317c3fed6b82999fc2de3cdf54dcad94e8382e3cf71797fb6ac3c8d329fd18571ae55d4d2f9e0acd51d240aab1d2bee68b7fcb9dd42e25ea870d8a2924375ab04539281e98d3be4847435ecabcf98cac804dd0556a06c2d8c7e6ed2972a754baf01f18c913a5e0403222b4d29be912d8250095"}}, &(0x7f0000000340)=0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f00000003c0)={{r3, r4+30000000}, {0x77359400}}, &(0x7f0000000400)) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r5 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) rseq(&(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x2, 0xffffffffffffff80, 0x7, 0x20}, 0x5}, 0x20, 0x1, 0x0) tkill(r5, 0x30) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000440)={0x5, 0x0, 0x10001, 0x3}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000480)={0x3, r6, 0x2, 0x3ff}) close(r1) 07:50:57 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:57 executing program 3 (fault-call:5 fault-nth:43): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0x7, 0x2, 0x8000, 0x6, 0xdb, 0x9, 0x9, 0x8, 0xed, 0x7fffffff, 0x4}, 0xb) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000140)={0x5, 0x80000001}) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:57 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 340.188770] FAULT_INJECTION: forcing a failure. [ 340.188770] name failslab, interval 1, probability 0, space 0, times 0 [ 340.220211] CPU: 0 PID: 21117 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 340.227299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.236661] Call Trace: [ 340.236690] dump_stack+0x172/0x1f0 [ 340.236710] should_fail.cold+0xa/0x1b [ 340.236726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 340.236741] ? lock_downgrade+0x810/0x810 [ 340.236766] __should_failslab+0x121/0x190 [ 340.236784] should_failslab+0x9/0x14 [ 340.236796] kmem_cache_alloc+0x2ae/0x700 [ 340.236817] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 340.243025] ptlock_alloc+0x20/0x70 [ 340.243046] pte_alloc_one+0x6d/0x1a0 [ 340.243061] __pte_alloc+0x2a/0x360 [ 340.243080] copy_page_range+0x151f/0x1f90 [ 340.289116] ? anon_vma_fork+0x371/0x4a0 [ 340.293198] ? find_held_lock+0x35/0x130 [ 340.297273] ? anon_vma_fork+0x371/0x4a0 [ 340.301364] ? vma_compute_subtree_gap+0x158/0x230 [ 340.306310] ? vma_gap_callbacks_rotate+0x62/0x80 [ 340.311169] ? pmd_alloc+0x180/0x180 [ 340.314898] ? __vma_link_rb+0x279/0x370 [ 340.318978] copy_process.part.0+0x543d/0x7a30 [ 340.323616] ? __cleanup_sighand+0x70/0x70 [ 340.327862] ? lock_downgrade+0x810/0x810 [ 340.332036] ? kasan_check_write+0x14/0x20 [ 340.336733] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 340.341607] _do_fork+0x257/0xfd0 [ 340.345085] ? fork_idle+0x1d0/0x1d0 [ 340.348814] ? fput+0x128/0x1a0 [ 340.352113] ? ksys_write+0x1f1/0x2d0 [ 340.355949] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.360736] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.365519] ? do_syscall_64+0x26/0x620 [ 340.369556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.374928] ? do_syscall_64+0x26/0x620 [ 340.378915] __x64_sys_clone+0xbf/0x150 [ 340.382908] do_syscall_64+0xfd/0x620 07:50:57 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 340.386721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.391906] RIP: 0033:0x459879 [ 340.395109] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.414028] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 340.421753] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 340.429812] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:50:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:57 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = accept$unix(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) sendmsg$inet(r2, &(0x7f0000000540)={&(0x7f0000000140)={0x2, 0x4e20, @rand_addr=0x2}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="caf79c2e419bad1f6c94bf029cb48d5a28894e30c8e4f06d0af3f81b8c440017e084e8e6914d2197945d72b6f48edc324d46180bfcbf5e4f385da6c7e0633475f52353", 0x43}, {&(0x7f00000002c0)="5ff6f3764b2d119aad567dbe2c2fa63aefc499e0a8502df8f7214325a46fc59caff3f27bf2696f308711a6f81bef4bd3cdf9a1ddb4d3bed4d88e4baead9d4eec19193c8260c9b3467bde51bf1ed6e79c367d48814720c5bf1c985824b6fb9b4d0b5d50f5", 0x64}, {&(0x7f0000000380)="6614a9fada5a9a1063aa7a8b4d692ef733b525210f4d2090c4ff9bf93aa92cdb990e853b05697aee4848bbdff5df2368a0fe0ea6d892ec59957ee9f66d391eb359a16298f1e4d01dcd06719e097c89cf69da5e0b880f3031867dc169f9dda1b17f7a5fd782933ad4f971d51ecb557cf15e", 0x71}, {&(0x7f0000000400)="020cb94167a2f98627d084bb62d97cad94ac5000e29c9e559f8c72eed0f8dc666fb1cd06c39a046281c2ae89d681d22cf7649ed6654347e01574b3bf1aff7a198a2ad74e8b9f607a5566c5e53fd51445e0ae97de081fe53469d4836893ce71f858bc0fa7198eb635f827861df0879ed58ae01832563ad341eee889", 0x7b}], 0x4, &(0x7f00000004c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x100000001}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1382b366}}], 0x48}, 0x0) 07:50:57 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x54b9a43626fde208) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000240)={{0x0, 0x1, 0x8e26, 0x1, 'syz0\x00', 0x401}, 0x0, [0x8, 0x101, 0x8, 0xa4, 0x9, 0x0, 0x0, 0x101, 0xffffffff, 0xfffffffffffffffe, 0x4, 0xdb, 0x6, 0xb8bb, 0x0, 0x6, 0x7, 0xff, 0xfffffffffffffff7, 0xff, 0x3, 0x1ff, 0x2, 0x9, 0x3, 0x4, 0x10001, 0xfc, 0x3, 0x8001, 0x40, 0x0, 0x1000000000000, 0x5, 0x5, 0x3, 0x1000, 0x2, 0x9, 0x9, 0x7fffffff, 0x9a, 0x9, 0x9, 0x7fff, 0x0, 0x4, 0x50, 0x5fa, 0x2a92, 0xffffffffffffffff, 0x8, 0x3, 0x200, 0x7f, 0x8, 0x100000000, 0x100000000, 0x9, 0x7ff, 0x81, 0x1f, 0x2f, 0x10000, 0x8, 0xcfec, 0x0, 0xb32d, 0x0, 0x7ff, 0x0, 0x4, 0xfff, 0x81, 0x8, 0x2, 0x4, 0x81, 0x1, 0x8, 0x7ff4, 0x20, 0x7fff, 0xb9e, 0x100000000, 0x9, 0x9, 0xd6, 0x9a, 0x5, 0x2, 0x1ff, 0xb0b5, 0x7ff, 0x8, 0x8, 0x3679cc2e, 0x9, 0x9, 0x3, 0xbd, 0x88c, 0x5, 0x2, 0x3f, 0x1000, 0x1ff, 0x7fffffff, 0x8, 0x5, 0x1, 0x0, 0xfffffffffffffc00, 0xffffffffffffff01, 0x3, 0x1ff, 0x4, 0x3, 0x8001, 0xe3, 0x100, 0x407, 0x2, 0x8, 0x2, 0x6, 0x4, 0x10001]}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x10000000000025, &(0x7f0000000040)={0x1}) select(0x40, &(0x7f0000000180)={0x80, 0x5, 0x10000, 0x2, 0x6, 0x4, 0x10001, 0x7}, &(0x7f00000001c0)={0xfffffffffffffff9, 0x2, 0xfff, 0xa8, 0xa71a, 0x7fffffff, 0xd43, 0x3ff}, &(0x7f0000000740)={0x87, 0x0, 0x2, 0x6, 0x6, 0x8000, 0x80000001, 0x4}, &(0x7f0000000780)) fcntl$lock(r2, 0x26, &(0x7f0000000000)) r4 = gettid() getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000007c0)={0x0, 0xe2b2, 0x1, [0x0]}, &(0x7f0000000800)=0xa) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000840)={r5, 0x6}, &(0x7f0000000880)=0x8) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f0000000140)={0x8f2a, 0x2, 0x5}) tkill(r4, 0x1000000000014) close(r3) 07:50:57 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e21}}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 340.438102] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 340.438112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 340.438118] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:57 executing program 3 (fault-call:5 fault-nth:44): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:58 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000240), 0x4) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000140)=""/49) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x0, 0x7, 0x0, 0x4, r2}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000580)={&(0x7f0000000340)={0x228, r3, 0x0, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1fffc0}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffad5}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e24, @local}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x6e86, @mcast2, 0xfffffffffffffffb}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x923}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf11}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}]}]}, 0x228}}, 0x80) r4 = gettid() unlink(&(0x7f00000001c0)='./file0\x00') socket$kcm(0x29, 0x5, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(0xffffffffffffffff, 0x80045500, &(0x7f0000000280)) tkill(r4, 0x1000000000014) close(r1) 07:50:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 340.668391] FAULT_INJECTION: forcing a failure. [ 340.668391] name failslab, interval 1, probability 0, space 0, times 0 [ 340.741286] CPU: 0 PID: 21199 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 340.748357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.761813] Call Trace: [ 340.764431] dump_stack+0x172/0x1f0 [ 340.768184] should_fail.cold+0xa/0x1b [ 340.772106] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 340.777627] ? lock_downgrade+0x810/0x810 [ 340.781821] __should_failslab+0x121/0x190 [ 340.786172] should_failslab+0x9/0x14 07:50:58 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 340.789989] kmem_cache_alloc+0x2ae/0x700 [ 340.794148] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 340.800494] ? __vm_enough_memory+0x324/0x5a0 [ 340.805153] vm_area_dup+0x21/0x170 [ 340.808821] copy_process.part.0+0x3407/0x7a30 [ 340.813461] ? __cleanup_sighand+0x70/0x70 [ 340.817715] ? lock_downgrade+0x810/0x810 [ 340.821894] ? kasan_check_write+0x14/0x20 [ 340.826151] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 340.831021] _do_fork+0x257/0xfd0 [ 340.834493] ? fork_idle+0x1d0/0x1d0 [ 340.838220] ? fput+0x128/0x1a0 [ 340.841518] ? ksys_write+0x1f1/0x2d0 [ 340.845341] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.850120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 340.854899] ? do_syscall_64+0x26/0x620 [ 340.858904] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.864309] ? do_syscall_64+0x26/0x620 [ 340.868288] __x64_sys_clone+0xbf/0x150 [ 340.872272] do_syscall_64+0xfd/0x620 [ 340.876098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.881288] RIP: 0033:0x459879 [ 340.884477] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.903443] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 340.911174] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 340.918448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 340.925859] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 340.933142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 07:50:58 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) pipe2$9p(&(0x7f0000000040), 0x57c9bdc50cf0552c) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RSETATTR(r2, &(0x7f00000000c0)={0x7, 0x1b, 0x2}, 0x7) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000100)={0x2, 0x0, [0x800, 0x49, 0x80, 0x2, 0x9, 0x10000, 0x8001, 0x10001]}) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) 07:50:58 executing program 3 (fault-call:5 fault-nth:45): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:58 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4800) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 340.940449] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:58 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:58 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) 07:50:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 341.139726] FAULT_INJECTION: forcing a failure. [ 341.139726] name failslab, interval 1, probability 0, space 0, times 0 [ 341.172702] CPU: 1 PID: 21281 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 341.179776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.189237] Call Trace: [ 341.191849] dump_stack+0x172/0x1f0 [ 341.195501] should_fail.cold+0xa/0x1b [ 341.199423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 341.204561] ? find_held_lock+0x35/0x130 [ 341.208639] ? percpu_ref_put_many+0x94/0x190 [ 341.213154] __should_failslab+0x121/0x190 [ 341.217406] should_failslab+0x9/0x14 [ 341.221227] kmem_cache_alloc+0x47/0x700 [ 341.225295] ? __lock_is_held+0xb6/0x140 [ 341.229388] anon_vma_clone+0xde/0x480 [ 341.233402] anon_vma_fork+0x8f/0x4a0 [ 341.237222] ? dup_userfaultfd+0x15e/0x6c0 [ 341.241478] ? memcpy+0x46/0x50 [ 341.244782] copy_process.part.0+0x34e5/0x7a30 [ 341.249439] ? __cleanup_sighand+0x70/0x70 [ 341.253778] ? lock_downgrade+0x810/0x810 [ 341.257966] ? kasan_check_write+0x14/0x20 [ 341.262225] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 341.267095] _do_fork+0x257/0xfd0 [ 341.270582] ? fork_idle+0x1d0/0x1d0 [ 341.274345] ? fput+0x128/0x1a0 [ 341.277645] ? ksys_write+0x1f1/0x2d0 [ 341.281569] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 341.286365] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 341.291143] ? do_syscall_64+0x26/0x620 [ 341.295140] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.300524] ? do_syscall_64+0x26/0x620 [ 341.304522] __x64_sys_clone+0xbf/0x150 [ 341.308518] do_syscall_64+0xfd/0x620 [ 341.312338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.317543] RIP: 0033:0x459879 07:50:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 341.320742] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.341655] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 341.341670] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 341.341677] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 341.341684] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 341.341691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 341.341699] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:58 executing program 3 (fault-call:5 fault-nth:46): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:58 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r1, 0x28}, 0x10) 07:50:58 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x2, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:58 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0xa2c6c5bb775eaa6c, &(0x7f0000000140)={0x3, 0x0, 0x0, 0xfffffffffffffffd}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x100000000000012, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:50:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x82, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x0, &(0x7f0000000240)}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) 07:50:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 341.562200] FAULT_INJECTION: forcing a failure. [ 341.562200] name failslab, interval 1, probability 0, space 0, times 0 07:50:59 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1) close(r1) [ 341.652086] CPU: 0 PID: 21414 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 341.659154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.668523] Call Trace: [ 341.671137] dump_stack+0x172/0x1f0 [ 341.674803] should_fail.cold+0xa/0x1b [ 341.674825] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 341.674844] ? __lock_is_held+0xb6/0x140 [ 341.674863] ? __lock_is_held+0xb6/0x140 [ 341.683849] __should_failslab+0x121/0x190 [ 341.683865] should_failslab+0x9/0x14 07:50:59 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x4, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 341.683878] kmem_cache_alloc+0x47/0x700 [ 341.683898] ? anon_vma_chain_link+0x154/0x1c0 [ 341.683914] anon_vma_clone+0xde/0x480 [ 341.683935] anon_vma_fork+0x8f/0x4a0 [ 341.683948] ? dup_userfaultfd+0x15e/0x6c0 [ 341.683963] ? memcpy+0x46/0x50 [ 341.723944] copy_process.part.0+0x34e5/0x7a30 [ 341.728580] ? __cleanup_sighand+0x70/0x70 [ 341.733023] ? lock_downgrade+0x810/0x810 [ 341.737635] ? kasan_check_write+0x14/0x20 [ 341.742666] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 341.742688] _do_fork+0x257/0xfd0 [ 341.750972] ? fork_idle+0x1d0/0x1d0 [ 341.754702] ? fput+0x128/0x1a0 [ 341.758010] ? ksys_write+0x1f1/0x2d0 [ 341.761838] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 341.766618] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 341.771405] ? do_syscall_64+0x26/0x620 [ 341.775399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.780790] ? do_syscall_64+0x26/0x620 [ 341.785690] __x64_sys_clone+0xbf/0x150 [ 341.789698] do_syscall_64+0xfd/0x620 [ 341.793526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.798735] RIP: 0033:0x459879 07:50:59 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x7, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 341.801947] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.820895] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 341.828627] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 341.835915] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 341.843213] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:50:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0xa0000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5, 0x40}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$SIOCX25SENDCALLACCPT(r2, 0x89e9) [ 341.843222] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 341.843230] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:50:59 executing program 1: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_nanosleep(0x0, 0xfffffffffdfffffd, &(0x7f00000000c0)={0x2000000000003}, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x1000000000012}, &(0x7f0000000000)=0x0) timer_settime(r2, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r3 = gettid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r3, 0x1000000000016) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{r0, r1/1000+30000}, {0x77359400}}) r4 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x2, 0x101000) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x14, 0x80, 0x8000, 0x20, 0x10108, r4, 0x3, [], 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x3c) sched_setparam(r3, &(0x7f0000000240)=0x6cec) r6 = dup(r5) ioctl$VIDIOC_G_SLICED_VBI_CAP(r6, 0xc0745645, &(0x7f0000000340)={0x100000001, [0x100, 0x81, 0x7fffffff, 0x101, 0x2, 0x100000000, 0x1, 0x0, 0xb3e, 0x1, 0x9, 0xfffffffffffffff7, 0x1f, 0xe60e, 0x6, 0x9, 0xffffffff, 0x10001, 0x9, 0x23dc913b, 0xffffffff, 0x0, 0x8, 0x3, 0xffffffffffff8001, 0x9, 0x6ac6, 0x6, 0x1, 0x4, 0x7, 0xa7b8, 0xff6, 0x100, 0x1ff, 0xffff, 0x3, 0xe27, 0x7f9, 0x0, 0x3f, 0x0, 0x2, 0x1f73, 0x3, 0x0, 0x100000001, 0x9ee2], 0x9}) fstatfs(r5, &(0x7f0000000700)=""/248) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r8, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r7, 0x26, &(0x7f0000000000)) ioctl$KDGETMODE(r8, 0x4b3b, &(0x7f00000003c0)) r9 = gettid() timer_create(0x7, &(0x7f0000000080)={0x0, 0x12, 0x13, @tid=r3}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r9, 0x1000000000014) close(r7) 07:50:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:59 executing program 3 (fault-call:5 fault-nth:47): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:50:59 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x1a0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:59 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='pids.current\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) recvfrom(r0, &(0x7f0000000200)=""/205, 0xcd, 0x100, 0x0, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000480)='mountstats\x00') ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f00000000c0)=0x48) lseek(r3, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) write$P9_RXATTRWALK(r0, &(0x7f0000000380)={0xfffffffffffffeb1, 0x1f, 0x1, 0x9}, 0xf) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r3, 0x7005) 07:50:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:50:59 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) syz_open_procfs$namespace(r2, &(0x7f0000000140)='ns/pid_for_children\x00') r3 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000014) close(r1) 07:50:59 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x700, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:50:59 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) [ 342.255697] FAULT_INJECTION: forcing a failure. [ 342.255697] name failslab, interval 1, probability 0, space 0, times 0 [ 342.308898] CPU: 0 PID: 21666 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 342.315971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.325338] Call Trace: [ 342.327956] dump_stack+0x172/0x1f0 [ 342.331613] should_fail.cold+0xa/0x1b [ 342.335524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 342.340654] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 342.347470] __should_failslab+0x121/0x190 [ 342.351724] should_failslab+0x9/0x14 07:50:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 342.355538] kmem_cache_alloc+0x47/0x700 [ 342.359612] ? anon_vma_chain_link+0x154/0x1c0 [ 342.364224] anon_vma_clone+0xde/0x480 [ 342.368145] anon_vma_fork+0x8f/0x4a0 [ 342.371998] ? dup_userfaultfd+0x15e/0x6c0 [ 342.376237] ? memcpy+0x46/0x50 [ 342.379538] copy_process.part.0+0x34e5/0x7a30 [ 342.384149] ? __cleanup_sighand+0x70/0x70 [ 342.388395] ? lock_downgrade+0x810/0x810 [ 342.392571] ? kasan_check_write+0x14/0x20 [ 342.396824] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 342.401693] _do_fork+0x257/0xfd0 [ 342.405164] ? fork_idle+0x1d0/0x1d0 07:50:59 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x4000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 342.408895] ? fput+0x128/0x1a0 [ 342.412188] ? ksys_write+0x1f1/0x2d0 [ 342.416010] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 342.420800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 342.425581] ? do_syscall_64+0x26/0x620 [ 342.429576] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.434963] ? do_syscall_64+0x26/0x620 [ 342.438960] __x64_sys_clone+0xbf/0x150 [ 342.442968] do_syscall_64+0xfd/0x620 [ 342.446799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.452094] RIP: 0033:0x459879 [ 342.455302] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.474221] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 342.481951] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 342.489231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 342.489240] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:51:00 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80UM\xa9\xf8_\x03\xbc\xd0S\x8f(\a\x11\x81@y\x00\x00\xccM\'\xffs\x98FE\xda\xdc&\xc2\x94\xb0\xa2R\"\x83\xee\x95\x18lVWY\xac\xe3\x10\xaa.S\x11=_\x8f0\x03l\xc6\xa5\xe8\xa2\xeb\x93\xf2\x9b\\\xea\x98u;z2eD\xd9s\x16K\x1b\xb1m\xed\xa5\xe8C\x01\xcaz\xe1}\x94N}\xffy\xf0\xb9\x7f{~\xdd\xa7\x81U\x8d\\\xd6$\x93\xeca\xfba\x0f@\xef\xd4\xca\xca\x16Q*z\x9fJ\x1dP,\xd5\x03>b\x88\xfc\xe7@\xb1>h\xc0d\x82\x92\xaf{\xe9\xc7I\x1d$X\x94\x1d\x9e\xfbQ\xa5T\xce\xc5\xb5IG,\x04\xb5\xdc\x03\x9d\x9d|\xf20\xf91\xefw\xa3\xf3\x90_\xcb\x9c\x8c\xdb[3\xbaV)M\x91U2\xd8\xa6\x01KI\xbda') r1 = openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x80}) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast1, 0x80000001, 0x2, 0x1, 0x6, 0xb85, 0x6}, 0x20) ioctl$RTC_PIE_ON(r2, 0x7005) 07:51:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000003080)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000003180)=0xe8) sendmmsg$sock(r1, &(0x7f0000003340)=[{{&(0x7f0000000380)=@xdp={0x2c, 0x0, r2, 0x3f}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)="9121c004a6e538c64ff22ebb0a1bb0fc5dc1d876911c7448e8c368261d84cdead4b92c66713d5132bb5f2d5c2a9fb889573315776c536fb3d4388fa5903d42b35598a2c576d9aaf4eb74d5f769af15f604af4168df567beebd18e89ddb20a003356eda4bc89d466c21508c3a3765a65791a024a006ae094c8b5e782958c6292f06e10ae0f741601cb4afce7d95", 0x8d}, {&(0x7f00000004c0)="ee4ec0a68f03a039d57ffa4190ef1a5afad0ac16901de2b095ff986be3e42fe1dd892aed323147df78f50e40cd2cf94163efbc138ed33648e870b1bcae50c974eee77787b6c6be85ed437e07027da5b65d2105e0aa0452370f12c391979707ca0fc1d4e4cf634404d3860f9d3510656436829855a024b8b955678db6851192f8aba21989cdd8915a8cff0beef058576f9226c808ed5ee0b85c78eafb7cecb1edb5220526e770914fdfae198867cadbec3be9a580a99a89d63fecb35d88114b929249e295f576235a49b3ea5802dc1ec86b96748786f7a64f5556f5bdac95fd1161cb93", 0xe3}, {&(0x7f00000005c0)="7567f9ca4d6faeca0c41b06f436333f202c1b5d5c3bbe01f094ff676042f27b6", 0x20}], 0x3, &(0x7f0000000640)=[@txtime={{0x18, 0x1, 0x3d, 0xaff2}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0xfff}}], 0x60}}, {{&(0x7f00000006c0)=@vsock={0x28, 0x0, 0xffffffff}, 0x80, &(0x7f0000002900)=[{&(0x7f0000000740)="4e23733f003aa46be2e87acb74cc73427b073c2ee29265ff8f49a80e215ba3beb0bd86705d213c304d3d6c136a39dc5eb6805dc790b2f90f88976dcd37d4b4522db082ef8aefcb5ee6250d3ff31c07340f1ba889ae60c50f09e66947c8ea39bbbdd96a2b2d3c1c98d0e5fdc3", 0x6c}, {&(0x7f00000007c0)="267f104b9cedaf2416ce60b8e36ddc6d3f17a52be890d331339c3e5e3cd846362df0a18136c6e2790626994d642668a29eddb4524d897b2e3c724d776ff474b3d97c89430c06a4fa3f8f12be7c12417a80d1cb8d310474725231c72727770f67536375c6e6b0b6a2a5d7f9447a54f923d25ee8983c7a08d2ab4bf9a66777a6b2a57f7f3362d9903848a120ef0f447085636ba1300c14bef6b7ca25e56b89db6605fdee481346af44f0f64061a4233af6a2495c111d2623f382b33f1825a4d04286acff7e2c0061c17505cc37ada35a543758872c7457ae95a9a5872fd9b01b04952fb7db6f21bb37abd7db344d0d20164898fed8bb1882960df77a9826f519b3aea9a450f1e1f4fba285136404c5cae57984a1152b46f1015c26e124497a04e3384ed8790fb8f4173607224dfb71e8ab9a637339d6d7eb9a335c8e2704ea37fa9b4a80cddc1b610c88c97158655f4dcb226ba2514bfa6485b39b08fdb9f9fef36736f4d1b4187405c132dfe0b08e41eb548e4c1b478f4a3f78e5c3ada1036644b665a7cb2e31f02b2df4fee3fe6a54c47a1015f4bbe8d037889df815adbcda6d97c43635672c34345eb19472551953e7a8b66c32ab4738b205a6cb041c8443434699c0604145dd837852244d0ec2534a1278a6f9b8e95a45ca7c77358793048f878c19d34e24a2566a02d6d9a5995f8752b8a3f7dcaac527199451a7a81a80639150d52cba4e7e812657a089b98199d7636b2f15ae131e2548dff226ce3da2299cfae268a6de3f0089f393ae5b1e2e5711e8d1c803ff8452fe5b15624118791dbab60bfce8379cfaa41ac6d5f0ef24f2b874b5abfb1838fadc6ec635a5a522744a32b63e3efa1f7b541354eb6b96663e0a0d61dd61884aa8a200901cb9f6c46edbf50f83e229095165123228d30aa505226bb8f554aa602d9e7a6b6dd8731d2d41035322fa60e310c69b5c7528ef375b3f6252673adc9e876526d8bcea6481a64a1d7c53e261e9de89ffea465916a816a22e32fcda4a1888ce72f98cc4b475f8ca92ac09d34822a2e6eb6b877af81868fb28bd26e70c1b592090e8416380ff65854001b73d8beeb61e5af5f5cae31022aced61f253de410035656fc62d89c4208462ea5c150fd5942b1417a0c92891d981232756bf5473e9a611236c5f7622c487c8c340eabf362f29da90636f612ec2b5b98ec6156acea9f21fb2eccb09a2d29c5cc4a78df013da7ff0d2cbfa708a9cf8ec48e28530fb7ba135389d666f7a9e8de387719555a080b0c44d8c8ea1a25fd24e2fe55bcdc43dadf43937120a054150a2389410b5b6e8f610d2d0cd253e4099e4559f1c5fe696accf98166e27e29e9133340780afe260b94507894a2b50d6349739c3e32da061c34dac8c49bf5b5e7b4af9612ecb76457ccd55f8f61979ef09df8668f1a47fab40de0019445565b02d315d25521c417a0ab5023d5bb667a71bf273acfe753df35cea5f127a0d2756bc6d4ea3383061ba5359b27d8881d4d6982a5ca2466f549f10a24a9f33ceb818669bf7757b62abdeeb7cebc806befe747d2abfa0ebafe750c47b81387defc4c0128ae6491593ecf40093a86b6e65e0063dcc7173baab155bb97216a1089d992796da54eec1c530856f35e493bb95c78b875eab8b7019a89edcc5278fa507bf5d15dd4b181df7c8695773c9292637fcbdb5054d34ad48b09357bd457875f09989734f2394993bda3aaa00ba03acd565edacf2109590ca5784604a62c07f0f9a2bcb441b1bedec7e0673f6757f97efc47dc9333f4e0b8ef814bfe73b2e6b1446baf35c0181c8d5b446469d5329087bb0a51380989701f1a4a7a0e371eda2dc5db2c59745550ee754c7f34730b8282224c985ee6a29ed50b8302c4ce57731fe7a9e6945332fea68123b8b7c2ac4974c36b34123c1df8296bbcc6ed3bd4e48062383b57ee2fd2bd96605abba714c1b8e1271ae747d3927569321597059d5f53285656928288782903f4070d112e0ca9a761b4bbd31144334aed79792a2430ade594e544b9f954ba749d1796c2996f0d4c97416a4a46182eba1ba880a5f9532c809981a7aacdb25c1232f842a8840e9008c9175bc32a8c495b67c70e29e21732673f3d03364a6eb304a0849aed7f062216e6c7afb2a76e9b22a2cfaad2d888a9d31141f02c85004c277ef2592b80853a955e09e48fb1de1ae6b6115deb3c250eb1a41d847871846e3525eeca76cbc18f2b29249ff5b2983ae4917149fd47a7884809f147f4f98f4639635fd8245dc90abed837eefad25d36a1353198b956e19fdfc63e49f4814fbc311c58271111805b0ad3e76282be07369cdc2ef0bcdeb5a42e5cedefc17b56a8911e77b0cede257ca091d8fc5ca6ef7d73050e3ba7046ae82b3ddb74233ac76ef139a53825ba8020852d77914eb8a4532f70d4dfaa4a685b594dcfefcedb9f46fdfa24e3176cdfa13cf47648ced67873b1ddda29acb90dd8328236cc9aaf36df51a25b154765ab63ab2fb527cbfd4bf94cf27ce703d7cf8217f844ac513476db11c829fc4d653bf875ae61a6d367599b456ceac6a0b2ef8ec32c82fc1dd9559bce91661d0e25f97b6d9c634e9dd18e39e68b2a84e68eccbb31e7ed6641b491601b5bd0d8a1f6b6a3c014ad253ce5b27ed78561c38b0b0f0d765e0e07f7176fa88b05af06db59eeac9a210e37d374a069f6ab2a9f35eb3f4626273d6bc7e39c8c730c00a20c4f50e7e0c6bbd4825040622b93d3361831fe0d1687263c3f4b5d70912bbcc0e7f0892e536f5007821b54332bb816e10d1a4ae258c07565b121764ac37a3c7be47c035982642507b36141088913912a7076c008078386f8d1370f7c77b8daeb57a952b549f73e19ddeee281cccb2b85398803810880746f1120a7b08664893f7062e50c2959528ef2696320f6ca48cff5a081cc81f7561c6485c37bde4daf834abf52f857ea784626aa12a103859f900f155860baaa9fa988fc8482ea7b161803fca0d3a1f987a00da04fb402db06a3b12a9089b51214c9aa4d21d9fdc9de9d541035946b70429dc9d522566e9c638a32f058a040b7b576b967e2e58fe565915af77a5a7f4ac7332e501e812df4560de9a3c7a8f1d20eb0de11a679c57b6c0783d14cacd54e66211e9c720eb5c2c47627c98058f481b94498d1d7854f83df37f29d6545c640230813c8580316f27af94a9a1031a67053e6731a09d216f0c4500895e36099e08fd3afb0a4827175f481ffb2918df3156b6144a55dd3bb61f3513fc9a888ae7011c327c583c7316b342379d8ce3e49e949216a91b0512b1bad503cd551beb0f84014f2ed097549a8674c4c5887957a8ea712f56d7964535eaae6f5aa7903806fc26ba6d4f5d175575229efc38eb8dbf695e8d4748b617c2cd75408ed23163816b8e83103e86736d8907f5033af08c0fe7c60771f60e0f7d4b961b02c7bc63cb40643483791d960ba6a5c1017b2ac326ca108e7bfb039dd0edd07f4a04797bd9f074b9680907dff274ef71292eeb30ae3466d388e450d1454c9afc006762a79f2c98cb9494bde206a13152331e38b7d03bbeaeba054cb1f27947738ab8200f86244e646b38c3575fa36ec920692f9f7c01ccf1efd2135ae3e46dc7278d0e4ed432cfd7c98d8798bd253006b7aac015923d5d2e49e1047417de718af8d3250a27ee10c92ab9a4964bc362dc6fcdd594237f1114bf259712e2493bef59f1dc18cb8988501e7ef463f7ee3e46ef92b718404dee39c4e858c35fe86c28cc4cfa8123e85984237a5722bc4fcccf49aa9b50d9e332d7df47fb6b4d66bdb3ea33bf6e34934930a89c064768764b877088d2660dc6d9f4fdcba8c4476c26e58c0fb54a5ca0cbeb92773b304e3a28e329539fca9c258b198c86a8e47ddc4a30758374a334d8100426ae4a39977df0ca028a6b6e22f7982f4ac2ecbb3960b6e1cad9c52d63436da3afa2172cf75258e2af04473d307132307fd3d41b0d201cabdeea378386de12b5b910be70872a46ea602c1d5769687b5cf542e27fd6b1a559dd0c072517c2be99b4ca12739bc6731b2bfbed8c0f66554269c8db13a391c4eb3ba5d6739c20b90d1f074dae722a68371872d00e6e819dd2a5fbbaaa822c023ae1781d9f1a5c7f6a91015c6f76a2200ab5b0319816b5fe02a0298c09dd925299246596abd5da3260a7769c95f1c22a833b638b6859a5c3a0073fe13c3116e6a52e00c1d863338046445ae3fd39690b231d779c74b4ba2d1334498ffdfec47bb7b55ab721362ba89b5712f9166d84d14e6b650f838afadf82fb35bdc8852d98f391beed36ae872c1ca86758f862df22b85cf59debf873d1e89eb240e719c7d1a3e62880202ea42a9a3986b3c790fd9145daca1be6b8ecb29a9909e103bd21264751c2d4bc84023410f1b224e9200703d97715c3d760d671799e017c05ede239fdd34b0a73b15ecac17a2c1f3bb7115be4556a4553746812a9e033623092e0f28fc526c1a4403e5967602c9478d0b333b9e5a28dafdc778bc84c9676734de72c18dddaba5886267e29bc44c0d7cd3f6fc167f9f9b92ae7eff1863e897edf2db18474187c56f1e1f5e11efba2d92b705dd538e6190225516d452e9c1e42e6a592d77018f9bf5c0d3f518d8b6b4b4ccb93c56250ab9004680387e3537e477c2b37bb812ad44317d42a881e027d253ed1b4097c6325fbfc877b29e7512ba06489c5aec7123ff98cc35f6460dae38f2242aafbf786f31d45b9beb621e26b30a3da2e06c94f6d4fbfc8f1d849e4437881aeec28d1bd30f6b41c317ed2dd6d5e49d7e9cdb23d43261ace7a201bb62d735745c4e9021a893be5e38e49944e472d5bd4bd39cf8deecb31871dcbb99ea3ea5bd9ca52bce27e2a0dbb9b4ea942ac6a29760c10c5ecc7a5729b113f925f09113ac0035813cb67cabedc68e8f297586469912baa673e6d95dae3f50ef9d4edfba94764c9f74426ebd88fb39bddd9a625062daa3e4e5585345fa5bcfe478b0b94e506af4888a1b00f755b10df7b199549de9f64b82af8fb816b37c9aafe80e97009a7ae731f0d932de9db7432c7003faf3c2477e30a3d3c882e7ccdc084cb4e640a70ace3266487f4b3b9d693adefd8e1539df96055aea82949ee5516c91af8d8b57529996cd8d3f84a9e4aec0e06acc8a51aa17de7bff3df7ee038dae62bd5cf3d6c8f46c24f293b9aecb719d35c9e463b29e8ab11833ab7e00f7ec8d04816d82bed1a9804ea74a6b8e322b7d49aa1610b81201c14909f022d42cb8c00ce2bcc722d4f832689c3287be314b0400e64f6f473bed6a41e3f1828899de21511d31075c4758015ac91e1feec8cd5415c0580db9bd72af0b8e8662931f713c7715177d839e78fe0db0562abea6d0894bdff597c121e8d2342fa3736f484cc243bf162884d60ccb224b225685a2950e987fec89dba2c228c9b63850edfbd932e6ad96a1f99faafc9234062d99bc2fc5da20e340a9d471cfb1f24e402f20b641f193b25ade6635bb0013fad924c76396947627504ed30aac4401cebcd752769ef8b2ceb9959231de10dbaf067fa0a202b11cb3a58031a57580248b5fefa5117f3b6ebc089e524e03205a080719ec69faa3b78bab259f4e3e7723a336fa9bc6b9c1812230ff8aaf2d94587531e5fc19e696e2c75a45bfb01c169b0def6f50430666d82bb3cb95dc0f02e5924fbb7d332315d3f2fe433fe450e0377c2681bb74674e5466059a6ee930c6ee3f622c480a15674dc7bede44aac7ca88078febc2a00679ecf39197f6a32588a0cb9149e", 0x1000}, {&(0x7f00000017c0)="7c9f5bf3b3f8c70a1fb98c095d692225d782a80f02842366b3873c14c27a9a6cd58fdf98cad849044f579f07969a09876937f33abae5cfbeac2e993f12d2867eb46219c4119f8d54ac82aae45cf774b952b76b1db26150b7576e05c642a8ef692e3a68", 0x63}, {&(0x7f0000001840)="2e5b1e95e96d34ba8feb7a76d6aa05e641bbe0f6fc6fd58dff06cb983e5e82457a8eda2ee96ec7b490baa3142d2fdbf261bbbb6a84d2ba96ca7148e0b7", 0x3d}, {&(0x7f0000001880)="92b1cd2505335739a7c93f3d6ae133a1be50eaa54acbad0ed78d05b4bde525656e432be63934797fa37a48356a1cfecc032f82aa2fa68bd38ce0164752e279c30224ab701038ee50816f81414ea93c68713640d0fb5c126c6a0fcb95c3add7550f5097a23542b281f188378d152069340d749b01b878", 0x76}, {&(0x7f0000001900)="7e2b575e44e72c74db4f1ab06e0cd6420cbe4c68197f5ab9240ab1038a759e2fc687c2b30559470812b9e4648dc4def6c27016eb6724dd51b106d2eb050dade0fbb81b552649d4edec1bdc7ce584d5d65942995a020bc006529b806f852f311731f9ae8073f222e160e0c4f8ef7a3aad1941f14525c1def67bce88c135e4001dd71c18181b6086b7a2d8a638faf92385569d347a1160ce579f6cbe8cff3d7765b9957a966dfc8bfac1999fa3441dc4028e79c53da309059773e4ab57d8fa192adff303e7c311e1b37569b519d962f66fa4f239574a8d6c9c48acfe8f70f98dbaef9cf6e5aaa43e29dbe61ec6f16043d3d89187d17d0a98463daabc9dec15e4b34ec76671491eae4211eb5d69d430dca890c48cb005327b39e3bf453c75eead2cb6e83a3a4c642cd661a582afc0b47506cd95c0db33708c9f921f72f8036a3a427362cb0a9e5fece8716b92db486e30d3b77e602a58aa6d3ba07358f13f5f1e42abe9223124da54c456a93a88051f39b98069ede93a59c2e18e8f7a040bc101b8617c5ab557c54f32a2fe786c1d2d58b9708f8736cb7cb03e0e10de6c7aa2e88cb49106448a4e8f297635562bc1bacc63df2f6b259c543d46dab8960e79d21dcbce27b824c0e9849472a2ce1a1e8c8bd3cdf42132c3b6729d6fdfee87d36f2d68b885aa7608c01f1e6a6eb232e6a9a156fa2d07d8184c638f138031ea740038d1d88d4f6df6e379dc7123e4f0176cb95ffc8432826f1522ddc4bb1b04f5a7bcbcbed8176f2ac8359fe453cf7e2bc56f1caef736e376b5d5621632a0dec22d1e85d162596eb2887fdd373554b5ab855cc2790078eb73d36d608372230b727c19affe0fdda412851f498aba24c6fd15a12a01f8513cb07e9478cf08adc4fda44fff40421cf3438262d59a72f407c8e9b8c3287867c2da3517013874e97d7acb0d54718be5ae809f699d5aeb8cc3f0507841cf4deb094f4a55e1c4f6a5db5bf3d1fe5d8eb0df18bf359e279fb18588b37f360cbf6ddde69edf0062fb6404fe1faa62efe60d3c934a6d14761518e980f6f48406edffbbd7d618be8a28fab1705d0f5aeb74c474d4a3462428b32476083802c74a9ecbf276fb7bedc01d7bbceb30969952ff6cf69351c9974779d5f466eb1761aff82f61fc96657d4be3e34077b8805eb9a4dce188b5dfb04935f8923e0601f7175933d7794acfbc87f4d341ca9039aa8adf72c10a21157f4ce1dcf73b4e25a9748abfe2d78dbe0208d0f799b4ab4258123b339ea0dc54f51d51b86e7973aa1c95011e5063cf22f4f40c6bf872032b2c25f3820622c71e886cca5032ecab9ec5d2d2b63e58edda0a10b2dccc220f93242bf27e0fe4a40fab8bff7eabfb94ac52674a78eb38dba0c42da1a3bc478a6be1b36774c5a335d082fedb67813157d81bf2771cd8b844897c245481928b6883a9150c318a0a66ff8ef4e153bc6c3dc1ef8a579a60c911ea21ddbec19d482503d0ef02c38bdbfb8fed908f379a497603638d73322fac05ef38773601a8639454d0e6596f37221bb4cfecfe16c9e9190f7a8cc07cf52dec44f3317a206d9277d7d98466c62abaf22640e06ce5eaad84ef352ebd61e2d72cffd93b67e5d19ff80be3828bf9eaab0c2ca356d84e235f24c8f04f491eaa54763f6b27be2f7b9b98f87c7fef6fd0d9e2ac5a2a48c2167dcec5a42d9ddff5d99028a1fa90d6c2ae055b9cd4b077c8c3773765c53578dae1c43a941d7c2e2f8d781ddeb438c47c4f4a94ed95843dbb6d9ab03a3622a96ca5ff4d94591b294ffbba3608f6e759e24d3fab4aa6d8259c7722e1e367b11772e304aa53f6001681d45f47c48599bdafaf3d3c1e7d3a36b21ffeaf12c08e444a51c75c108f5ce0a92abbfbf2e8f49335b9f4d9f3499ab0c57a1a1a654d8f1f819f58185abde515460d3ada3ff7e6af8627f973fbef5035519973106ca655f028a6943e227850593d2635e0e75d5c29d11b431d42359bb3f533a0c34653105c4cbdb65abadcb1edf681108a78863918c6dce08381942c2aa75f332788a020516e819c8f0fd6b3c6e91ba89f344efd898ca7b77950839f5fe916ee0f7483d6871111d4afcf2794924e5582794035bcce2d86231c4ccf501acf0ce26d3a2f6ca63deff96729efb3d4a08b908fa447a21a1b6fd02c7388db214b161942a3d34719458eeb047e1c5d167d8a522df295437d3a827629d5457510fa26e40bd2c30444b8435c90a468f5266f8dc0c3ddb3644a8bd4bda80f78042283dffa3df9cd5076c48d910fcc6a6572690903963eb9cf21abea23012e67ef6f20ad0dc9ce204ba31cc3e8e8fd528ab0fe638494ed2b68f3394daa652e243bdb3438b623707695f672481fa6aab667ca60fb23d93a7d55b8c0e1118740144be90f1136df76769c0202dfeb5a0f4111215793a3275803c18de3e6597614769ddd80db42e980a133e8371197eca80de581361615c84adc68a8270a1cb7315b217f3d5b8225d01984df2e524e146c96eefa6e464b4d95f95fe742d5e876e6185f84ae8337eab9ed09b998ea3575591167d0fbdc3eba3d33a90ac84ae988d92e9426d9f5c1b7f2270e1e5ffebc0a465274a49d7243c3bf0b88809403d74a2529a6b1940a3efbf9005cd0ef8a2251022aa1531d3d160333e02633c30339dcb6a48f01ea8cebe6fdf0d14205af9576f82f7d714480f5d14e68ddfa525a00066638893cd0fd1396557c6fb24400aabaf48a04e506ef33a80c650acaaf662112f045672c457a158827c99cd75819f96b44262a92f649ec75d75d262329fc53e74a5f7763bacba310cdadf3e93378257bee64cfda04b5bc2a47dcca05037a2eda2143c1dbb5d7da5c1c5a38b565de64d794e24817004ee5fbac09314abb0ed6cfa998c19559a26dd4eeb64ace69df65f84c9ade489f56236c38b77796604f6386f9f97151e7e9ebb33e13bbbb1b9cf9b9b06ec1e37b5b6f01ecaff63ca4831b09da976c44b080e07ef32cb2c5708e6b0139d8fe473c2499e2439b1a7840c0b796d9dd4ced6a3780bad77bfa6bc1af08b8f913ba0c8b3cb9dd7c416d0bc47bd86bbb6d3f7797288cc79553ad963eafeaa46f5b5ef9ca90c0f049b9c6fa8702a9ba32f9ad88c5002c2d765cdbce584176ee7c55b7d03648105442f7eb48c17b1a27d234964b3f0312bb96220042e712e55039d41075c63f5f913b36a02c37dddd53a029400413bad92ca0dcd23c4d2321d990890e21d7d8b114d97113f9967665a5ecdfcb5729362d5c72480b342aa769e511bab91828fdc9c5d7af432eb4c255796ee9775f24e23fa40d6c9faea8f73c0c94df7ba867fdb23690a6bbe2c638542a14d1edff3efe813f1a708e258ff297879fc892db8afccd76775213f49b5804521a995caccb740e53d04d55b362753611a841ae47c9a9f2bdee8185c2b6ab37e2e78d3994024df3ab058b5fcd0981861fbd2f11ddeadaec4bd31dd3429a15f90fcd150df203098cb9f1a689b685aa53ace5d44dcac6db04600e9c909ed2911d2c920b57a25c222f0e441339f1f757f1135650a5dacb34d56123741c539de7184b88c311e172d9d5b40eabe9e52de198d1dda50e46f44763e591aba782a36f35111ff7b6539bec61d8de76486b1290e2aacb1771c2a115ac05b9996c35317d8eb445891e74e4cc0d9773cb9877a6d93e43de3ec37c15e00c8780d771a329d7d15e5055ba307f4159cf91c95c21c02b10e80d5de9ee4d23fa2d484cbb4a3365c2401f605dec7df7d1bb2cc2217cd3005050ecf9e1fc02eee0470a48e3b503c6fb2f0a19929631b55d30d1a93ca15faf64e750a870b5ef714fe05afcc80450248a60b72974c25dca58df7785e343d0051733e8cb5d49179cebcf550c1eca773d412d8931c1b7014696dbdc0808524edb49173f4d18e3de15ffab4fb21efe6cd0c2ad8096c83c0357fc6ab4d10b5a02878b88a7e7bcdc7132ca1f6ed4a670e7d79ccacb8b2dd4472174d9416d79ffc3195db267d7c7ec9bac41a3cfcabe0ae72cb7b5de6262b1c6b4d04227b9dc534716cdc88955fee4b4445e48cd14f7d055832cdf6d1e43d736ee0cad635314bfc64ab162e75e76910931563341a4c2f29725d0fdc8d8b412257b7f6c765481e5f19c4ad4fbd97985e946bda86a6ff0d53f297abe3a645805de4293eeb3aaf68cad40d3900e86c1f993e4ebedd78d8c03d9b4da79b93ea8aeb470b06a51e92157f6e8ab29284905febf2a40d0318b7a7e9cd45831cc447728bd25f0bc1caabf813fad4ee96e38788b61f304845c61cbbefd85bd31a479e11a31d2c10537ae80287ff3ef7fdd9273b216efa3cf878813a570fc97599db4dac0e5fdecbbc5f88b2c1b3b83819f1856f3b04b828376d20b4c91e145f0bebe79240ecaba86b709bbb661d8400e05833d2ee59b16f4b7440d793a6061568c9b3670bd89f96cf4b6f925b2ed550a847c65381e9ad39e580ad5b82efc5cd0599db1127e6a0935aa8a10d48279d09c14399b5627d1803906e289b2638050905d194e5d52f6de317303e797af7e6d58fdfee06ee5ebc913c6254d20637e9f23e5c9b6413bedb37cb633ae4c2eea9ce7d6a22df6d2ae9ef9b70d3454bcb929cb8a863682f690e66d9253074e7fec25442aad417a179e6cfa040060c3483bdd590301ceaa40be24d52e99022b6e626d0ed9152ed08b80b31c02ffb2d04d0954a7a95155d17d6ecf1b546acce3ab882f7f24fbfdf15dd1cc42c7e4c202695c690db261cf573a46265e8c7f245a28dbf8853dd7a258390e760938d60728862485c0a5cebf4085e106cbc5c29e0f00c6e8083d4877a8a388a867409b27e0fd4eb82096b250ac5a9373150bd20a99d18bafc3a7218a4dbebf0ed9ff6994f7013a2eaefe77eb620af814a8f3e235d1c83148d9e55cfe02a1b03fab456bd33c1bdc5dda7741d5175cf2992c67dae4146b14e087815c5ac0729120f42179254672fee765c08bb45272521b144d38f326f1078e25a4030c1fc9b43950dd83284777f9ab5fa883b320bcaa8c20a5fb8c0d041bcbebdfc5fb628e2cacfb62ba9cdcdf48db274d82c4e3413cea05062356a9b9f9337cf1ae4f15fbbe3f00a6cfe968b803b9fbc49c23bb164d8ee9ed876502b0b745d7452bec314b3eca82c0573e21dfe50c9dfe1ef1d32afb14adb8b8fe861b76a363531880d53029b18d53d9670f0b981f86bc17095da690436e5fccc7421b80cf5738eca500f8dd16eae7171f9b7a177b6e82204699187946c5e2bb1ff6d0414934313ba6d0fd20eccbec005b70322987d4741ccdbb8c9a1c34613e90852a70e7e257dc79f4b13090f1373c931311c7e53a25336ed92b7cc7cb7f314da8bf429bfc9f5be1dc23f38c21f6d7eb56a64297ec3ff3615e16a7e5ac54c41bd8c6e451a85d89f1980b86bd5246f21bf08ca33eb1b49606364f41a9632e1107cac77c2fb2c97a789791df35a1123a781363e3c4bd03273146a5e22bd154ae1d6854de48e4a905163a59834892e94d4aad3e8d1048d914d52def7013f91cc383ac844df4e6b22def7d53de1716ac6b894c906f1d4db4a8e9fe44ff4406f820bd13973b174481ba08662f73d20a5221cf309e848e82b80844df471f3ba2690b714776729db945247980a88e827e9ce9e3a51b5601ee02f07c2cb203ebb28d8b0f5c361b32c51decc4704334025dcf891f8dd3e3917d94a889d48725459cc441d5659fc08b8c5caf812d993955c63413294ee2eef099748abdecd4379b7f042ca8b387ef1c7d483df5030e56532a18270136b424bfc9e9", 0x1000}], 0x6}}, {{&(0x7f00000031c0)=@xdp={0x2c, 0x5, r3, 0x3d}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000003240)="f55f744268771030ba3ee31d3a03154345c3ec0efb03bde5bd8400ead5e18976175136dbe0a5751fb3bd5cc092b8247fe8e45cd4aea5398f1d12a1fcfaa72d512d82109bd736f8a47bbc3c3b379b70ff1bbfb9550783c6ad5563913f8bf59b1bf456", 0x62}], 0x1, &(0x7f0000003300)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x2}}], 0x30}}], 0x3, 0x40040) r4 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1ff}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r5, 0x82bb, 0x7, [0x6, 0x101, 0x4, 0x4, 0x7, 0x8, 0x6]}, &(0x7f00000001c0)=0x16) tkill(r4, 0x2d) close(r1) [ 342.489247] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 342.489254] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:00 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x40000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:00 executing program 3 (fault-call:5 fault-nth:48): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:00 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f00000000c0)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000140)={r3, 0x2, 0x0, 0x7fffffff, 0x10001, 0x6, 0x1}) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r0) 07:51:00 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x6b6b6b, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:00 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = fcntl$getown(r0, 0x9) ioprio_get$pid(0x3, r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:51:00 executing program 5: 07:51:00 executing program 5: 07:51:00 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x1000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 343.119646] FAULT_INJECTION: forcing a failure. [ 343.119646] name failslab, interval 1, probability 0, space 0, times 0 [ 343.151413] CPU: 0 PID: 21820 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 343.158491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.167857] Call Trace: [ 343.170483] dump_stack+0x172/0x1f0 [ 343.174143] should_fail.cold+0xa/0x1b [ 343.178061] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 343.183199] ? lock_downgrade+0x810/0x810 [ 343.187385] __should_failslab+0x121/0x190 [ 343.191649] should_failslab+0x9/0x14 [ 343.195462] kmem_cache_alloc+0x2ae/0x700 [ 343.199623] ? anon_vma_clone+0x320/0x480 [ 343.203855] anon_vma_fork+0xfc/0x4a0 [ 343.207678] ? dup_userfaultfd+0x15e/0x6c0 [ 343.212021] ? memcpy+0x46/0x50 [ 343.215325] copy_process.part.0+0x34e5/0x7a30 [ 343.219961] ? __cleanup_sighand+0x70/0x70 [ 343.224210] ? lock_downgrade+0x810/0x810 [ 343.228392] ? kasan_check_write+0x14/0x20 [ 343.232645] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 343.237519] _do_fork+0x257/0xfd0 [ 343.241000] ? fork_idle+0x1d0/0x1d0 [ 343.244726] ? fput+0x128/0x1a0 [ 343.248021] ? ksys_write+0x1f1/0x2d0 [ 343.251850] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 343.256633] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 343.261406] ? do_syscall_64+0x26/0x620 [ 343.265392] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.270760] ? do_syscall_64+0x26/0x620 [ 343.274743] __x64_sys_clone+0xbf/0x150 [ 343.274760] do_syscall_64+0xfd/0x620 [ 343.274779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.274790] RIP: 0033:0x459879 [ 343.274808] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.274814] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 07:51:00 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x2000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:00 executing program 5: 07:51:00 executing program 3 (fault-call:5 fault-nth:49): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:00 executing program 5: 07:51:00 executing program 5: [ 343.274829] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 343.274837] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 343.274843] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 343.274851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 343.274858] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 343.461730] FAULT_INJECTION: forcing a failure. [ 343.461730] name failslab, interval 1, probability 0, space 0, times 0 [ 343.533751] CPU: 1 PID: 21880 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 343.540827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.550194] Call Trace: [ 343.552814] dump_stack+0x172/0x1f0 [ 343.556464] should_fail.cold+0xa/0x1b [ 343.560373] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 343.565501] ? lock_downgrade+0x810/0x810 [ 343.569681] __should_failslab+0x121/0x190 [ 343.573944] should_failslab+0x9/0x14 [ 343.577864] kmem_cache_alloc+0x2ae/0x700 [ 343.582020] ? anon_vma_clone+0x320/0x480 [ 343.586169] anon_vma_fork+0x1ea/0x4a0 [ 343.590054] ? dup_userfaultfd+0x15e/0x6c0 [ 343.594299] copy_process.part.0+0x34e5/0x7a30 [ 343.598890] ? __cleanup_sighand+0x70/0x70 [ 343.603115] ? lock_downgrade+0x810/0x810 [ 343.607260] ? kasan_check_write+0x14/0x20 [ 343.611490] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 343.616336] _do_fork+0x257/0xfd0 [ 343.619781] ? fork_idle+0x1d0/0x1d0 [ 343.623493] ? fput+0x128/0x1a0 [ 343.626806] ? ksys_write+0x1f1/0x2d0 [ 343.630619] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 343.635366] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 343.640126] ? do_syscall_64+0x26/0x620 [ 343.644098] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.649453] ? do_syscall_64+0x26/0x620 [ 343.653421] __x64_sys_clone+0xbf/0x150 [ 343.657388] do_syscall_64+0xfd/0x620 [ 343.661203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.666505] RIP: 0033:0x459879 [ 343.669686] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.689184] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 343.696898] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 343.704165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 343.711424] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 343.718685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 343.725944] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/fscreate\x00') ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000140)=0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r2, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000000)) r3 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ftruncate(r1, 0x2) tkill(r3, 0x1000000000014) getpgrp(r3) close(r2) 07:51:01 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x4000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:01 executing program 5: 07:51:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:01 executing program 3 (fault-call:5 fault-nth:50): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000140)=""/132) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f00000002c0)={@null, @bcast}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x282200, 0x0) ioctl$IMDELTIMER(r3, 0x80044941, &(0x7f00000000c0)) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000300)) 07:51:01 executing program 5: 07:51:01 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x7000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 343.935042] FAULT_INJECTION: forcing a failure. [ 343.935042] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 343.957259] CPU: 1 PID: 21966 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 343.964327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.973697] Call Trace: [ 343.976319] dump_stack+0x172/0x1f0 [ 343.979980] should_fail.cold+0xa/0x1b [ 343.983922] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 343.989057] ? __might_sleep+0x95/0x190 [ 343.993062] __alloc_pages_nodemask+0x1ee/0x750 [ 343.997774] ? save_stack+0xa9/0xd0 [ 344.001426] ? __alloc_pages_slowpath+0x2870/0x2870 [ 344.006455] ? copy_process.part.0+0x34e5/0x7a30 [ 344.011237] ? mark_held_locks+0x100/0x100 [ 344.015492] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 344.021075] alloc_pages_current+0x107/0x210 [ 344.025515] pte_alloc_one+0x1b/0x1a0 [ 344.029533] __pte_alloc+0x2a/0x360 07:51:01 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x40000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 344.033194] copy_page_range+0x151f/0x1f90 [ 344.037450] ? anon_vma_fork+0x371/0x4a0 [ 344.041531] ? find_held_lock+0x35/0x130 [ 344.045615] ? anon_vma_fork+0x371/0x4a0 [ 344.049704] ? lock_downgrade+0x810/0x810 [ 344.053876] ? pmd_alloc+0x180/0x180 [ 344.057627] ? __vma_link_rb+0x279/0x370 [ 344.061721] copy_process.part.0+0x543d/0x7a30 [ 344.066365] ? __cleanup_sighand+0x70/0x70 [ 344.070725] ? lock_downgrade+0x810/0x810 [ 344.074907] ? kasan_check_write+0x14/0x20 [ 344.079185] ? __mutex_unlock_slowpath+0xf8/0x6b0 07:51:01 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x6b6b6b00, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:01 executing program 5: [ 344.084054] _do_fork+0x257/0xfd0 [ 344.087526] ? fork_idle+0x1d0/0x1d0 [ 344.091267] ? fput+0x128/0x1a0 [ 344.094572] ? ksys_write+0x1f1/0x2d0 [ 344.098392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 344.103173] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 344.108477] ? do_syscall_64+0x26/0x620 [ 344.113261] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.118648] ? do_syscall_64+0x26/0x620 [ 344.122651] __x64_sys_clone+0xbf/0x150 [ 344.126649] do_syscall_64+0xfd/0x620 [ 344.126670] entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:51:01 executing program 5: [ 344.135666] RIP: 0033:0x459879 [ 344.135679] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.135687] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 344.135702] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 344.135710] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 344.135718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 344.135731] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 344.194588] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:01 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:51:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:01 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80400, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'\x00\x00\x00r\x03\x00', 0x43732e5398416f1a}) 07:51:01 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0xa0010000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:01 executing program 3 (fault-call:5 fault-nth:51): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:01 executing program 5: 07:51:01 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x1a0ffffffff, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:01 executing program 5: 07:51:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:02 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f00000004c0)=0x10) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) mount$overlay(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='overlay\x00', 0x8000, &(0x7f00000003c0)={[{@nfs_export_off='nfs_export=off'}, {@xino_auto='xino=auto'}, {@xino_on='xino=on'}, {@index_off='index=off'}, {@metacopy_on='metacopy=on'}, {@index_off='index=off'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_off='metacopy=off'}, {@index_off='index=off'}, {@xino_on='xino=on'}], [{@uid_lt={'uid<', r3}}]}) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) tkill(r2, 0x1000000000014) socket$inet_dccp(0x2, 0x6, 0x0) close(r1) 07:51:02 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x1000000000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:02 executing program 5: [ 344.696164] FAULT_INJECTION: forcing a failure. [ 344.696164] name failslab, interval 1, probability 0, space 0, times 0 [ 344.731317] CPU: 0 PID: 22222 Comm: syz-executor.3 Not tainted 4.19.69 #43 07:51:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 344.738399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.747764] Call Trace: [ 344.750379] dump_stack+0x172/0x1f0 [ 344.754035] should_fail.cold+0xa/0x1b [ 344.757954] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 344.763084] ? lock_downgrade+0x810/0x810 [ 344.767261] __should_failslab+0x121/0x190 [ 344.771524] should_failslab+0x9/0x14 [ 344.775330] kmem_cache_alloc+0x2ae/0x700 [ 344.779479] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 344.785039] ptlock_alloc+0x20/0x70 [ 344.788691] pte_alloc_one+0x6d/0x1a0 [ 344.792570] __pte_alloc+0x2a/0x360 [ 344.797893] copy_page_range+0x151f/0x1f90 [ 344.802149] ? anon_vma_fork+0x371/0x4a0 [ 344.806238] ? find_held_lock+0x35/0x130 [ 344.810329] ? anon_vma_fork+0x371/0x4a0 [ 344.814419] ? lock_downgrade+0x810/0x810 [ 344.818603] ? pmd_alloc+0x180/0x180 [ 344.822337] ? __vma_link_rb+0x279/0x370 [ 344.826442] copy_process.part.0+0x543d/0x7a30 [ 344.831096] ? __cleanup_sighand+0x70/0x70 [ 344.835343] ? lock_downgrade+0x810/0x810 [ 344.839518] ? kasan_check_write+0x14/0x20 [ 344.843773] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 344.848646] _do_fork+0x257/0xfd0 [ 344.852389] ? fork_idle+0x1d0/0x1d0 [ 344.856125] ? fput+0x128/0x1a0 [ 344.859422] ? ksys_write+0x1f1/0x2d0 [ 344.863244] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 344.868011] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 344.872851] ? do_syscall_64+0x26/0x620 [ 344.872866] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.872878] ? do_syscall_64+0x26/0x620 [ 344.872895] __x64_sys_clone+0xbf/0x150 [ 344.872911] do_syscall_64+0xfd/0x620 [ 344.872929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.872940] RIP: 0033:0x459879 [ 344.872953] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.872965] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 344.928981] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 344.936277] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:51:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100, 0x4) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f00000000c0)={0x0, 0x8}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:51:02 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x4000000000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 344.943569] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 344.953432] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 344.961849] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:02 executing program 3 (fault-call:5 fault-nth:52): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:02 executing program 5: 07:51:02 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000014) close(r1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x8000) 07:51:02 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x6b6b6b00000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:02 executing program 5: 07:51:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 345.200986] FAULT_INJECTION: forcing a failure. [ 345.200986] name failslab, interval 1, probability 0, space 0, times 0 [ 345.229108] CPU: 0 PID: 22275 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 345.236267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.245653] Call Trace: 07:51:02 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x100000000000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 345.248289] dump_stack+0x172/0x1f0 [ 345.251945] should_fail.cold+0xa/0x1b [ 345.255872] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 345.261002] ? lock_downgrade+0x810/0x810 [ 345.265178] __should_failslab+0x121/0x190 [ 345.269449] should_failslab+0x9/0x14 [ 345.273273] kmem_cache_alloc+0x2ae/0x700 [ 345.277423] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 345.282450] ? __vm_enough_memory+0x324/0x5a0 [ 345.286971] vm_area_dup+0x21/0x170 [ 345.290616] copy_process.part.0+0x3407/0x7a30 [ 345.295255] ? __cleanup_sighand+0x70/0x70 [ 345.299642] ? lock_downgrade+0x810/0x810 [ 345.305494] ? kasan_check_write+0x14/0x20 [ 345.309746] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 345.314631] _do_fork+0x257/0xfd0 [ 345.318114] ? fork_idle+0x1d0/0x1d0 [ 345.321848] ? fput+0x128/0x1a0 [ 345.325148] ? ksys_write+0x1f1/0x2d0 [ 345.328970] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 345.333761] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 345.338543] ? do_syscall_64+0x26/0x620 [ 345.342537] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.347921] ? do_syscall_64+0x26/0x620 07:51:02 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x200000000000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 345.351918] __x64_sys_clone+0xbf/0x150 [ 345.355908] do_syscall_64+0xfd/0x620 [ 345.359732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.364937] RIP: 0033:0x459879 [ 345.368153] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.387066] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 345.394794] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 07:51:02 executing program 5: [ 345.402078] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 345.409386] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 345.416694] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 345.423978] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:02 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000100)={r2, 0x2}, 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:51:02 executing program 5: 07:51:03 executing program 3 (fault-call:5 fault-nth:53): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:03 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x400000000000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:03 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x9}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() sched_rr_get_interval(r2, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f00000001c0)=0x4) splice(r1, &(0x7f0000000140)=0x4, r0, &(0x7f0000000180), 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:51:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:03 executing program 5: 07:51:03 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x700000000000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:03 executing program 5: [ 345.756368] FAULT_INJECTION: forcing a failure. [ 345.756368] name failslab, interval 1, probability 0, space 0, times 0 [ 345.775029] CPU: 0 PID: 22425 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 345.782121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.791485] Call Trace: [ 345.794100] dump_stack+0x172/0x1f0 [ 345.798469] should_fail.cold+0xa/0x1b [ 345.802501] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 345.807641] ? lock_downgrade+0x810/0x810 [ 345.811826] __should_failslab+0x121/0x190 [ 345.816169] should_failslab+0x9/0x14 [ 345.819983] kmem_cache_alloc+0x2ae/0x700 [ 345.824146] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 345.829178] ? __vm_enough_memory+0x324/0x5a0 [ 345.833698] vm_area_dup+0x21/0x170 [ 345.837432] copy_process.part.0+0x3407/0x7a30 [ 345.842055] ? __cleanup_sighand+0x70/0x70 [ 345.842068] ? lock_downgrade+0x810/0x810 [ 345.842094] ? kasan_check_write+0x14/0x20 [ 345.842109] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 345.842127] _do_fork+0x257/0xfd0 [ 345.850529] ? fork_idle+0x1d0/0x1d0 [ 345.850545] ? fput+0x128/0x1a0 [ 345.850562] ? ksys_write+0x1f1/0x2d0 [ 345.874022] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 345.878800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 345.883575] ? do_syscall_64+0x26/0x620 [ 345.887570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.887585] ? do_syscall_64+0x26/0x620 [ 345.887603] __x64_sys_clone+0xbf/0x150 [ 345.900906] do_syscall_64+0xfd/0x620 07:51:03 executing program 5: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000000)={0xf, 0x1f, 0x0, 0x4000}, 0x24e) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r1, 0x7005) 07:51:03 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:51:03 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x4000000000000000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 345.904735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 345.909935] RIP: 0033:0x459879 [ 345.913405] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.933367] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 345.941223] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 345.948599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 345.955887] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 345.963175] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 345.970549] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:03 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x1a1000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0xffffffff80000001, &(0x7f00000000c0)=0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80800) bind$ax25(r2, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @bcast, @null]}, 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000100)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:51:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:03 executing program 3 (fault-call:5 fault-nth:54): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:03 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0xffffffffa0010000, 0xfffffffffffffffd, 0x66d2f5089ed8fde5}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:03 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() clock_getres(0x2, &(0x7f00000000c0)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:51:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:03 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x10}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 346.236096] FAULT_INJECTION: forcing a failure. [ 346.236096] name failslab, interval 1, probability 0, space 0, times 0 [ 346.285328] CPU: 1 PID: 22533 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 346.292431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.301914] Call Trace: [ 346.304529] dump_stack+0x172/0x1f0 [ 346.308185] should_fail.cold+0xa/0x1b [ 346.312107] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 346.317230] ? lock_downgrade+0x810/0x810 [ 346.321408] __should_failslab+0x121/0x190 [ 346.325656] should_failslab+0x9/0x14 [ 346.329554] kmem_cache_alloc+0x2ae/0x700 [ 346.335026] ? anon_vma_clone+0x320/0x480 [ 346.339203] anon_vma_fork+0xfc/0x4a0 [ 346.343023] ? dup_userfaultfd+0x15e/0x6c0 [ 346.347282] ? memcpy+0x46/0x50 [ 346.350579] copy_process.part.0+0x34e5/0x7a30 [ 346.355211] ? __cleanup_sighand+0x70/0x70 [ 346.359448] ? lock_downgrade+0x810/0x810 [ 346.363618] ? kasan_check_write+0x14/0x20 [ 346.367873] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 346.372734] _do_fork+0x257/0xfd0 [ 346.376360] ? fork_idle+0x1d0/0x1d0 [ 346.380087] ? fput+0x128/0x1a0 [ 346.383381] ? ksys_write+0x1f1/0x2d0 [ 346.387192] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 346.391966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 346.396742] ? do_syscall_64+0x26/0x620 [ 346.400737] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.406110] ? do_syscall_64+0x26/0x620 [ 346.410107] __x64_sys_clone+0xbf/0x150 [ 346.414108] do_syscall_64+0xfd/0x620 [ 346.417941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 346.423148] RIP: 0033:0x459879 [ 346.426356] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.445278] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 346.453017] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 346.460308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 346.467595] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 346.474881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 07:51:03 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:51:03 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x2}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:03 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) [ 346.482168] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:04 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x4}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x480501, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f00000000c0)={0x7, 0x3, {0x0, 0x0, 0x7f, 0x3, 0x3ffc000000000}}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:51:04 executing program 3 (fault-call:5 fault-nth:55): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:04 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1, 0x4, 0x1}) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x4000) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:51:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:04 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) rt_sigqueueinfo(r2, 0x3d, &(0x7f0000000140)={0x9, 0xc69, 0x1ff}) [ 346.902452] FAULT_INJECTION: forcing a failure. [ 346.902452] name failslab, interval 1, probability 0, space 0, times 0 [ 346.919675] CPU: 0 PID: 22686 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 346.927382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.936744] Call Trace: [ 346.936780] dump_stack+0x172/0x1f0 [ 346.936802] should_fail.cold+0xa/0x1b [ 346.936819] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 346.936833] ? lock_downgrade+0x810/0x810 [ 346.936856] __should_failslab+0x121/0x190 [ 346.936876] should_failslab+0x9/0x14 [ 346.936891] kmem_cache_alloc+0x2ae/0x700 [ 346.936906] ? anon_vma_clone+0x320/0x480 [ 346.960468] anon_vma_fork+0x1ea/0x4a0 [ 346.976582] ? dup_userfaultfd+0x15e/0x6c0 [ 346.980852] copy_process.part.0+0x34e5/0x7a30 [ 346.985493] ? __cleanup_sighand+0x70/0x70 [ 346.989746] ? lock_downgrade+0x810/0x810 [ 346.993921] ? kasan_check_write+0x14/0x20 [ 346.998178] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 347.003046] _do_fork+0x257/0xfd0 [ 347.006521] ? fork_idle+0x1d0/0x1d0 [ 347.010245] ? fput+0x128/0x1a0 [ 347.010263] ? ksys_write+0x1f1/0x2d0 [ 347.010282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 347.010299] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 347.026960] ? do_syscall_64+0x26/0x620 [ 347.030973] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.036353] ? do_syscall_64+0x26/0x620 [ 347.036371] __x64_sys_clone+0xbf/0x150 [ 347.036390] do_syscall_64+0xfd/0x620 [ 347.036406] entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:51:04 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x7}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 347.036416] RIP: 0033:0x459879 [ 347.036431] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.056522] RSP: 002b:00007f4ba8fffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 347.056540] RAX: ffffffffffffffda RBX: 00007f4ba8fffc90 RCX: 0000000000459879 [ 347.056549] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 347.056555] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 347.056567] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90006d4 [ 347.113432] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:04 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x1a0}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:04 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:51:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:04 executing program 3 (fault-call:5 fault-nth:56): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:04 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000000c0)={r0, &(0x7f0000000140)="bbd73f8fad843f6ae8bf1f848de87bc81f0540373b9424aea778b04e1d71d3990c3d370243e93c21667558d6d3b5abaa2bca9ead65659536916615e508e722a8d9ff9c715037fe85aeabb12a97ffb108c8c987c45a01b1f00ac44524490283d567b2e94d86f06a3f0887a2f808e824a748", &(0x7f0000000240)=""/97}, 0x18) tkill(r2, 0x1000000000014) init_module(&(0x7f00000001c0)='}vboxnet0\x00', 0xa, &(0x7f00000002c0)='}\x00') close(r1) 07:51:04 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x20000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000140)={0x1, 0x93c, &(0x7f00000000c0)="e8dbee8ed9cb9bd5462befcea376e30df42f8250f80f4f07d59f0fb76031845e988aab1c90c642411697f9eaea4a9ca1d41984d20d4d48b67da650001a4c238604622a0f857655d1136e7ea4ec62145328f8b7ee5c9acb01f0206fb5ce5ccda8288a4a5bd7f726e3cd51d5ef", &(0x7f0000000380)="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", 0x6c, 0x1000}) 07:51:04 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x700}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 347.424093] FAULT_INJECTION: forcing a failure. [ 347.424093] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.451622] CPU: 1 PID: 22815 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 347.458693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.468054] Call Trace: [ 347.468083] dump_stack+0x172/0x1f0 [ 347.468103] should_fail.cold+0xa/0x1b [ 347.478211] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 347.483343] ? __might_sleep+0x95/0x190 [ 347.487348] __alloc_pages_nodemask+0x1ee/0x750 [ 347.492047] ? __alloc_pages_slowpath+0x2870/0x2870 [ 347.497090] ? save_stack+0x45/0xd0 [ 347.500823] ? kasan_kmalloc+0xce/0xf0 [ 347.504731] ? kasan_slab_alloc+0xf/0x20 [ 347.508841] ? __lock_acquire+0x6ee/0x49c0 [ 347.513104] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 347.518672] alloc_pages_current+0x107/0x210 [ 347.523108] pte_alloc_one+0x1b/0x1a0 [ 347.526929] copy_huge_pmd+0x7d/0x620 [ 347.530749] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.536297] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 347.541859] copy_page_range+0x7a1/0x1f90 [ 347.546011] ? anon_vma_fork+0x371/0x4a0 [ 347.550076] ? find_held_lock+0x35/0x130 [ 347.554152] ? anon_vma_fork+0x371/0x4a0 [ 347.558239] ? vma_compute_subtree_gap+0x158/0x230 [ 347.563287] ? vma_gap_callbacks_rotate+0x62/0x80 [ 347.568155] ? pmd_alloc+0x180/0x180 [ 347.571887] ? __vma_link_rb+0x279/0x370 [ 347.575972] copy_process.part.0+0x543d/0x7a30 [ 347.580607] ? __cleanup_sighand+0x70/0x70 [ 347.584860] ? lock_downgrade+0x810/0x810 [ 347.589032] ? kasan_check_write+0x14/0x20 [ 347.593280] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 347.598139] _do_fork+0x257/0xfd0 [ 347.601604] ? fork_idle+0x1d0/0x1d0 [ 347.605328] ? fput+0x128/0x1a0 [ 347.608616] ? ksys_write+0x1f1/0x2d0 [ 347.612475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 347.617241] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 347.622022] ? do_syscall_64+0x26/0x620 [ 347.626023] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.631410] ? do_syscall_64+0x26/0x620 [ 347.635403] __x64_sys_clone+0xbf/0x150 [ 347.639396] do_syscall_64+0xfd/0x620 [ 347.643208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 347.648411] RIP: 0033:0x459879 [ 347.651615] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:51:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 07:51:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 07:51:05 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x4000}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 347.670532] RSP: 002b:00007f4ba9041c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 347.678268] RAX: ffffffffffffffda RBX: 00007f4ba9041c90 RCX: 0000000000459879 [ 347.685554] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 347.692851] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 347.700142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90426d4 [ 347.710133] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:05 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)=0x0) timer_settime(r3, 0x3, &(0x7f0000000140)={{0x0, 0x989680}}, 0x0) tkill(r2, 0x1000000000014) close(r1) 07:51:05 executing program 3 (fault-call:5 fault-nth:57): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:05 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) r2 = dup2(r1, r0) ioctl$KVM_GET_DEBUGREGS(r2, 0x8080aea1, &(0x7f00000000c0)) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:51:05 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x40000}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:05 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 07:51:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 348.089152] FAULT_INJECTION: forcing a failure. [ 348.089152] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 348.134247] CPU: 1 PID: 22957 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 348.142013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.151380] Call Trace: [ 348.153989] dump_stack+0x172/0x1f0 [ 348.157646] should_fail.cold+0xa/0x1b [ 348.161574] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 348.166718] ? __might_sleep+0x95/0x190 [ 348.170711] __alloc_pages_nodemask+0x1ee/0x750 [ 348.175392] ? __alloc_pages_slowpath+0x2870/0x2870 [ 348.180416] ? save_stack+0x45/0xd0 [ 348.184070] ? kasan_kmalloc+0xce/0xf0 [ 348.187961] ? kasan_slab_alloc+0xf/0x20 [ 348.192033] ? __lock_acquire+0x6ee/0x49c0 [ 348.196284] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 348.201842] alloc_pages_current+0x107/0x210 [ 348.206265] pte_alloc_one+0x1b/0x1a0 [ 348.210082] copy_huge_pmd+0x7d/0x620 [ 348.213899] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 348.219444] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 348.225001] copy_page_range+0x7a1/0x1f90 [ 348.229157] ? anon_vma_fork+0x371/0x4a0 [ 348.233230] ? find_held_lock+0x35/0x130 [ 348.237301] ? anon_vma_fork+0x371/0x4a0 [ 348.241385] ? vma_compute_subtree_gap+0x158/0x230 [ 348.246327] ? vma_gap_callbacks_rotate+0x62/0x80 [ 348.251184] ? pmd_alloc+0x180/0x180 [ 348.254908] ? __vma_link_rb+0x279/0x370 [ 348.258989] copy_process.part.0+0x543d/0x7a30 [ 348.263638] ? __cleanup_sighand+0x70/0x70 [ 348.267900] ? lock_downgrade+0x810/0x810 [ 348.272080] ? kasan_check_write+0x14/0x20 [ 348.276337] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 348.281210] _do_fork+0x257/0xfd0 [ 348.285640] ? fork_idle+0x1d0/0x1d0 [ 348.289374] ? fput+0x128/0x1a0 [ 348.292686] ? ksys_write+0x1f1/0x2d0 [ 348.296508] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 348.301272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 348.306034] ? do_syscall_64+0x26/0x620 [ 348.310379] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.315750] ? do_syscall_64+0x26/0x620 [ 348.319738] __x64_sys_clone+0xbf/0x150 [ 348.323727] do_syscall_64+0xfd/0x620 [ 348.327554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.332750] RIP: 0033:0x459879 [ 348.335967] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.354878] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 348.362599] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 348.369869] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 348.377142] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:51:05 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x6b6b6b}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 348.384437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 348.391722] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:06 executing program 3 (fault-call:5 fault-nth:58): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:06 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) ioctl$RTC_PIE_ON(r2, 0x7005) 07:51:06 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x1000000}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 348.664562] FAULT_INJECTION: forcing a failure. [ 348.664562] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 348.683683] CPU: 0 PID: 23083 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 348.690753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.700130] Call Trace: [ 348.702747] dump_stack+0x172/0x1f0 [ 348.706405] should_fail.cold+0xa/0x1b [ 348.710330] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 348.715463] ? __might_sleep+0x95/0x190 [ 348.719467] __alloc_pages_nodemask+0x1ee/0x750 [ 348.724156] ? copy_huge_pmd+0x415/0x620 [ 348.728243] ? __alloc_pages_slowpath+0x2870/0x2870 [ 348.733286] ? lock_downgrade+0x810/0x810 [ 348.737450] ? pmd_pfn+0x12e/0x1d0 [ 348.741020] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 348.746594] alloc_pages_current+0x107/0x210 [ 348.751033] pte_alloc_one+0x1b/0x1a0 [ 348.754854] __pte_alloc+0x2a/0x360 [ 348.758508] copy_page_range+0x151f/0x1f90 [ 348.762767] ? anon_vma_fork+0x371/0x4a0 [ 348.767413] ? find_held_lock+0x35/0x130 [ 348.771501] ? anon_vma_fork+0x371/0x4a0 [ 348.775593] ? vma_compute_subtree_gap+0x158/0x230 [ 348.780551] ? vma_gap_callbacks_rotate+0x62/0x80 [ 348.785597] ? pmd_alloc+0x180/0x180 [ 348.789326] ? __vma_link_rb+0x279/0x370 [ 348.793414] copy_process.part.0+0x543d/0x7a30 [ 348.798065] ? __cleanup_sighand+0x70/0x70 [ 348.802327] ? lock_downgrade+0x810/0x810 [ 348.806505] ? kasan_check_write+0x14/0x20 [ 348.806528] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 348.816138] _do_fork+0x257/0xfd0 [ 348.816159] ? fork_idle+0x1d0/0x1d0 [ 348.816172] ? fput+0x128/0x1a0 [ 348.816187] ? ksys_write+0x1f1/0x2d0 [ 348.816207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 348.816220] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 348.816232] ? do_syscall_64+0x26/0x620 [ 348.816248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.816262] ? do_syscall_64+0x26/0x620 [ 348.816278] __x64_sys_clone+0xbf/0x150 [ 348.816293] do_syscall_64+0xfd/0x620 [ 348.816311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 348.867347] RIP: 0033:0x459879 [ 348.870527] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.889774] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 348.897565] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 348.904978] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 348.912257] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 348.919536] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 348.926801] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:08 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x10000000000025, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000014) close(r1) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f00000001c0)=""/51) 07:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:08 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) ioctl$RTC_PIE_ON(r2, 0x7005) 07:51:08 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x2000000}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x101241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000540)={'v\x7ft\xa0\xfb\x1a@\xef_tj\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5, 0x6}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x1, 0x800) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x3, &(0x7f00000001c0)=[{0x7, 0x7, 0x2, 0x3ff}, {0x3, 0x3, 0x8000, 0x5}, {0x800, 0x200, 0x400, 0x1000}]}) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000300)=0x4, &(0x7f0000000380)=0x1) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f00000003c0)={0x0, 0x1000}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000440)={r4, @in={{0x2, 0x4e23, @broadcast}}, 0x9, 0x9, 0x8, 0x4, 0x7f}, &(0x7f0000000500)=0x98) 07:51:08 executing program 3 (fault-call:5 fault-nth:59): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 350.981652] FAULT_INJECTION: forcing a failure. [ 350.981652] name failslab, interval 1, probability 0, space 0, times 0 [ 351.010073] CPU: 1 PID: 23103 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 351.017146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.017153] Call Trace: [ 351.017184] dump_stack+0x172/0x1f0 [ 351.017205] should_fail.cold+0xa/0x1b [ 351.017223] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 351.017237] ? lock_downgrade+0x810/0x810 [ 351.017259] __should_failslab+0x121/0x190 [ 351.050229] should_failslab+0x9/0x14 [ 351.054068] kmem_cache_alloc+0x2ae/0x700 [ 351.058229] ? pmd_pfn+0x12e/0x1d0 [ 351.061796] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 351.067353] ptlock_alloc+0x20/0x70 [ 351.070999] pte_alloc_one+0x6d/0x1a0 [ 351.074815] __pte_alloc+0x2a/0x360 [ 351.078554] copy_page_range+0x151f/0x1f90 [ 351.082800] ? anon_vma_fork+0x371/0x4a0 [ 351.086883] ? find_held_lock+0x35/0x130 [ 351.090957] ? anon_vma_fork+0x371/0x4a0 [ 351.095057] ? vma_compute_subtree_gap+0x158/0x230 [ 351.100005] ? vma_gap_callbacks_rotate+0x62/0x80 [ 351.104863] ? pmd_alloc+0x180/0x180 [ 351.108588] ? __vma_link_rb+0x279/0x370 [ 351.112670] copy_process.part.0+0x543d/0x7a30 [ 351.117300] ? __cleanup_sighand+0x70/0x70 [ 351.121541] ? lock_downgrade+0x810/0x810 [ 351.125711] ? kasan_check_write+0x14/0x20 [ 351.129962] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 351.134827] _do_fork+0x257/0xfd0 [ 351.138328] ? fork_idle+0x1d0/0x1d0 [ 351.142084] ? fput+0x128/0x1a0 [ 351.145387] ? ksys_write+0x1f1/0x2d0 [ 351.149209] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 351.153989] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 351.158760] ? do_syscall_64+0x26/0x620 [ 351.162743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.168116] ? do_syscall_64+0x26/0x620 [ 351.172099] __x64_sys_clone+0xbf/0x150 [ 351.176110] do_syscall_64+0xfd/0x620 [ 351.179920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.185205] RIP: 0033:0x459879 [ 351.188405] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.207323] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 351.215222] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 351.222508] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 07:51:08 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$x25(r1, &(0x7f00000000c0)={0x9, @null=' \x00'}, 0x12) fcntl$lock(r0, 0x10000000000025, &(0x7f0000000040)={0x1}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000180)={0x1f, 0x5, 0xeb0, 0x0, 0xb3}) fcntl$lock(r0, 0x26, &(0x7f0000000000)) r2 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) timer_settime(r3, 0x0, &(0x7f00000003c0)={{0x0, 0x989680}, {0x77359400}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000140)={'veth0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) tkill(r2, 0x1000000000014) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x9c, r4, 0x800, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x24, 0x9}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x22}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x48}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x87d}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x41}, 0x80) close(r1) 07:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 351.229786] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 351.237060] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 351.244338] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 07:51:08 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x4000000}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) 07:51:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x200c, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) 07:51:08 executing program 3 (fault-call:5 fault-nth:60): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x68, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 07:51:08 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) ioctl$RTC_PIE_ON(r2, 0x7005) 07:51:08 executing program 4: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000005700)={0x0, 0x31, 0x0, 0x0, 0xfffffffffffffffd, 0x66d2f5089ed8fde5, 0x7000000}, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000001000000010000000300000003000000"], 0x18}, 0x0) [ 351.518127] FAULT_INJECTION: forcing a failure. [ 351.518127] name failslab, interval 1, probability 0, space 0, times 0 [ 351.546216] CPU: 1 PID: 23265 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 351.553296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.562666] Call Trace: [ 351.565292] dump_stack+0x172/0x1f0 [ 351.568947] should_fail.cold+0xa/0x1b [ 351.572867] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 351.577999] ? lock_downgrade+0x810/0x810 [ 351.582183] __should_failslab+0x121/0x190 [ 351.586540] should_failslab+0x9/0x14 [ 351.590366] kmem_cache_alloc+0x2ae/0x700 [ 351.594540] ? pmd_alloc+0x180/0x180 [ 351.598273] vm_area_dup+0x21/0x170 [ 351.601923] copy_process.part.0+0x3407/0x7a30 [ 351.606552] ? __cleanup_sighand+0x70/0x70 [ 351.610890] ? lock_downgrade+0x810/0x810 [ 351.615071] ? kasan_check_write+0x14/0x20 [ 351.619485] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 351.624378] _do_fork+0x257/0xfd0 [ 351.627865] ? fork_idle+0x1d0/0x1d0 [ 351.631622] ? fput+0x128/0x1a0 [ 351.634916] ? ksys_write+0x1f1/0x2d0 [ 351.638733] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 351.643507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 351.648285] ? do_syscall_64+0x26/0x620 [ 351.652278] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.657663] ? do_syscall_64+0x26/0x620 [ 351.661660] __x64_sys_clone+0xbf/0x150 07:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0xf, r2, 0x414538d65c52980d, 0x0, 0x0, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x0, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) [ 351.665654] do_syscall_64+0xfd/0x620 [ 351.669480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 351.674681] RIP: 0033:0x459879 [ 351.677891] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.696813] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 351.696828] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 07:51:09 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x204200) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x1654c8c7, 0x4) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r1, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) mremap(&(0x7f0000040000/0x3000)=nil, 0x3000, 0x3000, 0x0, &(0x7f00006ac000/0x3000)=nil) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x20000357) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) ioctl$RTC_PIE_ON(r2, 0x7005) 07:51:09 executing program 3 (fault-call:5 fault-nth:61): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0xfebfe000) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:51:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') readlinkat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/255, 0xff) sendto$inet6(r1, &(0x7f0000000380)="f0c817e6bad03342d93dbafb079ed427d882601a62053fe0c556ea22a3e45920a4717016ca82d26886336215b0d1652bd0561c8a1e94652883a3134e525601225be9066738145c427958c78b3c1ceb08782ff5a2d6b216bef87c1aef359686f8aa72cfb3565b32aa2f701ebc87cd30447a64d379e651adafe0321cfb1383c1c2982ac81def9a749c2f7d9b08b06f37800ec658dcc9d1cd39d4c14a5a56d2a01c", 0xa0, 0x81, &(0x7f00000002c0)={0xa, 0x4e21, 0x6, @mcast1, 0x1000}, 0x1c) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000280)={'veth1_to_team\x00', 0x400}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) readlinkat(r1, &(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=""/35, 0x23) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000340)={0x1, &(0x7f0000000240)=[{0x5}]}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00D\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = getpgrp(0xffffffffffffffff) ioprio_get$pid(0x3, r3) [ 351.696835] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 351.696842] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 351.696850] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 351.696857] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 351.885773] FAULT_INJECTION: forcing a failure. [ 351.885773] name failslab, interval 1, probability 0, space 0, times 0 [ 351.913831] CPU: 0 PID: 23354 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 351.920902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.920909] Call Trace: [ 351.920937] dump_stack+0x172/0x1f0 [ 351.920959] should_fail.cold+0xa/0x1b [ 351.940449] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 351.945645] ? lock_downgrade+0x810/0x810 [ 351.950031] __should_failslab+0x121/0x190 [ 351.954384] should_failslab+0x9/0x14 [ 351.958217] kmem_cache_alloc_trace+0x2cc/0x760 [ 351.963096] ? __init_cache_modes+0x260/0x260 [ 351.967637] ? follow_phys+0x276/0x360 [ 351.971559] reserve_memtype+0x1e1/0x880 [ 351.975767] ? pat_init+0x4b0/0x4b0 [ 351.979439] ? __init_cache_modes+0x260/0x260 [ 351.983968] ? do_raw_spin_unlock+0x57/0x270 [ 351.993624] reserve_pfn_range+0x1b3/0x500 [ 351.997885] ? arch_io_reserve_memtype_wc+0xa0/0xa0 [ 352.002920] ? save_stack+0x45/0xd0 [ 352.006567] ? kasan_slab_alloc+0xf/0x20 [ 352.010652] ? kmem_cache_alloc+0x12e/0x700 [ 352.014974] ? vm_area_dup+0x21/0x170 [ 352.014985] ? copy_process.part.0+0x3407/0x7a30 [ 352.014995] ? _do_fork+0x257/0xfd0 [ 352.015007] ? __x64_sys_clone+0xbf/0x150 [ 352.015026] track_pfn_copy+0x196/0x1e0 [ 352.015040] ? reserve_pfn_range+0x500/0x500 [ 352.015058] ? get_mem_cgroup_from_mm+0x139/0x320 [ 352.015084] copy_page_range+0x15f6/0x1f90 [ 352.050611] ? copy_process.part.0+0x30f9/0x7a30 [ 352.055402] ? find_held_lock+0x35/0x130 [ 352.059492] ? vma_compute_subtree_gap+0x158/0x230 [ 352.064445] ? vma_gap_callbacks_rotate+0x62/0x80 [ 352.069394] ? pmd_alloc+0x180/0x180 [ 352.073103] ? __vma_link_rb+0x279/0x370 [ 352.077199] copy_process.part.0+0x543d/0x7a30 [ 352.081866] ? __cleanup_sighand+0x70/0x70 [ 352.086122] ? lock_downgrade+0x810/0x810 [ 352.090281] ? kasan_check_write+0x14/0x20 [ 352.094517] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 352.099355] _do_fork+0x257/0xfd0 [ 352.102808] ? fork_idle+0x1d0/0x1d0 [ 352.106519] ? fput+0x128/0x1a0 [ 352.109801] ? ksys_write+0x1f1/0x2d0 [ 352.113599] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 352.118353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 352.123104] ? do_syscall_64+0x26/0x620 [ 352.127068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.132432] ? do_syscall_64+0x26/0x620 [ 352.136398] __x64_sys_clone+0xbf/0x150 [ 352.140377] do_syscall_64+0xfd/0x620 [ 352.144178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.149371] RIP: 0033:0x459879 [ 352.152878] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.172758] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 352.180468] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 352.187832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 352.195107] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 352.202375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 352.209634] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 352.224357] WARNING: CPU: 1 PID: 23354 at arch/x86/mm/pat.c:1064 untrack_pfn+0x25c/0x2a0 [ 352.232708] Kernel panic - not syncing: panic_on_warn set ... [ 352.232708] [ 352.240062] CPU: 1 PID: 23354 Comm: syz-executor.3 Not tainted 4.19.69 #43 [ 352.247072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.256419] Call Trace: [ 352.259058] dump_stack+0x172/0x1f0 [ 352.262676] panic+0x263/0x507 [ 352.265981] ? __warn_printk+0xf3/0xf3 [ 352.269930] ? untrack_pfn+0x25c/0x2a0 [ 352.273840] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 352.279401] ? __warn.cold+0x5/0x4a [ 352.283035] ? untrack_pfn+0x25c/0x2a0 [ 352.286922] __warn.cold+0x20/0x4a [ 352.290449] ? untrack_pfn+0x25c/0x2a0 [ 352.294324] report_bug+0x263/0x2b0 [ 352.298002] do_error_trap+0x204/0x360 [ 352.301903] ? math_error+0x340/0x340 [ 352.305714] ? kasan_check_read+0x11/0x20 [ 352.309883] ? do_raw_spin_unlock+0x57/0x270 [ 352.314280] ? error_entry+0x7c/0xe0 [ 352.317982] ? trace_hardirqs_off_caller+0x65/0x220 [ 352.323000] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.327829] do_invalid_op+0x1b/0x20 [ 352.331529] invalid_op+0x14/0x20 [ 352.334966] RIP: 0010:untrack_pfn+0x25c/0x2a0 [ 352.339446] Code: 00 00 00 00 48 8b 45 d0 65 48 33 04 25 28 00 00 00 75 28 48 81 c4 88 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 74 9b 3a 00 <0f> 0b eb b3 48 89 df e8 e8 2e 71 00 e9 b0 fe ff ff e8 5e 20 0e 00 [ 352.359287] RSP: 0018:ffff888060b8f8a0 EFLAGS: 00010246 [ 352.364635] RAX: 0000000000040000 RBX: ffff8880805e6250 RCX: ffffc9000c4ba000 [ 352.371901] RDX: 0000000000040000 RSI: ffffffff8130b9dc RDI: 0000000000000005 [ 352.379154] RBP: ffff888060b8f950 R08: ffff888095e2c380 R09: ffffed1013686ba3 [ 352.386408] R10: ffffed1013686ba2 R11: ffff88809b435d13 R12: 1ffff1100c171f15 [ 352.393661] R13: 00000000ffffffea R14: 0000000000000000 R15: ffff888060b8f928 [ 352.400929] ? untrack_pfn+0x25c/0x2a0 [ 352.404808] ? track_pfn_insert+0x180/0x180 [ 352.409114] ? vm_normal_page_pmd+0x400/0x400 [ 352.413594] ? kasan_check_read+0x11/0x20 [ 352.417740] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 352.423261] ? uprobe_munmap+0xad/0x2b0 [ 352.427222] unmap_single_vma+0x1c2/0x300 [ 352.431358] unmap_vmas+0xae/0x180 [ 352.434889] exit_mmap+0x2c2/0x530 [ 352.438415] ? __ia32_sys_munmap+0x80/0x80 [ 352.442672] ? __khugepaged_exit+0x2da/0x400 [ 352.447063] ? rcu_read_lock_sched_held+0x110/0x130 [ 352.452068] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 352.457592] ? __khugepaged_exit+0xcf/0x400 [ 352.461913] mmput+0x15f/0x4c0 [ 352.465092] copy_process.part.0+0x5aaf/0x7a30 [ 352.469672] ? __cleanup_sighand+0x70/0x70 [ 352.473890] ? lock_downgrade+0x810/0x810 [ 352.478028] ? kasan_check_write+0x14/0x20 [ 352.482252] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 352.487168] _do_fork+0x257/0xfd0 [ 352.490619] ? fork_idle+0x1d0/0x1d0 [ 352.494317] ? fput+0x128/0x1a0 [ 352.497581] ? ksys_write+0x1f1/0x2d0 [ 352.501384] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 352.506136] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 352.510878] ? do_syscall_64+0x26/0x620 [ 352.514837] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.520195] ? do_syscall_64+0x26/0x620 [ 352.524159] __x64_sys_clone+0xbf/0x150 [ 352.528122] do_syscall_64+0xfd/0x620 [ 352.531910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 352.537084] RIP: 0033:0x459879 [ 352.540272] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.559161] RSP: 002b:00007f4ba9062c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 352.566862] RAX: ffffffffffffffda RBX: 00007f4ba9062c90 RCX: 0000000000459879 [ 352.574116] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 352.581369] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 352.588794] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ba90636d4 [ 352.596058] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000004 [ 352.605077] Kernel Offset: disabled [ 352.608741] Rebooting in 86400 seconds..