for_load_8+0x10/0x20 [ 304.012704] ? memcg_kmem_charge+0x79d/0xac0 [ 304.017130] kmsan_alloc_page+0x80/0xe0 [ 304.021127] __alloc_pages_nodemask+0x105b/0x6320 [ 304.025986] ? kmsan_set_origin_inline+0x6b/0x120 [ 304.030849] ? kmsan_set_origin_inline+0x6b/0x120 [ 304.035707] ? __msan_poison_alloca+0x183/0x220 [ 304.040453] ? _cond_resched+0x4c/0x100 [ 304.044447] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 304.049840] alloc_pages_current+0x6b1/0x970 [ 304.054280] pipe_write+0x7f0/0x1d30 [ 304.058043] ? pipe_read+0x1330/0x1330 [ 304.062293] __vfs_write+0x87e/0xb90 [ 304.066042] vfs_write+0x467/0x8c0 [ 304.069612] __x64_sys_write+0x1cf/0x400 [ 304.073694] ? ksys_write+0x380/0x380 [ 304.077502] do_syscall_64+0x15b/0x230 [ 304.081409] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 304.086610] RIP: 0033:0x455ab9 [ 304.089793] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.109131] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:03:39 executing program 2 (fault-call:3 fault-nth:0): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 304.117046] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 304.124331] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 304.131616] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 304.138882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 304.146162] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000a [ 304.159191] FAULT_INJECTION: forcing a failure. [ 304.159191] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 304.171575] CPU: 0 PID: 13728 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 304.178886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.188272] Call Trace: [ 304.190915] dump_stack+0x185/0x1e0 [ 304.194586] should_fail+0x8a7/0xae0 [ 304.198341] __alloc_pages_nodemask+0x622/0x6320 [ 304.203138] ? kmsan_set_origin_inline+0x6b/0x120 [ 304.208032] ? kmsan_set_origin_inline+0x6b/0x120 [ 304.212914] ? __msan_poison_alloca+0x183/0x220 [ 304.217640] ? _cond_resched+0x4c/0x100 [ 304.221650] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 304.227073] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 304.232584] alloc_pages_current+0x6b1/0x970 [ 304.237049] pipe_write+0x7f0/0x1d30 [ 304.240886] ? pipe_read+0x1330/0x1330 [ 304.244849] __vfs_write+0x87e/0xb90 [ 304.248639] vfs_write+0x467/0x8c0 [ 304.252251] __x64_sys_write+0x1cf/0x400 [ 304.256372] ? ksys_write+0x380/0x380 [ 304.260232] do_syscall_64+0x15b/0x230 [ 304.264164] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 304.269385] RIP: 0033:0x455ab9 [ 304.272584] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.291955] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 304.300114] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 304.307423] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 304.314753] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 304.322072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 304.329377] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000000 14:03:39 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000040)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) pipe2(&(0x7f0000000280), 0x80000) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f00000001c0)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000200)={r1}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r0, r0) 14:03:39 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r1, r0) 14:03:39 executing program 6 (fault-call:3 fault-nth:11): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:39 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r1 = shmget(0x3, 0x1000, 0x54000000, &(0x7f0000013000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000380)=""/4096) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000080)='./control\x00', 0x8000000000000000) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:03:39 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') ioctl$RTC_PIE_OFF(r2, 0x7006) 14:03:39 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000100)) r1 = socket$key(0xf, 0x3, 0x2) r2 = dup2(0xffffffffffffff9c, r1) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f00000001c0)={{&(0x7f0000000000)=""/166, 0xa6}, &(0x7f0000000140), 0x1a}, 0x20) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="020300030c000000ff0000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458185a32247aa5081e70e770e46fe8b9000200010000000000000006fc6bd80000030005000000000002000900000000000000000000000000"], 0x60}, 0x1}, 0x0) 14:03:39 executing program 2 (fault-call:3 fault-nth:1): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 304.653361] FAULT_INJECTION: forcing a failure. [ 304.653361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 304.665219] CPU: 0 PID: 13757 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 304.672498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.681862] Call Trace: [ 304.684464] dump_stack+0x185/0x1e0 [ 304.688109] should_fail+0x8a7/0xae0 [ 304.691849] __alloc_pages_nodemask+0x622/0x6320 [ 304.696629] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 304.702092] ? get_page_from_freelist+0xb01f/0xbb50 [ 304.707128] ? __save_stack_trace+0xa45/0xca0 [ 304.711655] ? memcg_kmem_charge+0x5f8/0xac0 [ 304.716084] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 304.721904] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 304.727890] ? __alloc_pages_nodemask+0x105b/0x6320 [ 304.732947] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 304.734119] FAULT_INJECTION: forcing a failure. [ 304.734119] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 304.738329] ? vmalloc_to_page+0x50b/0x630 [ 304.754343] ? kmsan_set_origin_inline+0x6b/0x120 [ 304.759202] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 304.764566] ? memcg_kmem_charge+0x79d/0xac0 [ 304.769323] kmsan_alloc_page+0x80/0xe0 [ 304.773295] __alloc_pages_nodemask+0x105b/0x6320 [ 304.778133] ? kmsan_set_origin_inline+0x6b/0x120 [ 304.783063] ? kmsan_set_origin_inline+0x6b/0x120 [ 304.787910] ? __msan_poison_alloca+0x183/0x220 [ 304.792568] ? _cond_resched+0x4c/0x100 [ 304.796542] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 304.801911] alloc_pages_current+0x6b1/0x970 [ 304.806320] pipe_write+0x7f0/0x1d30 [ 304.810049] ? pipe_read+0x1330/0x1330 [ 304.813926] __vfs_write+0x87e/0xb90 [ 304.817648] vfs_write+0x467/0x8c0 [ 304.821191] __x64_sys_write+0x1cf/0x400 [ 304.825249] ? ksys_write+0x380/0x380 [ 304.829044] do_syscall_64+0x15b/0x230 [ 304.832929] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 304.838108] RIP: 0033:0x455ab9 [ 304.841282] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.860566] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 304.868263] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 304.875543] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 304.882801] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 304.890056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 304.897317] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000b [ 304.904593] CPU: 1 PID: 13765 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 304.911871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.921399] Call Trace: [ 304.924001] dump_stack+0x185/0x1e0 [ 304.927653] should_fail+0x8a7/0xae0 [ 304.931386] __alloc_pages_nodemask+0x622/0x6320 [ 304.936165] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 304.941625] ? get_page_from_freelist+0xb01f/0xbb50 [ 304.946654] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 304.952380] ? memcg_kmem_charge+0x5f8/0xac0 [ 304.956791] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 304.962523] ? vmalloc_to_page+0x50b/0x630 [ 304.966775] ? kmsan_set_origin_inline+0x6b/0x120 [ 304.971640] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 304.977020] ? memcg_kmem_charge+0x79d/0xac0 [ 304.981444] kmsan_alloc_page+0x80/0xe0 [ 304.985435] __alloc_pages_nodemask+0x105b/0x6320 [ 304.990287] ? kmsan_set_origin_inline+0x6b/0x120 [ 304.995146] ? kmsan_set_origin_inline+0x6b/0x120 [ 305.000007] ? __msan_poison_alloca+0x183/0x220 14:03:40 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x3f, 0x1ff, 0x9}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r2, 0x2}, 0x8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) mlock2(&(0x7f0000013000/0x3000)=nil, 0x3000, 0x1) [ 305.004684] ? _cond_resched+0x4c/0x100 [ 305.008679] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 305.014082] alloc_pages_current+0x6b1/0x970 [ 305.018511] pipe_write+0x7f0/0x1d30 [ 305.022266] ? pipe_read+0x1330/0x1330 [ 305.026164] __vfs_write+0x87e/0xb90 [ 305.029905] vfs_write+0x467/0x8c0 [ 305.033469] __x64_sys_write+0x1cf/0x400 [ 305.037554] ? ksys_write+0x380/0x380 [ 305.041361] do_syscall_64+0x15b/0x230 [ 305.045267] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.050464] RIP: 0033:0x455ab9 [ 305.053656] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.072991] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 305.080722] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 305.088020] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 305.095298] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 305.102586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 305.109868] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000001 14:03:40 executing program 2 (fault-call:3 fault-nth:2): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:40 executing program 6 (fault-call:3 fault-nth:12): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0, @ANYRES64=r0, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESDEC=r0, @ANYPTR64, @ANYPTR64, @ANYPTR64, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRES16=r0, @ANYRES64=0x0, @ANYRES32=r0], @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX=r0, @ANYRESDEC=r0]], @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYRESDEC=r0, @ANYBLOB="7dd3a0650e25f40bcf70685a13339b780d09dd5668d61e1c10e0083e70027cdb80a29b5f6365f208152cb810507b9a95aad69fb52fdbc69378dacd7777e36bc9808e4e7f2558692016b75ab506ad3c4c06d8efadbfb16749622be01f02f8f0e0cef12ccadb97cc0ed5d941b7ac6c61a0bfc3661d95f8f93352678da4325174e6f00583ac620f6698fdd4e457d45519ab928741b4008eaef0f474e602f762eb338bc4d242fef6e836e9ee619c185fa22eb3301b476996f3d43cc14d55810a762bacb047e5d04b31d90796dfc81dd496cce9141244", @ANYBLOB="eb259e222956b00f03688c6359050523a446f5a778494dfb73f88f70018e1dc24f1a93f6a0d51eda47734c1fbf0bf9ef9757a25c029054efe2b4", @ANYRES32=r0, @ANYPTR64, @ANYRES16=r0, @ANYRES16, @ANYRESHEX=r0], @ANYRES16=0x0, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESHEX=0x0, @ANYRES32, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYPTR, @ANYRESOCT=r0, @ANYBLOB="3fa02926404b383ac56a259c6ab10c0c70f77fdb0637c644d1d3ec43cef7ef6f753b41da4c1b343d42438af990d18655cb72577c32d4954d5cd7"], @ANYRES32=r0, @ANYBLOB="ce02e81d6db612223cd981731c8e0d10177be086d52df2879f7ebc80ef7e2c643e1deee72bda62344b6df120d06f8612996c65bc30d5a482bccf3cd94737d1a003b84d1773e436b10bfc40b601f01a95af2a886f5c14", @ANYRESDEC=r0, @ANYRESHEX=r0], @ANYRESHEX=r0], 0x2c}, 0x1}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f0000000140)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000040)={0x0, 0xffffffffffff0001, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'gre0\x00'}) [ 305.241897] FAULT_INJECTION: forcing a failure. [ 305.241897] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 305.253767] CPU: 1 PID: 13779 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 305.261052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.270419] Call Trace: [ 305.273035] dump_stack+0x185/0x1e0 [ 305.276691] should_fail+0x8a7/0xae0 [ 305.280436] __alloc_pages_nodemask+0x622/0x6320 [ 305.285255] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:03:40 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000000c0)=""/112) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) [ 305.290730] ? get_page_from_freelist+0xb01f/0xbb50 [ 305.295781] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.301201] ? memcg_kmem_charge+0x5f8/0xac0 [ 305.305643] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 305.311477] ? vmalloc_to_page+0x50b/0x630 [ 305.315738] ? kmsan_set_origin_inline+0x6b/0x120 [ 305.320626] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 305.326037] ? memcg_kmem_charge+0x79d/0xac0 [ 305.330484] kmsan_alloc_page+0x80/0xe0 [ 305.330736] FAULT_INJECTION: forcing a failure. [ 305.330736] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 305.334481] __alloc_pages_nodemask+0x105b/0x6320 [ 305.334504] ? kmsan_set_origin_inline+0x6b/0x120 [ 305.334526] ? kmsan_set_origin_inline+0x6b/0x120 [ 305.334545] ? __msan_poison_alloca+0x183/0x220 [ 305.334563] ? _cond_resched+0x4c/0x100 [ 305.334591] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 305.334628] alloc_pages_current+0x6b1/0x970 [ 305.334655] pipe_write+0x7f0/0x1d30 [ 305.334703] ? pipe_read+0x1330/0x1330 [ 305.386914] __vfs_write+0x87e/0xb90 [ 305.390638] vfs_write+0x467/0x8c0 [ 305.394190] __x64_sys_write+0x1cf/0x400 [ 305.398253] ? ksys_write+0x380/0x380 [ 305.402053] do_syscall_64+0x15b/0x230 [ 305.405948] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.411128] RIP: 0033:0x455ab9 [ 305.414305] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.433567] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 305.441269] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 305.448619] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 305.455877] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 305.463140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 305.470412] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000002 [ 305.477719] CPU: 0 PID: 13784 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 305.485032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.495028] Call Trace: [ 305.497687] dump_stack+0x185/0x1e0 [ 305.501391] should_fail+0x8a7/0xae0 [ 305.505195] __alloc_pages_nodemask+0x622/0x6320 [ 305.510046] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 305.515299] ? __msan_poison_alloca+0x183/0x220 [ 305.520064] ? kmsan_set_origin_inline+0x6b/0x120 [ 305.524972] ? __msan_poison_alloca+0x183/0x220 [ 305.529722] ? _cond_resched+0x4c/0x100 [ 305.533761] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 305.539181] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 305.544692] alloc_pages_current+0x6b1/0x970 [ 305.549197] pipe_write+0x7f0/0x1d30 [ 305.553024] ? pipe_read+0x1330/0x1330 [ 305.556996] __vfs_write+0x87e/0xb90 [ 305.560782] vfs_write+0x467/0x8c0 [ 305.564413] __x64_sys_write+0x1cf/0x400 [ 305.568584] ? ksys_write+0x380/0x380 [ 305.573279] do_syscall_64+0x15b/0x230 [ 305.577229] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.582453] RIP: 0033:0x455ab9 [ 305.585651] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.605253] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 305.613018] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 305.620326] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 305.627618] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 305.634907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 305.642203] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000c 14:03:40 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340), 0x0) fcntl$setpipe(r1, 0x407, 0x80000002) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(anubis-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r4, r5+10000000}, &(0x7f0000000200)) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080), 0x2) recvmmsg(r3, &(0x7f00000071c0)=[{{0x0, 0x0, &(0x7f0000006140)=[{&(0x7f0000006000)=""/103, 0xfffffe29}, {&(0x7f0000006080)=""/160, 0xa0}], 0x2, &(0x7f00000061c0)=""/4096, 0x1000}}], 0x1500, 0x0, &(0x7f0000007380)={0x0, 0x1c9c380}) epoll_pwait(r1, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x6, 0x4, &(0x7f0000000380)={0x5}, 0x8) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000000)={0x3, r0}) fcntl$setpipe(r2, 0x407, 0xffffffff) r6 = openat(r0, &(0x7f0000000240)='./file0\x00', 0x200, 0x20) connect$l2tp(r6, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x2, 0x0, 0x1, {0xa, 0x4e22, 0x7, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xa19}}}, 0x32) dup2(r1, r0) 14:03:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b90002000100000000000000e038dfa342e2ae0b36f206fc6bd80000030005000000000002000000e000"], 0x60}, 0x1}, 0x0) 14:03:40 executing program 2 (fault-call:3 fault-nth:3): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:40 executing program 6 (fault-call:3 fault-nth:13): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:40 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) getsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:03:40 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') ioctl$RTC_PIE_OFF(r2, 0x7006) [ 305.945007] FAULT_INJECTION: forcing a failure. [ 305.945007] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 305.956878] CPU: 0 PID: 13812 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 305.964169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.973539] Call Trace: [ 305.976145] dump_stack+0x185/0x1e0 [ 305.979836] should_fail+0x8a7/0xae0 [ 305.983581] __alloc_pages_nodemask+0x622/0x6320 [ 305.988369] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 305.993841] ? get_page_from_freelist+0xb01f/0xbb50 [ 305.998884] ? __save_stack_trace+0xa45/0xca0 [ 306.003426] ? memcg_kmem_charge+0x5f8/0xac0 [ 306.007858] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 306.010851] FAULT_INJECTION: forcing a failure. [ 306.010851] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 306.013592] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 306.013614] ? __alloc_pages_nodemask+0x105b/0x6320 [ 306.013640] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 306.013659] ? vmalloc_to_page+0x50b/0x630 [ 306.013684] ? kmsan_set_origin_inline+0x6b/0x120 [ 306.013715] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 306.013734] ? memcg_kmem_charge+0x79d/0xac0 [ 306.013756] kmsan_alloc_page+0x80/0xe0 [ 306.013795] __alloc_pages_nodemask+0x105b/0x6320 [ 306.069506] ? kmsan_set_origin_inline+0x6b/0x120 [ 306.074348] ? kmsan_set_origin_inline+0x6b/0x120 [ 306.079186] ? __msan_poison_alloca+0x183/0x220 [ 306.083847] ? _cond_resched+0x4c/0x100 [ 306.087831] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 306.093200] alloc_pages_current+0x6b1/0x970 [ 306.097609] pipe_write+0x7f0/0x1d30 [ 306.101339] ? pipe_read+0x1330/0x1330 [ 306.105216] __vfs_write+0x87e/0xb90 [ 306.108935] vfs_write+0x467/0x8c0 [ 306.112479] __x64_sys_write+0x1cf/0x400 [ 306.116542] ? ksys_write+0x380/0x380 [ 306.121115] do_syscall_64+0x15b/0x230 [ 306.124999] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 306.130181] RIP: 0033:0x455ab9 [ 306.133352] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.152603] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 306.160304] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 306.167563] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 306.174831] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 306.182089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 306.189357] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000d [ 306.196651] CPU: 1 PID: 13817 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 306.203958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.213359] Call Trace: [ 306.216007] dump_stack+0x185/0x1e0 [ 306.219701] should_fail+0x8a7/0xae0 [ 306.223472] __alloc_pages_nodemask+0x622/0x6320 [ 306.228275] ? kmsan_set_origin_inline+0x6b/0x120 [ 306.233172] ? kmsan_set_origin_inline+0x6b/0x120 [ 306.238059] ? __msan_poison_alloca+0x183/0x220 [ 306.242786] ? _cond_resched+0x4c/0x100 [ 306.246809] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 306.252244] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 306.257744] alloc_pages_current+0x6b1/0x970 [ 306.262203] pipe_write+0x7f0/0x1d30 [ 306.265999] ? pipe_read+0x1330/0x1330 [ 306.269958] __vfs_write+0x87e/0xb90 [ 306.273744] vfs_write+0x467/0x8c0 [ 306.277362] __x64_sys_write+0x1cf/0x400 [ 306.281488] ? ksys_write+0x380/0x380 [ 306.285338] do_syscall_64+0x15b/0x230 [ 306.289283] entry_SYSCALL_64_after_hwframe+0x63/0xe7 14:03:41 executing program 0: mkdir(&(0x7f0000000080)='./control/file0\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 306.294491] RIP: 0033:0x455ab9 [ 306.297687] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.317302] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 306.325061] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 306.332368] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 306.339760] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 306.347058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 306.354359] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000003 14:03:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x20000, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000001c0)) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x4e21, 0xfffffffffffffff9, @mcast2={0xff, 0x2, [], 0x1}, 0x8}, 0x1c) 14:03:41 executing program 6 (fault-call:3 fault-nth:14): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:41 executing program 2 (fault-call:3 fault-nth:4): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:41 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 306.662207] FAULT_INJECTION: forcing a failure. [ 306.662207] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 306.674067] CPU: 1 PID: 13841 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 306.681348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.690708] Call Trace: [ 306.693311] dump_stack+0x185/0x1e0 [ 306.696957] should_fail+0x8a7/0xae0 [ 306.700697] __alloc_pages_nodemask+0x622/0x6320 [ 306.705497] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 306.710960] ? get_page_from_freelist+0xb01f/0xbb50 [ 306.715995] ? __save_stack_trace+0xa45/0xca0 [ 306.720544] ? memcg_kmem_charge+0x5f8/0xac0 [ 306.724974] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 306.730798] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 306.736789] ? __alloc_pages_nodemask+0x105b/0x6320 [ 306.741831] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 306.747211] ? vmalloc_to_page+0x50b/0x630 [ 306.751469] ? kmsan_set_origin_inline+0x6b/0x120 [ 306.756343] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 306.761720] ? memcg_kmem_charge+0x79d/0xac0 [ 306.766150] kmsan_alloc_page+0x80/0xe0 [ 306.770146] __alloc_pages_nodemask+0x105b/0x6320 [ 306.775008] ? kmsan_set_origin_inline+0x6b/0x120 [ 306.779860] ? kmsan_set_origin_inline+0x6b/0x120 [ 306.784697] ? __msan_poison_alloca+0x183/0x220 [ 306.789357] ? _cond_resched+0x4c/0x100 [ 306.793337] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 306.798703] alloc_pages_current+0x6b1/0x970 [ 306.803107] pipe_write+0x7f0/0x1d30 [ 306.806841] ? pipe_read+0x1330/0x1330 [ 306.810719] __vfs_write+0x87e/0xb90 [ 306.814445] vfs_write+0x467/0x8c0 [ 306.817986] __x64_sys_write+0x1cf/0x400 [ 306.822059] ? ksys_write+0x380/0x380 [ 306.825856] do_syscall_64+0x15b/0x230 [ 306.829741] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 306.834920] RIP: 0033:0x455ab9 [ 306.838093] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.857327] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 306.865026] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 306.872289] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 306.879550] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 306.886803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 306.894062] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000e [ 306.922612] FAULT_INJECTION: forcing a failure. [ 306.922612] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 306.934465] CPU: 1 PID: 13847 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 306.941745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.951108] Call Trace: [ 306.953710] dump_stack+0x185/0x1e0 [ 306.957356] should_fail+0x8a7/0xae0 [ 306.961099] __alloc_pages_nodemask+0x622/0x6320 [ 306.965877] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:03:41 executing program 6 (fault-call:3 fault-nth:15): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 306.971338] ? get_page_from_freelist+0xb01f/0xbb50 [ 306.976372] ? __save_stack_trace+0xa45/0xca0 [ 306.980899] ? memcg_kmem_charge+0x5f8/0xac0 [ 306.985321] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 306.991041] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 306.997031] ? __alloc_pages_nodemask+0x105b/0x6320 [ 307.002067] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 307.007441] ? vmalloc_to_page+0x50b/0x630 [ 307.011695] ? kmsan_set_origin_inline+0x6b/0x120 [ 307.016590] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 307.021962] ? memcg_kmem_charge+0x79d/0xac0 [ 307.026388] kmsan_alloc_page+0x80/0xe0 [ 307.030383] __alloc_pages_nodemask+0x105b/0x6320 [ 307.036047] ? kmsan_set_origin_inline+0x6b/0x120 [ 307.040909] ? kmsan_set_origin_inline+0x6b/0x120 [ 307.045763] ? __msan_poison_alloca+0x183/0x220 [ 307.050439] ? _cond_resched+0x4c/0x100 [ 307.054437] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 307.059832] alloc_pages_current+0x6b1/0x970 [ 307.064260] pipe_write+0x7f0/0x1d30 [ 307.068016] ? pipe_read+0x1330/0x1330 [ 307.071915] __vfs_write+0x87e/0xb90 [ 307.072608] FAULT_INJECTION: forcing a failure. [ 307.072608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 307.075654] vfs_write+0x467/0x8c0 [ 307.075689] __x64_sys_write+0x1cf/0x400 [ 307.075718] ? ksys_write+0x380/0x380 [ 307.075735] do_syscall_64+0x15b/0x230 [ 307.075763] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 307.075776] RIP: 0033:0x455ab9 [ 307.075781] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.130482] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 307.138181] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 307.145442] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 307.152702] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 307.159960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 307.167221] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000004 [ 307.174517] CPU: 0 PID: 13855 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 307.181818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.191191] Call Trace: [ 307.193828] dump_stack+0x185/0x1e0 [ 307.197524] should_fail+0x8a7/0xae0 [ 307.201291] __alloc_pages_nodemask+0x622/0x6320 [ 307.206089] ? kmsan_set_origin_inline+0x6b/0x120 [ 307.210969] ? kmsan_set_origin_inline+0x6b/0x120 [ 307.215847] ? __msan_poison_alloca+0x183/0x220 [ 307.220569] ? _cond_resched+0x4c/0x100 [ 307.224582] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 307.230003] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 307.235491] alloc_pages_current+0x6b1/0x970 [ 307.239927] pipe_write+0x7f0/0x1d30 [ 307.243678] ? pipe_read+0x1330/0x1330 [ 307.247608] __vfs_write+0x87e/0xb90 [ 307.251350] vfs_write+0x467/0x8c0 [ 307.254911] __x64_sys_write+0x1cf/0x400 [ 307.258999] ? ksys_write+0x380/0x380 [ 307.262835] do_syscall_64+0x15b/0x230 [ 307.266750] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 307.271945] RIP: 0033:0x455ab9 [ 307.275125] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.294485] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 307.302219] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 307.309507] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 307.316796] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 14:03:42 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8, 0x0) getsockname$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) [ 307.324074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 307.331366] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000f 14:03:42 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r0, 0x407, 0x0) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f0000000140)='H', 0xfffffffffffffd06}], 0x1, 0x4000008) dup2(r1, r0) 14:03:42 executing program 6 (fault-call:3 fault-nth:16): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:42 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) r2 = dup2(r1, r0) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000040)=0x101) 14:03:42 executing program 2 (fault-call:3 fault-nth:5): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:42 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000cf217dd43731aa010054d81458186fe8b9000200010000000000000006fc6bd80000030005000020000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 307.665967] FAULT_INJECTION: forcing a failure. [ 307.665967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 307.677828] CPU: 0 PID: 13882 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 307.685104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.694468] Call Trace: [ 307.697085] dump_stack+0x185/0x1e0 [ 307.700736] should_fail+0x8a7/0xae0 [ 307.704475] __alloc_pages_nodemask+0x622/0x6320 [ 307.709264] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 307.714724] ? get_page_from_freelist+0xb01f/0xbb50 [ 307.719760] ? __save_stack_trace+0xa45/0xca0 [ 307.719800] FAULT_INJECTION: forcing a failure. [ 307.719800] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 307.724280] ? memcg_kmem_charge+0x5f8/0xac0 [ 307.740443] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 307.746153] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 307.752118] ? __alloc_pages_nodemask+0x105b/0x6320 [ 307.757137] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 307.762492] ? vmalloc_to_page+0x50b/0x630 [ 307.766728] ? kmsan_set_origin_inline+0x6b/0x120 [ 307.771576] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 307.776931] ? memcg_kmem_charge+0x79d/0xac0 [ 307.781334] kmsan_alloc_page+0x80/0xe0 [ 307.785306] __alloc_pages_nodemask+0x105b/0x6320 [ 307.790143] ? kmsan_set_origin_inline+0x6b/0x120 [ 307.794980] ? kmsan_set_origin_inline+0x6b/0x120 [ 307.799815] ? __msan_poison_alloca+0x183/0x220 [ 307.804472] ? _cond_resched+0x4c/0x100 [ 307.808450] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 307.813819] alloc_pages_current+0x6b1/0x970 [ 307.818227] pipe_write+0x7f0/0x1d30 [ 307.821954] ? pipe_read+0x1330/0x1330 [ 307.825831] __vfs_write+0x87e/0xb90 [ 307.829550] vfs_write+0x467/0x8c0 [ 307.833112] __x64_sys_write+0x1cf/0x400 [ 307.837170] ? ksys_write+0x380/0x380 [ 307.840959] do_syscall_64+0x15b/0x230 [ 307.844845] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 307.850024] RIP: 0033:0x455ab9 [ 307.853197] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.872467] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 307.880169] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 307.887433] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 307.894814] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 307.902077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 307.909342] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000010 [ 307.916618] CPU: 1 PID: 13888 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 307.923894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.933249] Call Trace: [ 307.935854] dump_stack+0x185/0x1e0 [ 307.939496] should_fail+0x8a7/0xae0 [ 307.943231] __alloc_pages_nodemask+0x622/0x6320 [ 307.948011] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 307.953473] ? get_page_from_freelist+0xb01f/0xbb50 [ 307.958502] ? __save_stack_trace+0xa45/0xca0 [ 307.963013] ? apic_timer_interrupt+0xa/0x20 14:03:42 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000005c0)={'filter\x00', 0x1000, "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"}, &(0x7f0000000080)=0x1024) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000000)='\b', 0x1}], 0x1, 0x0) dup2(r2, r1) 14:03:42 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') ioctl$RTC_PIE_OFF(r2, 0x7006) [ 307.967452] ? memcg_kmem_charge+0x5f8/0xac0 [ 307.971873] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 307.977689] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 307.983679] ? __alloc_pages_nodemask+0x105b/0x6320 [ 307.988712] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 307.994091] ? vmalloc_to_page+0x50b/0x630 [ 307.998340] ? kmsan_set_origin_inline+0x6b/0x120 [ 308.003203] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 308.008576] ? memcg_kmem_charge+0x79d/0xac0 [ 308.013006] kmsan_alloc_page+0x80/0xe0 [ 308.016993] __alloc_pages_nodemask+0x105b/0x6320 [ 308.021853] ? kmsan_set_origin_inline+0x6b/0x120 [ 308.026711] ? kmsan_set_origin_inline+0x6b/0x120 [ 308.031569] ? __msan_poison_alloca+0x183/0x220 [ 308.036246] ? _cond_resched+0x4c/0x100 [ 308.040240] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 308.045635] alloc_pages_current+0x6b1/0x970 [ 308.050067] pipe_write+0x7f0/0x1d30 [ 308.053817] ? pipe_read+0x1330/0x1330 [ 308.057715] __vfs_write+0x87e/0xb90 [ 308.061458] vfs_write+0x467/0x8c0 [ 308.065028] __x64_sys_write+0x1cf/0x400 [ 308.069108] ? ksys_write+0x380/0x380 [ 308.072918] do_syscall_64+0x15b/0x230 [ 308.076823] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 308.082021] RIP: 0033:0x455ab9 [ 308.085208] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.104540] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:03:43 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) accept4$alg(r1, 0x0, 0x0, 0x800) pivot_root(&(0x7f0000000080)='./control\x00', &(0x7f0000000180)='./control/file0\x00') close(r0) [ 308.112271] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 308.119553] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 308.126834] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 308.134117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 308.141401] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000005 14:03:43 executing program 6 (fault-call:3 fault-nth:17): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:43 executing program 2 (fault-call:3 fault-nth:6): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x5bde3c66, @dev={0xfe, 0x80, [], 0x16}, 0x4}, 0x1c) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c00000000000000000000000200090002000000000000000300060000000000020047848a991f454af4abdc8d350000e0000054d87258186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e0"], 0x60}, 0x1}, 0x0) [ 308.391249] FAULT_INJECTION: forcing a failure. [ 308.391249] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 308.403107] CPU: 0 PID: 13909 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 308.410406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.419765] Call Trace: [ 308.422346] dump_stack+0x185/0x1e0 [ 308.425971] should_fail+0x8a7/0xae0 [ 308.429703] __alloc_pages_nodemask+0x622/0x6320 [ 308.434491] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 308.439954] ? get_page_from_freelist+0xb01f/0xbb50 [ 308.444980] ? __save_stack_trace+0xa45/0xca0 [ 308.449489] ? memcg_kmem_charge+0x5f8/0xac0 [ 308.453906] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 308.459718] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 308.465709] ? __alloc_pages_nodemask+0x105b/0x6320 [ 308.470744] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 308.476134] ? kmsan_set_origin_inline+0x6b/0x120 [ 308.481000] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 308.486377] ? memcg_kmem_charge+0x79d/0xac0 [ 308.490792] kmsan_alloc_page+0x80/0xe0 [ 308.494773] __alloc_pages_nodemask+0x105b/0x6320 [ 308.499617] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 308.504819] ? __msan_poison_alloca+0x183/0x220 [ 308.509517] ? kmsan_set_origin_inline+0x6b/0x120 [ 308.514384] ? __msan_poison_alloca+0x183/0x220 [ 308.519070] ? _cond_resched+0x4c/0x100 [ 308.523072] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 308.528476] alloc_pages_current+0x6b1/0x970 [ 308.532903] pipe_write+0x7f0/0x1d30 [ 308.536648] ? pipe_read+0x1330/0x1330 [ 308.540551] __vfs_write+0x87e/0xb90 [ 308.544297] vfs_write+0x467/0x8c0 [ 308.547864] __x64_sys_write+0x1cf/0x400 [ 308.551951] ? ksys_write+0x380/0x380 [ 308.555804] do_syscall_64+0x15b/0x230 [ 308.559729] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 308.564932] RIP: 0033:0x455ab9 [ 308.568123] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.587442] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 308.595168] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 308.602441] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 308.609713] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 308.616995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 308.624274] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000011 [ 308.639878] FAULT_INJECTION: forcing a failure. [ 308.639878] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 308.652124] CPU: 1 PID: 13911 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 308.659422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.668786] Call Trace: [ 308.671432] dump_stack+0x185/0x1e0 [ 308.675128] should_fail+0x8a7/0xae0 [ 308.678907] __alloc_pages_nodemask+0x622/0x6320 [ 308.683719] ? kmsan_set_origin_inline+0x6b/0x120 [ 308.688600] ? kmsan_set_origin_inline+0x6b/0x120 [ 308.693480] ? __msan_poison_alloca+0x183/0x220 [ 308.698213] ? _cond_resched+0x4c/0x100 [ 308.702247] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 308.707687] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 308.713167] alloc_pages_current+0x6b1/0x970 [ 308.717601] pipe_write+0x7f0/0x1d30 [ 308.721400] ? pipe_read+0x1330/0x1330 [ 308.725353] __vfs_write+0x87e/0xb90 [ 308.729126] vfs_write+0x467/0x8c0 [ 308.732729] __x64_sys_write+0x1cf/0x400 [ 308.736860] ? ksys_write+0x380/0x380 [ 308.740711] do_syscall_64+0x15b/0x230 [ 308.744639] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 308.749850] RIP: 0033:0x455ab9 [ 308.753051] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 308.772580] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 308.780342] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 308.787641] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 308.794933] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 308.802232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 308.809526] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000006 14:03:43 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080)=0x1ff, 0x4) fcntl$setpipe(r1, 0x407, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) connect$bt_rfcomm(r1, &(0x7f0000000140)={0x1f, {0x66ab, 0x8, 0x5, 0x80, 0x0, 0xbdf}, 0x800}, 0xa) r3 = dup2(r1, r0) r4 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x800, 0x100000000, 0x0, 0x0, 0x0, 0x7, 0x200, 0x4, 0x10000, 0x7f, 0x7, 0x9, 0x9a, 0xc8fd, 0x1, 0xfffffffffffffff9, 0x3, 0x5, 0xfffffffffffffe00, 0x10000, 0x6e26e5, 0x9, 0x10001, 0x1, 0x3, 0x8, 0x5, 0x1, 0x1, 0x10001, 0x100000001, 0x1, 0x40, 0x1, 0x3, 0xffffffffffff0000, 0x0, 0x3f, 0x0, @perf_config_ext={0x7, 0xfffffffffffffffd}, 0x200, 0x1, 0xf701, 0x7, 0x1, 0x0, 0x3}, r4, 0xb, r3, 0x3) fcntl$dupfd(r3, 0x0, r3) ioctl$RTC_PIE_ON(r1, 0x7005) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000040)="aec10dfbb9971c2aa726b8ba3c83f274", 0x10) 14:03:43 executing program 7: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) nanosleep(&(0x7f0000000340)={0x0, 0x989680}, &(0x7f0000000380)) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000003c0)={'ip6gretap0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, &(0x7f000000a000)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)='*', 0x1}], 0x1, 0x0) poll(&(0x7f0000000140)=[{r1}], 0x1, 0xec) chroot(&(0x7f0000000240)='./file1\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x41, 0x0) vmsplice(r2, &(0x7f0000000100)=[{&(0x7f0000000080)="a5", 0x1}], 0x1, 0x0) write$tun(r2, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)}}, 0x20) chdir(&(0x7f0000000000)='./file0\x00') r3 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ftruncate(r3, 0x280080) r4 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) r5 = dup3(r4, r4, 0x80000) ioctl$TIOCSWINSZ(r5, 0x5414, &(0x7f0000000080)={0x9, 0x9, 0x100000000, 0xfffffffffffffffc}) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:03:43 executing program 6 (fault-call:3 fault-nth:18): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f00000001c0)) [ 308.985855] FAULT_INJECTION: forcing a failure. [ 308.985855] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 308.997966] CPU: 1 PID: 13926 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 309.005281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.014663] Call Trace: [ 309.017317] dump_stack+0x185/0x1e0 [ 309.021032] should_fail+0x8a7/0xae0 [ 309.024811] __alloc_pages_nodemask+0x622/0x6320 [ 309.029627] ? kmsan_set_origin_inline+0x6b/0x120 [ 309.034527] ? kmsan_set_origin_inline+0x6b/0x120 [ 309.039420] ? __msan_poison_alloca+0x183/0x220 [ 309.044512] ? _cond_resched+0x4c/0x100 [ 309.048548] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 309.054016] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 309.059551] alloc_pages_current+0x6b1/0x970 [ 309.064053] pipe_write+0x7f0/0x1d30 [ 309.067872] ? pipe_read+0x1330/0x1330 [ 309.071853] __vfs_write+0x87e/0xb90 [ 309.075640] vfs_write+0x467/0x8c0 [ 309.079267] __x64_sys_write+0x1cf/0x400 [ 309.083423] ? ksys_write+0x380/0x380 [ 309.087280] do_syscall_64+0x15b/0x230 [ 309.091220] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 309.096441] RIP: 0033:0x455ab9 [ 309.099641] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.119262] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 309.127030] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 14:03:44 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) r2 = semget(0x1, 0x3, 0x40) semop(r2, &(0x7f0000000040)=[{0x4, 0xdf, 0x1800}, {0x2, 0x1, 0x1000}, {0x3, 0x1, 0x1800}, {0x0, 0x100, 0x1000}], 0x4) fcntl$setpipe(r1, 0x407, 0x0) write(r0, &(0x7f0000000080)="79c4e2951d9986119787904ab6b30cef089b29cefe3358ddc6b0038f26e84408a6e2a27b4c51667c68fdc1f6947cd65a61281f5db0060483a5174f922ed8d8b99bda2e83b55ff1110abd3a1ff755ba8852dae2587a277d21dea18a76bfda136bec778a6831833331f9da054f05366cae3df92f683d5af9f1c34a446640b19ca30650f86534d733c9", 0x88) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000380)={0x9610, 0x1, 0x6, 0xfffffffffffffffd, 0x7, [{0x1, 0x0, 0x8, 0x0, 0x0, 0x3405}, {0x1, 0x0, 0xffff, 0x0, 0x0, 0x200}, {0xa1c, 0x10000, 0x20, 0x0, 0x0, 0x100}, {0x3, 0x10001, 0x0, 0x0, 0x0, 0x2000}, {0x3, 0xffffffffffff7fff, 0x5, 0x0, 0x0, 0x1}, {0x8, 0x5, 0x9, 0x0, 0x0, 0x2400}, {0x0, 0x489, 0x80000000, 0x0, 0x0, 0x2000}]}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000000)={0x1, 0x9}) r3 = dup2(r1, r0) ioctl(r3, 0x0, &(0x7f0000000180)="5ca0b97ba05ff70104ad3018615bc5bc74bcd17d16cd085968b6cf0ca6d10ff1e6c8a8f392001b86fc5aafcc48355f8a1baa92c902c29c41afd43ab9f9089d5eb44d4c6bf435202e3db7643cd0fcc9630aa8afac116676e39b1ad2c6b942107531ad4b7925a11d426928945800d32515228271dd7f24f19e5e6e5fe2a40809d2ec391969bfc42f9c95aa624bf1856c0d4ce578ffd90588035d29f462c68371f9583f2fe32b") connect$netlink(r0, &(0x7f0000000280)=@kern={0x10, 0x0, 0x0, 0x4000000}, 0xc) 14:03:44 executing program 2 (fault-call:3 fault-nth:7): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 309.134359] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 309.141666] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 309.148970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 309.156283] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000012 14:03:44 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:03:44 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 309.298374] FAULT_INJECTION: forcing a failure. [ 309.298374] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.310217] CPU: 1 PID: 13945 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 309.317488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.326842] Call Trace: [ 309.329445] dump_stack+0x185/0x1e0 [ 309.333093] should_fail+0x8a7/0xae0 [ 309.336836] __alloc_pages_nodemask+0x622/0x6320 [ 309.341620] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 309.347082] ? get_page_from_freelist+0xb01f/0xbb50 [ 309.352115] ? __save_stack_trace+0xa45/0xca0 [ 309.356644] ? memcg_kmem_charge+0x5f8/0xac0 [ 309.361066] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 309.366791] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 309.372775] ? __alloc_pages_nodemask+0x105b/0x6320 [ 309.377808] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 309.383197] ? kmsan_set_origin_inline+0x6b/0x120 [ 309.388067] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 309.393444] ? memcg_kmem_charge+0x79d/0xac0 [ 309.397870] kmsan_alloc_page+0x80/0xe0 [ 309.401850] __alloc_pages_nodemask+0x105b/0x6320 [ 309.406703] ? kmsan_set_origin_inline+0x6b/0x120 [ 309.411569] ? kmsan_set_origin_inline+0x6b/0x120 [ 309.416431] ? __msan_poison_alloca+0x183/0x220 [ 309.421110] ? _cond_resched+0x4c/0x100 [ 309.425107] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 309.430499] alloc_pages_current+0x6b1/0x970 [ 309.434915] pipe_write+0x7f0/0x1d30 [ 309.438661] ? pipe_read+0x1330/0x1330 [ 309.442561] __vfs_write+0x87e/0xb90 [ 309.446308] vfs_write+0x467/0x8c0 [ 309.449876] __x64_sys_write+0x1cf/0x400 [ 309.453954] ? ksys_write+0x380/0x380 [ 309.457762] do_syscall_64+0x15b/0x230 [ 309.461673] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 309.466866] RIP: 0033:0x455ab9 [ 309.470052] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.489390] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:03:44 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x1d, 0x10, &(0x7f0000000440)=@raw=[@jmp={0x5, 0x3, 0xf, 0xa, 0x6, 0xfffffffffffffff8, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0xffff}, @alu={0x7, 0xfffffffffffffffe, 0xd, 0x0, 0xd, 0x84}, @ldst={0x1, 0x0, 0x2, 0x0, 0xb, 0x6}, @call={0x85, 0x0, 0x0, 0x3e}, @jmp={0x5, 0xf877, 0xf, 0x5, 0x0, 0xfffffffffffffffe, 0xfffffffffffffff8}, @map={0x18, 0x5, 0x1, 0x0, 0xffffffffffffff9c}, @alu={0x7, 0x4aa, 0xb, 0x7, 0x0, 0xfffffffffffffffe}], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0xdb, &(0x7f0000000500)=""/219, 0x41000, 0x1, [], 0x0, 0xf}, 0x48) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='autogroup\x00') ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000300)=0x5) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xfffffffffffffc00, 0x101000) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_DEL(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10400002}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x38, r4, 0x610, 0x70bd27, 0x25dfdbfd, {0x2}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3f}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x32}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x38}, 0x1}, 0x1) r5 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r5, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000280)={0x3b, 0x6, 0x0, {0x3, 0x4, 0x12, 0x0, '/dev/input/mouse#\x00'}}, 0x3b) ppoll(&(0x7f0000000380)=[{r1, 0x4}, {r2, 0x428}, {r3, 0x100}, {r2, 0x4080}, {r1}, {r2, 0x1128}], 0x6, &(0x7f00000003c0), &(0x7f0000000400)={0x7}, 0x8) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r2) [ 309.497110] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 309.504649] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 309.511928] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 309.519195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 309.526461] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000007 14:03:44 executing program 2 (fault-call:3 fault-nth:8): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x8300) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300030c0000000000000000000000020009000200e8ffff070000000000000300060000000000020a21a238cbe5f52454beb26f66ad000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e000"], 0x60}, 0x1}, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000000c0)=0x3ff) write$P9_RATTACH(r1, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x22, 0x0, 0x3}}, 0x14) 14:03:44 executing program 6 (fault-call:3 fault-nth:19): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 309.750786] FAULT_INJECTION: forcing a failure. [ 309.750786] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.755282] FAULT_INJECTION: forcing a failure. [ 309.755282] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 309.762637] CPU: 0 PID: 13970 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 309.781662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.792507] Call Trace: [ 309.795090] dump_stack+0x185/0x1e0 [ 309.798714] should_fail+0x8a7/0xae0 [ 309.802432] __alloc_pages_nodemask+0x622/0x6320 [ 309.807193] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 309.812634] ? get_page_from_freelist+0xb01f/0xbb50 [ 309.817653] ? __save_stack_trace+0xa45/0xca0 [ 309.822159] ? memcg_kmem_charge+0x5f8/0xac0 [ 309.826562] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 309.832266] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 309.838232] ? __alloc_pages_nodemask+0x105b/0x6320 [ 309.843243] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 309.848598] ? vmalloc_to_page+0x50b/0x630 [ 309.852834] ? kmsan_set_origin_inline+0x6b/0x120 [ 309.857681] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 309.863040] ? memcg_kmem_charge+0x79d/0xac0 [ 309.867444] kmsan_alloc_page+0x80/0xe0 [ 309.871424] __alloc_pages_nodemask+0x105b/0x6320 [ 309.876526] ? kmsan_set_origin_inline+0x6b/0x120 [ 309.881367] ? kmsan_set_origin_inline+0x6b/0x120 [ 309.886201] ? __msan_poison_alloca+0x183/0x220 [ 309.890857] ? _cond_resched+0x4c/0x100 [ 309.894830] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 309.900198] alloc_pages_current+0x6b1/0x970 [ 309.904626] pipe_write+0x7f0/0x1d30 [ 309.908352] ? pipe_read+0x1330/0x1330 [ 309.912230] __vfs_write+0x87e/0xb90 [ 309.915958] vfs_write+0x467/0x8c0 [ 309.919506] __x64_sys_write+0x1cf/0x400 [ 309.923564] ? ksys_write+0x380/0x380 [ 309.927352] do_syscall_64+0x15b/0x230 [ 309.931234] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 309.936411] RIP: 0033:0x455ab9 [ 309.939582] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 309.958850] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 309.966547] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 309.973801] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 309.981059] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 309.988315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 309.995579] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000013 [ 310.002852] CPU: 1 PID: 13971 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 310.010128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.019478] Call Trace: [ 310.022074] dump_stack+0x185/0x1e0 [ 310.025709] should_fail+0x8a7/0xae0 [ 310.029440] __alloc_pages_nodemask+0x622/0x6320 [ 310.034217] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 310.039685] ? get_page_from_freelist+0xb01f/0xbb50 [ 310.044724] ? __save_stack_trace+0xa45/0xca0 14:03:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000011c0)=ANY=[@ANYBLOB="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"], 0x60}, 0x1}, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r1, &(0x7f00000001c0)="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", 0x1000) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x208000, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000000c0)=0x8) [ 310.049240] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 310.054733] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 310.060119] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 310.065938] ? try_charge+0x2825/0x2e90 [ 310.069942] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 310.075324] ? vmalloc_to_page+0x50b/0x630 [ 310.079586] ? kmsan_set_origin_inline+0x6b/0x120 [ 310.084452] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 310.089830] ? memcg_kmem_charge+0x79d/0xac0 [ 310.094260] kmsan_alloc_page+0x80/0xe0 [ 310.098251] __alloc_pages_nodemask+0x105b/0x6320 [ 310.103134] ? kmsan_set_origin_inline+0x6b/0x120 [ 310.107980] ? kmsan_set_origin_inline+0x6b/0x120 [ 310.112828] ? __msan_poison_alloca+0x183/0x220 [ 310.117495] ? _cond_resched+0x4c/0x100 [ 310.121526] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 310.126899] alloc_pages_current+0x6b1/0x970 [ 310.131303] pipe_write+0x7f0/0x1d30 [ 310.135048] ? pipe_read+0x1330/0x1330 [ 310.138948] __vfs_write+0x87e/0xb90 [ 310.142671] vfs_write+0x467/0x8c0 [ 310.146211] __x64_sys_write+0x1cf/0x400 [ 310.150279] ? ksys_write+0x380/0x380 [ 310.154089] do_syscall_64+0x15b/0x230 [ 310.157997] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 310.163183] RIP: 0033:0x455ab9 [ 310.166356] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.185557] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 310.193257] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 310.200526] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 310.207794] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 310.215057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 310.222333] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000008 14:03:45 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x2e, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e24, 0x0, 'wrr\x00', 0x1, 0x8000, 0x2}, 0x2c) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x2f, @loopback=0x7f000001, 0x4e22, 0x2, 'ovf\x00', 0x0, 0x7ff, 0x42}, 0x2c) dup2(r0, r0) 14:03:45 executing program 2 (fault-call:3 fault-nth:9): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:45 executing program 3: ioctl(0xffffffffffffffff, 0x10000, &(0x7f0000000240)='aX') r0 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0xe0d, 0x300) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02030003ecffee0400000040618ff3448b8b490420000000000014000000000003000685c767cf000200000009000054d81401006fe8b90002f702000000000300050000000051a9f0d850c2859c010000000000000000"], 0x60}, 0x1}, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x10000}, &(0x7f0000000040)=0x8) fstat(0xffffffffffffffff, &(0x7f00000001c0)) syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0xc0040) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x8001, 0x400, 0x8209, 0xe9, 0x4, 0x3000000, 0x6, 0x6, r2}, &(0x7f0000000140)=0x20) 14:03:45 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) getgid() fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x9, 0x1f, 0xc, 0xc, "8662265baadace1eed671f0dccc30188fd434334c6302311dadfa95e83d67cf780de33c421a7fb91cf5ecb57cafb48232a5873d3d1c8e77101bc75a52b6ee1ae", "0d14300a6724339851e6b8fa5dd0fda07089521d142db157ae69264a1aff25ae", [0x101, 0x1]}) r2 = dup2(r1, r0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000180)={0x3ff00000000000, 0x1}) [ 310.517896] FAULT_INJECTION: forcing a failure. [ 310.517896] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 310.530140] CPU: 0 PID: 14000 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 310.537461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.546854] Call Trace: [ 310.549501] dump_stack+0x185/0x1e0 [ 310.553190] should_fail+0x8a7/0xae0 [ 310.556967] __alloc_pages_nodemask+0x622/0x6320 [ 310.561760] ? kmsan_set_origin_inline+0x6b/0x120 [ 310.566637] ? kmsan_set_origin_inline+0x6b/0x120 [ 310.571521] ? __msan_poison_alloca+0x183/0x220 [ 310.576262] ? _cond_resched+0x4c/0x100 [ 310.580276] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 310.585703] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 310.591197] alloc_pages_current+0x6b1/0x970 [ 310.595649] pipe_write+0x7f0/0x1d30 [ 310.599449] ? pipe_read+0x1330/0x1330 [ 310.603400] __vfs_write+0x87e/0xb90 [ 310.607181] vfs_write+0x467/0x8c0 [ 310.610798] __x64_sys_write+0x1cf/0x400 [ 310.614900] ? ksys_write+0x380/0x380 [ 310.618712] do_syscall_64+0x15b/0x230 [ 310.622634] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 310.627847] RIP: 0033:0x455ab9 [ 310.631048] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.650686] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 310.658441] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 310.665740] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 310.673038] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 310.680332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 310.687627] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000009 14:03:45 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:03:45 executing program 6 (fault-call:3 fault-nth:20): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:45 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x3, 0x5, 0x2004, &(0x7f0000000080)={0x77359400}, &(0x7f0000000100)=0x100, 0x2) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:03:45 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000380)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@mcast2={0xff, 0x2, [], 0x1}, 0x4e22, 0x0, 0x4e23, 0x0, 0xa, 0x0, 0xa0, 0x3a, r2, r3}, {0xfffe000000000000, 0x9d8a, 0x0, 0x10000, 0x1, 0x3, 0x0, 0x1}, {0x800, 0x6, 0x658a, 0x6}, 0xfff, 0x6e6bb5, 0x1, 0x1, 0x3, 0x2}, {{@in, 0x4d2, 0x3f}, 0x2, @in6=@loopback={0x0, 0x1}, 0x0, 0x4, 0x2, 0x100000001, 0x9350, 0x3, 0xa9cd}}, 0xe8) 14:03:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000400000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) 14:03:45 executing program 2 (fault-call:3 fault-nth:10): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 310.885932] FAULT_INJECTION: forcing a failure. [ 310.885932] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 310.897795] CPU: 1 PID: 14013 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 310.903023] FAULT_INJECTION: forcing a failure. [ 310.903023] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 310.905081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.926193] Call Trace: [ 310.928778] dump_stack+0x185/0x1e0 [ 310.932404] should_fail+0x8a7/0xae0 [ 310.936122] __alloc_pages_nodemask+0x622/0x6320 [ 310.940886] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 310.946329] ? get_page_from_freelist+0xb01f/0xbb50 [ 310.951342] ? __save_stack_trace+0xa45/0xca0 [ 310.955848] ? memcg_kmem_charge+0x5f8/0xac0 [ 310.960256] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 310.966048] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 310.972015] ? __alloc_pages_nodemask+0x105b/0x6320 [ 310.977030] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 310.982387] ? vmalloc_to_page+0x50b/0x630 [ 310.986618] ? kmsan_set_origin_inline+0x6b/0x120 [ 310.991465] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 310.996823] ? memcg_kmem_charge+0x79d/0xac0 [ 311.001229] kmsan_alloc_page+0x80/0xe0 [ 311.005210] __alloc_pages_nodemask+0x105b/0x6320 [ 311.010055] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.014892] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.019726] ? __msan_poison_alloca+0x183/0x220 [ 311.024384] ? _cond_resched+0x4c/0x100 [ 311.028359] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 311.033729] alloc_pages_current+0x6b1/0x970 [ 311.038138] pipe_write+0x7f0/0x1d30 [ 311.041866] ? pipe_read+0x1330/0x1330 [ 311.045746] __vfs_write+0x87e/0xb90 [ 311.049467] vfs_write+0x467/0x8c0 [ 311.053015] __x64_sys_write+0x1cf/0x400 [ 311.057080] ? ksys_write+0x380/0x380 [ 311.060868] do_syscall_64+0x15b/0x230 [ 311.064752] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.069937] RIP: 0033:0x455ab9 [ 311.073108] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.092378] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 311.100085] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 311.107350] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 311.114867] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 311.122126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 311.129388] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000014 [ 311.136664] CPU: 0 PID: 14016 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 311.143939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.153292] Call Trace: [ 311.155890] dump_stack+0x185/0x1e0 [ 311.159538] should_fail+0x8a7/0xae0 [ 311.163271] __alloc_pages_nodemask+0x622/0x6320 [ 311.168051] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 311.173527] ? get_page_from_freelist+0xb01f/0xbb50 [ 311.178552] ? __save_stack_trace+0xa45/0xca0 [ 311.183077] ? memcg_kmem_charge+0x5f8/0xac0 [ 311.187512] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 311.193238] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 311.199217] ? __alloc_pages_nodemask+0x105b/0x6320 [ 311.204244] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.209620] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.214481] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 311.219853] ? memcg_kmem_charge+0x79d/0xac0 [ 311.224274] kmsan_alloc_page+0x80/0xe0 [ 311.228262] __alloc_pages_nodemask+0x105b/0x6320 [ 311.233115] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.237973] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.242826] ? __msan_poison_alloca+0x183/0x220 [ 311.247509] ? _cond_resched+0x4c/0x100 [ 311.251509] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 311.256897] alloc_pages_current+0x6b1/0x970 [ 311.261325] pipe_write+0x7f0/0x1d30 [ 311.265096] ? pipe_read+0x1330/0x1330 [ 311.269025] __vfs_write+0x87e/0xb90 [ 311.272772] vfs_write+0x467/0x8c0 [ 311.276333] __x64_sys_write+0x1cf/0x400 [ 311.280399] ? ksys_write+0x380/0x380 [ 311.284194] do_syscall_64+0x15b/0x230 [ 311.288099] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.293286] RIP: 0033:0x455ab9 [ 311.296467] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.315692] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 311.323410] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 311.330682] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 311.337945] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 311.345207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 311.352479] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000a 14:03:46 executing program 6 (fault-call:3 fault-nth:21): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:46 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'lo\x00', 0x7}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x800, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000140)="9331543f28") 14:03:46 executing program 2 (fault-call:3 fault-nth:11): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:46 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x1, &(0x7f0000000040)={0x7fffffff}, &(0x7f0000000080), 0xfffffffffffffe7b) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000380)="4255829a2bc71c5b053454336b1b39841503522bfaf3080809ee6ad4b72c0c9bee71815ff37d1770f7fee9b89f1a5647d49136a02082886aaf6be44fe2833b2fc9a09c209514517961bf0257439856996ec7b41c377cdcafb67df1fcdaf0178c4b1c5d7f87e47f9c24d51b60a109475b1713a28466a28544210de2454e73dd388755f254cfa4b369193b81a58669b4e7d2e4c18824fcfe8a36b14d8d3e4561620dc9cf36eaf7cee16719e7bb411afad2f738f8c85379e99c91f5e83083f559ca9e7a8e14030c39b4b2add14219651944821cc51f8c305d323681d28b12705f497074fd29cc4b4f2187"}, {&(0x7f0000000180)="4df107d1e719894966056eaf1d263d33f792273aed95fd0e49fe06fb4d77b57321a7ceaad68bcb8e18a7260bbd7ac6ab4b5c9e28a3a942ef3aa07b03ff2a2bd18262a2b623552d03521bb5987793"}], 0x1000000000000177, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)) [ 311.510962] FAULT_INJECTION: forcing a failure. [ 311.510962] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 311.523223] CPU: 1 PID: 14032 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 311.530778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.540151] Call Trace: [ 311.542791] dump_stack+0x185/0x1e0 [ 311.546466] should_fail+0x8a7/0xae0 [ 311.550229] __alloc_pages_nodemask+0x622/0x6320 [ 311.555026] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.559907] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.564781] ? __msan_poison_alloca+0x183/0x220 [ 311.569500] ? _cond_resched+0x4c/0x100 [ 311.573518] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 311.578953] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 311.584454] alloc_pages_current+0x6b1/0x970 [ 311.588939] pipe_write+0x7f0/0x1d30 [ 311.592740] ? pipe_read+0x1330/0x1330 [ 311.596704] __vfs_write+0x87e/0xb90 [ 311.600511] vfs_write+0x467/0x8c0 [ 311.604150] __x64_sys_write+0x1cf/0x400 [ 311.608281] ? ksys_write+0x380/0x380 [ 311.612138] do_syscall_64+0x15b/0x230 [ 311.616076] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.621290] RIP: 0033:0x455ab9 [ 311.624488] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.644111] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 311.651861] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 311.659150] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 311.666446] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 311.673739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 311.681029] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000015 [ 311.685866] FAULT_INJECTION: forcing a failure. [ 311.685866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 311.700104] CPU: 0 PID: 14040 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 311.707361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.716697] Call Trace: [ 311.719278] dump_stack+0x185/0x1e0 [ 311.722897] should_fail+0x8a7/0xae0 [ 311.726611] __alloc_pages_nodemask+0x622/0x6320 [ 311.731369] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 311.736812] ? get_page_from_freelist+0xb01f/0xbb50 [ 311.741823] ? __save_stack_trace+0xa45/0xca0 [ 311.746323] ? memcg_kmem_charge+0x5f8/0xac0 [ 311.750726] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 311.756529] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 311.762498] ? __alloc_pages_nodemask+0x105b/0x6320 [ 311.767517] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.772872] ? vmalloc_to_page+0x50b/0x630 [ 311.777101] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.781944] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 311.787297] ? memcg_kmem_charge+0x79d/0xac0 [ 311.791701] kmsan_alloc_page+0x80/0xe0 [ 311.795671] __alloc_pages_nodemask+0x105b/0x6320 [ 311.800514] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.805351] ? kmsan_set_origin_inline+0x6b/0x120 [ 311.810186] ? __msan_poison_alloca+0x183/0x220 [ 311.814847] ? _cond_resched+0x4c/0x100 [ 311.818817] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 311.824183] alloc_pages_current+0x6b1/0x970 [ 311.828598] pipe_write+0x7f0/0x1d30 [ 311.832407] ? pipe_read+0x1330/0x1330 [ 311.836284] __vfs_write+0x87e/0xb90 [ 311.840004] vfs_write+0x467/0x8c0 [ 311.843553] __x64_sys_write+0x1cf/0x400 [ 311.847613] ? ksys_write+0x380/0x380 [ 311.851403] do_syscall_64+0x15b/0x230 [ 311.855288] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 311.860463] RIP: 0033:0x455ab9 [ 311.863638] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.882875] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 311.890920] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 311.898179] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 311.905433] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 14:03:46 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) dup2(r0, r0) setitimer(0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x7530}}, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000180)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000380)={r2, 0xf1, "5d28ff59fe1614d553792aecfa199ac26bbe6c64b8d74cc9c7bac6639b3f2f528a0c0478ea3a3863ad3cf8c6c145a06db006fd75f762d5d4e65738702b7a8b57b2ef820bcbe0a47a71d6c008acfe0010d08b382839d97648d8f06d1d3d23adda960917ac3ae08876ec5266fabc48bbe947d9dbe57442120b4f5a88a5475a7127e4e5e0bd01353191a776c83254d64748aa809236b7de6bfd21ad94ad3089cb0919c48101a21ac559fe98683309c63ba2104e88d847d6abd9259aaefa2cce4783ab247c1aaff10d9e74a9f800544c07e213e60126432da82b553aa22c35312fc23c1cefd0669a171820ad9aa453b4506335"}, &(0x7f00000001c0)=0xf9) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e20, @multicast2=0xe0000002}, {0x7, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x4, {0x2, 0x4e23}, 'veth0_to_bridge\x00'}) [ 311.912691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 311.919950] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000b 14:03:47 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000200)={0x30, 0x5, 0x0, {0x0, 0x2, 0x8001, 0x19}}, 0x30) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, 0x5, 0x4}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r2, 0xab}, &(0x7f00000001c0)=0x8) 14:03:47 executing program 2 (fault-call:3 fault-nth:12): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:47 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x303, 0xb663, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffc, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7ffffffffc, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x1, 0xffffffffffffffff, 0xfffffffffffffffe) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1000000000000000, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) 14:03:47 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') renameat2(r1, &(0x7f0000000080)='./control/file0\x00', r1, &(0x7f0000000140)='./control/file0\x00', 0x7) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:03:47 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 312.205876] FAULT_INJECTION: forcing a failure. [ 312.205876] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.218000] CPU: 1 PID: 14062 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 312.225317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.234695] Call Trace: [ 312.237337] dump_stack+0x185/0x1e0 [ 312.241036] should_fail+0x8a7/0xae0 [ 312.244799] __alloc_pages_nodemask+0x622/0x6320 [ 312.249598] ? kmsan_set_origin_inline+0x6b/0x120 [ 312.254491] ? kmsan_set_origin_inline+0x6b/0x120 [ 312.259371] ? __msan_poison_alloca+0x183/0x220 [ 312.264101] ? _cond_resched+0x4c/0x100 [ 312.268121] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 312.273551] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 312.279051] alloc_pages_current+0x6b1/0x970 [ 312.283511] pipe_write+0x7f0/0x1d30 [ 312.287317] ? pipe_read+0x1330/0x1330 [ 312.291270] __vfs_write+0x87e/0xb90 [ 312.295059] vfs_write+0x467/0x8c0 [ 312.298675] __x64_sys_write+0x1cf/0x400 [ 312.302810] ? ksys_write+0x380/0x380 [ 312.306675] do_syscall_64+0x15b/0x230 [ 312.310613] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 312.315828] RIP: 0033:0x455ab9 [ 312.319023] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.338630] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 312.346374] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 14:03:47 executing program 6 (fault-call:3 fault-nth:22): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 312.353666] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 312.360955] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 312.368251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 312.375544] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000c [ 312.424909] FAULT_INJECTION: forcing a failure. [ 312.424909] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.436765] CPU: 1 PID: 14074 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 312.444039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.453393] Call Trace: [ 312.455997] dump_stack+0x185/0x1e0 [ 312.459641] should_fail+0x8a7/0xae0 [ 312.463381] __alloc_pages_nodemask+0x622/0x6320 [ 312.468161] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 312.473621] ? get_page_from_freelist+0xb01f/0xbb50 [ 312.478672] ? memcg_kmem_charge+0x5f8/0xac0 [ 312.483097] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 312.488816] ? __alloc_pages_nodemask+0x105b/0x6320 [ 312.493841] ? vmalloc_to_page+0x50b/0x630 [ 312.498092] ? kmsan_set_origin_inline+0x6b/0x120 [ 312.502953] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 312.508331] ? memcg_kmem_charge+0x79d/0xac0 [ 312.512753] kmsan_alloc_page+0x80/0xe0 [ 312.516740] __alloc_pages_nodemask+0x105b/0x6320 [ 312.521610] ? kmsan_set_origin_inline+0x6b/0x120 [ 312.526465] ? kmsan_set_origin_inline+0x6b/0x120 [ 312.531315] ? __msan_poison_alloca+0x183/0x220 [ 312.535997] ? _cond_resched+0x4c/0x100 [ 312.539992] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 312.545376] alloc_pages_current+0x6b1/0x970 [ 312.549800] pipe_write+0x7f0/0x1d30 [ 312.553546] ? pipe_read+0x1330/0x1330 [ 312.557442] __vfs_write+0x87e/0xb90 [ 312.561181] vfs_write+0x467/0x8c0 [ 312.564740] __x64_sys_write+0x1cf/0x400 [ 312.568820] ? ksys_write+0x380/0x380 [ 312.572628] do_syscall_64+0x15b/0x230 [ 312.576533] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 312.581723] RIP: 0033:0x455ab9 [ 312.584903] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.604342] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 312.612067] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 312.619339] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 312.626618] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 312.633895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 312.641169] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000016 14:03:47 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x100000001, 0x40c080) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f00000001c0)={0x9, 0x108, 0xfa00, {r1, 0xb4, "9ef486", "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"}}, 0x110) socket$key(0xf, 0x3, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000040)=0x3) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[]}, 0x1}, 0x1) 14:03:47 executing program 2 (fault-call:3 fault-nth:13): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:47 executing program 6 (fault-call:3 fault-nth:23): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 312.866765] FAULT_INJECTION: forcing a failure. [ 312.866765] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.878629] CPU: 1 PID: 14087 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 312.885915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.895276] Call Trace: [ 312.897883] dump_stack+0x185/0x1e0 [ 312.901525] should_fail+0x8a7/0xae0 [ 312.905284] __alloc_pages_nodemask+0x622/0x6320 [ 312.910067] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 312.915536] ? get_page_from_freelist+0xb01f/0xbb50 [ 312.920573] ? __save_stack_trace+0xa45/0xca0 [ 312.925107] ? memcg_kmem_charge+0x5f8/0xac0 [ 312.929534] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 312.935351] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 312.938694] FAULT_INJECTION: forcing a failure. [ 312.938694] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 312.941345] ? __alloc_pages_nodemask+0x105b/0x6320 [ 312.958139] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 312.963501] ? vmalloc_to_page+0x50b/0x630 [ 312.967755] ? kmsan_set_origin_inline+0x6b/0x120 [ 312.972602] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 312.977958] ? memcg_kmem_charge+0x79d/0xac0 [ 312.982369] kmsan_alloc_page+0x80/0xe0 [ 312.986343] __alloc_pages_nodemask+0x105b/0x6320 [ 312.991190] ? kmsan_set_origin_inline+0x6b/0x120 [ 312.996032] ? kmsan_set_origin_inline+0x6b/0x120 [ 313.000867] ? __msan_poison_alloca+0x183/0x220 [ 313.005527] ? _cond_resched+0x4c/0x100 [ 313.009502] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 313.014871] alloc_pages_current+0x6b1/0x970 [ 313.019281] pipe_write+0x7f0/0x1d30 [ 313.023013] ? pipe_read+0x1330/0x1330 [ 313.026895] __vfs_write+0x87e/0xb90 [ 313.030613] vfs_write+0x467/0x8c0 [ 313.034153] __x64_sys_write+0x1cf/0x400 [ 313.038214] ? ksys_write+0x380/0x380 [ 313.042007] do_syscall_64+0x15b/0x230 [ 313.045894] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 313.051069] RIP: 0033:0x455ab9 [ 313.054242] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.073509] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 313.081209] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 313.088466] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 313.095725] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 313.102984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 313.110245] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000017 14:03:48 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000000)) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) r2 = dup2(r1, r0) sendmsg$kcm(r2, &(0x7f0000000280)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @loopback=0x7f000001}, 0x2, 0x1, 0x2}}, 0x80, &(0x7f00000015c0)=[{&(0x7f00000005c0)="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", 0x1000}, {&(0x7f0000000180)="487858f884dcfc0525c6e1955e97f3aff99bcf69cb2ef8d3126f51faab9630c8cb1006df473b4af3399262c8f12e45aea0e154004597de93c2d5fdf2bae859884d0e6e20a6f3f98bfbea0fed468bd36bf24ccc11e430ef6d5b0ed3425025f503e8c773c769b3a018ba1d32d235a5eb03aba6884ec17dc4b478effe90f628356b529921886bad992df00b1def2ff619227b728bb5d6a817ba9c8b8700b5185f8de61621ab08794d530f4931084eb265227a4299ea713238cd0d6893a7c80e5c5c", 0xc0}, {&(0x7f0000000380)="13614997f299c0d4101dbabac0dd3a76213d36eb48951dc0f17f281eaeb454769640cf266c566b234bffda89ade9b1e36e25cae43a736613ca070d8c457ebbef32fc88457e6389b6af081660ec356a2967e02c091aa332a96c35450c6f415adb08fa1529ed66d9a34987f755a5829a623db5379c912c775494583e4f4bd6b9eec9db0d37fa163ad3392a76612eb56f0bb837ad904b9003082d2da5c10e7c8ed58d123060c4fdbce36a89700ddfdc89ae4e1755f069719ddda4407c93df7dfed4efd634b590f67e71ce605893f2ef9ee46333b799a644399ea7c6e24350c9ac952e053fe6", 0xe4}, {&(0x7f0000000480)="8920a29eafe22207ac478ec10a8259651dbb842b2381cb7421dfd995d4324a2ca5424d6fcbc2e226ee76bc29e057369f3d9a691e736cf1bd7acc6489f125bc5c667180ee6bdecd0fcd6c00c61d9567f2d1c8bc757bcf71c82e9821d58c272bd510ca1b5b1580b21183e7cad071d912b1f15028c23a6fba0d409d66664cfbdd9812c767a2233410a5dd312a365b8d0d9a584d75c747cdc75cda4b20df", 0x9c}, {&(0x7f00000000c0)="9cb37da0387885f38dc5340875328817f19abf076b652fca21762ec7033d13aa967157e49e8cc4997007185d3e59", 0x2e}, {&(0x7f0000000100)="33d76d0ede1520a0d6abed908d95529fe3a30300a5956fc2427f5f53d4346e134852cb7c648948b11b", 0x29}], 0x6, &(0x7f0000001640)=[{0x58, 0x115, 0x6, "8bee51b6ae421578a712362e542bab5d63f3c4a4e60ace1f0ff875ab9a14824f8dbad10e84761ba92e9a1299e6c21ca4d34398012d34c010ff27d6798526aa5b8998158d8f6c2f06"}, {0x10, 0x111, 0x7}, {0x18, 0x119, 0x8, "3f6be9763b02d00b"}, {0x108, 0x103, 0x6, "383ea372e36a72dcb1f6964813686473d285026ee27cfb4cf58362da9c519490fb58044790c1d2e9651c7371f95cc7e378bea44c4f50f5b678404871eac47da103c748a84604cb7249b46605fd78067a7a516f1082c51c008c9f95a830472e4ec91ac41ae39834dacae3205753822f900d7bb696d56bc623700e2a45c431e3cc5af79759e3e5bb99fb6e282ee26c6929832605a6daea77678b4bb743b29b724128ab5c7630af60333c18a38bd872fb2c110e15e7d300a3816fb91d3764e9de1c38f12790094db08b824b0b806250a28f6533ea042cd68bf0cc192444b6c17dbebfc552226cdb66563b025d0cc12102a5697a8a8b21"}, {0x48, 0x11f, 0x0, "c02ef38cf35612cbe45d57c552f19a7b8b133ea54d98cb28b3c0286b9e03b16def21e14f6eb8c7c1e7ebccc20ef1f66cd9"}], 0x1d0, 0x20000000}, 0x40800) [ 313.117524] CPU: 0 PID: 14088 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 313.124800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.134154] Call Trace: [ 313.136751] dump_stack+0x185/0x1e0 [ 313.140392] should_fail+0x8a7/0xae0 [ 313.144128] __alloc_pages_nodemask+0x622/0x6320 [ 313.148905] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 313.154367] ? get_page_from_freelist+0xb01f/0xbb50 [ 313.159397] ? __save_stack_trace+0xa45/0xca0 [ 313.163924] ? memcg_kmem_charge+0x5f8/0xac0 14:03:48 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000000040)={0x7ffffffb}, &(0x7f0000000080), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 313.168342] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 313.174059] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 313.180040] ? __alloc_pages_nodemask+0x105b/0x6320 [ 313.185066] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 313.190435] ? vmalloc_to_page+0x50b/0x630 [ 313.194680] ? kmsan_set_origin_inline+0x6b/0x120 [ 313.199541] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 313.204913] ? memcg_kmem_charge+0x79d/0xac0 [ 313.209336] kmsan_alloc_page+0x80/0xe0 [ 313.213325] __alloc_pages_nodemask+0x105b/0x6320 [ 313.218161] ? kmsan_set_origin_inline+0x6b/0x120 [ 313.223001] ? kmsan_set_origin_inline+0x6b/0x120 [ 313.227837] ? __msan_poison_alloca+0x183/0x220 [ 313.232492] ? _cond_resched+0x4c/0x100 [ 313.236466] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 313.241857] alloc_pages_current+0x6b1/0x970 [ 313.246272] pipe_write+0x7f0/0x1d30 [ 313.250021] ? pipe_read+0x1330/0x1330 [ 313.253915] __vfs_write+0x87e/0xb90 [ 313.257645] vfs_write+0x467/0x8c0 [ 313.261202] __x64_sys_write+0x1cf/0x400 [ 313.265276] ? ksys_write+0x380/0x380 [ 313.269081] do_syscall_64+0x15b/0x230 [ 313.272988] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 313.278179] RIP: 0033:0x455ab9 [ 313.281362] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.300673] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 313.308385] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 313.315654] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 313.322917] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 313.330186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 313.337458] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000d 14:03:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='children\x00') ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000280)=0x3) r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20000, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f0000000140)) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0xae12}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000200)={r4, 0x7fff}, 0x8) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYRESHEX=r1], 0x12}, 0x1}, 0x0) 14:03:48 executing program 2 (fault-call:3 fault-nth:14): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:48 executing program 6 (fault-call:3 fault-nth:24): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 313.543704] FAULT_INJECTION: forcing a failure. [ 313.543704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 313.555698] CPU: 0 PID: 14115 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 313.562999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.572773] Call Trace: [ 313.575416] dump_stack+0x185/0x1e0 [ 313.579109] should_fail+0x8a7/0xae0 [ 313.582878] __alloc_pages_nodemask+0x622/0x6320 [ 313.587684] ? kmsan_set_origin_inline+0x6b/0x120 [ 313.590819] FAULT_INJECTION: forcing a failure. [ 313.590819] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 313.592574] ? kmsan_set_origin_inline+0x6b/0x120 [ 313.609190] ? __msan_poison_alloca+0x183/0x220 [ 313.613896] ? _cond_resched+0x4c/0x100 [ 313.617893] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 313.623300] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 313.628790] alloc_pages_current+0x6b1/0x970 [ 313.633240] pipe_write+0x7f0/0x1d30 [ 313.637008] ? pipe_read+0x1330/0x1330 [ 313.640927] __vfs_write+0x87e/0xb90 [ 313.644672] vfs_write+0x467/0x8c0 [ 313.648253] __x64_sys_write+0x1cf/0x400 [ 313.652352] ? ksys_write+0x380/0x380 [ 313.656176] do_syscall_64+0x15b/0x230 [ 313.660078] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 313.665272] RIP: 0033:0x455ab9 [ 313.668451] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.687947] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 313.695669] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 313.702938] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 313.710209] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 313.717478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 313.724757] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000018 [ 313.732038] CPU: 1 PID: 14117 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 313.739318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.748669] Call Trace: [ 313.751268] dump_stack+0x185/0x1e0 [ 313.754906] should_fail+0x8a7/0xae0 [ 313.758637] __alloc_pages_nodemask+0x622/0x6320 [ 313.763416] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 313.768870] ? get_page_from_freelist+0xb01f/0xbb50 [ 313.773903] ? __save_stack_trace+0xa45/0xca0 [ 313.778425] ? memcg_kmem_charge+0x5f8/0xac0 [ 313.782847] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 313.788650] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 313.794626] ? __alloc_pages_nodemask+0x105b/0x6320 [ 313.799660] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 313.805033] ? vmalloc_to_page+0x50b/0x630 [ 313.809283] ? kmsan_set_origin_inline+0x6b/0x120 [ 313.814145] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 313.819517] ? memcg_kmem_charge+0x79d/0xac0 [ 313.823937] kmsan_alloc_page+0x80/0xe0 [ 313.827918] __alloc_pages_nodemask+0x105b/0x6320 [ 313.832772] ? kmsan_set_origin_inline+0x6b/0x120 [ 313.837629] ? kmsan_set_origin_inline+0x6b/0x120 14:03:48 executing program 7: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:03:48 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x4, 0x400080) r1 = getuid() getresgid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000300)) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./control\x00', &(0x7f0000000200)='fuseblk\x00', 0x20000, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x7}, 0x2c}, {@max_read={'max_read', 0x3d, 0x7fff}, 0x2c}, {@blksize={'blksize', 0x3d, 0x800}, 0x2c}, {@default_permissions='default_permissions', 0x2c}, {@max_read={'max_read', 0x3d, 0x1ff}, 0x2c}]}}) r3 = userfaultfd(0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r4, 0x40045730, &(0x7f0000000140)=0x800) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r5, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r3) 14:03:48 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) ioctl$RTC_PIE_OFF(r2, 0x7006) close(r0) [ 313.842479] ? __msan_poison_alloca+0x183/0x220 [ 313.847152] ? _cond_resched+0x4c/0x100 [ 313.851243] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 313.856638] alloc_pages_current+0x6b1/0x970 [ 313.861070] pipe_write+0x7f0/0x1d30 [ 313.864823] ? pipe_read+0x1330/0x1330 [ 313.868740] __vfs_write+0x87e/0xb90 [ 313.868769] vfs_write+0x467/0x8c0 14:03:48 executing program 6 (fault-call:3 fault-nth:25): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r2, 0xffffffffffffffe0}, &(0x7f00000001c0)=0x8) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 313.868798] __x64_sys_write+0x1cf/0x400 [ 313.868823] ? ksys_write+0x380/0x380 [ 313.868839] do_syscall_64+0x15b/0x230 [ 313.868861] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 313.868874] RIP: 0033:0x455ab9 [ 313.868878] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.869131] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 313.869148] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 313.869157] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 313.869165] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 313.869172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 313.869181] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000e [ 314.074863] FAULT_INJECTION: forcing a failure. [ 314.074863] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.148721] CPU: 1 PID: 14133 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 314.155994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.165351] Call Trace: [ 314.167954] dump_stack+0x185/0x1e0 [ 314.168768] FAULT_INJECTION: forcing a failure. [ 314.168768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.171598] should_fail+0x8a7/0xae0 [ 314.171630] __alloc_pages_nodemask+0x622/0x6320 [ 314.171663] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 314.171680] ? get_page_from_freelist+0xb01f/0xbb50 [ 314.171704] ? __save_stack_trace+0xa45/0xca0 [ 314.171745] ? memcg_kmem_charge+0x5f8/0xac0 [ 314.171767] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 314.171806] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 314.222944] ? __alloc_pages_nodemask+0x105b/0x6320 [ 314.227956] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.233311] ? vmalloc_to_page+0x50b/0x630 [ 314.237541] ? kmsan_set_origin_inline+0x6b/0x120 [ 314.242384] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 314.247738] ? memcg_kmem_charge+0x79d/0xac0 [ 314.252143] kmsan_alloc_page+0x80/0xe0 [ 314.256112] __alloc_pages_nodemask+0x105b/0x6320 [ 314.260947] ? kmsan_set_origin_inline+0x6b/0x120 [ 314.265806] ? kmsan_set_origin_inline+0x6b/0x120 [ 314.270651] ? __msan_poison_alloca+0x183/0x220 [ 314.275310] ? _cond_resched+0x4c/0x100 [ 314.279282] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 314.284649] alloc_pages_current+0x6b1/0x970 [ 314.289067] pipe_write+0x7f0/0x1d30 [ 314.292796] ? pipe_read+0x1330/0x1330 [ 314.296676] __vfs_write+0x87e/0xb90 [ 314.300394] vfs_write+0x467/0x8c0 [ 314.303935] __x64_sys_write+0x1cf/0x400 [ 314.308002] ? ksys_write+0x380/0x380 [ 314.311807] do_syscall_64+0x15b/0x230 [ 314.315696] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.320874] RIP: 0033:0x455ab9 [ 314.324049] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:03:49 executing program 2 (fault-call:3 fault-nth:15): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 314.343299] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 314.351000] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 314.358261] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 314.365523] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 314.372779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 314.380040] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000019 [ 314.387337] CPU: 0 PID: 14139 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 314.394642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.404022] Call Trace: [ 314.406664] dump_stack+0x185/0x1e0 [ 314.410335] should_fail+0x8a7/0xae0 [ 314.414102] __alloc_pages_nodemask+0x622/0x6320 [ 314.418900] ? kmsan_set_origin_inline+0x6b/0x120 [ 314.423789] ? kmsan_set_origin_inline+0x6b/0x120 [ 314.428672] ? __msan_poison_alloca+0x183/0x220 [ 314.433377] ? _cond_resched+0x4c/0x100 [ 314.437395] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 314.442831] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 314.448327] alloc_pages_current+0x6b1/0x970 [ 314.452783] pipe_write+0x7f0/0x1d30 [ 314.456593] ? pipe_read+0x1330/0x1330 [ 314.460543] __vfs_write+0x87e/0xb90 [ 314.464314] vfs_write+0x467/0x8c0 [ 314.467927] __x64_sys_write+0x1cf/0x400 [ 314.472051] ? ksys_write+0x380/0x380 [ 314.475905] do_syscall_64+0x15b/0x230 [ 314.479830] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.485041] RIP: 0033:0x455ab9 [ 314.488237] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.507840] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 314.515595] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 314.522916] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 314.530214] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 314.537516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 14:03:49 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000000)="b2", 0xfffffffffffffdff}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r1, r0) 14:03:49 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) flistxattr(r0, &(0x7f0000000040)=""/19, 0x13) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 314.544801] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000000f 14:03:49 executing program 2 (fault-call:3 fault-nth:16): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:49 executing program 6 (fault-call:3 fault-nth:26): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:49 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000100)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) getdents(r1, &(0x7f0000000000)=""/184, 0xb8) lseek(r0, 0x0, 0x2) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b'}], 0x1, 0x1) dup2(r1, r0) [ 314.801936] FAULT_INJECTION: forcing a failure. [ 314.801936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.813797] CPU: 1 PID: 14165 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 314.821069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.830422] Call Trace: [ 314.833024] dump_stack+0x185/0x1e0 [ 314.836666] should_fail+0x8a7/0xae0 [ 314.840399] __alloc_pages_nodemask+0x622/0x6320 [ 314.845177] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:03:49 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 314.850641] ? get_page_from_freelist+0xb01f/0xbb50 [ 314.855684] ? __save_stack_trace+0xa45/0xca0 [ 314.860197] ? apic_timer_interrupt+0xa/0x20 [ 314.864631] ? memcg_kmem_charge+0x5f8/0xac0 [ 314.869063] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 314.874876] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 314.880859] ? __alloc_pages_nodemask+0x105b/0x6320 [ 314.885894] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.891269] ? vmalloc_to_page+0x50b/0x630 [ 314.895528] ? kmsan_set_origin_inline+0x6b/0x120 [ 314.900397] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 314.905779] ? memcg_kmem_charge+0x79d/0xac0 [ 314.910206] kmsan_alloc_page+0x80/0xe0 [ 314.914194] __alloc_pages_nodemask+0x105b/0x6320 [ 314.919062] ? kmsan_set_origin_inline+0x6b/0x120 [ 314.923929] ? kmsan_set_origin_inline+0x6b/0x120 [ 314.928786] ? __msan_poison_alloca+0x183/0x220 [ 314.933469] ? _cond_resched+0x4c/0x100 [ 314.937467] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 314.942857] alloc_pages_current+0x6b1/0x970 [ 314.947283] pipe_write+0x7f0/0x1d30 14:03:49 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000080)={0x0, 0x757}, 0x8) close(r0) [ 314.951036] ? pipe_read+0x1330/0x1330 [ 314.954934] __vfs_write+0x87e/0xb90 [ 314.958678] vfs_write+0x467/0x8c0 [ 314.962241] __x64_sys_write+0x1cf/0x400 [ 314.966317] ? ksys_write+0x380/0x380 [ 314.970130] do_syscall_64+0x15b/0x230 [ 314.974035] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 314.979227] RIP: 0033:0x455ab9 [ 314.982417] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.001768] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 315.009502] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 315.016792] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 315.024083] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 315.031375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 315.038688] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001a [ 315.107230] FAULT_INJECTION: forcing a failure. [ 315.107230] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.119091] CPU: 0 PID: 14176 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 315.126371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.135734] Call Trace: [ 315.138345] dump_stack+0x185/0x1e0 [ 315.141996] should_fail+0x8a7/0xae0 [ 315.145738] __alloc_pages_nodemask+0x622/0x6320 [ 315.150566] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 315.156045] ? get_page_from_freelist+0xb01f/0xbb50 [ 315.161093] ? __save_stack_trace+0xa45/0xca0 [ 315.165637] ? memcg_kmem_charge+0x5f8/0xac0 [ 315.170154] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 315.175879] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 315.181862] ? __alloc_pages_nodemask+0x105b/0x6320 [ 315.186896] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 315.192268] ? kmsan_set_origin_inline+0x6b/0x120 [ 315.197132] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 315.202516] ? memcg_kmem_charge+0x79d/0xac0 [ 315.206939] kmsan_alloc_page+0x80/0xe0 [ 315.210926] __alloc_pages_nodemask+0x105b/0x6320 [ 315.215778] ? kmsan_set_origin_inline+0x6b/0x120 [ 315.220639] ? __msan_poison_alloca+0x183/0x220 [ 315.225312] ? finish_task_switch+0x130/0x260 [ 315.229797] ? kmsan_set_origin_inline+0x6b/0x120 [ 315.234626] ? __msan_poison_alloca+0x183/0x220 [ 315.239287] ? _cond_resched+0x4c/0x100 [ 315.243248] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 315.248605] alloc_pages_current+0x6b1/0x970 [ 315.253003] pipe_write+0x7f0/0x1d30 [ 315.256721] ? pipe_read+0x1330/0x1330 [ 315.260595] __vfs_write+0x87e/0xb90 [ 315.264303] vfs_write+0x467/0x8c0 [ 315.267836] __x64_sys_write+0x1cf/0x400 [ 315.271885] ? ksys_write+0x380/0x380 [ 315.275667] do_syscall_64+0x15b/0x230 [ 315.279577] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 315.284751] RIP: 0033:0x455ab9 [ 315.287917] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:03:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x0) write$P9_RWALK(r1, &(0x7f00000000c0)={0x16, 0x6f, 0x1, {0x1, [{0x1, 0x0, 0x6}]}}, 0x16) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x60}, 0x1}, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x11) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)) 14:03:50 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) ioctl$RTC_PIE_OFF(r2, 0x7006) close(r0) 14:03:50 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) fsync(r0) unshare(0x24020400) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x89f3, &(0x7f00000000c0)={'tunl0\x00', @ifru_map}) r3 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x2, &(0x7f0000000100)=[{0x7ff, 0x1000, 0x200, 0x5}, {0x7, 0x3, 0x3, 0x10000}]}, 0x10) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x0) [ 315.307106] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 315.314798] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 315.322061] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 315.329329] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 315.336588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 315.343838] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000010 14:03:50 executing program 7: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f00000000c0)={0x2, 0x7}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, &(0x7f0000000240), 0x1d, 0x102) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000100)={@ipv4={[], [], @dev}}, &(0x7f0000000140)=0x14) 14:03:50 executing program 2 (fault-call:3 fault-nth:17): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:50 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x10) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:03:50 executing program 6 (fault-call:3 fault-nth:27): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:50 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0xfe55}, 0x1}, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=""/200, 0xc8) dup2(r1, r0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x896, 0xd53a01122495ea48) [ 315.657632] FAULT_INJECTION: forcing a failure. [ 315.657632] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.669491] CPU: 0 PID: 14205 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 315.676767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.686121] Call Trace: [ 315.688724] dump_stack+0x185/0x1e0 [ 315.692370] should_fail+0x8a7/0xae0 [ 315.696108] __alloc_pages_nodemask+0x622/0x6320 [ 315.700889] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 315.706353] ? get_page_from_freelist+0xb01f/0xbb50 [ 315.711391] ? __save_stack_trace+0xa45/0xca0 [ 315.715922] ? memcg_kmem_charge+0x5f8/0xac0 [ 315.720347] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 315.726161] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 315.732145] ? __alloc_pages_nodemask+0x105b/0x6320 [ 315.737177] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 315.742555] ? vmalloc_to_page+0x50b/0x630 [ 315.746812] ? kmsan_set_origin_inline+0x6b/0x120 [ 315.751679] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 315.757061] ? memcg_kmem_charge+0x79d/0xac0 [ 315.761495] kmsan_alloc_page+0x80/0xe0 [ 315.765491] __alloc_pages_nodemask+0x105b/0x6320 [ 315.770347] ? kmsan_set_origin_inline+0x6b/0x120 [ 315.775202] ? kmsan_set_origin_inline+0x6b/0x120 [ 315.780052] ? __msan_poison_alloca+0x183/0x220 [ 315.784732] ? _cond_resched+0x4c/0x100 [ 315.788728] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 315.794123] alloc_pages_current+0x6b1/0x970 [ 315.798554] pipe_write+0x7f0/0x1d30 [ 315.802311] ? pipe_read+0x1330/0x1330 [ 315.806213] __vfs_write+0x87e/0xb90 [ 315.809961] vfs_write+0x467/0x8c0 [ 315.813528] __x64_sys_write+0x1cf/0x400 [ 315.817614] ? ksys_write+0x380/0x380 [ 315.821428] do_syscall_64+0x15b/0x230 [ 315.825337] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 315.830535] RIP: 0033:0x455ab9 [ 315.833724] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:03:50 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x1, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300030c00c3a24a3c0000000000000200090002000000ad887e0f2c8c479b0200001075c3ca585439828dca766ec699000000000002000000e0000054d81458186fe8b9000200010000000000000006fc921656ed6bd8510f00000800d300000002000000e00000010000000000000000fb2b435f120129ee3bf29934a488cede616fa826e5"], 0x60}, 0x1}, 0x3) getcwd(&(0x7f0000000080)=""/85, 0x55) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)) [ 315.853077] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 315.860796] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 315.868072] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 315.875350] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 315.882580] FAULT_INJECTION: forcing a failure. [ 315.882580] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 315.882621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 315.882653] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000011 [ 315.908986] CPU: 1 PID: 14210 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 315.916289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.925664] Call Trace: [ 315.928300] dump_stack+0x185/0x1e0 [ 315.931971] should_fail+0x8a7/0xae0 [ 315.935744] __alloc_pages_nodemask+0x622/0x6320 [ 315.940558] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 315.945783] ? __msan_poison_alloca+0x183/0x220 [ 315.950517] ? kmsan_set_origin_inline+0x6b/0x120 [ 315.955389] ? __msan_poison_alloca+0x183/0x220 [ 315.960108] ? _cond_resched+0x4c/0x100 [ 315.964117] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 315.969539] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 315.975037] alloc_pages_current+0x6b1/0x970 [ 315.979520] pipe_write+0x7f0/0x1d30 [ 315.983323] ? pipe_read+0x1330/0x1330 [ 315.987267] __vfs_write+0x87e/0xb90 [ 315.991043] vfs_write+0x467/0x8c0 [ 315.994655] __x64_sys_write+0x1cf/0x400 [ 315.998789] ? ksys_write+0x380/0x380 [ 316.002639] do_syscall_64+0x15b/0x230 [ 316.006567] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 316.011777] RIP: 0033:0x455ab9 [ 316.015010] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.034620] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 316.042373] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 316.049675] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 316.056969] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 316.064264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 316.071563] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001b 14:03:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000040)) 14:03:51 executing program 2 (fault-call:3 fault-nth:18): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:51 executing program 6 (fault-call:3 fault-nth:28): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 316.275023] FAULT_INJECTION: forcing a failure. [ 316.275023] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 316.286869] CPU: 0 PID: 14223 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 316.294145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.299268] FAULT_INJECTION: forcing a failure. [ 316.299268] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 316.303497] Call Trace: [ 316.303525] dump_stack+0x185/0x1e0 [ 316.303550] should_fail+0x8a7/0xae0 [ 316.303582] __alloc_pages_nodemask+0x622/0x6320 [ 316.303616] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 316.303634] ? get_page_from_freelist+0xb01f/0xbb50 [ 316.303657] ? __save_stack_trace+0xa45/0xca0 [ 316.303699] ? memcg_kmem_charge+0x5f8/0xac0 [ 316.303722] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 316.303742] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 316.303759] ? __alloc_pages_nodemask+0x105b/0x6320 [ 316.303780] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 316.303825] ? kmsan_set_origin_inline+0x6b/0x120 [ 316.376321] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 316.381688] ? memcg_kmem_charge+0x79d/0xac0 [ 316.386094] kmsan_alloc_page+0x80/0xe0 [ 316.390070] __alloc_pages_nodemask+0x105b/0x6320 [ 316.394911] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 316.400094] ? __msan_poison_alloca+0x183/0x220 [ 316.404773] ? kmsan_set_origin_inline+0x6b/0x120 [ 316.409614] ? __msan_poison_alloca+0x183/0x220 [ 316.414277] ? _cond_resched+0x4c/0x100 [ 316.418259] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 316.423635] alloc_pages_current+0x6b1/0x970 [ 316.428051] pipe_write+0x7f0/0x1d30 [ 316.431782] ? pipe_read+0x1330/0x1330 [ 316.435663] __vfs_write+0x87e/0xb90 [ 316.439383] vfs_write+0x467/0x8c0 [ 316.442926] __x64_sys_write+0x1cf/0x400 [ 316.446988] ? ksys_write+0x380/0x380 [ 316.450782] do_syscall_64+0x15b/0x230 [ 316.454678] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 316.459855] RIP: 0033:0x455ab9 [ 316.463031] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.482281] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 316.489981] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 316.497240] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 316.504503] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 316.511760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 316.519017] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001c [ 316.526312] CPU: 1 PID: 14228 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 316.533611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.542987] Call Trace: [ 316.545623] dump_stack+0x185/0x1e0 [ 316.549292] should_fail+0x8a7/0xae0 [ 316.553053] __alloc_pages_nodemask+0x622/0x6320 [ 316.557855] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 316.563076] ? __msan_poison_alloca+0x183/0x220 [ 316.570766] ? kmsan_set_origin_inline+0x6b/0x120 [ 316.575645] ? __msan_poison_alloca+0x183/0x220 [ 316.580344] ? _cond_resched+0x4c/0x100 [ 316.584359] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 316.589784] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 316.595281] alloc_pages_current+0x6b1/0x970 [ 316.599733] pipe_write+0x7f0/0x1d30 [ 316.603530] ? pipe_read+0x1330/0x1330 [ 316.607480] __vfs_write+0x87e/0xb90 [ 316.611289] vfs_write+0x467/0x8c0 [ 316.614897] __x64_sys_write+0x1cf/0x400 [ 316.619027] ? ksys_write+0x380/0x380 [ 316.622879] do_syscall_64+0x15b/0x230 [ 316.626812] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 316.632023] RIP: 0033:0x455ab9 [ 316.635218] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.654811] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 316.662554] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 316.669848] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 14:03:51 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000180)='./control\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 316.677154] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 316.684443] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 316.691733] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000012 14:03:51 executing program 6 (fault-call:3 fault-nth:29): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:51 executing program 2 (fault-call:3 fault-nth:19): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:51 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(r2, 0x7006) close(r0) 14:03:51 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200040, 0x0) ioctl$sock_bt(r0, 0x0, &(0x7f0000000040)="db96a2f1c5ae0df787376fdedae8cd43221dd5a267d9e3de0ffa7dda4306a6e92579fb783af6b7") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0xfffffffffffffced}], 0xf93bbacda6748f8, 0x0) pipe(&(0x7f0000000080)) dup2(r2, r1) 14:03:51 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x1000000000400000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={r1, 0x5}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x9}, &(0x7f0000000180)=0x8) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x14d) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r3, &(0x7f0000000000)={0x18}, 0x18) r4 = getpid() ptrace$peek(0x1, r4, &(0x7f0000000380)) getsockopt$inet_dccp_int(r2, 0x21, 0x1f, &(0x7f00000001c0), &(0x7f0000000200)=0x4) dup2(r3, r2) 14:03:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900800000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 317.012272] FAULT_INJECTION: forcing a failure. [ 317.012272] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 317.024131] CPU: 1 PID: 14260 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 317.031402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.040755] Call Trace: [ 317.043359] dump_stack+0x185/0x1e0 [ 317.047004] should_fail+0x8a7/0xae0 [ 317.050740] __alloc_pages_nodemask+0x622/0x6320 [ 317.055525] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 317.060995] ? get_page_from_freelist+0xb01f/0xbb50 [ 317.066024] ? __save_stack_trace+0xa45/0xca0 [ 317.070555] ? memcg_kmem_charge+0x5f8/0xac0 [ 317.074977] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 317.080707] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 317.086685] ? __alloc_pages_nodemask+0x105b/0x6320 [ 317.091714] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.097082] ? vmalloc_to_page+0x50b/0x630 [ 317.101333] ? kmsan_set_origin_inline+0x6b/0x120 [ 317.106204] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 317.111584] ? memcg_kmem_charge+0x79d/0xac0 [ 317.116015] kmsan_alloc_page+0x80/0xe0 [ 317.120005] __alloc_pages_nodemask+0x105b/0x6320 [ 317.124861] ? kmsan_set_origin_inline+0x6b/0x120 [ 317.129717] ? kmsan_set_origin_inline+0x6b/0x120 [ 317.134573] ? __msan_poison_alloca+0x183/0x220 [ 317.139247] ? _cond_resched+0x4c/0x100 [ 317.143240] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 317.148633] alloc_pages_current+0x6b1/0x970 [ 317.153066] pipe_write+0x7f0/0x1d30 [ 317.156813] ? pipe_read+0x1330/0x1330 [ 317.160708] __vfs_write+0x87e/0xb90 [ 317.164444] vfs_write+0x467/0x8c0 [ 317.168008] __x64_sys_write+0x1cf/0x400 [ 317.172092] ? ksys_write+0x380/0x380 [ 317.175900] do_syscall_64+0x15b/0x230 [ 317.178769] FAULT_INJECTION: forcing a failure. [ 317.178769] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 317.179809] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.196750] RIP: 0033:0x455ab9 [ 317.199923] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.219200] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 317.226904] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 317.234159] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 317.241418] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 317.248674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 317.255931] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000013 [ 317.263212] CPU: 0 PID: 14262 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 317.270494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.279851] Call Trace: [ 317.282454] dump_stack+0x185/0x1e0 [ 317.286104] should_fail+0x8a7/0xae0 [ 317.289843] __alloc_pages_nodemask+0x622/0x6320 [ 317.294623] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 317.300083] ? get_page_from_freelist+0xb01f/0xbb50 [ 317.305111] ? __save_stack_trace+0xa45/0xca0 14:03:52 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000000080), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f00000000c0)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:03:52 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001c0000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x101000, 0x0) dup2(r1, r0) [ 317.309645] ? memcg_kmem_charge+0x5f8/0xac0 [ 317.318241] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 317.324051] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 317.330037] ? __alloc_pages_nodemask+0x105b/0x6320 [ 317.335073] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.340459] ? kmsan_set_origin_inline+0x6b/0x120 [ 317.345332] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 317.350706] ? memcg_kmem_charge+0x79d/0xac0 [ 317.355128] kmsan_alloc_page+0x80/0xe0 [ 317.359115] __alloc_pages_nodemask+0x105b/0x6320 [ 317.363970] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 317.369168] ? __msan_poison_alloca+0x183/0x220 [ 317.373862] ? kmsan_set_origin_inline+0x6b/0x120 [ 317.378715] ? __msan_poison_alloca+0x183/0x220 [ 317.383393] ? _cond_resched+0x4c/0x100 [ 317.387386] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 317.392777] alloc_pages_current+0x6b1/0x970 [ 317.397201] pipe_write+0x7f0/0x1d30 [ 317.400949] ? pipe_read+0x1330/0x1330 [ 317.404846] __vfs_write+0x87e/0xb90 [ 317.408591] vfs_write+0x467/0x8c0 [ 317.412155] __x64_sys_write+0x1cf/0x400 [ 317.416235] ? ksys_write+0x380/0x380 [ 317.420042] do_syscall_64+0x15b/0x230 [ 317.423946] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.429139] RIP: 0033:0x455ab9 [ 317.432320] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.451646] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 317.459364] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 317.466639] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 317.473914] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 317.481190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 317.488470] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001d 14:03:52 executing program 2 (fault-call:3 fault-nth:20): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x41) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)=0xffff, 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) [ 317.660317] FAULT_INJECTION: forcing a failure. [ 317.660317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 317.672166] CPU: 0 PID: 14285 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 317.679443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.688794] Call Trace: [ 317.691374] dump_stack+0x185/0x1e0 [ 317.694988] should_fail+0x8a7/0xae0 [ 317.698695] __alloc_pages_nodemask+0x622/0x6320 [ 317.703449] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 317.708804] ? vmalloc_to_page+0x50b/0x630 [ 317.713046] ? vmalloc_to_page_or_null+0x3b/0xa0 [ 317.717816] ? perf_trace_buf_update+0xf0/0x150 [ 317.722492] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 317.727946] ? perf_tp_event+0xd1e/0xd90 [ 317.732020] ? memcg_kmem_charge+0x5f8/0xac0 [ 317.736429] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 317.742216] ? task_kmsan_context_state+0x6b/0x120 [ 317.747151] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 317.752514] ? vmalloc_to_page+0x50b/0x630 [ 317.756761] ? task_kmsan_context_state+0x6b/0x120 [ 317.761691] ? perf_trace_run_bpf_submit+0x2be/0x3d0 [ 317.766814] ? perf_trace_mm_page_alloc+0x521/0x5e0 [ 317.771846] kmsan_alloc_page+0x80/0xe0 [ 317.775821] ? trace_event_raw_event_mm_page_alloc+0x500/0x500 [ 317.781778] __alloc_pages_nodemask+0x105b/0x6320 [ 317.786621] ? kmsan_set_origin_inline+0x6b/0x120 [ 317.791473] ? kmsan_set_origin_inline+0x6b/0x120 [ 317.796313] ? __msan_poison_alloca+0x183/0x220 [ 317.800969] ? _cond_resched+0x4c/0x100 [ 317.804952] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 317.810332] alloc_pages_current+0x6b1/0x970 [ 317.814743] pipe_write+0x7f0/0x1d30 [ 317.818458] ? pipe_read+0x1330/0x1330 [ 317.822337] __vfs_write+0x87e/0xb90 [ 317.826070] vfs_write+0x467/0x8c0 [ 317.829606] __x64_sys_write+0x1cf/0x400 [ 317.833657] ? ksys_write+0x380/0x380 [ 317.837458] do_syscall_64+0x15b/0x230 [ 317.841353] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.846538] RIP: 0033:0x455ab9 [ 317.849723] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.868976] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 317.876694] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 317.883982] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 317.891261] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 317.898541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 14:03:52 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:03:52 executing program 6 (fault-call:3 fault-nth:30): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 317.905814] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000014 [ 318.026232] FAULT_INJECTION: forcing a failure. [ 318.026232] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.038366] CPU: 1 PID: 14299 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 318.045669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.055042] Call Trace: [ 318.057693] dump_stack+0x185/0x1e0 [ 318.061389] should_fail+0x8a7/0xae0 [ 318.065152] __alloc_pages_nodemask+0x622/0x6320 [ 318.069959] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 318.075192] ? __msan_poison_alloca+0x183/0x220 [ 318.079933] ? kmsan_set_origin_inline+0x6b/0x120 [ 318.084823] ? __msan_poison_alloca+0x183/0x220 [ 318.089572] ? _cond_resched+0x4c/0x100 [ 318.093601] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 318.099019] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 318.104518] alloc_pages_current+0x6b1/0x970 [ 318.108986] pipe_write+0x7f0/0x1d30 [ 318.112806] ? pipe_read+0x1330/0x1330 [ 318.116770] __vfs_write+0x87e/0xb90 [ 318.120560] vfs_write+0x467/0x8c0 [ 318.124186] __x64_sys_write+0x1cf/0x400 [ 318.128322] ? ksys_write+0x380/0x380 [ 318.132185] do_syscall_64+0x15b/0x230 [ 318.136125] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 318.141348] RIP: 0033:0x455ab9 [ 318.144552] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.164191] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:03:53 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) ioctl$RTC_PIE_OFF(r2, 0x7006) close(r0) 14:03:53 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18, 0x71, 0x2, {{0x4, 0x4, 0x3}, 0x81}}, 0x18) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) futex(&(0x7f00000001c0)=0x2, 0x3, 0x3, &(0x7f0000000080)={0x77359400}, &(0x7f0000000100)=0x1, 0x3) dup2(r1, r0) 14:03:53 executing program 2 (fault-call:3 fault-nth:21): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 318.171928] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 318.179236] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 318.186540] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 318.193839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 318.201132] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001e [ 318.302730] FAULT_INJECTION: forcing a failure. [ 318.302730] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.314879] CPU: 1 PID: 14320 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 318.322185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.331561] Call Trace: [ 318.334205] dump_stack+0x185/0x1e0 [ 318.337903] should_fail+0x8a7/0xae0 [ 318.341670] __alloc_pages_nodemask+0x622/0x6320 [ 318.346474] ? kmsan_set_origin_inline+0x6b/0x120 14:03:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="020300030c00000000000000fa8848979c4982d4d766dfba000002000000e0000054d81458186fe8b90002000100000000000000010000000000000000"], 0x3d}, 0x1}, 0x0) prctl$intptr(0x21, 0x5) [ 318.351363] ? kmsan_set_origin_inline+0x6b/0x120 [ 318.356241] ? __msan_poison_alloca+0x183/0x220 [ 318.360963] ? _cond_resched+0x4c/0x100 [ 318.364993] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 318.370422] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 318.375918] alloc_pages_current+0x6b1/0x970 [ 318.380375] pipe_write+0x7f0/0x1d30 [ 318.384180] ? pipe_read+0x1330/0x1330 [ 318.388130] __vfs_write+0x87e/0xb90 [ 318.391904] vfs_write+0x467/0x8c0 [ 318.395519] __x64_sys_write+0x1cf/0x400 [ 318.399648] ? ksys_write+0x380/0x380 [ 318.404086] do_syscall_64+0x15b/0x230 [ 318.408026] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 318.413242] RIP: 0033:0x455ab9 [ 318.416438] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.436068] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 318.443815] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 14:03:53 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r1, r0) [ 318.451114] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 318.458405] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 318.465699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 318.472996] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000015 14:03:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000036f3efa8e9eb16c05000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) 14:03:53 executing program 6 (fault-call:3 fault-nth:31): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:53 executing program 2 (fault-call:3 fault-nth:22): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 318.692254] FAULT_INJECTION: forcing a failure. [ 318.692254] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.704097] CPU: 1 PID: 14337 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 318.711369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.720820] Call Trace: [ 318.723422] dump_stack+0x185/0x1e0 [ 318.727069] should_fail+0x8a7/0xae0 [ 318.730808] __alloc_pages_nodemask+0x622/0x6320 [ 318.735594] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 318.740770] FAULT_INJECTION: forcing a failure. [ 318.740770] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.741063] ? get_page_from_freelist+0xb01f/0xbb50 [ 318.757844] ? __save_stack_trace+0xa45/0xca0 [ 318.762351] ? memcg_kmem_charge+0x5f8/0xac0 [ 318.766758] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 318.772467] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 318.778433] ? __alloc_pages_nodemask+0x105b/0x6320 [ 318.783449] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 318.788815] ? kmsan_set_origin_inline+0x6b/0x120 [ 318.793662] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 318.799015] ? memcg_kmem_charge+0x79d/0xac0 [ 318.803418] kmsan_alloc_page+0x80/0xe0 [ 318.807392] __alloc_pages_nodemask+0x105b/0x6320 [ 318.812228] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 318.817408] ? __msan_poison_alloca+0x183/0x220 [ 318.822076] ? kmsan_set_origin_inline+0x6b/0x120 [ 318.826912] ? __msan_poison_alloca+0x183/0x220 [ 318.831571] ? _cond_resched+0x4c/0x100 [ 318.835542] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 318.840911] alloc_pages_current+0x6b1/0x970 [ 318.845321] pipe_write+0x7f0/0x1d30 [ 318.849052] ? pipe_read+0x1330/0x1330 [ 318.852932] __vfs_write+0x87e/0xb90 [ 318.856655] vfs_write+0x467/0x8c0 [ 318.860201] __x64_sys_write+0x1cf/0x400 [ 318.864260] ? ksys_write+0x380/0x380 [ 318.868053] do_syscall_64+0x15b/0x230 [ 318.871941] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 318.877121] RIP: 0033:0x455ab9 [ 318.880297] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.899565] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 318.907265] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 318.914524] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 318.921783] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 318.929039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 318.936317] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001f [ 318.943597] CPU: 0 PID: 14339 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 318.950880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.960241] Call Trace: [ 318.962842] dump_stack+0x185/0x1e0 [ 318.966484] should_fail+0x8a7/0xae0 [ 318.970217] __alloc_pages_nodemask+0x622/0x6320 [ 318.974996] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 318.980449] ? get_page_from_freelist+0xb01f/0xbb50 [ 318.985464] ? __save_stack_trace+0xa45/0xca0 [ 318.989971] ? memcg_kmem_charge+0x5f8/0xac0 [ 318.994376] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 319.000079] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 319.006048] ? __alloc_pages_nodemask+0x105b/0x6320 [ 319.011069] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.016430] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.021271] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 319.026756] ? memcg_kmem_charge+0x79d/0xac0 [ 319.031157] kmsan_alloc_page+0x80/0xe0 [ 319.035126] __alloc_pages_nodemask+0x105b/0x6320 [ 319.039959] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.044793] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.049634] ? __msan_poison_alloca+0x183/0x220 [ 319.054291] ? _cond_resched+0x4c/0x100 [ 319.058263] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 319.063626] alloc_pages_current+0x6b1/0x970 [ 319.068041] pipe_write+0x7f0/0x1d30 [ 319.071780] ? pipe_read+0x1330/0x1330 [ 319.075658] __vfs_write+0x87e/0xb90 [ 319.079372] vfs_write+0x467/0x8c0 [ 319.082911] __x64_sys_write+0x1cf/0x400 [ 319.086965] ? ksys_write+0x380/0x380 [ 319.090752] do_syscall_64+0x15b/0x230 [ 319.094634] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.099809] RIP: 0033:0x455ab9 [ 319.102983] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.122232] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 319.129926] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 319.137183] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 319.144439] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 319.151693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 319.158954] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000016 14:03:54 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f00000000c0)=0x3, 0x2, 0x0, &(0x7f0000000100)={0x77359400, 0x4}, &(0x7f0000000140), 0x1) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:03:54 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) close(r0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) r2 = dup2(r0, r0) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000040)={0x6, 0xfffffffffffffffc}) 14:03:54 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) 14:03:54 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) ioctl$RTC_PIE_OFF(r2, 0x7006) close(r0) 14:03:54 executing program 6 (fault-call:3 fault-nth:32): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 319.438037] FAULT_INJECTION: forcing a failure. [ 319.438037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 319.449898] CPU: 0 PID: 14358 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 319.457188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.466559] Call Trace: [ 319.469164] dump_stack+0x185/0x1e0 [ 319.472814] should_fail+0x8a7/0xae0 [ 319.476558] __alloc_pages_nodemask+0x622/0x6320 [ 319.481347] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 319.486877] ? get_page_from_freelist+0xb01f/0xbb50 [ 319.491912] ? __save_stack_trace+0xa45/0xca0 [ 319.496439] ? memcg_kmem_charge+0x5f8/0xac0 [ 319.500859] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 319.506669] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 319.512652] ? __alloc_pages_nodemask+0x105b/0x6320 [ 319.517690] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.523066] ? vmalloc_to_page+0x50b/0x630 [ 319.527318] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.532186] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 319.537564] ? memcg_kmem_charge+0x79d/0xac0 [ 319.541985] kmsan_alloc_page+0x80/0xe0 [ 319.545973] __alloc_pages_nodemask+0x105b/0x6320 [ 319.550823] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.555679] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.560530] ? __msan_poison_alloca+0x183/0x220 [ 319.565203] ? _cond_resched+0x4c/0x100 [ 319.569192] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 319.575155] alloc_pages_current+0x6b1/0x970 [ 319.579581] pipe_write+0x7f0/0x1d30 [ 319.583353] ? pipe_read+0x1330/0x1330 [ 319.587268] __vfs_write+0x87e/0xb90 [ 319.591013] vfs_write+0x467/0x8c0 [ 319.594580] __x64_sys_write+0x1cf/0x400 [ 319.598663] ? ksys_write+0x380/0x380 [ 319.602469] do_syscall_64+0x15b/0x230 [ 319.606383] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.611576] RIP: 0033:0x455ab9 [ 319.614764] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:03:54 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x3, 0x0, 0x3, 0x4}}, 0x80, &(0x7f0000000740)=[{&(0x7f00000000c0)="5e4badc336f7a03a66d85b2b8060005933ef02ad067713378e7f89eb601e851642f3f067d0a626162efe97cc10adaa", 0x2f}, {&(0x7f0000000180)="282c917eeed07c61230d42385d49cf564d7c5a3e2b70b7714da9c9d9575a48622d08e2efe5a52ea26c3bde9a3ab4c1fc3d80259d18cfbd4a338dcdf6e66c9a7e0444d46e0f46ed1c27442ca44c", 0x4d}, {&(0x7f0000000100)}, {&(0x7f0000000380)="b5f64f701ccc95a01be9f415777e6c3900ddfd3382fea186f350afc0b2540910cd35e507988df1bb975255299af8d2c5f1726116bdb09f74ef55c2e8f994d23aa099c3f44a12f097e0e0933c04551bf461561efe56787e9a0f445229b761381c380d27388e0ee0e9f48615fdad9adae789d5cb829e7908c12f74fd82773fa056bfec1d75569d128ae88d9b174393d90f", 0x90}, {&(0x7f0000000200)="af1af74de4a3dd2512f02bbc21e197698e2529f25e77935b2f2177f7104cdd607d67", 0x22}, {&(0x7f0000000440)="70ec08ce6117340dbccc4cccf2af2c6313c5b517500df1f7028a6f70ef3fde9665cb8bf1651946c72e4a14f3c5c842ee36bb4147f35133373d67e45a00642646cec8f64970474d7a3cc61b2d373b5343be2b680f4f39b4ea058685e3600b95f2c1ec58cc7692a219bcc00f3f5c20187473d3d5d166481947923f7346899f51a0eeed2f1c1c3984480fa3e2e502b7bb51825cf208d3d096979a31513aa168877e8a3d6a2b9e17aae9b2a695cc42ada2e2c126ccb0e77effb7e2133cfea65c", 0xbe}, {&(0x7f0000000500)="f52087cf0de670d7f6b071126fa2637e09808fbf175f86d1e654f6a86d6684fd82161df1dc5e4833a9dab34f663fb26213c96287766115dd4cce51c8f56b436608", 0x41}, {&(0x7f00000005c0)="346cb9433276d425fdbb8bcde2bde391ce4711188c668f4339beccca0589a01278a4553c4f43af4da567907a446ec0f70c52657379b730f71b6bd9ffd16dc0a6a1667968762a2dcfb400277b5444659407f71b6a9ba26958991c07b7b566cb6da06d98080a3782e0c40fd1c307406ab63224d1da0447c4a2ff24014fbae1aeb26f0c1a0915851364105e595c9bd37cba250288d3034d547851f549a5d779c78997540557d0275027a0aabd341d", 0xad}, {&(0x7f0000000680)="275e4115961723b38492ffc5ac4468b5767c709ad308c7b04821063ee90efc8c73ddf9a7de439ce722d3282c5303f3f9d651a810f3580c87eeb99cb879749562f6b02de1b464270a30d14ebcb831fd220eb4b12dc34dfa85dc79008379234ffdbec23119531d19ffaaf17f5a05d5a3ec588f51be51b9e3257b61af146add90722ead8fe8e8165fe6d1fdc05fdd5ee84ce509fc7e22955b4e99854194cc5e48011cd6c2dd7079", 0xa6}], 0x9, 0x0, 0x0, 0x404c015}, 0x20000044) dup2(r1, r0) 14:03:54 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap(&(0x7f0000012000/0x3000)=nil, 0x3000, 0x2000000, 0x10010, r0, 0x2) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r1) 14:03:54 executing program 2 (fault-call:3 fault-nth:23): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:54 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80100, 0x0) fcntl$setpipe(r0, 0x407, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000280)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) setresuid(r2, r3, r4) setsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000380)="63870a973739e69556e07869d5bd2bd16906dbf2e16c915998021f78b8ab8b4584334eb8db41a386ed4632ce86b61cf4b94fcbd2c0e1bfc52759ef2b49677edad6c120d52b30e507239f71e0742c79dc668cc1e1f2eb17bd3fdd224ab862e343f0038d09c1b5c88a89f7e8d27ab7aca407c453", 0x73) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000180)={r1, r1, 0x7, 0x3, &(0x7f0000000040)="74d755589a1430f2a6988d2bfb7f3c86abfafd5d272d806fa4ea4b6cf1aa7ffb91b34f50b5c295ce98475d99450be36cd02879b7927ba2ba658b9e130402ac589f1c1b6087735ec5447d16a61cd0c9dda80fca497e81efd455c6c10f3f81e23e1b863d66aeb17ef3466eedbd6f6f9605ea5e9f7be6c9c7af8d93b57c3c5ccf11801148f8437ba6372f9f9a7d20de9d1461b08a002f63639dc61adc46d90443207a0be2636f0028244ff23eba570cb013cc7e6cb6e505123500237aad09", 0x95, 0x6, 0x7fff, 0x1000, 0x0, 0x8, 0x20, "f8588b80b7f1b9df1365fd967734794902a66f6091913ebcc5632c2cbd5948a03f36613dcb883fecb46b80b85e75e1a2ce89e505b11ce7c19327efab604c0c8b7fc4654629495be659c3a48c0fc57a0d40ce9365c8f195048ca3ceffb2031b24aac77153153b3390826fbbfc095c88a7adcb5e196ab3dad0659a742efac0411d1432ba4b0f3ca160170c0c8388"}) dup2(r1, r0) [ 319.634111] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 319.641827] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 319.649104] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 319.656384] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 319.663660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 319.670938] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000020 [ 319.876508] FAULT_INJECTION: forcing a failure. [ 319.876508] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 319.888358] CPU: 0 PID: 14388 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 319.895628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.904978] Call Trace: [ 319.907579] dump_stack+0x185/0x1e0 [ 319.911216] should_fail+0x8a7/0xae0 [ 319.914947] __alloc_pages_nodemask+0x622/0x6320 [ 319.919719] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 319.925171] ? get_page_from_freelist+0xb01f/0xbb50 [ 319.930217] ? __save_stack_trace+0xa45/0xca0 [ 319.934747] ? memcg_kmem_charge+0x5f8/0xac0 [ 319.939174] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 319.944987] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 319.950969] ? __alloc_pages_nodemask+0x105b/0x6320 [ 319.955998] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.961370] ? vmalloc_to_page+0x50b/0x630 [ 319.965622] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.970499] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 319.975899] ? memcg_kmem_charge+0x79d/0xac0 [ 319.980320] kmsan_alloc_page+0x80/0xe0 [ 319.984312] __alloc_pages_nodemask+0x105b/0x6320 [ 319.989169] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.994028] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.998885] ? __msan_poison_alloca+0x183/0x220 [ 320.003569] ? _cond_resched+0x4c/0x100 [ 320.007568] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 320.012976] alloc_pages_current+0x6b1/0x970 [ 320.017417] pipe_write+0x7f0/0x1d30 [ 320.021195] ? pipe_read+0x1330/0x1330 [ 320.025114] __vfs_write+0x87e/0xb90 [ 320.028838] vfs_write+0x467/0x8c0 [ 320.032388] __x64_sys_write+0x1cf/0x400 [ 320.036451] ? ksys_write+0x380/0x380 [ 320.040258] do_syscall_64+0x15b/0x230 [ 320.044150] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.049333] RIP: 0033:0x455ab9 [ 320.052500] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:03:55 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8400, 0x0) 14:03:55 executing program 6 (fault-call:3 fault-nth:33): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:55 executing program 7: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82000, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3ff, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3681222e, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) [ 320.071688] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 320.079383] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 320.086637] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 320.093903] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 320.101174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 320.108445] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000017 [ 320.167440] FAULT_INJECTION: forcing a failure. [ 320.167440] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 320.179373] CPU: 1 PID: 14396 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 320.186681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.196059] Call Trace: [ 320.198699] dump_stack+0x185/0x1e0 [ 320.202394] should_fail+0x8a7/0xae0 [ 320.206161] __alloc_pages_nodemask+0x622/0x6320 [ 320.210956] ? kmsan_set_origin_inline+0x6b/0x120 [ 320.215849] ? kmsan_set_origin_inline+0x6b/0x120 [ 320.220725] ? __msan_poison_alloca+0x183/0x220 [ 320.225447] ? _cond_resched+0x4c/0x100 [ 320.229462] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 320.234883] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 320.240374] alloc_pages_current+0x6b1/0x970 [ 320.244858] pipe_write+0x7f0/0x1d30 [ 320.248677] ? pipe_read+0x1330/0x1330 [ 320.252622] __vfs_write+0x87e/0xb90 [ 320.256398] vfs_write+0x467/0x8c0 [ 320.260017] __x64_sys_write+0x1cf/0x400 [ 320.264148] ? ksys_write+0x380/0x380 14:03:55 executing program 2 (fault-call:3 fault-nth:24): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 320.268006] do_syscall_64+0x15b/0x230 [ 320.271935] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.277150] RIP: 0033:0x455ab9 [ 320.280347] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.299979] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 320.307729] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 320.315028] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 320.322321] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 320.329619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 320.336914] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000021 14:03:55 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) epoll_create1(0x80000) ioctl$RTC_PIE_OFF(r2, 0x7006) close(r0) 14:03:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x600000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000140)={0x0, 0x4, 0x0, 0xfffffffffffffffd, 0x80}, &(0x7f0000000240)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={r2, 0x9, 0xffffffff}, 0x8) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b900020000030005000000000002000000e0000001000000000000000000000000000000000000000000"], 0x60}, 0x1}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f00000001c0)={0x4, {0x2, 0x4e22, @loopback=0x7f000001}, {0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x0, 0x8, 0x6, 0x100, 0xcdb, &(0x7f0000000040)='veth1_to_team\x00', 0x0, 0x100000001, 0x60000000000}) [ 320.463489] FAULT_INJECTION: forcing a failure. [ 320.463489] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 320.475618] CPU: 0 PID: 14404 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 320.482925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.492294] Call Trace: [ 320.494927] dump_stack+0x185/0x1e0 [ 320.498616] should_fail+0x8a7/0xae0 [ 320.502381] __alloc_pages_nodemask+0x622/0x6320 [ 320.507155] ? kmsan_set_origin_inline+0x6b/0x120 [ 320.512003] ? kmsan_set_origin_inline+0x6b/0x120 [ 320.516869] ? __msan_poison_alloca+0x183/0x220 [ 320.521549] ? _cond_resched+0x4c/0x100 [ 320.525548] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 320.530944] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 320.536412] alloc_pages_current+0x6b1/0x970 [ 320.540830] pipe_write+0x7f0/0x1d30 [ 320.544605] ? pipe_read+0x1330/0x1330 [ 320.548513] __vfs_write+0x87e/0xb90 [ 320.552264] vfs_write+0x467/0x8c0 [ 320.555846] __x64_sys_write+0x1cf/0x400 [ 320.559947] ? ksys_write+0x380/0x380 [ 320.563777] do_syscall_64+0x15b/0x230 [ 320.567690] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.572881] RIP: 0033:0x455ab9 [ 320.576059] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.595519] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 320.603255] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 14:03:55 executing program 6 (fault-call:3 fault-nth:34): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 320.610532] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 320.617822] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 320.625097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 320.632363] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000018 14:03:55 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_pts(r1, 0x40082) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e23, @loopback=0x7f000001}, @in6={0xa, 0x4e24, 0x1, @dev={0xfe, 0x80, [], 0x13}, 0xd2}, @in6={0xa, 0x4e20, 0x81, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x58) r2 = dup2(r1, r0) tee(r2, r0, 0x8, 0x9) [ 320.730422] FAULT_INJECTION: forcing a failure. [ 320.730422] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 320.742300] CPU: 1 PID: 14416 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 320.749577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.758930] Call Trace: [ 320.761533] dump_stack+0x185/0x1e0 [ 320.765174] should_fail+0x8a7/0xae0 [ 320.768909] __alloc_pages_nodemask+0x622/0x6320 [ 320.773688] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:03:55 executing program 2 (fault-call:3 fault-nth:25): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 320.779145] ? get_page_from_freelist+0xb01f/0xbb50 [ 320.784178] ? __save_stack_trace+0xa45/0xca0 [ 320.788699] ? memcg_kmem_charge+0x5f8/0xac0 [ 320.793119] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 320.798838] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 320.804823] ? __alloc_pages_nodemask+0x105b/0x6320 [ 320.809855] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.815244] ? kmsan_set_origin_inline+0x6b/0x120 [ 320.820113] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 320.825483] ? memcg_kmem_charge+0x79d/0xac0 [ 320.829907] kmsan_alloc_page+0x80/0xe0 [ 320.833901] __alloc_pages_nodemask+0x105b/0x6320 [ 320.838757] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 320.844224] ? pick_next_task_fair+0x2308/0x2580 [ 320.849003] ? kmsan_set_origin_inline+0x6b/0x120 [ 320.851986] FAULT_INJECTION: forcing a failure. [ 320.851986] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 320.853860] ? __msan_poison_alloca+0x183/0x220 [ 320.870289] ? _cond_resched+0x4c/0x100 [ 320.874269] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 320.879645] alloc_pages_current+0x6b1/0x970 [ 320.884054] pipe_write+0x7f0/0x1d30 [ 320.887783] ? pipe_read+0x1330/0x1330 [ 320.891661] __vfs_write+0x87e/0xb90 [ 320.895380] vfs_write+0x467/0x8c0 [ 320.898926] __x64_sys_write+0x1cf/0x400 [ 320.902989] ? ksys_write+0x380/0x380 [ 320.906781] do_syscall_64+0x15b/0x230 [ 320.910664] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.915842] RIP: 0033:0x455ab9 [ 320.919029] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.938300] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 320.946001] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 320.953259] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 320.960517] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 320.967775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 320.975035] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000022 [ 320.982313] CPU: 0 PID: 14423 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 320.989591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.998944] Call Trace: [ 321.001533] dump_stack+0x185/0x1e0 [ 321.005175] should_fail+0x8a7/0xae0 [ 321.008908] __alloc_pages_nodemask+0x622/0x6320 [ 321.013684] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 321.019148] ? get_page_from_freelist+0xb01f/0xbb50 [ 321.024181] ? __save_stack_trace+0xa45/0xca0 [ 321.028710] ? memcg_kmem_charge+0x5f8/0xac0 [ 321.033135] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 321.038856] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 321.044826] ? __alloc_pages_nodemask+0x105b/0x6320 [ 321.049841] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 321.055194] ? vmalloc_to_page+0x50b/0x630 [ 321.059434] ? kmsan_set_origin_inline+0x6b/0x120 [ 321.064269] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 321.069627] ? memcg_kmem_charge+0x79d/0xac0 [ 321.074022] kmsan_alloc_page+0x80/0xe0 [ 321.078008] __alloc_pages_nodemask+0x105b/0x6320 [ 321.082862] ? kmsan_set_origin_inline+0x6b/0x120 [ 321.087703] ? kmsan_set_origin_inline+0x6b/0x120 [ 321.092543] ? __msan_poison_alloca+0x183/0x220 [ 321.097220] ? _cond_resched+0x4c/0x100 [ 321.101190] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 321.106562] alloc_pages_current+0x6b1/0x970 [ 321.110974] pipe_write+0x7f0/0x1d30 [ 321.114686] ? pipe_read+0x1330/0x1330 [ 321.118557] __vfs_write+0x87e/0xb90 [ 321.122266] vfs_write+0x467/0x8c0 [ 321.125823] __x64_sys_write+0x1cf/0x400 [ 321.129903] ? ksys_write+0x380/0x380 [ 321.133704] do_syscall_64+0x15b/0x230 [ 321.137581] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 321.142768] RIP: 0033:0x455ab9 [ 321.145946] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.165158] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 321.172850] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 14:03:56 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r1, r0) 14:03:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c00000000007eef00020009ef4be2f7bd216c683600020000000000000000000000030006000000000002000067ee7ad22b528f3b186fe8b900020001318d6529141d4436fc6bd80000030005000000000002000000e00000"], 0x60}, 0x1}, 0x0) [ 321.180103] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 321.187355] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 321.194617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 321.201889] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000019 14:03:56 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = syz_open_dev$mice(&(0x7f0000002ac0)='/dev/input/mice\x00', 0x0, 0x202000) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000002b00)={0x9, {{0xa, 0x4e20, 0x7f, @loopback={0x0, 0x1}, 0x9}}}, 0x88) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$FUSE_STATFS(r2, &(0x7f0000000140)={0x60, 0x0, 0x8, {{0x200, 0xff, 0x7, 0x1, 0x4a71, 0x417, 0x7, 0x10001}}}, 0x60) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000200)={{0x0, 0x3, 0x1104, 0x9, 'syz0\x00', 0xd}, 0x3, 0x200, 0x2, r3, 0x2, 0xfffffffffffffffb, 'syz1\x00', &(0x7f00000001c0)=['user@\x00', "0100"], 0x8, [], [0x7fff, 0x0, 0x2, 0x1]}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000480)=[@in6={0xa, 0x4e23, 0x40, @mcast1={0xff, 0x1, [], 0x1}, 0x7}, @in={0x2, 0x4e21, @broadcast=0xffffffff}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}], 0x3c) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000380)=""/197) 14:03:56 executing program 6 (fault-call:3 fault-nth:35): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:56 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x809b78255242f971, 0x0) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(r2, 0x7006) close(r0) 14:03:56 executing program 2 (fault-call:3 fault-nth:26): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 321.434372] FAULT_INJECTION: forcing a failure. [ 321.434372] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 321.446225] CPU: 1 PID: 14442 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 321.453507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.462863] Call Trace: [ 321.465469] dump_stack+0x185/0x1e0 [ 321.469115] should_fail+0x8a7/0xae0 [ 321.472856] __alloc_pages_nodemask+0x622/0x6320 [ 321.477642] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 321.483102] ? get_page_from_freelist+0xb01f/0xbb50 [ 321.488134] ? __save_stack_trace+0xa45/0xca0 [ 321.492665] ? memcg_kmem_charge+0x5f8/0xac0 [ 321.497093] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 321.502907] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 321.508887] ? __alloc_pages_nodemask+0x105b/0x6320 [ 321.513927] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 321.519318] ? kmsan_set_origin_inline+0x6b/0x120 [ 321.524191] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 321.529565] ? memcg_kmem_charge+0x79d/0xac0 [ 321.533995] kmsan_alloc_page+0x80/0xe0 [ 321.537996] __alloc_pages_nodemask+0x105b/0x6320 [ 321.540011] FAULT_INJECTION: forcing a failure. [ 321.540011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 321.542853] ? __msan_poison_alloca+0x183/0x220 [ 321.559282] ? __switch_to+0x2b3/0x420 [ 321.563165] ? switch_fpu_finish+0x7b/0x4f0 [ 321.567479] ? __switch_to+0x2b3/0x420 [ 321.571366] ? kmsan_set_origin_inline+0x6b/0x120 [ 321.576201] ? __msan_poison_alloca+0x183/0x220 [ 321.580860] ? _cond_resched+0x4c/0x100 [ 321.584833] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 321.590203] alloc_pages_current+0x6b1/0x970 [ 321.594613] pipe_write+0x7f0/0x1d30 [ 321.598344] ? pipe_read+0x1330/0x1330 [ 321.602226] __vfs_write+0x87e/0xb90 [ 321.605945] vfs_write+0x467/0x8c0 [ 321.609493] __x64_sys_write+0x1cf/0x400 [ 321.613554] ? ksys_write+0x380/0x380 [ 321.617348] do_syscall_64+0x15b/0x230 [ 321.621242] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 321.626421] RIP: 0033:0x455ab9 [ 321.629592] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.649295] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 321.656993] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 321.664258] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 321.671513] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 14:03:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7fffffff, 0x200) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000140)=""/48) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f00000000c0), 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0xd3, "ab9de255dbd077d360340c72360f131415fb69bc492ee9ed05b2f1c0a64a16dcfd74115b0d5cd7b6890315ae9dbd90f1e49fce3e9537cede2b11c04d19cd689a0baa9364fb643eb81c6b7baae9db011cdd4fd5087da107111291f21da69839d8796660f5345ef9906e5f4dca1d3d27f13b5c2b305adf1d0d83b38f089971b6736ccbb030fccd43153187d44c666cd00eef6c8b9a8e4473c52169b1cc9385810de7168445fc5f69a559f3c3a405721747971ca4a5f78f9b62e36668fcc50916530e673bb3cbe630cae0c408a66512b68502d8ba"}, &(0x7f0000000040)=0xdb) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2, 0x80000000}, 0x8) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x60}, 0x1}, 0x0) [ 321.678767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 321.686022] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000023 [ 321.693301] CPU: 0 PID: 14447 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 321.700575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.709930] Call Trace: [ 321.712526] dump_stack+0x185/0x1e0 [ 321.716163] should_fail+0x8a7/0xae0 [ 321.719891] __alloc_pages_nodemask+0x622/0x6320 [ 321.724652] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 321.730097] ? get_page_from_freelist+0xb01f/0xbb50 [ 321.735128] ? __save_stack_trace+0xa45/0xca0 [ 321.739737] ? memcg_kmem_charge+0x5f8/0xac0 [ 321.744155] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 321.749969] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 321.755946] ? __alloc_pages_nodemask+0x105b/0x6320 [ 321.760976] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 321.766346] ? vmalloc_to_page+0x50b/0x630 [ 321.770594] ? kmsan_set_origin_inline+0x6b/0x120 [ 321.775458] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 321.780838] ? memcg_kmem_charge+0x79d/0xac0 [ 321.785258] kmsan_alloc_page+0x80/0xe0 [ 321.789241] __alloc_pages_nodemask+0x105b/0x6320 [ 321.794093] ? kmsan_set_origin_inline+0x6b/0x120 [ 321.798951] ? kmsan_set_origin_inline+0x6b/0x120 [ 321.803798] ? __msan_poison_alloca+0x183/0x220 [ 321.808477] ? _cond_resched+0x4c/0x100 [ 321.812462] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 321.817853] alloc_pages_current+0x6b1/0x970 [ 321.822300] pipe_write+0x7f0/0x1d30 [ 321.826052] ? pipe_read+0x1330/0x1330 [ 321.829948] __vfs_write+0x87e/0xb90 14:03:56 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x200, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x3, 0x2, 0x8001, 0xfffffffffffffbb2, 0x1, 0xfffffffffffff001, 0x8000, 0x0, 0x7fff, 0x2}) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000003c0), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = request_key(&(0x7f0000000400)='encrypted\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)='}\x00', 0x0) keyctl$get_keyring_id(0x0, r2, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0xd1, "417903f55f757f1c54739559001119f6d86ec4f3253269163a9512b7ee4cc94c77e50ae9f833790277daa0c32a234d7a02bb690141c8e0556d834181c3e0bc742b8d66caf85cd60226fe2d2c446a366950babb092f50a5817af9ae79ae8259f8a3f4f3fe4de6b70e6d935c0b3f32e2f52b6b79e3bd124ff92bf1ce55b8cf28a7da6f042eaad2140654304363eda0e46400fc01e79eaff7438a424c025d1ce2ca256990017f6d53f0b8d2ba0dcb5c565540cf83acad0cf631dad295025402e7a5597e442004de3a0f94d036c5a918b283c9"}, &(0x7f0000000100)=0xd9) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000300)={r3, @in={{0x2, 0x4e21}}, 0x40000000000, 0x7}, &(0x7f0000000140)=0x90) [ 321.833686] vfs_write+0x467/0x8c0 [ 321.837249] __x64_sys_write+0x1cf/0x400 [ 321.841329] ? ksys_write+0x380/0x380 [ 321.845137] do_syscall_64+0x15b/0x230 [ 321.849047] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 321.854241] RIP: 0033:0x455ab9 [ 321.857433] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.876764] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 321.884509] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 321.891786] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 321.899067] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 321.906343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 321.913620] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001a 14:03:57 executing program 2 (fault-call:3 fault-nth:27): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:57 executing program 6 (fault-call:3 fault-nth:36): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:57 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r0, 0x80045700, &(0x7f0000000040)) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 322.125880] FAULT_INJECTION: forcing a failure. [ 322.125880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 322.138180] CPU: 1 PID: 14466 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 322.145488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.154865] Call Trace: [ 322.157503] dump_stack+0x185/0x1e0 [ 322.161205] should_fail+0x8a7/0xae0 [ 322.165005] __alloc_pages_nodemask+0x622/0x6320 [ 322.169813] ? kmsan_set_origin_inline+0x6b/0x120 [ 322.174703] ? kmsan_set_origin_inline+0x6b/0x120 [ 322.179590] ? __msan_poison_alloca+0x183/0x220 [ 322.184293] ? _cond_resched+0x4c/0x100 [ 322.188314] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 322.193745] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 322.199242] alloc_pages_current+0x6b1/0x970 [ 322.203722] pipe_write+0x7f0/0x1d30 [ 322.207525] ? pipe_read+0x1330/0x1330 [ 322.211475] __vfs_write+0x87e/0xb90 [ 322.215254] vfs_write+0x467/0x8c0 [ 322.218871] __x64_sys_write+0x1cf/0x400 14:03:57 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000140)=""/130) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) [ 322.223006] ? ksys_write+0x380/0x380 [ 322.226859] do_syscall_64+0x15b/0x230 [ 322.230791] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 322.236006] RIP: 0033:0x455ab9 [ 322.239206] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.249945] FAULT_INJECTION: forcing a failure. [ 322.249945] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 322.258814] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 322.258850] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 322.258869] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 322.258887] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 322.258904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 322.258923] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000024 [ 322.315438] CPU: 0 PID: 14470 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 322.322735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.332108] Call Trace: [ 322.334744] dump_stack+0x185/0x1e0 [ 322.338417] should_fail+0x8a7/0xae0 [ 322.342183] __alloc_pages_nodemask+0x622/0x6320 [ 322.346987] ? kmsan_set_origin_inline+0x6b/0x120 [ 322.351880] ? kmsan_set_origin_inline+0x6b/0x120 [ 322.356756] ? __msan_poison_alloca+0x183/0x220 [ 322.361490] ? _cond_resched+0x4c/0x100 [ 322.365513] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 322.370939] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 322.376436] alloc_pages_current+0x6b1/0x970 [ 322.380896] pipe_write+0x7f0/0x1d30 [ 322.384700] ? pipe_read+0x1330/0x1330 [ 322.388648] __vfs_write+0x87e/0xb90 [ 322.392431] vfs_write+0x467/0x8c0 [ 322.396065] __x64_sys_write+0x1cf/0x400 [ 322.400196] ? ksys_write+0x380/0x380 [ 322.404061] do_syscall_64+0x15b/0x230 [ 322.407998] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 322.413216] RIP: 0033:0x455ab9 [ 322.416419] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.436037] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 322.443788] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 322.451084] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 322.458382] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 322.465673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 14:03:57 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000500)=[{&(0x7f00000005c0)="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", 0xfffffffffffffe7a}, {&(0x7f0000000180)="b283aa15cfbab2e99b7f0122cf9db5c51db62ed2f45b8c8dff00662744d4bb069d140a4f55fcdb0d7b4ecb9a23cf418b35bbe010972c0592d9fed943017372507bef66a388b38037d8db12ed7b6eadf12af665e24f18fba624f3dd61159dbdda1bf2c3110777bff3094c4fb134dfdddecd67462fdd3fe420032e2d012273af1d8992bcc379527c009e867b47408eed94c96553e850b82b190cf3e1a2e8d62fe6929229950db61ac7e0f69e7e38a0fa69db2114d773", 0xb5}, {&(0x7f00000000c0)="e5bf2bdba3672583da6d3c72a3f060d1a35e6378e3034aa288e62f", 0xfffffffffffffdc5}, {&(0x7f0000000380)="2d1176860fb984a4543022ff289f4cda2014b1e350c5ea66c76f002be87f2e01102501d29a15388edbf42f49d3349b1f2196180a90fc7769778953229178984599e650d0ea65190d014b2c6973326fae27b6edb9b88071a8af1cad13c7c727c100202803ced512a971eb6329554f11266353e0dd14205bfd30465c265eba2b1b5a7f289eaeb08fdf071de6b864ef191acade1fad4f4f", 0x96}, {&(0x7f0000000440)="532e6c0a1a115e3614400505fb7f70c4a2cc7b0a060ef94a86a3476acd9765da526afdf19b98dd75c5d959669c8b3ef832bf4db679a363931d01d8b2f94c76016fe6b47404925e9a6ae182750d2b5644f11f39f6dc7e5f1ac76fbe2f03775d5f13f33de61e6464550dccb99498056a28384e2473d04d16c8d342813391ae54fa10cfd573753face9119127679343498f", 0x90}, {&(0x7f00000015c0)="dfc1bc33d2d264e2644da916dbbf081d506e984003839166cce341b1e6ad2e887768316b81210978de7870f6dcbe999d470f2258bd880301a07d0db3783f24b7341bb4ce80e4e48333594e1709607dda7dd45682f1b8513b76c8ef54dde2096efc0ea909d0fad50c68c31dafd25f7dbde2046e92c10d75566b1fadb577bc650e350a1f2461b333ef4e8154c71a9494e458b0c6e61e90778c362068a6da664dc5ba78e1023b662945103141ae79ba66dfb178addf86b3ab18a7fca6d7ae8b9f2cc0d066c7a366112ad58cc15cdc8a24cffe065d23ae3c59ab8fc25d31787fd2c311c779da28dea88acd581a144dabb726e2edd824356781ff5b8d2773503dd140b568059fd5b9a02c58075e31c2823020a4bae2d00b46457fc8247985ba43e58bf8beab0be3f3e3620a2a46ba94e9f8d0115e983901ae3380ffee32f59a31eebb9c70ae6f33de9db4e5f142f8193faf25e21c9ae3cf900ae556cd6e86a5e455ad235009f2a1124e694607c566bd556b5d908e87424e69e026dc532937bdd4aba9275637dd41e8c46310249f1f5d26d81222fcd146e561d45bf31c5666708b80f70dad00d70d82e357694a41c4a40bacaaeb19330c1d95e551e4bfe1d18e81d74d971667c7fa5091cbc6f64c1d6701b90b37dae2c4fdb7a6172fd00c32217f56a0da0414576d35e0a1165d59c20bcaeacfb5ac5f5750edb801f069e4580c7f6b05dd5c903cb7526859b255d99d75c02386b4b9fa6339409b23a16632b476b3a16916813941ebd3b503afcb9bd6e4ce37227217220f60f1bf9df6a230b0e2cd381d44e2abae02d5f0b4b4909c86efaa01c32f12af5a59446fc41c78358c883f7a8fe69f506db633726e3300e44a46ae02a51bbc910c7532791b4c88b8ab14ecdee2c5c2f9086358e2bf9e4d4906f55772f2b849aff56645ea65e01ed7175f82dd0d2ed7cb512ac9e508b541335fc6ee66fecc642ff1905ebe5a1f589e1fa6ae79a9b895220306f3a14e15016fb4300b3fba5106a928d570a7fdea74abc3d9cd10ef1557ff437831a7f498849726c7b563ae51a0ea33e7e4c116c27f043429588fa54896ae9abd7932c83232185d12725f1c7d8a3c16ef636b0f56582d882814ece4561a819dc94b6a70af63c30f3e9a839f6f74a4e77e447f45c50cfc1456b79148eaecf24aee087b8cf511b67e5b9af41a0a1c06e01583d44c42db03edc4c0eab62b34b18413f970c8cb7aaaf70eb8601e4ac8705cb3fbb33b93ad859e8e2b3afb63c6c774ff5995834593424d950dbcef405dfbfbb797d8e1add142e438e3130f6266b9e2d303facf572317f1560ea7c02ac8ba9be235af3cd624c8d9441c9b894fd556d104dec70462e5bf5c75110b093740d7716de7197ea23f392c88dcb5661189e4ea1199d4b8218a9409e9b2e032ebe79de5a54d8c9b10efea08b247ad705c5177f7b6cb3b2b610343a940d6027bbe7ba2cc30a3cb16871403a6dfeabff632e4523767802e3105a2759489e21f24bf39df7f5570629a40bb95e48e953b5da484cb121c5ee595a31fcf07de418747f449444237a6096cf6d96ac2fec69fd1779b58be327ddd86a21c7878ade8469e702598eac4ae1c112ffe2f21abb02176a0830a5b2f69fe62062e836a6cc54dac1386d62766bff68b257643241bcd2a00d2eb0bfed0a74b8d714a58328e39a7422112c1122643c716488caf9f31d19e8d5f7a3570ce55a3e33cba6e0e8747c1b745e0e1cc037ef9148c1b91d44853f4d0cc31483bc94fa6b8ccec452f84fbce6eafc07e4b30fbffb4d7f8a2f38cc7bf0e0ab739c8af8a5541dd444fb1f7184579d58b43085574265b84ff23ea57b97fbb10e07fa9bfd2f2e118f6c834b11ea511fddc0d27a70f7e19a6b1654f629ad1357bbf7c57b0fc64fb1ed8e15c9af2448cfd8eb8b3f7de74a814a854f9606ee6cfdda3e402bc6a6f3c9e0e377d355de31c5cb4b248229e8d34decfa4a18d9acc9db9f2c362362f1fcc74f20d6dbc2e5091eb456b88a0aeaec46f0342da21fe0d389905d0c530e24cec9ddcf59fbf0fe8351dd9cc2182a5f48e6875371cf279efd377d397d50c970b9391f284bd5791f0e856cfd7e96b82903790c259fc39c142257d0d55e12598013fa7ce6926e20543352dc72c00d2a23054890ed07d12970a31d569a3514e2acb56d7eeeaf9023387ead7c4521cfd5fc62b65a51d93cd92a2944f2b5c47e71d788841445c98fc62c3b7fce752ed90d8509420522351106784b69ae1c71ec17bc79fa33abb4f0242cdbd1d19a421a43d9875eb09e194a44763a0dd75866e7f3309d5ab585194cf63e9a54b806f14a58881f650a1b41668f5541601aeeb19c951cf92d754642e84acbf8cd6987118d299c960870ad69c03f78bf416b75788e6864452e33e0b211ca9450281dd48086b394e42c6079ef3665ee060d07697fe9e5f2b96aae1eee40439175ff90fbd5b8428a83a92c014306d7808906b602b06526ae49765142dc5c2876e55ab5434bba01c2427b6ebf384f40d06152139c6fda81e2fa29fe2415fb6bad92c44967bc994164114e3878d1bcaa0c1e7650d342171a14203e6d4b3a4da8f49e87530f860c5e13205a4d218a5ebf0328fe845231c3c37911c816681a84cdfd53477182cf71ac0309f98462d4716c250d77556e153acfa7e75b93abad8aceac1382c207ddbe3a68f8ed5cf42a84d4e1ffa85cb292ee698699aed19d666340d0651f20fd69229476a75443da4c6c856e23b4c53ef22153794e7386967708f47838983ce6b4f665b2e58fa38376c90027823a565df0473db76ec51fe84d3514a7b3c1483beb99c2c940a664f837b7fd1d7d051bc72f48aa3f41d2da02ed05fbd0af3d6d6e9cbb5012e539aa8ef4fc4cfbf075b7c19649ded08c103ab8bb394dd4324eeed5a48a29cac9818d6fe33d8a68e51ffdb6b8760a0aad3076744e4acba8817b73cf6a0a302d8d2c53fd1ed651db4c7f5ca121df9c721dad40df9fbab2e2660571545f5be6d8c1b2b52e3943f5711aa9d1a6a7b21e617088d823f307b9dac279bc772dfb27226e41bd6cd876b4e7f1064886864f95b2fd0d232673e0b11051be2d8b8ba07372c8aec116be6cdb9c4a133b92e970ef0e70eb0ff8ca7089514ff54f075945fadac80f01afd0cb8f2e760fe093dea827031dab14ccc06cf7aa7c4a31579858cf5d1c78e0514ecc9a5617debff9d870a6cbe6c5fca7d07283e5ead69c3d5458d54037c28033c31c7eab220aa2d5fd051f9531292a6ca0bf80ad140e5a385859eeb2fcfc9a29ef211753d139a85ecf9a8ce33577907bb036def068761bd37efb009db3c931b97b25db44af478e243480a88993ee7f2059374d473601c2985b2391defd7c5c891ee09b14447991d12ed13ee102bfd6cb19a4e1983554118e4ff9263fbfa8f1a9e09d03c841134cfe8e480f5760cb8ce7ba817b536f4415ce92e462b61d3a2ebd7532f3da0ee6005f4f5f19953aef06db9b7c6a3ed3cba60b149583e8f7f54dd47a269586c89563644218fde2265baabf2aaf67a2b13817be5209011fe06a9f3f41a55ef742d8fcc445f1df690bfe0646c49facff7548cc192c6ce75e203a90490455e0b79aa0159e6ea7c223c3ce58f74cc784a7435ef157cc52b7f524e4bca125a0e702d77a6c5a8f86015d881cd4d76f03c8db25297583f89253cd89aa7fc833bd545c05744d3b1c193a52708dcc2ebf67067a821cb61adf84a39db34e6d641c96234dbcfdc368e239f42def383517b26cb4cd63234f465b48ac0872902fca08940dc6a8331aca0459f3c360261d3ff4ac359533b4e2a708ce658c83b4b89bce1c6cb7d2cbe537ae2f6670535e09ce78282559ef803a5fab3637db47f00d402f80fd74d8a5725dcd32f6f461d02930ec24016800751c915f794b5c23d3c88335ef9758b909ce9e0de7cbfe1d1381132ff2b5b0b560548864c974a807cd04c4a3903be712b0eba58a0b6b583920336ab99db730bcd9b76ed459728a22d56e39b2dbe60aa723e2c00ff355c59039a17d1e2d5b635d08d204b35ee32dc6686e23a3f959e0a9d5234df4af5e4a838642404ac7933f3291b19183e1696214f0c19f3b2e12287534e2a31fef29e4c6edbb1e13ad43475c17261bc2d0fcf11a79522448d9b096070b720ee0d82bd180030bd000e794664cb40689c504e7b79ca1ef9865cff0e4ecb1e91737a148096af2e511d30b53a2b99554406b3ffe53ecbfe728af034c69c381515930ea174a8b2ecb16e5012932d8fa33b246e362a69d537a09ddeffc528b4d73aae95ed0ac17b0cb7314a13306acded85172609dd9384bc1065613dcc4a6b5cfa3e78e5ebf971ea890411ddf0fa2c8bbf03b1df4635d8704bd915f147fc6204df977d24ba8e5cd8498d92a7ea742bee234d9110346302f78f3226d14ae4c49cd180692b7ef1bdcaf32c340f8df2975ee4faaebfd8e8523cf56a63b7f2ddf4820103946052d207df80e56cfc56587768cbf05d7e45ed9738ed0cf0ab01ac1b861a5a1d43e750def50c12801a4d5bf7c8f7a9134a5b57bffdb4f9d5533a9ea89ff22a2ff57584568c09f0f6c4a72f192dcb89bdb4f0b57d85701b7f65910908cfe468a6f5ded8c21c7998563c0af8d12c7bca1dcf289dabaf8d3aaf2d7d165e3b4380c4ab6d2dcba937eb6138520176df47c695eeb5460d05c998f816905c292067680d8d0f137320a393e7b7dcc44d1156ada2f69a6af945ec8213e82b7b5151689233202563386c7e0d192b714f4e2b19d72c32e7f8cae50ca78707337a1115ce02c950f2059b142a8f5d82dda1e90d231e17b3acfbc209152c2ff381b80051b785b164436aeb88e88e46d6c3c0796a70479bbd037f29ea7aada4cda7c896a369cb26b9d74987af09d0e1a6e0d1393bd250484f1f4dd7c1304ba71f25eaae2ba7419ff8f394bce4026072084663bac2b73140c616c4906f80bcd2194cfa7e445eca7c5c005e902e67aaefb4da527c6a8c12777607866ee46006335f9d7ab0f11a894ddbe829ce69af9bb4f6914957c6d894ce3f25374bc42f94eb70871e1f0752c2db168564755e22f94d324229b26e271a67f3ccda11e5aa93c8ae5414da63a5654f169f4c57aab43d95a616ba1e8d75d7c85e8afb9bd90a5d0dde53262788daafc437f46205811656bbb7720067972cf50ba7e376c2ab798ccd2acc49fde34b9c0302ac1ee64c0d260a1feead44bf556965f79a1cdb3661fd808ed325c45902ee6b554b605872780d558e42d3b6baf1fadb5a1cda4017e130a22c8aa46e0bbc3b7cc641dd18caed655b3511bc499225560177e045d1b24f651865e63be6bcc64c9292991ea31055edb92871c3634a34bb48c14998977e3b5755f060f6d996c4a9555fc6e67c7af6e12181bb9443a89b2ed3a933a726836284efee953ae84af0088944c37bc455b5265893a0a04bea911076cccb03eae67aa25fde3c4af996d6cd1046cb8ef78b7e01d0d2a72541552ec23478b44afbe4e5646b12bd74f6620d3a82358c55a5d3c46b965fe0ca056f4f6f9e797d0268ce190e6d4b139b21ceff3a831aba5796653f6043a9ef195b5491ed929d6da663d2cf210f359a40ffac5289898a5bd28859447b28f2dd2151de302f21534d1645641aff15880953e885bcbb4bcd60b8ee6ba73fb27fcd74b19229d3ef28c104e72df71c59dced120e0118d7ba44e2cbceb940953bdb2560a55703610a9512c2081ebefaba60f10867cd155a75200ad147a04e1cfe36c19a32abe70df875ac9ea7acc59e01466c69c0", 0x1000}, {&(0x7f00000025c0)="3a27c73def8c28e3d48d36524ffda07b31cea00954eb4411873fa48e1fe5aab50d6d772b5c32519069563931b8b585a94e4317cc39725791b2606d4d57175bde7b9d1ca183b3ab80995afd5b143bcef6dc79a76dd71ad567b0dc1d7effd158312b8523def2608bc86741af75c50948e9672e4ff5cc3d41f9070f97bdc97d00b9e00331eac451181064c825efb9ce74831ae81386f7ab92b7515a7c1905aa2b8df56615b653975cbad5b7878870eb157bc8622f44226467f774697ec8ca58fd2e2dd59b46a750f554013c478a32d1636a7dcf5560bd0230b6c1230f01eab9a8466fb656f56a35812b13", 0xe9}, {&(0x7f00000026c0)="34a8c258c7f1b592fa4be828d0f14888da30a5eee663d33a52c569941220d31203b5fce641eab2070c0ea1dc8efc397471390bc3ed0dc468beac654031cab0b168f1691966fdcfb60fc2db6da9e659b72f0a4f792efead0afd48b36939b3331c0190ffb28ab224d1c4c806152f7088ef37445e2cd680213d23312ccffbbf437cbec9ea6269a8f75126c8d8da2d27457dfa6f5cdf16faadf9deec57bb43c9dab6bdfe1fabc2ee58b87be6a8367d7b778599e51cdbae065074692cca70fe4db13a461e74fa9b2b6fe3171e21b16a2820cb22a93feb50fee31d86db88a3c83b1d5898231ee9eac0cb4242aa7a1f166336d68889de23edf4082a27e91746ab", 0xfd}], 0x1e3) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000280)={0x8, 0x0, 0xffffffff, 0x4, 0x3, 0x6, 0xffff, 0x9, 0x4, 0x1, 0x0, 0x20}) fcntl$setpipe(r1, 0x407, 0x1f) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000100)={0x1ff, 0x4, 0x86, 0x7fffffff, 0x3ff, 0x7fffffff, 0x8, 0x8001, 0x0, 0x10001}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r1, r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000040)=0xc) sched_rr_get_interval(r2, &(0x7f0000000080)) 14:03:57 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000080)={0x400, {{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0x9}, 0x2}}, {{0xa, 0x4e22, 0xfffffffffffffa27}}}, 0x108) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)='\b', 0x1}], 0x1000000000000168, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 322.472974] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001b 14:03:57 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffd000/0x2000)=nil, 0x2000}, 0x4}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0xffffffffffff7ffd, 0x0, 0x0, 0x0, @time, {0x4}, {0x200000000010000}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f0000000140)={0x0, {r3, r4+30000000}, 0x7fffffff, 0x97c3}) 14:03:57 executing program 6 (fault-call:3 fault-nth:37): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000ddff05ec6bd80000030005000000000002000000e000000100000000000000007b64d5f30d6c33453f245c34726eba9e99fa722b921c28246ec2ead7c1004f62b925243a3ffb9918eba90e9007941b05329f98daf5081845d4ea"], 0xfffffffffffffe9f}, 0x1}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x80000, 0x0) ioctl$sock_proto_private(r1, 0x89e2, &(0x7f0000000100)) getpeername$inet6(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000001c0)) socket$inet_icmp_raw(0x2, 0x3, 0x1) 14:03:57 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000380)={{0x3, 0x2, 0x200, 0x1ef9c682, '\x00', 0x947}, 0x5, 0x20, 0x0, 0x0, 0x8, 0x9, 'syz1\x00', &(0x7f0000000040)=['/\x00', 'user$\x00', '\x00', '\x00', '[system#%\'\x00', '&system\x00', 'security\x00', 'wlan0\x00'], 0x2c, [], [0x2, 0x3ff, 0xf41, 0x9]}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) ioctl$FICLONE(r1, 0x40049409, r1) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r1, r0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0x29) [ 322.718378] FAULT_INJECTION: forcing a failure. [ 322.718378] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 322.730230] CPU: 1 PID: 14504 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 322.737508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.746869] Call Trace: [ 322.749477] dump_stack+0x185/0x1e0 [ 322.753122] should_fail+0x8a7/0xae0 [ 322.756864] __alloc_pages_nodemask+0x622/0x6320 [ 322.761648] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 322.767112] ? get_page_from_freelist+0xb01f/0xbb50 [ 322.772143] ? __save_stack_trace+0xa45/0xca0 [ 322.776673] ? memcg_kmem_charge+0x5f8/0xac0 [ 322.781096] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 322.786820] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 322.792805] ? __alloc_pages_nodemask+0x105b/0x6320 [ 322.797836] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 322.803212] ? vmalloc_to_page+0x50b/0x630 [ 322.807469] ? kmsan_set_origin_inline+0x6b/0x120 [ 322.812338] ? __msan_metadata_ptr_for_load_8+0x10/0x20 14:03:57 executing program 0: mkdir(&(0x7f0000000300)='./control/file0\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) mq_timedreceive(r1, &(0x7f0000000140)=""/160, 0xa0, 0x6, &(0x7f0000000080)) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 322.817712] ? memcg_kmem_charge+0x79d/0xac0 [ 322.822140] kmsan_alloc_page+0x80/0xe0 [ 322.826134] __alloc_pages_nodemask+0x105b/0x6320 [ 322.830996] ? kmsan_set_origin_inline+0x6b/0x120 [ 322.835849] ? kmsan_set_origin_inline+0x6b/0x120 [ 322.840705] ? __msan_poison_alloca+0x183/0x220 [ 322.845387] ? _cond_resched+0x4c/0x100 [ 322.849382] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 322.854774] alloc_pages_current+0x6b1/0x970 [ 322.859201] pipe_write+0x7f0/0x1d30 [ 322.862954] ? pipe_read+0x1330/0x1330 [ 322.866864] __vfs_write+0x87e/0xb90 [ 322.870616] vfs_write+0x467/0x8c0 [ 322.874183] __x64_sys_write+0x1cf/0x400 [ 322.878262] ? ksys_write+0x380/0x380 [ 322.882076] do_syscall_64+0x15b/0x230 [ 322.885994] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 322.891188] RIP: 0033:0x455ab9 [ 322.894373] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:03:57 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 322.913718] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 322.921437] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 322.928715] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 322.935995] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 322.943268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 322.950630] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000025 14:03:58 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = memfd_create(&(0x7f0000000080)='selinux*(lo\x00', 0x2) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000140)=""/189) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r1) 14:03:58 executing program 2 (fault-call:3 fault-nth:28): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:58 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$setfpexc(0xc, 0x20000020081) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, r2) sched_getscheduler(r1) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYRES16], 0x2}, 0x1}, 0x0) [ 323.202474] FAULT_INJECTION: forcing a failure. [ 323.202474] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 323.214311] CPU: 0 PID: 14530 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 323.221587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.230934] Call Trace: [ 323.233522] dump_stack+0x185/0x1e0 [ 323.237141] should_fail+0x8a7/0xae0 [ 323.240870] __alloc_pages_nodemask+0x622/0x6320 [ 323.245629] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 323.251073] ? get_page_from_freelist+0xb01f/0xbb50 [ 323.256086] ? __save_stack_trace+0xa45/0xca0 [ 323.260585] ? memcg_kmem_charge+0x5f8/0xac0 [ 323.264992] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 323.270705] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 323.276671] ? __alloc_pages_nodemask+0x105b/0x6320 [ 323.281691] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 323.287070] ? kmsan_set_origin_inline+0x6b/0x120 [ 323.291913] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 323.297276] ? memcg_kmem_charge+0x79d/0xac0 [ 323.301676] kmsan_alloc_page+0x80/0xe0 [ 323.305655] __alloc_pages_nodemask+0x105b/0x6320 [ 323.310491] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 323.315678] ? __msan_poison_alloca+0x183/0x220 [ 323.320348] ? kmsan_set_origin_inline+0x6b/0x120 [ 323.325180] ? __msan_poison_alloca+0x183/0x220 [ 323.329832] ? _cond_resched+0x4c/0x100 [ 323.333807] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 323.339189] alloc_pages_current+0x6b1/0x970 [ 323.343622] pipe_write+0x7f0/0x1d30 [ 323.347347] ? pipe_read+0x1330/0x1330 [ 323.351218] __vfs_write+0x87e/0xb90 [ 323.354938] vfs_write+0x467/0x8c0 [ 323.358488] __x64_sys_write+0x1cf/0x400 [ 323.362541] ? ksys_write+0x380/0x380 [ 323.366325] do_syscall_64+0x15b/0x230 [ 323.370211] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 323.375389] RIP: 0033:0x455ab9 [ 323.378562] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.397797] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 323.405500] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 323.412766] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 323.420048] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 323.427582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 323.434852] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001c 14:03:58 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:03:58 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:03:58 executing program 6 (fault-call:3 fault-nth:38): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:58 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) r2 = socket$bt_rfcomm(0x1f, 0x1, 0x3) fremovexattr(r2, &(0x7f0000000040)=@random={'user.', 'em0\x00'}) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x6) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r1, r0) 14:03:58 executing program 2 (fault-call:3 fault-nth:29): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) write$P9_RLERROR(r1, &(0x7f0000000040)={0xa, 0x7, 0x2, {0x1, '&'}}, 0xa) [ 323.691264] FAULT_INJECTION: forcing a failure. [ 323.691264] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 323.703122] CPU: 0 PID: 14544 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 323.710404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.719785] Call Trace: [ 323.722418] dump_stack+0x185/0x1e0 [ 323.726066] should_fail+0x8a7/0xae0 [ 323.729807] __alloc_pages_nodemask+0x622/0x6320 [ 323.734595] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 323.740065] ? get_page_from_freelist+0xb01f/0xbb50 [ 323.745108] ? __save_stack_trace+0xa45/0xca0 [ 323.749618] ? task_kmsan_context_state+0x6b/0x120 [ 323.754608] ? memcg_kmem_charge+0x5f8/0xac0 [ 323.759063] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 323.764891] ? kmsan_set_origin_inline+0x6b/0x120 [ 323.769763] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 323.775145] ? memcg_kmem_charge+0x79d/0xac0 [ 323.779570] kmsan_alloc_page+0x80/0xe0 [ 323.783565] __alloc_pages_nodemask+0x105b/0x6320 [ 323.788418] ? kmsan_set_origin_inline+0x6b/0x120 [ 323.793276] ? __msan_poison_alloca+0x183/0x220 [ 323.795258] FAULT_INJECTION: forcing a failure. [ 323.795258] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 323.797963] ? finish_task_switch+0x130/0x260 [ 323.814222] ? mmdrop+0x4f/0xf0 [ 323.817500] ? finish_task_switch+0x130/0x260 [ 323.822012] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 323.827376] ? balance_callback+0x48/0x260 [ 323.831613] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 323.836986] alloc_pages_current+0x6b1/0x970 [ 323.841396] pipe_write+0x7f0/0x1d30 [ 323.845131] ? pipe_read+0x1330/0x1330 [ 323.849015] __vfs_write+0x87e/0xb90 [ 323.852737] vfs_write+0x467/0x8c0 [ 323.856279] __x64_sys_write+0x1cf/0x400 [ 323.860337] ? ksys_write+0x380/0x380 [ 323.864129] do_syscall_64+0x15b/0x230 [ 323.868017] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 323.873196] RIP: 0033:0x455ab9 [ 323.876386] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.895669] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 323.903367] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 323.910627] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 323.917886] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 323.925143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 323.932401] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000026 [ 323.939675] CPU: 1 PID: 14554 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 323.946951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.956326] Call Trace: [ 323.958927] dump_stack+0x185/0x1e0 [ 323.962569] should_fail+0x8a7/0xae0 [ 323.966300] __alloc_pages_nodemask+0x622/0x6320 [ 323.971079] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 323.976544] ? get_page_from_freelist+0xb01f/0xbb50 [ 323.981578] ? __save_stack_trace+0xa45/0xca0 [ 323.986114] ? memcg_kmem_charge+0x5f8/0xac0 [ 323.990547] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 323.996354] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 324.002338] ? __alloc_pages_nodemask+0x105b/0x6320 [ 324.007376] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.012761] ? kmsan_set_origin_inline+0x6b/0x120 [ 324.017630] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 324.023011] ? memcg_kmem_charge+0x79d/0xac0 [ 324.027422] kmsan_alloc_page+0x80/0xe0 [ 324.031397] __alloc_pages_nodemask+0x105b/0x6320 [ 324.036255] ? kmsan_set_origin_inline+0x6b/0x120 [ 324.041115] ? kmsan_set_origin_inline+0x6b/0x120 [ 324.045972] ? __msan_poison_alloca+0x183/0x220 [ 324.050640] ? _cond_resched+0x4c/0x100 [ 324.054614] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 324.059980] alloc_pages_current+0x6b1/0x970 [ 324.064379] pipe_write+0x7f0/0x1d30 [ 324.068109] ? pipe_read+0x1330/0x1330 [ 324.071991] __vfs_write+0x87e/0xb90 [ 324.075699] vfs_write+0x467/0x8c0 [ 324.079231] __x64_sys_write+0x1cf/0x400 [ 324.083280] ? ksys_write+0x380/0x380 [ 324.087078] do_syscall_64+0x15b/0x230 [ 324.090968] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.096149] RIP: 0033:0x455ab9 [ 324.099324] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.118497] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 324.126203] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 324.133462] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 324.140716] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 324.147978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 324.155253] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001d 14:03:59 executing program 6 (fault-call:3 fault-nth:39): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:03:59 executing program 2 (fault-call:3 fault-nth:30): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x8000) chmod(&(0x7f0000000040)='./file0\x00', 0x4) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x0) delete_module(&(0x7f0000000180)='/dev/audio#\x00', 0x800) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0xab633969}, 0x1}, 0x0) [ 324.276607] FAULT_INJECTION: forcing a failure. [ 324.276607] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 324.288701] CPU: 1 PID: 14569 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 324.296002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.305376] Call Trace: [ 324.308014] dump_stack+0x185/0x1e0 [ 324.311706] should_fail+0x8a7/0xae0 [ 324.315474] __alloc_pages_nodemask+0x622/0x6320 [ 324.320292] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 324.325528] ? __msan_poison_alloca+0x183/0x220 [ 324.330265] ? kmsan_set_origin_inline+0x6b/0x120 [ 324.335142] ? __msan_poison_alloca+0x183/0x220 [ 324.339866] ? _cond_resched+0x4c/0x100 [ 324.343880] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 324.349305] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 324.354803] alloc_pages_current+0x6b1/0x970 [ 324.359285] pipe_write+0x7f0/0x1d30 [ 324.363096] ? pipe_read+0x1330/0x1330 [ 324.367049] __vfs_write+0x87e/0xb90 [ 324.370823] vfs_write+0x467/0x8c0 14:03:59 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 324.374442] __x64_sys_write+0x1cf/0x400 [ 324.378570] ? ksys_write+0x380/0x380 [ 324.382422] do_syscall_64+0x15b/0x230 [ 324.386355] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.391574] RIP: 0033:0x455ab9 [ 324.394773] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.414973] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 324.422726] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 324.430027] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 324.437325] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 324.444626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 324.451918] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000027 [ 324.544216] FAULT_INJECTION: forcing a failure. [ 324.544216] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 324.556150] CPU: 1 PID: 14582 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 324.563449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.572826] Call Trace: [ 324.575462] dump_stack+0x185/0x1e0 [ 324.579150] should_fail+0x8a7/0xae0 [ 324.582917] __alloc_pages_nodemask+0x622/0x6320 [ 324.587729] ? apic_timer_interrupt+0xa/0x20 14:03:59 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x2080, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000001c0)=""/101) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_VL_CLR(r2, 0x7014) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000140)=""/77) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r1) [ 324.592179] ? kmsan_set_origin_inline+0x6b/0x120 [ 324.597063] ? __msan_poison_alloca+0x183/0x220 [ 324.601786] ? _cond_resched+0x4c/0x100 [ 324.605805] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 324.611227] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 324.616722] alloc_pages_current+0x6b1/0x970 [ 324.621178] pipe_write+0x7f0/0x1d30 [ 324.624989] ? pipe_read+0x1330/0x1330 [ 324.628934] __vfs_write+0x87e/0xb90 [ 324.632724] vfs_write+0x467/0x8c0 [ 324.636348] __x64_sys_write+0x1cf/0x400 [ 324.640477] ? ksys_write+0x380/0x380 14:03:59 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f0000000040)) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 324.644330] do_syscall_64+0x15b/0x230 [ 324.648260] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.653467] RIP: 0033:0x455ab9 [ 324.656667] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.676314] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 324.684063] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 14:03:59 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) fchdir(r0) dup2(r1, r0) r2 = msgget$private(0x0, 0x8) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000000)=""/5) [ 324.691356] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 324.698648] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 324.705942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 324.713244] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001e 14:03:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000180)="e55abf301d2b7661f992e287560021e7e56ffc457a8acc6756c346f136eb26d7") sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x4000080) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="6c000000ca1aab0cf31e934fd0f0859afbeabfa22fd0e1a9d02f959a8c050100e4bd32d4b31f05c5bea3d26e719249a1c739c0d7f6416e40bd7eab9890d5b38ebe7b81ac0e96e23713635b47a8d3513d9404680999359a73833c2869f195d03ab31f6c2d451ba63bf4833565a65b746d0a7e3b83d01d79784718f56597802339249c9db9ad3b8d6536eabfefd5be00c04e1ddfd118b3ad"], &(0x7f0000000080)=0x74) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x7}, 0x8) 14:03:59 executing program 2 (fault-call:3 fault-nth:31): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:03:59 executing program 6 (fault-call:3 fault-nth:40): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 325.077013] FAULT_INJECTION: forcing a failure. [ 325.077013] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 325.088871] CPU: 1 PID: 14607 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 325.096146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.098100] FAULT_INJECTION: forcing a failure. [ 325.098100] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 325.105512] Call Trace: [ 325.119883] dump_stack+0x185/0x1e0 [ 325.123514] should_fail+0x8a7/0xae0 [ 325.127234] __alloc_pages_nodemask+0x622/0x6320 [ 325.132004] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 325.137451] ? get_page_from_freelist+0xb01f/0xbb50 [ 325.142508] ? __save_stack_trace+0xa45/0xca0 [ 325.147018] ? memcg_kmem_charge+0x5f8/0xac0 [ 325.151426] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 325.157137] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 325.163103] ? __alloc_pages_nodemask+0x105b/0x6320 [ 325.168120] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.173488] ? kmsan_set_origin_inline+0x6b/0x120 [ 325.178335] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 325.183698] ? memcg_kmem_charge+0x79d/0xac0 [ 325.188106] kmsan_alloc_page+0x80/0xe0 [ 325.192079] __alloc_pages_nodemask+0x105b/0x6320 [ 325.196929] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 325.202111] ? __msan_poison_alloca+0x183/0x220 [ 325.206784] ? kmsan_set_origin_inline+0x6b/0x120 [ 325.211636] ? __msan_poison_alloca+0x183/0x220 [ 325.216298] ? _cond_resched+0x4c/0x100 [ 325.220277] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 325.225656] alloc_pages_current+0x6b1/0x970 [ 325.230068] pipe_write+0x7f0/0x1d30 [ 325.233801] ? pipe_read+0x1330/0x1330 [ 325.237684] __vfs_write+0x87e/0xb90 [ 325.241408] vfs_write+0x467/0x8c0 [ 325.244955] __x64_sys_write+0x1cf/0x400 [ 325.249029] ? ksys_write+0x380/0x380 [ 325.252834] do_syscall_64+0x15b/0x230 [ 325.256721] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.261903] RIP: 0033:0x455ab9 [ 325.265080] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.284439] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 325.292155] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 325.299418] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 325.306679] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 325.313941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 325.321206] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000028 [ 325.328489] CPU: 0 PID: 14610 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 325.335775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.345138] Call Trace: [ 325.347762] dump_stack+0x185/0x1e0 [ 325.347784] should_fail+0x8a7/0xae0 [ 325.347815] __alloc_pages_nodemask+0x622/0x6320 [ 325.347836] ? msan_get_shadow_origin_ptr+0x260/0x300 [ 325.347861] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 325.347878] ? get_page_from_freelist+0xb01f/0xbb50 14:04:00 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000080)=""/61) [ 325.347899] ? __save_stack_trace+0xa45/0xca0 [ 325.347936] ? memcg_kmem_charge+0x5f8/0xac0 [ 325.384597] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 325.384618] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 325.384638] ? __alloc_pages_nodemask+0x105b/0x6320 [ 325.384662] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.384690] ? kmsan_set_origin_inline+0x6b/0x120 [ 325.384721] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 325.384736] ? memcg_kmem_charge+0x79d/0xac0 [ 325.384769] kmsan_alloc_page+0x80/0xe0 [ 325.425386] __alloc_pages_nodemask+0x105b/0x6320 [ 325.430250] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 325.435454] ? __msan_poison_alloca+0x183/0x220 [ 325.440170] ? kmsan_set_origin_inline+0x6b/0x120 [ 325.445033] ? __msan_poison_alloca+0x183/0x220 [ 325.449714] ? _cond_resched+0x4c/0x100 [ 325.453709] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 325.459137] alloc_pages_current+0x6b1/0x970 [ 325.463590] pipe_write+0x7f0/0x1d30 [ 325.467362] ? pipe_read+0x1330/0x1330 [ 325.471278] __vfs_write+0x87e/0xb90 [ 325.475002] vfs_write+0x467/0x8c0 [ 325.478555] __x64_sys_write+0x1cf/0x400 [ 325.482630] ? ksys_write+0x380/0x380 [ 325.486468] do_syscall_64+0x15b/0x230 [ 325.490392] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.495598] RIP: 0033:0x455ab9 [ 325.498793] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.518156] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 325.525880] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 325.533152] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 325.540417] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 325.547705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 325.554991] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000001f 14:04:00 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x111) fcntl$setpipe(r1, 0x407, 0xfffffffffffffffd) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:00 executing program 6 (fault-call:3 fault-nth:41): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000000000000002000900020000000000000000000000030006000000000002000000e0000054d81458186fe8b9000200010000000000000006fc6bd80000030005000000000002000000e00000010000000000000000"], 0x60}, 0x1}, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @rand_addr}, &(0x7f0000000040)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000140)=0x4) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000280)=@int=0x7, 0x4) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000200), &(0x7f0000000380)=0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={r2, 0x1000}, 0x8) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000340)={0x0, @local, @remote}, &(0x7f0000000240)=0x5) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000002c0), &(0x7f0000000300)=0x10) 14:04:00 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:00 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080), 0x800) r0 = userfaultfd(0x5b9fa01b43f34b5c) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000180)='./control\x00', 0x2) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 325.832375] FAULT_INJECTION: forcing a failure. [ 325.832375] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 325.844236] CPU: 0 PID: 14637 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 325.851523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.860883] Call Trace: [ 325.863505] dump_stack+0x185/0x1e0 [ 325.867149] should_fail+0x8a7/0xae0 [ 325.870887] __alloc_pages_nodemask+0x622/0x6320 [ 325.875849] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 325.881314] ? get_page_from_freelist+0xb01f/0xbb50 [ 325.886392] ? __save_stack_trace+0xa45/0xca0 [ 325.890940] ? memcg_kmem_charge+0x5f8/0xac0 [ 325.895395] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 325.901212] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 325.907199] ? __alloc_pages_nodemask+0x105b/0x6320 [ 325.912228] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.917612] ? kmsan_set_origin_inline+0x6b/0x120 [ 325.922494] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 325.927869] ? memcg_kmem_charge+0x79d/0xac0 [ 325.932300] kmsan_alloc_page+0x80/0xe0 [ 325.936296] __alloc_pages_nodemask+0x105b/0x6320 [ 325.941158] ? kmsan_set_origin_inline+0x6b/0x120 [ 325.946019] ? kmsan_set_origin_inline+0x6b/0x120 [ 325.950873] ? __msan_poison_alloca+0x183/0x220 [ 325.955551] ? _cond_resched+0x4c/0x100 [ 325.959552] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 325.964942] alloc_pages_current+0x6b1/0x970 [ 325.969376] pipe_write+0x7f0/0x1d30 [ 325.973133] ? pipe_read+0x1330/0x1330 [ 325.977033] __vfs_write+0x87e/0xb90 [ 325.980808] vfs_write+0x467/0x8c0 [ 325.984375] __x64_sys_write+0x1cf/0x400 [ 325.988465] ? ksys_write+0x380/0x380 [ 325.992277] do_syscall_64+0x15b/0x230 [ 325.996187] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.001384] RIP: 0033:0x455ab9 [ 326.004572] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.023909] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:00 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000042c0)='/dev/zero\x00', 0x101200, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000004340)={0x7, [0x101, 0x4, 0x9, 0x8, 0x6bd9, 0x1b5, 0x2]}, 0x12) r1 = userfaultfd(0x0) syz_open_dev$vcsn(&(0x7f0000004280)='/dev/vcs#\x00', 0x1, 0x100) r2 = syz_open_dev$mouse(&(0x7f0000004300)='/dev/input/mouse#\x00', 0x80, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000080)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x200000, 0x0) sendmsg$rds(r3, &(0x7f0000004180)={&(0x7f0000000180)={0x2, 0x4e21}, 0x10, &(0x7f00000013c0)=[{&(0x7f00000001c0)=""/95, 0x5f}, {&(0x7f0000000240)=""/131, 0x83}, {&(0x7f0000000300)=""/10, 0xa}, {&(0x7f0000000380)=""/6, 0x6}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x5, &(0x7f0000003e80)=[@fadd={0x58, 0x114, 0x6, {{0xb3, 0x6}, &(0x7f0000001440)=0x81, &(0x7f0000001480)=0x1ff, 0x2, 0xffffffffffffff41, 0x5e6e, 0x1a, 0x40, 0x7dd8468d}}, @rdma_args={0x48, 0x114, 0x1, {{0x565, 0x400}, {&(0x7f00000014c0)=""/244, 0xf4}, &(0x7f0000003ac0)=[{&(0x7f00000015c0)=""/79, 0x4f}, {&(0x7f0000001640)=""/179, 0xb3}, {&(0x7f0000001700)=""/169, 0xa9}, {&(0x7f00000017c0)=""/228, 0xe4}, {&(0x7f00000018c0)=""/143, 0x8f}, {&(0x7f0000001980)=""/255, 0xff}, {&(0x7f0000001a80)=""/4, 0x4}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/4096, 0x1000}], 0x9, 0x2, 0x3}}, @mask_fadd={0x58, 0x114, 0x8, {{0x80000001, 0x101}, &(0x7f0000003b80)=0xfffffffffffffffe, &(0x7f0000003bc0)=0x585, 0x5, 0x0, 0x7, 0x8001, 0x1, 0xfff}}, @rdma_dest={0x18, 0x114, 0x2, {0x3f}}, @cswp={0x58, 0x114, 0x7, {{0xff, 0xb0}, &(0x7f0000003c00)=0x100, &(0x7f0000003c40)=0x6, 0x1ff, 0x7, 0x1, 0x4, 0x7, 0x400}}, @mask_fadd={0x58, 0x114, 0x8, {{0x9813, 0x5}, &(0x7f0000003c80)=0x9, &(0x7f0000003cc0)=0x6, 0x1f, 0x6e8923c6, 0x6, 0x9, 0x2}}, @fadd={0x58, 0x114, 0x6, {{0x1f, 0x1000}, &(0x7f0000003d00)=0x4, &(0x7f0000003d40)=0xffffffff, 0x101, 0x0, 0x48bb, 0x7, 0x1, 0x5e}}, @mask_cswp={0x58, 0x114, 0x9, {{0x0, 0x3}, &(0x7f0000003d80)=0xc3c3, &(0x7f0000003dc0)=0x8, 0x3, 0x1, 0x80000000, 0xfffffffffffff000, 0x40, 0x8}}, @mask_cswp={0x58, 0x114, 0x9, {{0xaea9, 0xffff}, &(0x7f0000003e00), &(0x7f0000003e40)=0x8, 0x6, 0x7fffffff, 0x0, 0x8, 0x5, 0x1}}], 0x2c8, 0x24004000}, 0x20000001) r4 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') perf_event_open$cgroup(&(0x7f0000004200)={0x2, 0x70, 0x8, 0x9, 0xffffffffffff7fff, 0x1, 0x0, 0x80000000, 0x8000, 0x5, 0x2, 0xc419, 0x7fff, 0x9, 0x2, 0x4, 0xc9e9, 0x98, 0x1, 0xba9, 0x4, 0x5, 0x9, 0x8001, 0x7fffffff, 0x8000, 0x1, 0x40, 0x1, 0xfff, 0xfffffffffffffc01, 0x6, 0x2, 0xff, 0x7, 0x100000000, 0x10001, 0x0, 0x0, 0x6, 0x1, @perf_bp={&(0x7f00000041c0), 0x2}, 0x0, 0x7, 0x200, 0x7, 0x100, 0x6, 0x7}, r3, 0x4, r4, 0x2) close(r1) 14:04:01 executing program 2 (fault-call:3 fault-nth:32): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:01 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, r3, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000100)={0x9, [0x8001, 0x2, 0x3, 0x599, 0x3730196a, 0x2, 0xfffffffffffffff8, 0x0, 0xf80]}, &(0x7f0000000180)=0x16) r5 = dup2(r4, r3) socketpair$inet(0x2, 0x80003, 0x6, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$void(r4, 0xc0045878) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000004c0)={0x2f2, @tick=0x3, 0x1, {0x0, 0x3}, 0x10000, 0x1, 0x8a}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setlease(r0, 0x400, 0x1) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f00000001c0)={0x0, 0x2, 0x4, 0x0, 0x100}) write$P9_RMKDIR(r1, &(0x7f0000000080)={0x14, 0x49, 0x2, {0x20}}, 0x14) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) prctl$getreaper(0x2, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'veth1_to_bond\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', r7}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'bpq0\x00', r8}) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000440)={0x3, 0x27d, 0x1}) recvfrom$inet(r5, &(0x7f0000000380)=""/131, 0x83, 0x40010040, &(0x7f0000000200)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x618, 0x401) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r1, r0) 14:04:01 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x1) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)) finit_module(r0, &(0x7f00000000c0)='nodev}\x00', 0x3) rt_sigprocmask(0x0, &(0x7f0000000100)={0x80000001}, &(0x7f00000c1000), 0x22b) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgrcv(r3, &(0x7f0000000040)={0x0, ""/67}, 0x4b, 0x3, 0x3000) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 326.031642] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 326.038926] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 326.046209] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 326.053541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 326.060828] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000029 [ 326.227360] FAULT_INJECTION: forcing a failure. [ 326.227360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 326.239224] CPU: 0 PID: 14662 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 326.246510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.255869] Call Trace: [ 326.258480] dump_stack+0x185/0x1e0 [ 326.262130] should_fail+0x8a7/0xae0 [ 326.265891] __alloc_pages_nodemask+0x622/0x6320 [ 326.270673] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 326.276150] ? get_page_from_freelist+0xb01f/0xbb50 [ 326.281197] ? __save_stack_trace+0xa45/0xca0 [ 326.285739] ? memcg_kmem_charge+0x5f8/0xac0 [ 326.290172] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 326.296002] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 326.301992] ? __alloc_pages_nodemask+0x105b/0x6320 [ 326.307031] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.312432] ? kmsan_set_origin_inline+0x6b/0x120 [ 326.317405] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 326.322779] ? memcg_kmem_charge+0x79d/0xac0 [ 326.327202] kmsan_alloc_page+0x80/0xe0 [ 326.331196] __alloc_pages_nodemask+0x105b/0x6320 [ 326.336055] ? kmsan_set_origin_inline+0x6b/0x120 [ 326.340910] ? __msan_poison_alloca+0x183/0x220 [ 326.345593] ? finish_task_switch+0x130/0x260 [ 326.350102] ? kmsan_set_origin_inline+0x6b/0x120 [ 326.354963] ? __msan_poison_alloca+0x183/0x220 [ 326.359650] ? _cond_resched+0x4c/0x100 [ 326.363648] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 326.369044] alloc_pages_current+0x6b1/0x970 [ 326.373495] pipe_write+0x7f0/0x1d30 [ 326.377253] ? pipe_read+0x1330/0x1330 [ 326.381155] __vfs_write+0x87e/0xb90 [ 326.384903] vfs_write+0x467/0x8c0 [ 326.388484] __x64_sys_write+0x1cf/0x400 [ 326.392572] ? ksys_write+0x380/0x380 [ 326.396385] do_syscall_64+0x15b/0x230 [ 326.400390] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.405588] RIP: 0033:0x455ab9 [ 326.408776] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.428131] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 326.435851] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 326.443131] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 326.450408] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 326.457689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 326.464988] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000020 14:04:01 executing program 6 (fault-call:3 fault-nth:42): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:01 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000003c0)='/dev/snd/pcmC#D#p\x00', 0x20000008, 0x3ffffe) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f00000001c0)={0x0, {{0x2, 0x4e22, @rand_addr=0x100000000}}, {{0x2, 0x4e23}}}, 0x108) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x60}, 0x1}, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x13, 0xffffffff, 0x7, 0x16, 0x0, 0x70bd26, 0x25dfdbff, [@sadb_x_nat_t_type={0x1, 0x14, 0x7}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x19b800000000000, 0x100000001, @mcast1={0xff, 0x1, [], 0x1}, 0x1ff}, @in6={0xa, 0x4e21, 0xfff, @loopback={0x0, 0x1}, 0x5a}}, @sadb_x_sa2={0x2, 0x13, 0x6, 0x0, 0x0, 0x2, 0x3502}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e20, @multicast1=0xe0000001}, @in={0x2, 0x4e22}}, @sadb_key={0x4, 0x9, 0x98, 0x0, "c65d5df77bd173b13432e13c7f0961595eb45b"}]}, 0xb0}, 0x1}, 0x8800) 14:04:01 executing program 2 (fault-call:3 fault-nth:33): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 326.674501] FAULT_INJECTION: forcing a failure. [ 326.674501] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 326.686474] CPU: 1 PID: 14680 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 326.693779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.703162] Call Trace: [ 326.705808] dump_stack+0x185/0x1e0 [ 326.709488] should_fail+0x8a7/0xae0 [ 326.713262] __alloc_pages_nodemask+0x622/0x6320 [ 326.718065] ? kmsan_set_origin_inline+0x6b/0x120 [ 326.722952] ? kmsan_set_origin_inline+0x6b/0x120 [ 326.727840] ? __msan_poison_alloca+0x183/0x220 [ 326.732567] ? _cond_resched+0x4c/0x100 [ 326.736584] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 326.742033] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 326.747526] alloc_pages_current+0x6b1/0x970 [ 326.752008] pipe_write+0x7f0/0x1d30 [ 326.755822] ? pipe_read+0x1330/0x1330 [ 326.759777] __vfs_write+0x87e/0xb90 [ 326.763560] vfs_write+0x467/0x8c0 [ 326.767179] __x64_sys_write+0x1cf/0x400 [ 326.771321] ? ksys_write+0x380/0x380 14:04:01 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) [ 326.775176] do_syscall_64+0x15b/0x230 [ 326.779112] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.784334] RIP: 0033:0x455ab9 [ 326.787534] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.807186] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 326.808747] FAULT_INJECTION: forcing a failure. [ 326.808747] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 326.814942] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 326.814967] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 326.814985] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 326.815003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 326.815021] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002a [ 326.863900] CPU: 0 PID: 14686 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 326.871229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.880616] Call Trace: [ 326.883268] dump_stack+0x185/0x1e0 [ 326.886946] should_fail+0x8a7/0xae0 [ 326.890714] __alloc_pages_nodemask+0x622/0x6320 [ 326.895568] ? kmsan_set_origin_inline+0x6b/0x120 [ 326.900451] ? kmsan_set_origin_inline+0x6b/0x120 [ 326.905329] ? __msan_poison_alloca+0x183/0x220 [ 326.910053] ? _cond_resched+0x4c/0x100 [ 326.914079] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 326.919493] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 326.924987] alloc_pages_current+0x6b1/0x970 [ 326.929442] pipe_write+0x7f0/0x1d30 [ 326.933252] ? pipe_read+0x1330/0x1330 [ 326.937205] __vfs_write+0x87e/0xb90 [ 326.940989] vfs_write+0x467/0x8c0 [ 326.944640] __x64_sys_write+0x1cf/0x400 [ 326.948769] ? ksys_write+0x380/0x380 [ 326.952624] do_syscall_64+0x15b/0x230 [ 326.956558] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.961771] RIP: 0033:0x455ab9 [ 326.964969] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.984611] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 326.992362] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 326.999654] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 327.006942] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 327.014234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 14:04:02 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x80000000) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r0, r0) [ 327.021527] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000021 14:04:02 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000000)={0x3f, 0x2, 0x1, 0xd58, 0x80000000, 0x1f}) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) shutdown(r0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 14:04:02 executing program 6 (fault-call:3 fault-nth:43): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:02 executing program 2 (fault-call:3 fault-nth:34): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:02 executing program 4: rt_sigprocmask(0x40, &(0x7f0000000100)={0x80000001}, &(0x7f00000c1000), 0x8) writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000040)='\b', 0x1}], 0x1, 0x3) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0900000065ffff0300000008003950323030302e4c"], 0x15) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 327.301940] FAULT_INJECTION: forcing a failure. [ 327.301940] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 327.313827] CPU: 1 PID: 14710 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 327.321112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.330481] Call Trace: [ 327.333096] dump_stack+0x185/0x1e0 [ 327.336746] should_fail+0x8a7/0xae0 [ 327.340490] __alloc_pages_nodemask+0x622/0x6320 [ 327.345277] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 327.350747] ? get_page_from_freelist+0xb01f/0xbb50 [ 327.355785] ? __save_stack_trace+0xa45/0xca0 [ 327.360318] ? memcg_kmem_charge+0x5f8/0xac0 [ 327.364747] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 327.371093] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 327.377090] ? __alloc_pages_nodemask+0x105b/0x6320 [ 327.382136] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.387544] ? kmsan_set_origin_inline+0x6b/0x120 [ 327.392435] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 327.397826] ? memcg_kmem_charge+0x79d/0xac0 [ 327.402265] kmsan_alloc_page+0x80/0xe0 [ 327.405571] FAULT_INJECTION: forcing a failure. [ 327.405571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 327.406266] __alloc_pages_nodemask+0x105b/0x6320 [ 327.422884] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 327.428073] ? __msan_poison_alloca+0x183/0x220 [ 327.432752] ? kmsan_set_origin_inline+0x6b/0x120 [ 327.437594] ? __msan_poison_alloca+0x183/0x220 [ 327.442260] ? _cond_resched+0x4c/0x100 [ 327.446412] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 327.451783] alloc_pages_current+0x6b1/0x970 [ 327.456198] pipe_write+0x7f0/0x1d30 [ 327.459930] ? pipe_read+0x1330/0x1330 [ 327.463813] __vfs_write+0x87e/0xb90 [ 327.467535] vfs_write+0x467/0x8c0 [ 327.471082] __x64_sys_write+0x1cf/0x400 [ 327.475143] ? ksys_write+0x380/0x380 [ 327.478937] do_syscall_64+0x15b/0x230 [ 327.482833] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.488011] RIP: 0033:0x455ab9 [ 327.491185] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.510456] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 327.518158] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 327.525419] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 327.532680] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 327.539938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 327.547202] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002b [ 327.554482] CPU: 0 PID: 14714 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 327.561762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.571522] Call Trace: [ 327.574137] dump_stack+0x185/0x1e0 [ 327.577805] should_fail+0x8a7/0xae0 [ 327.581540] __alloc_pages_nodemask+0x622/0x6320 [ 327.586324] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 327.591785] ? get_page_from_freelist+0xb01f/0xbb50 [ 327.596820] ? __save_stack_trace+0xa45/0xca0 [ 327.601353] ? memcg_kmem_charge+0x5f8/0xac0 [ 327.605783] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 327.611507] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 327.617492] ? __alloc_pages_nodemask+0x105b/0x6320 [ 327.622530] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.627917] ? kmsan_set_origin_inline+0x6b/0x120 [ 327.632788] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 327.638167] ? memcg_kmem_charge+0x79d/0xac0 [ 327.642595] kmsan_alloc_page+0x80/0xe0 [ 327.646587] __alloc_pages_nodemask+0x105b/0x6320 [ 327.651447] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 327.656652] ? __msan_poison_alloca+0x183/0x220 [ 327.661340] ? kmsan_set_origin_inline+0x6b/0x120 [ 327.666194] ? __msan_poison_alloca+0x183/0x220 [ 327.670874] ? _cond_resched+0x4c/0x100 [ 327.674866] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 327.680264] alloc_pages_current+0x6b1/0x970 [ 327.684688] pipe_write+0x7f0/0x1d30 [ 327.688435] ? pipe_read+0x1330/0x1330 [ 327.692338] __vfs_write+0x87e/0xb90 [ 327.696081] vfs_write+0x467/0x8c0 [ 327.699641] __x64_sys_write+0x1cf/0x400 [ 327.703719] ? ksys_write+0x380/0x380 [ 327.707528] do_syscall_64+0x15b/0x230 [ 327.711434] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.716631] RIP: 0033:0x455ab9 [ 327.719813] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.739173] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 327.746887] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 14:04:02 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x0, 0x5, 0x0, 0x3, 0x98}) writev(r2, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r2, r1) 14:04:02 executing program 3: 14:04:02 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x6b}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:02 executing program 3: [ 327.754165] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 327.761437] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 327.768716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 327.775988] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000022 14:04:02 executing program 0: mkdir(&(0x7f0000000140)='./control/file0\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000040)={0xf82, 0x6, 0x9, 0x8, 0x8, 0x20}) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000400)='./control/file0\x00', &(0x7f0000000380)='./control\x00') ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f00000002c0)=r1) close(r1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') connect$can_bcm(r1, &(0x7f0000000280)={0x1d}, 0x10) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x11000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000129bd7000ffdbdf251000000014000300080001000000000008000800070000000c0002000800030002fdffff0700040008000000"], 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x1) 14:04:02 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x34, 0x0) unshare(0x64000400) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$int_out(r2, 0x40045730, &(0x7f0000000100)) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:02 executing program 6 (fault-call:3 fault-nth:44): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:02 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)=@ipv4_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xff}}, 0x1c}, 0x1}, 0x0) 14:04:03 executing program 2 (fault-call:3 fault-nth:35): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 328.093584] IPVS: ftp: loaded support on port[0] = 21 [ 328.155979] FAULT_INJECTION: forcing a failure. [ 328.155979] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 328.167836] CPU: 1 PID: 14749 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 328.175127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.184485] Call Trace: [ 328.187092] dump_stack+0x185/0x1e0 [ 328.190735] should_fail+0x8a7/0xae0 [ 328.194474] __alloc_pages_nodemask+0x622/0x6320 [ 328.199257] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 328.204720] ? get_page_from_freelist+0xb01f/0xbb50 [ 328.209753] ? __save_stack_trace+0xa45/0xca0 [ 328.214284] ? memcg_kmem_charge+0x5f8/0xac0 [ 328.218708] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 328.224519] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 328.230505] ? __alloc_pages_nodemask+0x105b/0x6320 [ 328.235538] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.235931] FAULT_INJECTION: forcing a failure. [ 328.235931] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 328.240918] ? vmalloc_to_page+0x50b/0x630 [ 328.256925] ? kmsan_set_origin_inline+0x6b/0x120 [ 328.261784] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 328.267157] ? memcg_kmem_charge+0x79d/0xac0 [ 328.271568] kmsan_alloc_page+0x80/0xe0 [ 328.275550] __alloc_pages_nodemask+0x105b/0x6320 [ 328.280393] ? kmsan_set_origin_inline+0x6b/0x120 [ 328.285234] ? kmsan_set_origin_inline+0x6b/0x120 [ 328.290071] ? __msan_poison_alloca+0x183/0x220 [ 328.294734] ? _cond_resched+0x4c/0x100 [ 328.298711] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 328.304081] alloc_pages_current+0x6b1/0x970 [ 328.308493] pipe_write+0x7f0/0x1d30 [ 328.312233] ? pipe_read+0x1330/0x1330 [ 328.316113] __vfs_write+0x87e/0xb90 [ 328.319836] vfs_write+0x467/0x8c0 [ 328.323381] __x64_sys_write+0x1cf/0x400 [ 328.327443] ? ksys_write+0x380/0x380 [ 328.331247] do_syscall_64+0x15b/0x230 [ 328.335137] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.340316] RIP: 0033:0x455ab9 [ 328.343492] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.362867] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 328.370580] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 328.377841] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 328.385099] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 328.392373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 328.399636] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002c [ 328.407617] CPU: 0 PID: 14751 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 328.414900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.424256] Call Trace: [ 328.426856] dump_stack+0x185/0x1e0 [ 328.430501] should_fail+0x8a7/0xae0 [ 328.434232] __alloc_pages_nodemask+0x622/0x6320 [ 328.439011] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 328.444481] ? get_page_from_freelist+0xb01f/0xbb50 [ 328.449515] ? __save_stack_trace+0xa45/0xca0 [ 328.454058] ? memcg_kmem_charge+0x5f8/0xac0 [ 328.458491] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 328.464289] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 328.470262] ? __alloc_pages_nodemask+0x105b/0x6320 [ 328.475288] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.480657] ? vmalloc_to_page+0x50b/0x630 [ 328.484908] ? kmsan_set_origin_inline+0x6b/0x120 [ 328.489756] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 328.495118] ? memcg_kmem_charge+0x79d/0xac0 [ 328.499538] kmsan_alloc_page+0x80/0xe0 [ 328.503522] __alloc_pages_nodemask+0x105b/0x6320 [ 328.508381] ? kmsan_set_origin_inline+0x6b/0x120 [ 328.513234] ? kmsan_set_origin_inline+0x6b/0x120 [ 328.518087] ? __msan_poison_alloca+0x183/0x220 [ 328.522759] ? _cond_resched+0x4c/0x100 [ 328.526742] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 328.532104] alloc_pages_current+0x6b1/0x970 [ 328.536522] pipe_write+0x7f0/0x1d30 [ 328.540274] ? pipe_read+0x1330/0x1330 [ 328.544162] __vfs_write+0x87e/0xb90 [ 328.547889] vfs_write+0x467/0x8c0 [ 328.551426] __x64_sys_write+0x1cf/0x400 [ 328.555510] ? ksys_write+0x380/0x380 [ 328.559308] do_syscall_64+0x15b/0x230 [ 328.563204] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.568389] RIP: 0033:0x455ab9 [ 328.571565] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.590775] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 328.598480] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 328.605740] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 328.613003] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 328.620268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 328.627535] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000023 14:04:03 executing program 3: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) alarm(0x920d) 14:04:03 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:03 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0xfffffffffffffd9e, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:03 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000140)={@broadcast, @empty, 0x0}, &(0x7f0000000180)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000001c0)={@remote, @rand_addr, 0x0}, &(0x7f0000000200)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) sendmsg$nl_route(r1, &(0x7f0000000800)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40400}, 0xc, &(0x7f00000007c0)={&(0x7f00000003c0)=@ipv4_delroute={0x3d4, 0x19, 0x110, 0x70bd2c, 0x25dfdbff, {0x2, 0x0, 0xa0, 0xffffffff, 0xfd, 0x3, 0x0, 0x5, 0x3400}, [@RTA_IIF={0x8, 0x1, r2}, @RTA_PREFSRC={0x8, 0x7, @broadcast=0xffffffff}, @RTA_MULTIPATH={0xc, 0x9, {0x0, 0x100000001, 0x3, r3}}, @RTA_UID={0x8, 0x19, r4}, @RTA_ENCAP={0x38c, 0x16, @nested={0x388, 0x79, [@generic="b51c8771b3a4dbbf67083a9459d5e4a535e9b0cd054516ec7dee1275970d3bf2591e33150049461aad7d8b6673726ad39e0c71485e02f8f5228be4219a9484d4461b3bc9ff009ede5fcd01a9d54a6688622128d9962c83d7deedf1b21068445fc0d229300dac09568a0cb77dfdac11a8f3ce3855fe47227cbdeebf941f9a9b7afb8913144362148badaa83c35a920118a7e9d56a3ac07ec0756ace81539e2b9227e0acd76be67f854d2b9ff8588e260ac3d0eac122ebd6af54373c49", @generic="52ebd15ef5143fc2ffbf33d7f470e704fa7337db2aadab34b86a30d949744d29c62837779898b8f5da6f0777614792cdf8d5cf7a08c325d06e1175b9356f929ceeade4b3015bd8b22452a2651cb25ef9ed9290f31770890e58ff068b6e3d65a746f548f8da5315726dbf208f25558482db4c07745d0394943efc54123cf73cca04b51d6f58a0dae26327bdf4820338cb5ac4a36befe55d069514a1e3ea6da5de1f5456b44264ce44442915c03d9c9c0582a634c245ae4d1fc24cf9ae76add79742a4304d44bf147f0bb9d7a6373a101c3ab56f2650", @typed={0x8, 0x65, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @generic="76e2a4971d38114634488c0bb901ee043f6bf359365080fcada4d78b501febee7b6bd6b10b3692be26cbd064fc1ba5edb997e3067f19d4de0fc6a0c47771cb34fbb833d223864fb26b867ef7a476e23e4a201f886866d9e442fa8097b9bed3f9d98216aacbfd07225662b8f7c731e87371128c7dbea288f1ea258ca1df785c743e880f0fa1b962643c31df198d2c045f6af5e521229726d64f1d3b5b427dadc335ecc436b2", @generic="9beacb6ec98fac007e98b4eab970f728ef410b95f581774b151e93c11d6e9e4f363cc0514b13090424b9877bbac2323b8b574ad78e5fa0d94ac28ff467cc3fd85f22e817ab354e1678ac46b709a2979ef840ccbfe4", @generic="392651f2657aaafe0c3a791983b723b67e0c0e276ffc2602f844b0d06b79d318354c18fdafc05d3879aa50e93343ed23447ab3f92dc925515345666cdff7a5b802fcfaf8912cc457a26959a2dd1f5ba09f3578b29299f11e33be25a98acb568f16b6079f0db59178dc9a89a7a17d8fbebafb6eec5a2034446b856f8d4ab202476986524f7c7ed65fe55a0d909c53b0389feb3343c70be93baeb07e09dfb5637cf702addbfc919e9d3896af0954174c27ccf91195a4c43f718b0a7d685c77745f02d971670e0b135c44a29f058288116a6285a8a2191c7429bd74a16798405c02df77cefae87ae2c261e0dccdb3db6615"]}}, @RTA_PRIORITY={0x8, 0x6, 0x7b}]}, 0x3d4}, 0x1, 0x0, 0x0, 0x80}, 0x0) close(r0) 14:04:03 executing program 2 (fault-call:3 fault-nth:36): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:03 executing program 6 (fault-call:3 fault-nth:45): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:03 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) dup2(r1, r0) 14:04:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x1, 0x6001, 0x80, 0xb550, 0x100, 0x1ff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r2, &(0x7f0000000340)=[{&(0x7f0000000380)="1abbbcdcf60008d437d1d0e1fa7ed287473dc5706fd449141cd1e712c1dacc49577e1ae1befc1bf94aa7c4105c0afb92bdd873c24e5f9ed7667c133aabacfc4c4bcd1b784fb2dab1c7210c6f01ef734b4e44b6ab0acb726c02e74c7c19e1a19727eda546ca456276cd0dfe15e91dc3bd46b209d4a7932772bafa818bb68ed7445ba7dc802669b62747ff74956275936ffb89e52c32376dd4c08d", 0x29a}], 0x1) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000000)={0x18}, 0x18) r3 = dup2(r2, r1) ioctl$TIOCSCTTY(r3, 0x540e, 0x400) fstat(r0, &(0x7f00000000c0)) [ 328.926729] FAULT_INJECTION: forcing a failure. [ 328.926729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 328.938830] CPU: 1 PID: 14771 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 328.946147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.955535] Call Trace: [ 328.958179] dump_stack+0x185/0x1e0 [ 328.961854] should_fail+0x8a7/0xae0 [ 328.965623] __alloc_pages_nodemask+0x622/0x6320 [ 328.970424] ? kmsan_set_origin_inline+0x6b/0x120 [ 328.973857] FAULT_INJECTION: forcing a failure. [ 328.973857] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 328.975305] ? __msan_poison_alloca+0x183/0x220 [ 328.975338] ? perf_event_task_sched_in+0x257/0x2b0 [ 328.975390] ? kmsan_set_origin_inline+0x6b/0x120 [ 328.975437] ? __msan_poison_alloca+0x183/0x220 [ 329.006417] ? _cond_resched+0x4c/0x100 [ 329.010436] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 329.015843] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 329.021315] alloc_pages_current+0x6b1/0x970 [ 329.025765] pipe_write+0x7f0/0x1d30 [ 329.029508] ? init_wait_entry+0x1a0/0x1a0 [ 329.033778] ? pipe_read+0x1330/0x1330 [ 329.037696] __vfs_write+0x87e/0xb90 [ 329.041442] vfs_write+0x467/0x8c0 [ 329.045033] __x64_sys_write+0x1cf/0x400 [ 329.049141] ? ksys_write+0x380/0x380 [ 329.052972] do_syscall_64+0x15b/0x230 [ 329.056878] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.062075] RIP: 0033:0x455ab9 [ 329.065260] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.084732] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 329.092466] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 329.099740] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 329.107013] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 329.114290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 329.121566] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002d [ 329.128863] CPU: 0 PID: 14779 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 329.136156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.145532] Call Trace: [ 329.148162] dump_stack+0x185/0x1e0 [ 329.151843] should_fail+0x8a7/0xae0 [ 329.155603] __alloc_pages_nodemask+0x622/0x6320 [ 329.160396] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.165272] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.170147] ? __msan_poison_alloca+0x183/0x220 [ 329.174861] ? _cond_resched+0x4c/0x100 [ 329.178870] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 329.184288] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 329.189774] alloc_pages_current+0x6b1/0x970 [ 329.194221] pipe_write+0x7f0/0x1d30 [ 329.198017] ? pipe_read+0x1330/0x1330 [ 329.201959] __vfs_write+0x87e/0xb90 [ 329.205729] vfs_write+0x467/0x8c0 [ 329.209334] __x64_sys_write+0x1cf/0x400 [ 329.213459] ? ksys_write+0x380/0x380 [ 329.217304] do_syscall_64+0x15b/0x230 [ 329.221229] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.226437] RIP: 0033:0x455ab9 [ 329.229640] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.249255] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 329.256999] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 329.264289] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 329.271578] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 329.278866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 329.286157] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000024 14:04:04 executing program 3: mprotect(&(0x7f000001c000/0x4000)=nil, 0x4000, 0x7) 14:04:04 executing program 2 (fault-call:3 fault-nth:37): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:04 executing program 6 (fault-call:3 fault-nth:46): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:04 executing program 3: sched_setscheduler(0x0, 0x1, &(0x7f0000000080)) [ 329.527033] FAULT_INJECTION: forcing a failure. [ 329.527033] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 329.538874] CPU: 0 PID: 14789 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 329.546157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.555518] Call Trace: [ 329.558217] dump_stack+0x185/0x1e0 [ 329.561863] should_fail+0x8a7/0xae0 [ 329.565604] __alloc_pages_nodemask+0x622/0x6320 [ 329.570389] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 329.576332] ? get_page_from_freelist+0xb01f/0xbb50 [ 329.581379] ? check_preempt_wakeup+0xede/0x1590 [ 329.586166] ? memcg_kmem_charge+0x5f8/0xac0 [ 329.590597] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 329.596341] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.601297] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 329.606675] ? memcg_kmem_charge+0x79d/0xac0 [ 329.611102] kmsan_alloc_page+0x80/0xe0 [ 329.615095] __alloc_pages_nodemask+0x105b/0x6320 [ 329.619954] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.624814] ? __msan_poison_alloca+0x183/0x220 [ 329.629496] ? perf_event_task_sched_in+0x257/0x2b0 [ 329.634614] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.639472] ? __msan_poison_alloca+0x183/0x220 [ 329.644152] ? _cond_resched+0x4c/0x100 [ 329.648143] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 329.653532] alloc_pages_current+0x6b1/0x970 [ 329.657959] pipe_write+0x7f0/0x1d30 [ 329.661727] ? init_wait_entry+0x1a0/0x1a0 [ 329.665983] ? pipe_read+0x1330/0x1330 [ 329.669883] __vfs_write+0x87e/0xb90 [ 329.673635] vfs_write+0x467/0x8c0 14:04:04 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0xe21}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@random="b9a2d5b19422", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1=0xe0000001}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 329.677196] __x64_sys_write+0x1cf/0x400 [ 329.681302] ? ksys_write+0x380/0x380 [ 329.685106] do_syscall_64+0x15b/0x230 [ 329.689011] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.694210] RIP: 0033:0x455ab9 [ 329.697394] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.716736] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:04 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) pwritev(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)="5b24d33f86057cce239c65058341d5540aae3e551fefc0fa9b059495c9a3f2cc134fb01d554e331251af574751decebb813e95dbef2f0dbfb22523f8f78a47612b459e25aa96f46a35960156e3aa1ff714c5453c933786c68ec4bb65aaeb19f03479a1dd23deed72f3e030e5f7f94a52c53bea3c0e47ba10c7acb1739d36446f17ae48b2a86118732cd85be28321c7907a7b20c7bd0b5a8c83804ed78e72679f2a090e189110824b2d8957ca00c5ba9ee8818fe5c68e7256fffd5c1018bbc4eba4f84f52b1746e4b1a07eac39f9e34c76d46a21036be6c7527e25221cac281af88839877e6dd77066d9b632f5f83e543c5a9850ef0", 0xf5}, {&(0x7f0000000100)="1341cc2dc3e00a87ba1ad9d2f84a47bbd223a7b8116b1c01a22499ded41b86ec335a0cca", 0x24}, {&(0x7f0000000180)="4853487afa4e3e6791d934923678a2a26109ad", 0x13}], 0x3, 0x0) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) dup2(r1, r0) [ 329.724466] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 329.731743] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 329.739013] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 329.746294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 329.753568] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002e [ 329.817457] FAULT_INJECTION: forcing a failure. [ 329.817457] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 329.829311] CPU: 0 PID: 14807 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 329.836588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.845946] Call Trace: [ 329.848549] dump_stack+0x185/0x1e0 [ 329.852194] should_fail+0x8a7/0xae0 [ 329.855932] __alloc_pages_nodemask+0x622/0x6320 [ 329.860715] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 329.866181] ? get_page_from_freelist+0xb01f/0xbb50 [ 329.871217] ? __save_stack_trace+0xa45/0xca0 [ 329.875753] ? memcg_kmem_charge+0x5f8/0xac0 [ 329.880214] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 329.885938] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 329.891920] ? __alloc_pages_nodemask+0x105b/0x6320 [ 329.896950] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.902326] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.907184] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.912048] ? __msan_metadata_ptr_for_load_8+0x10/0x20 14:04:04 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 329.917422] ? memcg_kmem_charge+0x79d/0xac0 [ 329.921849] kmsan_alloc_page+0x80/0xe0 [ 329.925837] __alloc_pages_nodemask+0x105b/0x6320 [ 329.930694] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.935558] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.940416] ? __msan_poison_alloca+0x183/0x220 [ 329.945098] ? _cond_resched+0x4c/0x100 [ 329.949091] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 329.954489] alloc_pages_current+0x6b1/0x970 [ 329.958922] pipe_write+0x7f0/0x1d30 [ 329.962675] ? pipe_read+0x1330/0x1330 [ 329.966572] __vfs_write+0x87e/0xb90 [ 329.970320] vfs_write+0x467/0x8c0 [ 329.973882] __x64_sys_write+0x1cf/0x400 [ 329.977966] ? ksys_write+0x380/0x380 [ 329.981777] do_syscall_64+0x15b/0x230 [ 329.985687] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.990884] RIP: 0033:0x455ab9 [ 329.994073] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:05 executing program 0: mkdir(&(0x7f00000002c0)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000180)='lo.cpusetwlan1\x00', 0x40, 0x11, &(0x7f00000001c0)={0x6, 0x9, 0x100000001, 0x35dd, 0xfffffffffffffffc, 0x8000, 0x4, 0x850}) socketpair(0x10, 0x7, 0xaed, &(0x7f0000001780)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="9c178b1641d576e098b82e69c8271125aae2a4dc93", @ANYRES32=0x0], &(0x7f0000001800)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000001840)={r2, @in6={{0xa, 0x4e20, 0x3, @loopback={0x0, 0x1}, 0x6}}, 0x0, 0xfffffffffffffffd}, 0x90) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) mount(&(0x7f0000000200)='./control/file0\x00', &(0x7f0000000240)='./control\x00', &(0x7f0000000280)='tracefs\x00', 0x40, 0x0) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0x8, 0x4) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r3) [ 330.013417] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 330.021144] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 330.028421] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 330.035710] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 330.042982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 330.050255] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000025 14:04:05 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:05 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x5, 0x7, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) rt_sigprocmask(0x40000000000003, &(0x7f0000000280)={0x2}, &(0x7f0000000380), 0x50e) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) sysfs$2(0x2, 0x9ef, &(0x7f0000000080)=""/138) dup2(r1, r0) 14:04:05 executing program 6 (fault-call:3 fault-nth:47): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 330.351655] FAULT_INJECTION: forcing a failure. [ 330.351655] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 330.363514] CPU: 1 PID: 14827 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 330.370799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.380162] Call Trace: [ 330.382787] dump_stack+0x185/0x1e0 [ 330.386458] should_fail+0x8a7/0xae0 [ 330.390203] __alloc_pages_nodemask+0x622/0x6320 [ 330.395011] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 330.400476] ? get_page_from_freelist+0xb01f/0xbb50 [ 330.406112] ? check_preempt_wakeup+0xede/0x1590 [ 330.410902] ? memcg_kmem_charge+0x5f8/0xac0 [ 330.415327] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 330.421161] ? kmsan_set_origin_inline+0x6b/0x120 [ 330.426028] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 330.431430] ? memcg_kmem_charge+0x79d/0xac0 [ 330.435860] kmsan_alloc_page+0x80/0xe0 [ 330.439852] __alloc_pages_nodemask+0x105b/0x6320 [ 330.444708] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 330.450083] ? __list_add_valid+0xb8/0x450 [ 330.454335] ? kmsan_set_origin_inline+0x6b/0x120 [ 330.459188] ? __msan_poison_alloca+0x183/0x220 [ 330.463868] ? _cond_resched+0x4c/0x100 [ 330.467863] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 330.473255] alloc_pages_current+0x6b1/0x970 [ 330.477680] pipe_write+0x7f0/0x1d30 [ 330.481425] ? init_wait_entry+0x1a0/0x1a0 [ 330.485679] ? pipe_read+0x1330/0x1330 [ 330.489578] __vfs_write+0x87e/0xb90 [ 330.493323] vfs_write+0x467/0x8c0 [ 330.496889] __x64_sys_write+0x1cf/0x400 [ 330.500973] ? ksys_write+0x380/0x380 [ 330.504781] do_syscall_64+0x15b/0x230 [ 330.508685] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 330.513877] RIP: 0033:0x455ab9 [ 330.517064] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.536409] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 330.544128] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 14:04:05 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000080)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x200, 0x200000) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000100)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000200)={0x0, @tick, 0x0, {0x0, 0x3}, 0x0, 0xffffffffffffffff}) dup2(r0, r0) 14:04:05 executing program 2 (fault-call:3 fault-nth:38): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 330.551403] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 330.558677] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 330.565946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 330.573223] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002f 14:04:05 executing program 6 (fault-call:3 fault-nth:48): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 330.728954] FAULT_INJECTION: forcing a failure. [ 330.728954] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 330.740825] CPU: 0 PID: 14839 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 330.748107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.757518] Call Trace: [ 330.760124] dump_stack+0x185/0x1e0 [ 330.763768] should_fail+0x8a7/0xae0 [ 330.767503] __alloc_pages_nodemask+0x622/0x6320 [ 330.772283] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:04:05 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x3, 0xd98, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000000), &(0x7f00000005c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x11, 0x4, 0x88ff, 'veth1_to_team\x00', 'bridge0\x00', 'bcsh0\x00', 'gre0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0xc0, 0x110, 0x148, [@ipvs={'ipvs\x00', 0x28, {{@ipv6, [0xd3aee70bad3646e8, 0xff000000, 0xff000000, 0xffffff00], 0x4e22, 0x2, 0x1, 0x4e24, 0x11, 0x4}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz0\x00', 0x1, 0x7, 0x401}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 0xfffffffffffffffc}}}}, {{{0xd, 0x1e, 0x15, 'gre0\x00', 'bond_slave_1\x00', 'veth0_to_bond\x00', 'veth1_to_bridge\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x20}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], @empty, [0xff, 0x0, 0xff, 0x0, 0xff], 0x130, 0x1d0, 0x208, [@rateest={'rateest\x00', 0x48, {{'dummy0\x00', 'ip_vti0\x00', 0x23, 0x2, 0x50, 0x2f5, 0x80000000, 0x8, 0x2, 0x1}}}, @ipvs={'ipvs\x00', 0x28, {{@ipv4=@broadcast=0xffffffff, [0x0, 0x0, 0xff000000, 0xff000000], 0x4e24, 0x96, 0x1, 0x4e22, 0x10, 0x10}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0xfa, 0x6}}}, @common=@log={'log\x00', 0x28, {{0x1, "4eb8a8ceae05f29abeac876ef530d82022499c92b2dc378039660541dd81", 0x2}}}]}, @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0xd, 0x15967056799c80e4, 0xedff, 'yam0\x00', 'yam0\x00', 'lo\x00', 'bpq0\x00', @random="b3873d41a10f", [0x0, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x21}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0x888, 0x888, 0x9b8, [@state={'state\x00', 0x8, {{0x3}}}, @u32={'u32\x00', 0x7c0, {{[{[{0x6, 0x2}, {0x1, 0x1}, {0x2}, {0xbc9}, {0x2, 0x1}, {0x8001, 0x2}, {0x3}, {0x143, 0x1}, {0x5, 0x3}, {0x10000, 0x1}, {0x0, 0x2}], [{0x9, 0x3}, {0x8, 0x2}, {0x200}, {0x7fff, 0x6}, {0x9fb7, 0x7}, {0x3f, 0x40}, {0x200, 0x2}, {0x7, 0x4}, {0x8a5, 0x1}, {0x399, 0x80}, {0x7, 0xffff}], 0xb, 0x8}, {[{0x82}, {0xffffffff}, {0x3}, {0x3}, {0x1ff, 0x2}, {0xfffffffffffffffd, 0x1}, {0x8, 0x2}, {0x7f, 0x1}, {0x100000000, 0x1}, {0x2}, {0x8, 0x3}], [{0x1, 0x800}, {0x7fffffff, 0x531}, {0x3, 0xfffffffffffffffa}, {0x600, 0xff}, {0x2000000000000000, 0x2}, {0x100000001, 0x81}, {0x7b53, 0x80000001}, {0x81, 0x5}, {0x1000, 0x8}, {0x4, 0x2}, {0x1ff, 0x4}], 0x5, 0x8}, {[{0x1}, {0x0, 0x3}, {0x6, 0x3}, {0x1000, 0x3}, {0x7}, {0x2f, 0x3}, {0x7}, {0x1000, 0x3}, {0x4}, {0x100, 0x2}, {0xffffffffffffffff, 0x3}], [{0x8001, 0x5}, {0x8001, 0x7}, {0x800, 0xc00000000}, {0x7, 0x4}, {0x3f, 0x10001}, {0x1, 0x7}, {0x5e, 0x9}, {0x1f, 0xe59}, {0x10000, 0x6e87}, {0x9, 0x5}, {0x7f, 0x33e7}], 0x9, 0x1}, {[{0xce5a, 0x2}, {0x7, 0x3}, {0x586a}, {0xab}, {0x7fff, 0x2}, {0x1, 0x2}, {0x4, 0x3}, {0x100000001}, {0x4, 0x2}, {0x74e1, 0x3}, {0x90}], [{0x7fffffff, 0x401}, {0x1, 0x3ff}, {0xe1, 0xdd}, {0xfffffffffffffe01, 0x7ff}, {0x3ff, 0x4958}, {0x0, 0x8001}, {}, {0x7, 0x7}, {0x8, 0x8}, {0x100000000, 0x800}, {0x7, 0x4}], 0x4}, {[{0x1, 0x3}, {0x8, 0x2}, {0x3, 0x3}, {0x6720e989}, {0x2b55, 0x3}, {0x1, 0x1}, {0x2d, 0x3}, {0x9, 0x3}, {0x1ff, 0x3}, {0xe3e5, 0x1efea9b630a7df4f}, {0x6, 0x3}], [{0x5ff, 0x81}, {0x2, 0x2}, {0x9, 0xff}, {0x8ff, 0x7ff}, {0x80000001, 0x7fff}, {0x81, 0x3ff}, {0x1f, 0x8001}, {0x8}, {0x9, 0xe7}, {0x401, 0x2}, {0x2, 0x1}], 0xb, 0x9}, {[{0x6, 0x3}, {}, {}, {0x7fff, 0x3}, {0xfffffffffffffe35, 0x3}, {0x54a, 0x2}, {0x5, 0x3}, {0x2, 0x2}, {0x2, 0x3}, {0x80000001, 0x3}, {0x9, 0x3}], [{0x8, 0x5034}, {0x1, 0x1ff}, {0x10001, 0x7}, {0xfffffffffffff59d, 0x2}, {0x8, 0x2}, {0x5, 0x8}, {0xffff, 0x85}, {0xba, 0x4a36800f}, {0x9, 0x7}, {0x1, 0x4}, {0x1}], 0x5, 0x1}, {[{0x3, 0x2}, {0x5, 0x1}, {0x7, 0x1}, {0x3, 0x3}, {0x3, 0x3}, {0x7, 0x1}, {0x1, 0x3}, {0x4, 0x3}, {0x9}, {0x9, 0x3}, {0xd565, 0x1}], [{0x0, 0x156}, {0x0, 0x3ff}, {0x3, 0x100000000}, {0xd7b8, 0x2}, {0x9, 0x7}, {0x6b7, 0x7}, {0x1b1, 0x5}, {0x3ff, 0x22}, {0x1, 0xd8}, {0x1ff, 0x100000000}, {0x7ff, 0x400}], 0xb, 0x2}, {[{0x3, 0x3}, {0x4, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x10000, 0x2}, {0x7, 0x3}, {0x361800000000000}, {0x7f}, {0xb612, 0x2}, {0x8}, {0x8}], [{0x6, 0x8}, {0x3, 0xfffffffffffffff9}, {0x32d, 0x7fffffff}, {0x50, 0x3}, {0x1f, 0x8}, {0xfdc8, 0x7}, {0xff}, {0x1f, 0x8}, {0x8, 0xfbb}, {0x4, 0x6}, {0x800, 0x8}], 0x4, 0x4}, {[{0x10000, 0x1}, {0x80000000, 0x2}, {0x2, 0x2}, {0x2, 0x3}, {0x4040000000000000}, {0x20, 0x1}, {0x6, 0x1}, {0x3ff, 0x2}, {0x0, 0x3}, {0x372, 0x3}, {0x7fffffff}], [{0x1, 0x100000000}, {0x6, 0xe92}, {0x3ff, 0x6}, {0xee, 0x2d9}, {0x16bebf33, 0x401}, {0x3ff, 0x40}, {0x1, 0x6}, {0x7, 0x7fff}, {0x1, 0xfffffffffffff44d}, {0x0, 0xfff}, {0x8, 0xbf0ae84}], 0x7, 0x1}, {[{0x9, 0x2}, {0x9}, {0x3ff, 0x3}, {0x2, 0x1}, {0x8, 0x3}, {0x1, 0x2}, {0x7, 0x2}, {0x3, 0x3}, {0x101}, {0x4, 0x1}, {0x7, 0x3}], [{0x100, 0x7}, {0xfd, 0x1}, {0x7ff, 0x4}, {0x7, 0x8}, {0x46, 0x1}, {0x1000, 0x101}, {0x1}, {0x9, 0xc7ad}, {0x6, 0xd8}, {0x200, 0x3ff}, {0x7fffffff, 0x6}], 0xb, 0xb}, {[{0x5, 0x1}, {0x7, 0x3}, {0x100000000, 0x3}, {0x8}, {0x294, 0x3}, {0x7}, {0x3, 0x2}, {0x2}, {0x9, 0x3}, {0x4, 0x2}, {0x9, 0x3}], [{0x1, 0x7f}, {0x1, 0x784a}, {0x7fffffff, 0x3}, {0x4, 0x7fffffff}, {0x1ff, 0x595a}, {0x7fffffff, 0x9}, {0x0, 0x6108b86a}, {0x6, 0x4}, {0x87, 0x4}, {0xffffffffffffffe2, 0x1}, {0x1d, 0x376072b2}], 0x7}], 0x6}}}]}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x1, 'system_u:object_r:audisp_remote_exec_t:s0\x00'}}}}]}]}, 0xe10) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0xffffffffffffdfd, 0x0) dup2(r1, r0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x3f}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000180)={r2, 0x9, 0x2}, 0x8) [ 330.777746] ? get_page_from_freelist+0xb01f/0xbb50 [ 330.782777] ? __save_stack_trace+0xa45/0xca0 [ 330.787303] ? memcg_kmem_charge+0x5f8/0xac0 [ 330.791733] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 330.797544] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 330.803530] ? __alloc_pages_nodemask+0x105b/0x6320 [ 330.808561] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 330.813973] ? kmsan_set_origin_inline+0x6b/0x120 [ 330.818848] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 330.824226] ? memcg_kmem_charge+0x79d/0xac0 [ 330.828655] kmsan_alloc_page+0x80/0xe0 [ 330.832647] __alloc_pages_nodemask+0x105b/0x6320 [ 330.837500] ? __msan_poison_alloca+0x183/0x220 [ 330.842180] ? __switch_to+0x2b3/0x420 [ 330.846087] ? switch_fpu_finish+0x7b/0x4f0 [ 330.850418] ? __switch_to+0x2b3/0x420 [ 330.854328] ? kmsan_set_origin_inline+0x6b/0x120 [ 330.859178] ? __msan_poison_alloca+0x183/0x220 [ 330.863858] ? _cond_resched+0x4c/0x100 [ 330.867851] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 330.873242] alloc_pages_current+0x6b1/0x970 [ 330.877673] pipe_write+0x7f0/0x1d30 [ 330.881422] ? pipe_read+0x1330/0x1330 [ 330.885326] __vfs_write+0x87e/0xb90 [ 330.889069] vfs_write+0x467/0x8c0 [ 330.892634] __x64_sys_write+0x1cf/0x400 [ 330.896714] ? ksys_write+0x380/0x380 [ 330.900527] do_syscall_64+0x15b/0x230 [ 330.904437] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 330.909635] RIP: 0033:0x455ab9 14:04:05 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 330.912823] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.932171] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 330.939889] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 330.947162] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 330.954439] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 330.961716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 330.968989] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000026 14:04:06 executing program 1: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) [ 331.038958] FAULT_INJECTION: forcing a failure. [ 331.038958] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 331.051053] CPU: 0 PID: 14849 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 331.058379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.067767] Call Trace: [ 331.070420] dump_stack+0x185/0x1e0 [ 331.074104] should_fail+0x8a7/0xae0 [ 331.077902] __alloc_pages_nodemask+0x622/0x6320 [ 331.082722] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 331.088142] ? __list_add_valid+0xb8/0x450 [ 331.092459] ? kmsan_set_origin_inline+0x6b/0x120 [ 331.097356] ? __msan_poison_alloca+0x183/0x220 [ 331.102107] ? _cond_resched+0x4c/0x100 [ 331.106136] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 331.111580] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 331.117097] alloc_pages_current+0x6b1/0x970 [ 331.121584] pipe_write+0x7f0/0x1d30 [ 331.125345] ? init_wait_entry+0x1a0/0x1a0 [ 331.129644] ? pipe_read+0x1330/0x1330 [ 331.133599] __vfs_write+0x87e/0xb90 14:04:06 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x1) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)) finit_module(r0, &(0x7f00000000c0)='nodev}\x00', 0x3) rt_sigprocmask(0x0, &(0x7f0000000100)={0x80000001}, &(0x7f00000c1000), 0x22b) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgrcv(r3, &(0x7f0000000040)={0x0, ""/67}, 0x4b, 0x3, 0x3000) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 331.137382] vfs_write+0x467/0x8c0 [ 331.140997] __x64_sys_write+0x1cf/0x400 [ 331.145129] ? ksys_write+0x380/0x380 [ 331.148979] do_syscall_64+0x15b/0x230 [ 331.152908] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 331.158124] RIP: 0033:0x455ab9 [ 331.161320] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.180944] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:06 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x0, 0x800) write$P9_RSTAT(r0, &(0x7f0000000480)={0x77, 0x7d, 0x1, {0x0, 0x70, 0x8000, 0x3, {0x12, 0xd87b, 0x1}, 0x88340000, 0x7fffffff, 0x5, 0x6, 0x20, 'procmd5sumlobdev/)md5sumvmnet0/\x00', 0x11, ':+vboxnet0cgroup%', 0x5, 'IPVS\x00', 0x7, 'em1GPL@'}}, 0x77) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x20000000024001e, 0xffffffffffffffff, 0x0) open(&(0x7f0000000400)='./control/file0\x00', 0x0, 0x108) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control\x00') r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000003c0)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x14c, r3, 0x2, 0x70bd2d, 0x25dfdbfb, {0xf}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x400}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x20}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3f, 0x2}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xa03}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x96}, @IPVS_CMD_ATTR_SERVICE={0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfffffffffffffffd}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x186}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffffb}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7fff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffffc9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x19}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@mcast2={0xff, 0x2, [], 0x1}, 0xaab, 0x1, 0x0, 0x0, 0x8, 0x2, 0x1ff}, 0x20) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r1) [ 331.188695] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 331.195993] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 331.203288] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 331.210579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 331.217873] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000030 14:04:06 executing program 2 (fault-call:3 fault-nth:39): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:06 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:06 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(0xffffffffffffffff, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:06 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:06 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) close(r0) 14:04:06 executing program 6 (fault-call:3 fault-nth:49): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:06 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 331.835477] FAULT_INJECTION: forcing a failure. [ 331.835477] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 331.847336] CPU: 0 PID: 14886 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 331.854613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.863967] Call Trace: [ 331.866570] dump_stack+0x185/0x1e0 [ 331.870217] should_fail+0x8a7/0xae0 [ 331.873975] __alloc_pages_nodemask+0x622/0x6320 [ 331.878761] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 331.884223] ? get_page_from_freelist+0xb01f/0xbb50 [ 331.889254] ? __save_stack_trace+0xa45/0xca0 [ 331.893764] ? task_kmsan_context_state+0x6b/0x120 [ 331.898714] ? memcg_kmem_charge+0x5f8/0xac0 [ 331.903125] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 331.908830] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 331.914796] ? __alloc_pages_nodemask+0x105b/0x6320 [ 331.919806] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 331.925171] ? kmsan_set_origin_inline+0x6b/0x120 [ 331.930032] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 331.936347] ? memcg_kmem_charge+0x79d/0xac0 [ 331.940754] kmsan_alloc_page+0x80/0xe0 [ 331.944737] __alloc_pages_nodemask+0x105b/0x6320 [ 331.949582] ? kmsan_set_origin_inline+0x6b/0x120 [ 331.954418] ? __msan_poison_alloca+0x183/0x220 [ 331.959086] ? perf_event_task_sched_in+0x257/0x2b0 [ 331.964098] ? kmsan_set_origin_inline+0x6b/0x120 [ 331.968936] ? __msan_poison_alloca+0x183/0x220 [ 331.973598] ? _cond_resched+0x4c/0x100 [ 331.977568] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 331.982937] alloc_pages_current+0x6b1/0x970 [ 331.987346] pipe_write+0x7f0/0x1d30 [ 331.991069] ? init_wait_entry+0x1a0/0x1a0 [ 331.995312] ? pipe_read+0x1330/0x1330 [ 331.999191] __vfs_write+0x87e/0xb90 [ 332.002910] vfs_write+0x467/0x8c0 [ 332.006464] __x64_sys_write+0x1cf/0x400 [ 332.010528] ? ksys_write+0x380/0x380 [ 332.014321] do_syscall_64+0x15b/0x230 [ 332.018212] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 332.023388] RIP: 0033:0x455ab9 [ 332.026577] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.045818] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 332.053514] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 332.060774] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 332.068036] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 332.075299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 332.082558] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000031 [ 332.157989] FAULT_INJECTION: forcing a failure. [ 332.157989] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 332.170132] CPU: 0 PID: 14894 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 332.177429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.186810] Call Trace: [ 332.189442] dump_stack+0x185/0x1e0 [ 332.193119] should_fail+0x8a7/0xae0 [ 332.196881] __alloc_pages_nodemask+0x622/0x6320 [ 332.201691] ? __perf_event_task_sched_in+0xa3b/0xab0 14:04:07 executing program 7: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000180), &(0x7f0000000200)=0x4) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x1004000, &(0x7f0000000200), &(0x7f0000000280), &(0x7f0000000080), &(0x7f00000000c0)="b9167e9eaab71b0bcdc9cc8545640baaca8b6ceacb8674960610ae6b05806409bc13a1d8bcaf3ab0bd787b1aeda1272e5bb68311a0c6c40e9b557ec3bcb2bc193438345f109ce6e73fdc8c92131a48accb00937d") mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:07 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000640)=[{&(0x7f0000000380)="55a0b2b3b0d95050d72896e8bd736caa63c79f09eec12d5ab7332773c5b69ded56951bf4ecad0c77b2e71a9a50c84153235103c18e1a18f24aa3d76bdae6b033a1a938d555ecde3f515eb4c6a0b82dddc08419d9ba5b2f305f8421a3f6516bf9edd80dd02dee3506abab9a9ec9cf28bc38f2192b6ae50185bb6299d6a4d66792e9f0205ee1143257544e4af33f1192153575674ff90aedbe15b5c4bcd0ea5b8f0839ce2a140274b712233c433a647db36d44df06f813ce7427e4fdb61130fd8c64af745ce93b0ff350e150a9d24fba794d183db2e90b96ac0652157d1143c7083d1f5d8e286c"}, {&(0x7f0000000480)="a7ce7cbe50b86897010a25f8df4801ac32e8388f3055875d1e3d054b8c012b97148fcde19e3e41c097953c5722d9f64ae9ac83fdd35b8b59350b1c9288a5628758b30fa86ae86eb3f0eed12299234da1248a08cbe089611eeceb87accdc2f57b75812cd306bffe4d7aae11477d3d39cb7fac9792cef17ebf22f8097364a6a49ad4591cfa0aae555e063620c64c46503a40d9f9df5574d9f42fa5f50177e7ffe326528a877beaa1acf55fbd2e5cf6fd501b1294fcfc13b9253da72f62d184c07c9659106b995111c4462f80cd9ea964ea4b821ec5286697b52142046c7ebc0f044c02d11f5630", 0x3cc}, {&(0x7f00000000c0)="1f91a02954fba9"}, {&(0x7f0000000180)="3cf5dde669a10044de15b23506dfa3c87438a147b58bc393cb127c7eeb89a563d7d2e0b67bf74d2014c212af41053d5f15a5b0241bd613a8942e67d4da734e8e2c3aba2fde336962954c3c16c55d578000258ba06c9da8a90aa8a8acb40e55e9f335f43cd546249849fb4f6b8d461058"}, {&(0x7f00000005c0)="6ccd0318fbaab374ef9d2362a82f255b7d23dee895363c217ef1e005d8d46d6dc4ed8625a633e8aea660bb3bbf8fc1072872bc9670f857ff6119709853fbcff412d19f17b15f0a8ba534199038b97b3f68c6cd4956729518"}], 0x100001b5) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) uname(&(0x7f00000006c0)=""/150) 14:04:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) close(r1) 14:04:07 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:07 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x1) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)) finit_module(r0, &(0x7f00000000c0)='nodev}\x00', 0x3) rt_sigprocmask(0x0, &(0x7f0000000100)={0x80000001}, &(0x7f00000c1000), 0x22b) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) r3 = msgget$private(0x0, 0x20) msgrcv(r3, &(0x7f0000000040)={0x0, ""/67}, 0x4b, 0x3, 0x3000) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 332.206913] ? __msan_poison_alloca+0x183/0x220 [ 332.211646] ? kmsan_set_origin_inline+0x6b/0x120 [ 332.216520] ? __msan_poison_alloca+0x183/0x220 [ 332.221215] ? _cond_resched+0x4c/0x100 [ 332.225226] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 332.230651] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 332.236147] alloc_pages_current+0x6b1/0x970 [ 332.240600] pipe_write+0x7f0/0x1d30 [ 332.244395] ? pipe_read+0x1330/0x1330 [ 332.248340] __vfs_write+0x87e/0xb90 [ 332.252113] vfs_write+0x467/0x8c0 [ 332.255741] __x64_sys_write+0x1cf/0x400 [ 332.259869] ? ksys_write+0x380/0x380 [ 332.263722] do_syscall_64+0x15b/0x230 [ 332.267657] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 332.272871] RIP: 0033:0x455ab9 [ 332.276074] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.295699] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 332.303453] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 332.310749] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 332.318054] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 332.325369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 332.332663] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000027 14:04:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) close(r1) 14:04:07 executing program 2 (fault-call:3 fault-nth:40): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:07 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:07 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) close(r0) 14:04:07 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) close(r1) 14:04:07 executing program 6 (fault-call:3 fault-nth:50): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 332.808429] FAULT_INJECTION: forcing a failure. [ 332.808429] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 332.820290] CPU: 0 PID: 14927 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 332.827031] FAULT_INJECTION: forcing a failure. [ 332.827031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 332.827579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.848695] Call Trace: [ 332.851297] dump_stack+0x185/0x1e0 [ 332.854926] should_fail+0x8a7/0xae0 [ 332.858658] __alloc_pages_nodemask+0x622/0x6320 [ 332.863421] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 332.868872] ? get_page_from_freelist+0xb01f/0xbb50 [ 332.873887] ? __save_stack_trace+0xa45/0xca0 [ 332.878399] ? memcg_kmem_charge+0x5f8/0xac0 [ 332.882808] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 332.888524] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 332.894499] ? __alloc_pages_nodemask+0x105b/0x6320 [ 332.899514] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 332.904871] ? vmalloc_to_page+0x50b/0x630 [ 332.909102] ? kmsan_set_origin_inline+0x6b/0x120 [ 332.913949] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 332.919305] ? memcg_kmem_charge+0x79d/0xac0 [ 332.923713] kmsan_alloc_page+0x80/0xe0 [ 332.927689] __alloc_pages_nodemask+0x105b/0x6320 [ 332.932528] ? kmsan_set_origin_inline+0x6b/0x120 [ 332.937370] ? kmsan_set_origin_inline+0x6b/0x120 [ 332.942216] ? __msan_poison_alloca+0x183/0x220 [ 332.946877] ? _cond_resched+0x4c/0x100 [ 332.950852] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 332.956225] alloc_pages_current+0x6b1/0x970 [ 332.960637] pipe_write+0x7f0/0x1d30 [ 332.964367] ? pipe_read+0x1330/0x1330 [ 332.968249] __vfs_write+0x87e/0xb90 [ 332.971969] vfs_write+0x467/0x8c0 [ 332.975515] __x64_sys_write+0x1cf/0x400 [ 332.979582] ? ksys_write+0x380/0x380 [ 332.983373] do_syscall_64+0x15b/0x230 [ 332.987258] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 332.992435] RIP: 0033:0x455ab9 [ 332.995611] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.014878] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 333.022578] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 333.029837] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 333.037096] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 333.044365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 333.051624] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000028 [ 333.058904] CPU: 1 PID: 14929 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 333.066176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.075526] Call Trace: [ 333.078126] dump_stack+0x185/0x1e0 [ 333.081771] should_fail+0x8a7/0xae0 [ 333.085504] __alloc_pages_nodemask+0x622/0x6320 [ 333.090286] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 333.095750] ? get_page_from_freelist+0xb01f/0xbb50 [ 333.100782] ? __save_stack_trace+0xa45/0xca0 [ 333.105306] ? memcg_kmem_charge+0x5f8/0xac0 [ 333.109727] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 333.115533] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 333.121510] ? __alloc_pages_nodemask+0x105b/0x6320 [ 333.126535] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 333.131914] ? kmsan_set_origin_inline+0x6b/0x120 [ 333.136780] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 333.142157] ? memcg_kmem_charge+0x79d/0xac0 [ 333.146580] kmsan_alloc_page+0x80/0xe0 [ 333.150572] __alloc_pages_nodemask+0x105b/0x6320 [ 333.155426] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 333.160626] ? __msan_poison_alloca+0x183/0x220 [ 333.165315] ? kmsan_set_origin_inline+0x6b/0x120 [ 333.170168] ? __msan_poison_alloca+0x183/0x220 [ 333.174835] ? _cond_resched+0x4c/0x100 [ 333.178816] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 333.184188] alloc_pages_current+0x6b1/0x970 [ 333.188600] pipe_write+0x7f0/0x1d30 [ 333.192313] ? init_wait_entry+0x1a0/0x1a0 [ 333.196536] ? pipe_read+0x1330/0x1330 [ 333.200425] __vfs_write+0x87e/0xb90 [ 333.204133] vfs_write+0x467/0x8c0 [ 333.207664] __x64_sys_write+0x1cf/0x400 [ 333.211716] ? ksys_write+0x380/0x380 [ 333.215515] do_syscall_64+0x15b/0x230 [ 333.219403] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 333.224576] RIP: 0033:0x455ab9 [ 333.227747] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.246990] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) shutdown(r2, 0x1) close(r1) 14:04:08 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 333.254711] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 333.261967] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 333.269220] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 333.276474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 333.283769] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000032 14:04:08 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0xfe55}, 0x1}, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=""/200, 0xc8) dup2(r1, r0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x896, 0xd53a01122495ea48) 14:04:08 executing program 2 (fault-call:3 fault-nth:41): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:08 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="a2", 0xffffffffffffff79}], 0x1) fcntl$setpipe(r0, 0x407, 0x3) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xe, 0x40, 0x7, 0x0, 0x8, r0, 0x6}, 0x2c) ioctl$RTC_AIE_OFF(r1, 0x7002) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 333.550309] FAULT_INJECTION: forcing a failure. [ 333.550309] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 333.562156] CPU: 1 PID: 14947 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 333.569433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.569439] Call Trace: [ 333.569466] dump_stack+0x185/0x1e0 [ 333.569492] should_fail+0x8a7/0xae0 [ 333.569525] __alloc_pages_nodemask+0x622/0x6320 [ 333.569558] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 333.569587] ? get_page_from_freelist+0xb01f/0xbb50 [ 333.604628] ? __save_stack_trace+0xa45/0xca0 [ 333.609159] ? memcg_kmem_charge+0x5f8/0xac0 [ 333.613586] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 333.619413] ? kmsan_set_origin_inline+0x6b/0x120 [ 333.624282] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 333.629660] ? memcg_kmem_charge+0x79d/0xac0 [ 333.634087] kmsan_alloc_page+0x80/0xe0 [ 333.638084] __alloc_pages_nodemask+0x105b/0x6320 [ 333.642941] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 333.648147] ? __msan_poison_alloca+0x183/0x220 [ 333.652844] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 333.658224] ? balance_callback+0x48/0x260 [ 333.662471] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 333.667952] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 333.673348] alloc_pages_current+0x6b1/0x970 [ 333.677781] pipe_write+0x7f0/0x1d30 [ 333.681537] ? pipe_read+0x1330/0x1330 [ 333.685441] __vfs_write+0x87e/0xb90 [ 333.689188] vfs_write+0x467/0x8c0 [ 333.692756] __x64_sys_write+0x1cf/0x400 [ 333.696892] ? ksys_write+0x380/0x380 [ 333.700739] do_syscall_64+0x15b/0x230 [ 333.704647] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 333.709857] RIP: 0033:0x455ab9 [ 333.713044] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.734028] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 333.741746] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 333.749023] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 333.756299] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 333.763576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 333.770854] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000029 14:04:08 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000000c0), &(0x7f0000000080)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:08 executing program 6 (fault-call:3 fault-nth:51): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:08 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) shutdown(r2, 0x1) close(r1) 14:04:08 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:08 executing program 4: r0 = creat(&(0x7f00000006c0)='./file0\x00', 0x20) epoll_wait(r0, &(0x7f0000000700)=[{}, {}, {}], 0x3, 0x200) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x40000) recvmsg$kcm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/105, 0x69}, {&(0x7f0000000180)=""/17, 0x11}, {&(0x7f00000001c0)=""/111, 0x6f}, {&(0x7f0000000380)=""/95, 0x5f}, {&(0x7f0000000400)=""/121, 0x79}, {&(0x7f0000000480)=""/132, 0x84}, {&(0x7f0000000280)=""/17, 0x11}], 0x7, 0x0, 0x0, 0x2}, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000640)=0x1000) ioctl$int_in(r3, 0x5421, &(0x7f0000000680)=0x6b5) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x0, {0x6}}, 0xc635bdfc9e2e82f7) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000040)=0x100000001) dup2(r1, r1) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000540)=0x8, 0x4) 14:04:08 executing program 2 (fault-call:3 fault-nth:42): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:08 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) mknod$loop(&(0x7f0000000080)='./control/file0\x00', 0x80, 0x1) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000140)={{0x5, 0x5}, 0x0, 0x1, 0x1, {0x0, 0x3}, 0xd4b, 0x7}) [ 334.023146] FAULT_INJECTION: forcing a failure. [ 334.023146] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 334.035147] CPU: 0 PID: 14969 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 334.042465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.051843] Call Trace: [ 334.054493] dump_stack+0x185/0x1e0 [ 334.058166] should_fail+0x8a7/0xae0 [ 334.061966] __alloc_pages_nodemask+0x622/0x6320 [ 334.066770] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 334.072000] ? __msan_poison_alloca+0x183/0x220 [ 334.076725] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.082149] ? balance_callback+0x48/0x260 [ 334.086441] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 334.091955] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 334.097357] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 334.102850] alloc_pages_current+0x6b1/0x970 [ 334.107335] pipe_write+0x7f0/0x1d30 [ 334.111106] ? init_wait_entry+0x1a0/0x1a0 [ 334.113810] FAULT_INJECTION: forcing a failure. [ 334.113810] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 334.115415] ? pipe_read+0x1330/0x1330 [ 334.115482] __vfs_write+0x87e/0xb90 [ 334.115539] vfs_write+0x467/0x8c0 [ 334.115613] __x64_sys_write+0x1cf/0x400 [ 334.142634] ? ksys_write+0x380/0x380 [ 334.146475] do_syscall_64+0x15b/0x230 [ 334.150390] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.155590] RIP: 0033:0x455ab9 [ 334.158774] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.178271] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 334.186010] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 334.193303] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 334.200578] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 334.207855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 334.215127] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000033 [ 334.222427] CPU: 1 PID: 14974 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 334.229734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.239106] Call Trace: [ 334.241752] dump_stack+0x185/0x1e0 [ 334.245427] should_fail+0x8a7/0xae0 [ 334.249189] __alloc_pages_nodemask+0x622/0x6320 [ 334.254001] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 334.259226] ? __msan_poison_alloca+0x183/0x220 [ 334.263956] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.269382] ? balance_callback+0x48/0x260 14:04:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) shutdown(r2, 0x1) close(r1) [ 334.273674] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 334.279164] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 334.284589] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 334.290086] alloc_pages_current+0x6b1/0x970 [ 334.294537] pipe_write+0x7f0/0x1d30 [ 334.298338] ? pipe_read+0x1330/0x1330 [ 334.302279] __vfs_write+0x87e/0xb90 [ 334.306052] vfs_write+0x467/0x8c0 [ 334.309664] __x64_sys_write+0x1cf/0x400 [ 334.313785] ? ksys_write+0x380/0x380 [ 334.317628] do_syscall_64+0x15b/0x230 [ 334.321559] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.326771] RIP: 0033:0x455ab9 [ 334.329970] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.349558] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 334.357304] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 334.364599] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 14:04:09 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 334.371892] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 334.379189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 334.386485] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002a 14:04:09 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0xfe55}, 0x1}, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=""/200, 0xc8) dup2(r1, r0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x896, 0xd53a01122495ea48) 14:04:09 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r0, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(0xffffffffffffffff) 14:04:09 executing program 2 (fault-call:3 fault-nth:43): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:09 executing program 6 (fault-call:3 fault-nth:52): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:09 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 334.712708] FAULT_INJECTION: forcing a failure. [ 334.712708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 334.724568] CPU: 0 PID: 14995 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 334.731852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.739102] FAULT_INJECTION: forcing a failure. [ 334.739102] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 334.741248] Call Trace: [ 334.755626] dump_stack+0x185/0x1e0 [ 334.759254] should_fail+0x8a7/0xae0 [ 334.762977] __alloc_pages_nodemask+0x622/0x6320 [ 334.767740] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 334.773189] ? get_page_from_freelist+0xb01f/0xbb50 [ 334.778223] ? __save_stack_trace+0xa45/0xca0 [ 334.782714] ? task_kmsan_context_state+0x6b/0x120 [ 334.787656] ? memcg_kmem_charge+0x5f8/0xac0 [ 334.792076] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 334.797800] ? kmsan_set_origin_inline+0x6b/0x120 [ 334.802657] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.808019] ? memcg_kmem_charge+0x79d/0xac0 [ 334.812430] kmsan_alloc_page+0x80/0xe0 [ 334.816408] __alloc_pages_nodemask+0x105b/0x6320 [ 334.821252] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 334.826434] ? __msan_poison_alloca+0x183/0x220 [ 334.831115] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.836475] ? balance_callback+0x48/0x260 [ 334.840704] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 334.846153] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 334.851524] alloc_pages_current+0x6b1/0x970 [ 334.855946] pipe_write+0x7f0/0x1d30 [ 334.859673] ? init_wait_entry+0x1a0/0x1a0 [ 334.863913] ? pipe_read+0x1330/0x1330 [ 334.867805] __vfs_write+0x87e/0xb90 [ 334.871530] vfs_write+0x467/0x8c0 [ 334.875075] __x64_sys_write+0x1cf/0x400 [ 334.879139] ? ksys_write+0x380/0x380 [ 334.882931] do_syscall_64+0x15b/0x230 [ 334.886817] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.891996] RIP: 0033:0x455ab9 [ 334.895169] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.914446] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 334.922149] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 334.929406] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 334.936665] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 334.943923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 334.951182] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000034 [ 334.958460] CPU: 1 PID: 14998 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 334.965740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.975102] Call Trace: [ 334.975126] dump_stack+0x185/0x1e0 [ 334.975149] should_fail+0x8a7/0xae0 [ 334.975179] __alloc_pages_nodemask+0x622/0x6320 [ 334.975210] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 334.975224] ? get_page_from_freelist+0xb01f/0xbb50 [ 334.975251] ? __save_stack_trace+0xa45/0xca0 [ 335.004833] ? memcg_kmem_charge+0x5f8/0xac0 14:04:10 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r0, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(0xffffffffffffffff) [ 335.009268] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 335.014999] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 335.020986] ? __alloc_pages_nodemask+0x105b/0x6320 [ 335.026022] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 335.031404] ? kmsan_set_origin_inline+0x6b/0x120 [ 335.036268] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 335.041640] ? memcg_kmem_charge+0x79d/0xac0 [ 335.046065] kmsan_alloc_page+0x80/0xe0 [ 335.050054] __alloc_pages_nodemask+0x105b/0x6320 [ 335.054913] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 335.060117] ? __msan_poison_alloca+0x183/0x220 [ 335.064802] ? kmsan_set_origin_inline+0x6b/0x120 [ 335.069657] ? __msan_poison_alloca+0x183/0x220 [ 335.074339] ? _cond_resched+0x4c/0x100 [ 335.078330] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 335.083717] alloc_pages_current+0x6b1/0x970 [ 335.088142] pipe_write+0x7f0/0x1d30 [ 335.091887] ? pipe_read+0x1330/0x1330 [ 335.095781] __vfs_write+0x87e/0xb90 [ 335.099518] vfs_write+0x467/0x8c0 [ 335.103080] __x64_sys_write+0x1cf/0x400 [ 335.107159] ? ksys_write+0x380/0x380 [ 335.110970] do_syscall_64+0x15b/0x230 [ 335.114874] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 335.120067] RIP: 0033:0x455ab9 [ 335.123255] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.142552] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 335.150270] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 335.157647] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 14:04:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 335.164917] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 335.172191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 335.179462] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002b 14:04:10 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1f) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:10 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r0 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r0, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r0, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(0xffffffffffffffff) 14:04:10 executing program 6 (fault-call:3 fault-nth:53): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:10 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)=0x0) sched_setattr(r0, &(0x7f0000000200)={0x30, 0x0, 0x1, 0xe49d, 0x0, 0x2, 0x811b, 0x8000}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x202300, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000280)={'icmp6\x00'}, &(0x7f00000002c0)=0x1e) mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000140)=0xc) rt_sigqueueinfo(r3, 0x21, &(0x7f0000000180)={0x41, 0x3, 0xfffffffffffffeff, 0xfffffffffffffffa}) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r4, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r2) 14:04:10 executing program 2 (fault-call:3 fault-nth:44): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:10 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0xfe55}, 0x1}, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) listxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)=""/200, 0xc8) dup2(r1, r0) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x896, 0xd53a01122495ea48) 14:04:10 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) r2 = dup2(r1, r0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000040)=0x0) capget(&(0x7f0000000080)={0x20080522, r3}, &(0x7f00000000c0)={0x800, 0x9, 0x7fffffff, 0x9, 0x3, 0xfcb}) 14:04:10 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 335.643559] FAULT_INJECTION: forcing a failure. [ 335.643559] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 335.655469] CPU: 0 PID: 15027 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 335.662747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.672112] Call Trace: [ 335.674729] dump_stack+0x185/0x1e0 [ 335.678381] should_fail+0x8a7/0xae0 [ 335.682120] __alloc_pages_nodemask+0x622/0x6320 [ 335.686907] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 335.692368] ? get_page_from_freelist+0xb01f/0xbb50 [ 335.697417] ? __save_stack_trace+0xa45/0xca0 [ 335.701955] ? memcg_kmem_charge+0x5f8/0xac0 [ 335.706382] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 335.706404] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 335.706424] ? __alloc_pages_nodemask+0x105b/0x6320 [ 335.706456] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 335.706486] ? kmsan_set_origin_inline+0x6b/0x120 [ 335.706518] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 335.706538] ? memcg_kmem_charge+0x79d/0xac0 [ 335.706559] kmsan_alloc_page+0x80/0xe0 [ 335.706588] __alloc_pages_nodemask+0x105b/0x6320 [ 335.717987] FAULT_INJECTION: forcing a failure. [ 335.717987] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 335.718354] ? kmsan_set_origin_inline+0x6b/0x120 [ 335.768644] ? __msan_poison_alloca+0x183/0x220 [ 335.773310] ? perf_event_task_sched_in+0x257/0x2b0 [ 335.778324] ? kmsan_set_origin_inline+0x6b/0x120 [ 335.783161] ? __msan_poison_alloca+0x183/0x220 [ 335.787823] ? _cond_resched+0x4c/0x100 [ 335.791799] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 335.797173] alloc_pages_current+0x6b1/0x970 [ 335.801587] pipe_write+0x7f0/0x1d30 [ 335.805321] ? init_wait_entry+0x1a0/0x1a0 [ 335.809550] ? pipe_read+0x1330/0x1330 [ 335.813430] __vfs_write+0x87e/0xb90 [ 335.817155] vfs_write+0x467/0x8c0 [ 335.820700] __x64_sys_write+0x1cf/0x400 [ 335.824764] ? ksys_write+0x380/0x380 [ 335.828556] do_syscall_64+0x15b/0x230 [ 335.832467] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 335.837650] RIP: 0033:0x455ab9 [ 335.840826] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.860102] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 335.867803] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 335.875064] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 335.882323] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 335.889583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 335.896841] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000035 [ 335.904117] CPU: 1 PID: 15040 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 335.911399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.920759] Call Trace: [ 335.923361] dump_stack+0x185/0x1e0 [ 335.927004] should_fail+0x8a7/0xae0 [ 335.930804] __alloc_pages_nodemask+0x622/0x6320 [ 335.935586] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 335.941053] ? get_page_from_freelist+0xb01f/0xbb50 [ 335.946087] ? __save_stack_trace+0xa45/0xca0 [ 335.950628] ? memcg_kmem_charge+0x5f8/0xac0 [ 335.955060] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 335.960882] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 335.966867] ? __alloc_pages_nodemask+0x105b/0x6320 [ 335.971901] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 335.977284] ? kmsan_set_origin_inline+0x6b/0x120 [ 335.982150] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 335.987522] ? memcg_kmem_charge+0x79d/0xac0 [ 335.991950] kmsan_alloc_page+0x80/0xe0 [ 335.995947] __alloc_pages_nodemask+0x105b/0x6320 [ 336.000803] ? kmsan_set_origin_inline+0x6b/0x120 [ 336.005661] ? kmsan_set_origin_inline+0x6b/0x120 [ 336.010513] ? __msan_poison_alloca+0x183/0x220 [ 336.015219] ? _cond_resched+0x4c/0x100 [ 336.019286] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 336.024673] alloc_pages_current+0x6b1/0x970 [ 336.029101] pipe_write+0x7f0/0x1d30 [ 336.032848] ? pipe_read+0x1330/0x1330 [ 336.036745] __vfs_write+0x87e/0xb90 [ 336.040489] vfs_write+0x467/0x8c0 14:04:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 336.044048] __x64_sys_write+0x1cf/0x400 [ 336.048126] ? ksys_write+0x380/0x380 [ 336.051934] do_syscall_64+0x15b/0x230 [ 336.055844] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 336.061037] RIP: 0033:0x455ab9 [ 336.064223] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.083567] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:11 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 336.091291] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 336.098568] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 336.105846] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 336.113140] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 336.120446] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002c 14:04:11 executing program 6 (fault-call:3 fault-nth:54): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 336.291315] FAULT_INJECTION: forcing a failure. [ 336.291315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.303517] CPU: 0 PID: 15051 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 336.310819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.320197] Call Trace: [ 336.322837] dump_stack+0x185/0x1e0 [ 336.326514] should_fail+0x8a7/0xae0 [ 336.330280] __alloc_pages_nodemask+0x622/0x6320 [ 336.335094] ? __perf_event_task_sched_in+0xa3b/0xab0 14:04:11 executing program 2 (fault-call:3 fault-nth:45): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 336.340320] ? __msan_poison_alloca+0x183/0x220 [ 336.345046] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 336.350467] ? balance_callback+0x48/0x260 [ 336.354769] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 336.360257] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 336.365664] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 336.371160] alloc_pages_current+0x6b1/0x970 [ 336.375648] pipe_write+0x7f0/0x1d30 [ 336.379419] ? init_wait_entry+0x1a0/0x1a0 [ 336.383729] ? pipe_read+0x1330/0x1330 [ 336.387679] __vfs_write+0x87e/0xb90 14:04:11 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 336.391466] vfs_write+0x467/0x8c0 [ 336.395087] __x64_sys_write+0x1cf/0x400 [ 336.399224] ? ksys_write+0x380/0x380 [ 336.403076] do_syscall_64+0x15b/0x230 [ 336.407006] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 336.412221] RIP: 0033:0x455ab9 [ 336.415420] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.435131] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 336.442917] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 336.450218] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 336.457514] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 336.464806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 336.472099] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000036 14:04:11 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 336.584778] FAULT_INJECTION: forcing a failure. [ 336.584778] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.596731] CPU: 0 PID: 15067 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 336.604038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.613420] Call Trace: [ 336.616081] dump_stack+0x185/0x1e0 [ 336.619782] should_fail+0x8a7/0xae0 [ 336.623558] __alloc_pages_nodemask+0x622/0x6320 [ 336.628360] ? kmsan_set_origin_inline+0x6b/0x120 [ 336.633249] ? __msan_poison_alloca+0x183/0x220 [ 336.637963] ? perf_event_task_sched_in+0x257/0x2b0 [ 336.643034] ? kmsan_set_origin_inline+0x6b/0x120 [ 336.647931] ? __msan_poison_alloca+0x183/0x220 [ 336.652670] ? _cond_resched+0x4c/0x100 [ 336.656711] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 336.662149] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 336.667664] alloc_pages_current+0x6b1/0x970 [ 336.672124] pipe_write+0x7f0/0x1d30 [ 336.675899] ? init_wait_entry+0x1a0/0x1a0 [ 336.680216] ? pipe_read+0x1330/0x1330 [ 336.684184] __vfs_write+0x87e/0xb90 [ 336.687972] vfs_write+0x467/0x8c0 [ 336.691602] __x64_sys_write+0x1cf/0x400 [ 336.695749] ? ksys_write+0x380/0x380 [ 336.699616] do_syscall_64+0x15b/0x230 [ 336.703555] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 336.708771] RIP: 0033:0x455ab9 [ 336.711981] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:11 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) fremovexattr(r0, &(0x7f0000000300)=@known='security.evm\x00') ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = syz_open_dev$mice(&(0x7f00000016c0)='/dev/input/mice\x00', 0x0, 0x400002) sendmsg$nl_route_sched(r1, &(0x7f0000003cc0)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x38008001}, 0xc, &(0x7f0000003c80)={&(0x7f0000001740)=@newtaction={0x2528, 0x30, 0x616, 0x70bd2a, 0x25dfdbff, {0x0, 0x3f, 0x4}, [{0x16c, 0x1, @m_simple={0x168, 0x17, {{0xc, 0x1, 'simple\x00'}, {0x84, 0x2, [@TCA_DEF_PARMS={0x18, 0x2, {0x1f, 0x1f, 0x20000000, 0x9, 0x1}}, @TCA_DEF_PARMS={0x18, 0x2, {0x8, 0x4, 0xd, 0x8, 0x1a}}, @TCA_DEF_DATA={0x18, 0x3, 'mime_type[%nodev\x00'}, @TCA_DEF_DATA={0x8, 0x3, ']-x\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x5, 0x0, 0x7, 0x1c741f16, 0x1}}, @TCA_DEF_PARMS={0x18, 0x2, {0x8, 0x3, 0x3, 0x200}}]}, {0xd0, 0x6, "26312aad72acdd0c24c90fc796e626d14f8dd75c8003f317fcb03abd957a98325b19b81401b291ff063851a9ca5782f2f25b42d155ac9a0342cd4e472cebc8e703b9f73c9fe90fd4c83cf383eb6f47f4bbe0dfe548f24fa0c243c84c2da94db82fe4ade2f9def76111119ff2d918e1d348e81766da92e3231ec11e17b0798b6c7ced79eb7411d7ecc00155a74374cde20e1c280d018af6102d979f48c739a1106defd2a722cc98390ab42583cd2369484ef8ad663f5219f9246976b0f3f45265fd8f2984076f48f9a8"}}}}, {0xa8, 0x1, @m_vlan={0xa4, 0x1e, {{0xc, 0x1, 'vlan\x00'}, {0x58, 0x2, [@TCA_VLAN_PUSH_VLAN_ID={0x8, 0x3, 0xfc9}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x8, 0x6, 0x1}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x8, 0x6}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x3, 0x1, 0x5, 0x1, 0x9}, 0x2}}, @TCA_VLAN_PUSH_VLAN_ID={0x8, 0x3, 0xe4f}, @TCA_VLAN_PUSH_VLAN_ID={0x8, 0x3, 0x1b}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x8, 0x6, 0x6}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x8, 0x4, 0x8100}]}, {0x38, 0x6, "c8e9a0681c878bcbb84f5927ef51f4aa9a7387f5fe003baf3bff0cfe956def74404d2bbc9b21b8fb18daafceb4a7aea2ced687"}}}}, {0x6c, 0x1, @m_sample={0x68, 0x1a, {{0xc, 0x1, 'sample\x00'}, {0xc, 0x2, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x4}]}, {0x48, 0x6, "1ac9f5156370cacffcbe0c963a7565f678701e18407eed78a5da6370638e6f46fc6ab76020ab12e728c4fca78640280a24045f1b1264fdf056ca24255a7217650da4f0"}}}}, {0x114, 0x1, @m_vlan={0x110, 0x4, {{0xc, 0x1, 'vlan\x00'}, {0xc, 0x2, [@TCA_VLAN_PUSH_VLAN_ID={0x8, 0x3, 0x97e}]}, {0xf0, 0x6, "c9fb6a45d27951fcf8561b79edfb483502bdef57c5dde570a2f43b2a6ec1f9a9efc6782e8634d0abeb8f6720fef8a54a1d184f041ade577a6d6489fad649af8d7bb582bf63280c9acaf470153a605d04047a1bfd74ce541e81d8f79db55168aa2c28685829715de81298d3c06c973fa48faf56e01d78cafb36d16be2a853ca14162285cd72e68486dcfa5a3e405af5ef8c37b47f1858423aca68c9b1267f1e6b081397dad8d84f408364c646c5d055d9ba1f15d1ca4b0a40ec3631c5a54f200545672f19254f4f7718877776566ae94844fa98cdbeb334e31ce1ffad84ae67d7feb010c8b69ec3df12"}}}}, {0x10c0, 0x1, @m_police={0x10bc, 0x0, {{0xc, 0x1, 'police\x00'}, {0x1068, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0xffff, 0x401, 0x38000000000, 0x81, 0x6, 0x7, 0x100000, 0x3ff, 0xc9, 0x6, 0x1, 0x2, 0x6, 0x8b, 0x6, 0x8, 0x7, 0x1ff, 0x2, 0x10000, 0x9, 0x1, 0x4, 0x6d5b, 0x101, 0x7, 0x2, 0x81, 0x10001, 0x5, 0x1, 0x800, 0x7f, 0x2, 0xffffffff, 0x8, 0x7, 0x26, 0x3, 0x4041, 0x7, 0x344, 0x3ed1, 0x9, 0x800, 0xfff, 0x80000000, 0x8, 0xf8f, 0x7, 0x3ff, 0x1, 0x6, 0x6b2a, 0xf4, 0x4, 0x9b, 0xffffffff, 0x8, 0xff, 0x5, 0x8, 0xfffffffffffffffc, 0x5, 0x1f, 0xffffffffffffffff, 0x81, 0x7, 0x0, 0x1, 0x1, 0x40, 0x100000000, 0x2, 0xeec, 0x4, 0x5, 0x80, 0x100, 0x1448, 0x8, 0x2, 0x5, 0x8001, 0x8, 0xe6fc, 0x8, 0x7f00000000, 0x8cfc, 0x8, 0x1c, 0x7fff, 0x81, 0x8, 0x1, 0x7fffffff, 0xcd, 0x400, 0x7, 0x1, 0x800, 0x4b6, 0x8, 0x0, 0x81, 0x3, 0x8, 0x8, 0xfff, 0x3, 0xd380, 0x3f, 0x9d9f, 0x1, 0x83a, 0xffff, 0x2, 0x61, 0x4, 0x6d, 0xfffffffffffffff7, 0x1, 0x9, 0x9, 0x5, 0x8, 0x8, 0x0, 0x9, 0x42, 0x1, 0x3b5, 0x3, 0x0, 0x8, 0x1, 0x8, 0x3, 0x5, 0x7, 0x88eb, 0xd9, 0xab0000000000, 0x6, 0x7fffffff, 0x8, 0xfffffffffffffffd, 0x3, 0xf7, 0xff, 0x3ff, 0xe18, 0x8, 0x9c2, 0x8, 0xffffffffffffff01, 0x9, 0x1, 0x100000001, 0x4, 0x4, 0x401, 0x8, 0x400, 0x100000000, 0x7, 0x9, 0xb1e9, 0x673, 0x7, 0xeb, 0x1f, 0x100000000, 0x8, 0x3ff, 0x800, 0x8, 0xffffffff, 0x0, 0x2, 0x3, 0xf2, 0x7, 0xfff, 0x2, 0x1, 0xfffffffffffff001, 0x80000000, 0x8, 0xa7a, 0x0, 0x401, 0x3f, 0x8, 0xffffffffffffff01, 0x7fffffff, 0x1000, 0x80000000, 0x0, 0x4, 0xfffffffffffff801, 0xa6, 0x5, 0x100, 0x7, 0x8, 0x8d8, 0x89, 0x80000001, 0x5, 0x1f, 0x6, 0x7, 0x6, 0x1318, 0x9, 0x4, 0x1f, 0x2, 0x3, 0x100000001, 0x2, 0x6, 0x3f, 0x4, 0x20, 0x7, 0x3, 0x8001, 0x9, 0x0, 0x2, 0x7, 0x1, 0x8, 0x1, 0x2, 0x196, 0x60c, 0x0, 0xffffffff, 0xb1, 0x9, 0xfffffffffffffffc, 0x80000001, 0xfffffffffffff0e5, 0x200, 0x8, 0xa5f, 0xfffffffffffffffe, 0xdd, 0xb5, 0xe2c1, 0x9, 0x400, 0x8000]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x99ce}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x0, 0x3, 0x1f, 0x9, {0x1f, 0x0, 0x594, 0x40cd, 0x8, 0x3}, {0x1, 0x9049a3b3ea53758f, 0x6e9, 0x4, 0x7, 0x1f}, 0x3ee, 0x2, 0x7ff}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x6, 0x4, 0x5, 0x3f, 0x70b, 0x3, 0x4, 0x9, 0x0, 0x0, 0x1ff, 0x7f, 0x3, 0xffffffff80000001, 0x6, 0x9, 0xfffffffffffffff8, 0x7, 0x100000001, 0x4, 0x100000001, 0xfff, 0x3, 0x3f, 0x0, 0x80000000, 0x8001, 0x0, 0xb10d, 0x80, 0x3, 0x3, 0x8, 0x9, 0x5, 0x9, 0x4, 0x6, 0x2, 0x7fffffff, 0x0, 0x16bc8cf8, 0xec64, 0xff, 0x400, 0x4, 0x0, 0x3, 0x3ff, 0x6, 0x3, 0x71a8, 0x2, 0x0, 0x6b0, 0x4, 0x0, 0x0, 0x8, 0x5, 0x0, 0xc00, 0x9, 0x1, 0x9, 0x3, 0x2, 0x5, 0x5, 0x4, 0x3ff, 0x9, 0xba, 0x4, 0x0, 0x5, 0x41c, 0x3ff, 0x8, 0x80, 0x8, 0x6, 0x3, 0xff, 0x7, 0x6, 0x4, 0x0, 0x80000001, 0x7, 0xa4c2, 0x7, 0x8, 0x9, 0xfffffffffffffff7, 0xffffffff, 0x0, 0xfffffffffffffff8, 0x400, 0xffffffffffffffe0, 0x4, 0xf1a8, 0x6, 0x4, 0xff, 0x9, 0x6, 0x800, 0x5, 0x6, 0x1, 0x9, 0x2, 0x7, 0x80000001, 0x7, 0x1ff, 0x5fa, 0xfe3b, 0x8, 0x0, 0xffffffffffffffe0, 0x1, 0x4, 0x3, 0x2, 0x100000000, 0x401, 0xb31b, 0x3411, 0x9, 0x9, 0x5, 0xfffffffffffffff9, 0x3, 0x9, 0x7f, 0x1000, 0x7f, 0x80000000, 0xb7d7, 0x3, 0x80000000, 0x0, 0xffffffff, 0xfe7, 0x0, 0x0, 0x9, 0x3293, 0x6, 0x0, 0x80, 0x8, 0x5f, 0xc, 0xd97, 0xfffffffffffffff8, 0x3, 0x5, 0xffffffff, 0x401, 0x2, 0x1ff, 0x7, 0x8, 0x101, 0x400, 0x5, 0x3, 0x6, 0x5, 0x4, 0x6, 0x1, 0x2, 0x5, 0xfffffffffffffffd, 0x2, 0x0, 0x7, 0x2, 0xb648, 0x6, 0x9, 0x47, 0x8, 0x80, 0x1, 0x7, 0x40, 0x0, 0x9, 0x20, 0x4, 0x9fd6, 0x6e, 0x3, 0x80000001, 0xfffffffffffffde4, 0xb7, 0x9, 0x9, 0x12000000000, 0x1efe, 0x76cb, 0x5, 0xd59, 0x0, 0x6, 0xe65, 0x1ff, 0xd8, 0x0, 0x2, 0x1baf48b9, 0xfffffffffffffffd, 0x40000000, 0x8, 0x2, 0x226, 0x57, 0x7ff, 0x5c6, 0x10, 0x7, 0x1, 0x9, 0x7, 0x2, 0x1edfaf74, 0xc4, 0x1000, 0x1, 0x3, 0x7, 0x1000, 0x0, 0x38bfd084, 0x400, 0x3f, 0x2a, 0x2, 0xffffffffffffc091, 0x7f, 0x400, 0x10000, 0x7fffffff, 0x8, 0x5, 0x6a, 0xffffffffffffff81, 0x6e0, 0xfffffffffffffffd, 0x3]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x200, 0x7, 0xaf5, 0x6, 0x7, 0x7f, 0x10000, 0x7ff, 0x2, 0x5, 0x1, 0x7, 0x8, 0x1000, 0x80, 0xfffffffffffffffa, 0x2, 0xffffffffffffffff, 0x2, 0x4, 0x9, 0x2dc0, 0xffffffff, 0x3a3e, 0x1, 0x8, 0x0, 0x6, 0x71112589, 0x3, 0x9, 0x1, 0x7fffffff, 0x400, 0xfffffffffffff19c, 0x20, 0x7fff, 0x5800000000000000, 0x8000, 0x4, 0x3, 0x9, 0x6, 0xfff, 0x707, 0xc3b, 0x10001, 0x100000001, 0x0, 0xb790, 0x5, 0x4, 0x3, 0x0, 0xc3, 0x5, 0x6, 0xc98, 0x5d000000, 0x5, 0xfffffffffffff710, 0x5, 0x0, 0x80, 0x1, 0x8, 0x2, 0x3ff, 0xfff, 0x7, 0x9, 0x7fffffff, 0x10001, 0x0, 0x5, 0x1, 0x1, 0xfffffffffffffff8, 0x100000001, 0x4, 0x2, 0x7fff, 0x80, 0x0, 0x2, 0xfffffffffffffff7, 0x177, 0xf4fc, 0x5, 0xffffffffffffff00, 0xa3c, 0x3, 0x1ff, 0x15, 0x3e7f, 0x80, 0x0, 0x0, 0xffffffffffff5404, 0x80000000, 0xa1, 0x7fffffff, 0xce, 0x3f, 0x0, 0x6, 0x74df, 0x1, 0x5, 0x6, 0xfffffffffffffff7, 0x10000, 0x100, 0x5, 0x2, 0x7c276b0c, 0xffffffff, 0x2, 0x80000000, 0x40, 0x8, 0x475, 0x0, 0x1, 0xffff, 0x4, 0xfffffffffffffff8, 0x10001, 0x6, 0x1ff, 0x9, 0x7, 0x3f, 0x7, 0x2, 0x7, 0x8, 0x3, 0x8, 0x2, 0x64f, 0x2, 0x81, 0x1, 0xffffffffffffff79, 0x20, 0x7fffffff, 0x401, 0x7f, 0x5, 0x1, 0x200, 0x3, 0x100000001, 0x7ba, 0x3bf, 0x5, 0x7fffffff, 0x8001, 0xffffffffffffd987, 0x5, 0x0, 0xffffffff, 0x4, 0x8, 0x81, 0x7ff, 0x7f, 0x100, 0x3, 0x5, 0x8, 0x1, 0x8, 0x1000, 0x5, 0x12, 0x3ff, 0x0, 0x3, 0x2, 0xef9, 0x0, 0x7, 0x1, 0xffffffffffffff4d, 0x3, 0x1ff, 0xf6b0, 0x3, 0x88a, 0x3, 0x9, 0x4, 0x101, 0x100000000, 0xb57, 0xeae, 0x7, 0x2, 0xfff, 0xfff, 0x1, 0x8, 0x6, 0x3, 0x4, 0x1000, 0x80000000, 0x1, 0x8001, 0x57a0, 0xfffffffffffffffa, 0x0, 0x1, 0x101, 0xffffffffffffffe0, 0xe5a9, 0x3, 0x100, 0x1, 0xe6c, 0x2, 0x81, 0x80000001, 0x0, 0xff, 0x1ab316d8, 0x3, 0x2e, 0x7fffffff, 0xfffffffffffffffa, 0x457, 0x5, 0xa7d52f7, 0x6166, 0x1, 0x9edb, 0x6ef, 0x3f, 0xd1f5, 0x1, 0x1, 0x4, 0xffffffff, 0x40, 0x400, 0x80, 0x0, 0x1000, 0x7f, 0x8, 0x81, 0x10001, 0x20, 0x2]}, @TCA_POLICE_RESULT={0x8, 0x5}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x8001}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xfffffffffffffe01, 0x7ff, 0x8, 0x8001, 0x0, 0x100, 0xcbd1, 0x4, 0x4, 0x8, 0x80, 0x80, 0x401, 0x3, 0x7, 0x86c, 0x5, 0x8000, 0x2, 0x3, 0x8, 0x8, 0x1, 0x100000000, 0x10000, 0x4179, 0x8, 0x4d, 0x6, 0xe87, 0x100000001, 0x7, 0x7, 0x5, 0x1c8a, 0x3, 0x9, 0x7fffffff, 0x1, 0xd2a9, 0x0, 0x1f, 0x5, 0x400, 0x85be, 0xfffffffffffffff7, 0x8001, 0x3, 0x7, 0x55, 0xfffffffffffffffd, 0x8c5, 0x9, 0x4, 0xa434, 0xcacf, 0x9, 0xfffffffffffffffa, 0xc8ab, 0x80, 0x5, 0x80000001, 0x80000000, 0xffffffffffffffff, 0x20, 0x400, 0x4, 0x80000001, 0x3, 0x1, 0x9, 0x3ff, 0x8, 0x8, 0x6, 0x1, 0x2, 0x2, 0x4, 0x3, 0x3ff, 0x6f7, 0x8e7, 0x4, 0x401, 0x7, 0x3, 0x99c, 0x3ff, 0x5, 0x7, 0xffffffff, 0x5, 0x100, 0xfffffffffffffbff, 0x7f, 0x3, 0x100000000, 0xb892, 0x55cdb3d2, 0x400, 0x7, 0x9, 0x0, 0x9, 0x80000000, 0xffffffff, 0x2, 0x3ff, 0x8, 0x7a1, 0x0, 0x1, 0x7, 0x9, 0x9, 0xb1, 0x6, 0x2, 0xfffffffeffffffff, 0x5, 0xe3c2, 0xfffffffffffffff9, 0x6, 0x2, 0x6, 0x5, 0x100, 0x4, 0xa7, 0x2, 0x4, 0xfffffffffffffffb, 0x1, 0x2, 0xff, 0x1, 0x2, 0x5, 0xfffffffffffffffb, 0x0, 0x4, 0x2, 0x1000, 0x1958, 0x4, 0xc0000000000000, 0x3, 0x0, 0x7, 0x8, 0x5, 0x3, 0x2, 0xfff, 0x6, 0x0, 0x6, 0x800, 0x100000001, 0xffffffff, 0x6, 0x6b, 0x2, 0x8, 0x4, 0x86df, 0x1, 0x259, 0x80000000, 0x4, 0x0, 0x2, 0x2, 0x6, 0x7ff, 0x400, 0x1ff, 0x8, 0x8, 0x100000001, 0x3, 0x5, 0x4, 0x488a98b, 0x80, 0x9, 0x106, 0x80000000, 0x1, 0xc753, 0x9, 0x29a1, 0x0, 0x5, 0x3, 0xffffffffffff0001, 0x9c95, 0x7, 0x20, 0xf8, 0x1, 0xe19, 0x2, 0xffffffff, 0x590f, 0x0, 0x0, 0x7, 0x4, 0x1, 0x2f, 0x2, 0x3, 0x5, 0x0, 0x7, 0x4, 0x4, 0x7, 0x9, 0x100, 0x73f3, 0x5, 0xb44a, 0x8, 0x9, 0x800, 0xc71, 0x7, 0xfffffffffffffff9, 0x5, 0x0, 0x8d85, 0x1, 0x0, 0x0, 0x4, 0x3, 0x4, 0x4, 0x0, 0x10001, 0x7, 0x1, 0x3e, 0x6, 0x8, 0x79a, 0x9, 0x10000, 0x7ff, 0x800, 0x100000001, 0xa6a, 0x6]}]}, {0x40, 0x6, "fc14aa5b20225d0d96971476ee1da22cd21044d11dee9ad2ccfdb70b46c1110d6b5cfcb08dc31962a7044fdd7ccbba8c7075812e9ff24dac50f4a915"}}}}, {0x1060, 0x1, @m_bpf={0x105c, 0xc, {{0x8, 0x1, 'bpf\x00'}, {0x48, 0x2, [@TCA_ACT_BPF_NAME={0x10, 0x6, './control\x00'}, @TCA_ACT_BPF_NAME={0x14, 0x6, './control/file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x6, 0x9, 0xffffffffffffffff, 0x401, 0x8}}, @TCA_ACT_BPF_OPS_LEN={0x8, 0x3, 0x1}]}, {0x1004, 0x6, "422730c59a1ff103b5df5578c63f7d606969efa1bf9a70401e848a1dfdc8356e98d60c90974fe8aaf373f78dff84f6415bef94cb58a19cb6e905c265c3099ff0584458e3ab41bd13efd37d58d873f6d1f668eedf39de42f43ec66c00ff1b374d08ebaedef59fb71aa728332fbcb2a08aaa32c164f9a69df03dcbf5909e5d7ed451de2bdf3caaf8603f37549394ea3b60022ad3181336c352b0654a5fba057fa5f92d946218b67e311022a78d699e63861626454d17282a672f9d87a71c15baf4908f2abb8ae267bef0c2c41b14a8ddfdf132f83dea952ef91cd04335dee4e4bc282ef9e96c3fa45acee62b9d45baa4c8a8aae0d03db8d26c28c50b314978fc00252428964b2bf65f774b2a3111032530dfbcdf7935b2cf5ae8b2069307055fac262b0c900da9a4039369862949d53488bfc04405bda0cde376e16c3ed6a953863e254045480ca248dc4d04af27c5211eafb3b5c1999b1b6df09c1d8f93f7833bfbc968f3ad7df6693b1c0466bdba83f05f25367bbc7439635bf25b9db822347721169ee10f53aea5a5f2ab9b71cc8e06bc7daf3a7585a6bd58c48ea38f599b2033d10906445f9cc73b2eccb117fc02e69d7d6cdde5aa7b176739aa6547377beb54b0612fa817cda3faeaa185bd384182136103b647c2691b9d7424f553f2c3243196701df4a4d22a0ec62b63583cf17b543ca5e7070f6b776a13b7498cdf8c71c560b527924fc63ec8257599f562dba4047502a56106b866d5f97aca245eaf752589d190f11cead138ce992057edb27b542a0c1148c775bcd46080f58b15a7bf25ba215c303b0edd87f3a526129942da201d8f85d78f85ca6fd20acd3979d16445df794fe08a9fd04d4515e4ce1057eca4eb6a278d1dbd14eec639012ef2291cc76bb5cdcba51e2dd652805b21ae639067b6e2f683ac0997aa68586ea411bde64b14605a7b33989690d51d6716852b928921b042e58753da8ea72ecccc4e4a0bd14c5b627d9dc4233f9a696718e7c2261d15155ad646080a6fef7b40e33b0d92613e403f614023a952f107b9df8f52c54e05ae8454b8f783905826e668d7e1eba9e89ebe9e86407b9912a021e7f065a2980aadcc50bcb6f5db4fcc91aeaf576b332f318c88c9c5a8299a148f73015ba1a71ec7bc26201607a27c0478043caadaaa4e147851ed2143a200fec5af30dd4f69058b5e1503a736a29324ee9e0e9a68ff49b3dab1cdeffd169a031bd05eaab1202559af02afe5878354d81cea2ebd7d18b17c78d13121517e74ef82d7627ae8dc0b71736e9888950e439057047435a2b5a7fb2a0325f4e5e5af187f34c52f6c9a01d6faf597a08933ae65b05e9ac0265bf1155ec0dbf08ff7920deb864f3fa93008c718d6b60020169b37228a4d5ee43cbbf725ad85ebaefd1a8bec0d7142c9101079b6c507fe7b6de19597127bb08596570bf2e4f08033b15c093de26bbd7f6815c684681a9da8b54478e75962dbba53f93a56e41d60b1df7dd589caef326acc36e6794ff2e4621c4e8f688136268d37183cbc60f94a24cecddf5cb4f6b8fe164f361c87bc658b565a498ba43ba2a2af1e2d1eaddb416f5c172c195179b39edd01ef15e16934c4f69065277a80d4cf3bf1b64acbed811e561d74300a9ca911a825c2c53f46eef6b2fe6a7a977f229fa3fd68a1ae7c761088b369a2f1474f56bf442dd3ba89f064b7ef7c52f8052a744b1450b7859468edce489234c1b5866512c519a37c7ef0df5531943cddaf6b0615e6d693bdf5e4d67296f659d0edddc59a1eb27ad1b61d961656892ffdca588dde716bf5e95e9e8e518a48ab1c3e0d39a7479af07937cb0edbe029d68b2d768fcbc47843212d3ddd421fac90cf1b88f8d06954119cec27d0a05abeb8c5d78194a90d7647b9729b375424076ff7d3fc7592e69d9074587dda7df4b3483496e161e6b50ed4a2c838fe9ef77c317b0ade3aad5deb7ddb64d01dbe28a9dac9a8e5e6ce0e8d77dea6125e5f0b1fd829d5227cee02addc6ae2f5239b5a95796db477545fbc9e14b3618a90f6b0c319ab75ce8ba52e5c7da555b318a3ada208b18baf4e9f731fdea0a98606febb0b4db1a3b74a9aa4c353676b1ceb42a7647c627e339f168e3debd49dcf6e5444b46b9f589847128659442c468af21a03eefbce068f926d9649b59fc59c03462fd5bdf52c36f38eb46c618c8ae7d13cb73ba645dd64682abda65bcc6ac6c2a1e9ccb025cbd6a69793dd4efa214e53787a4136dd2effc5b3c78e0196889a25eb2b47cb2908a192a522c33c4fb7ee0918e9bb1aeba75993cd9ed98181f48b2f37873196b3f1164a77ac3977ee3f71ee4216dfd59356c43234e8b3cf9a3b15b09b93b273c9fc13b21db488dd69c3082eacef73a10f4f6359942abe0ed6b507c3f17bb7496f25b28da495d826d018ede1eb403c67554d187eaad34d0958e6c40f30cfc6f381642a8d4f8f880048d56e7c9763e385cd8572f23c50ef8f41e88a7308b6d76f190c90dbc5d9547d31c393816cbebf4ceac1f83b457b2707c1a25612a683a6df421d5c4fd79b69033e8f2a54f2c282cec31fa18207df6bf1f6f578b51acfecfc5ccc42772e446022d9bc4a1cf43525aa6090d1eb8c6d279b44def8c1ea6fd31224bbf39ae366425fb8b31fb17b745b449582967f031017ac9aed463f936194d858f8e100db678f53b94c03670f605dbdc32a81e10eefef5aa42c1cb30deea7aef01c4f959b88fa4fbcc20cb60b594c784b4b90bcbf94fc414f04fb5c52b45e6b740cc4f64031ba3367539084b8a5c3ebe050869843b26a7bef09168bd96771b7713488c6db9650286e29048338d9aa909c674bf89cdd0667a75a34cd87b73c0c5bf00160f4ea2d5a71360c25cd9e2f45239060ef9863ed07dfbc538a3230d76bc1b94c9e6aa1f8cd5d75baf9bf498b586bf16cfbc2f6790aacc496280ffe1033717b693b27ca33d25d12e0ba5c7e4c4e7b8f6c59066c2f34bfa82a9e60a8a0c402f8d8e472e6b253e1ced112c4d96aa118b34d61302d1be12554b665e151325071cc7525346f71a43781bf83f7cf07dab5bd610cbd81c25bbd800fa450dc1083889ad01975eb3ee97bf27f952d4f2585dcf0e1025d298a90d857e8f7e252247580ecdd35de83d04cf93d0e14450ece4a13cd9f919419b33c27f282c80cea3b77ddf69bfd447c2958bb60f859a1b83c050e3667bdaf8f65eb6484da9f17eb4c748caf1a69ad24ba702bb088e0bcfb584c5cbe49968ab3f8031078fafda085e89f6ad51e0485718abe1fcc9d3fca6e972db8d938f771b8ab51b32185ebc9863c0dbc957ebc8b4bf7c1e01a412d8cf383deb9e46da58c175a75bbe785e97134ee665b0b6b31325aea61f85329975c20f48b86fb341e5f9aee74f637e178966bb8adbf740224fc9a305a714fa8a9286320f670124f7d05a0616799af37d952e3cb64a6f83490501da39c18079c04d9768670135a855d879c8682c874b36a0401624940d08bc5699f894244f708646b3e97baf8166ce146f6306b39407da175dae62743f4ce7af9236c6c882b5992296aa7ffa15fd8a9ed34d6ce84d813064848662d215dcc0246a9de22ae703be6f8636398c01d6bd9fdaa660a75260cdb941b66cc5821b58ac845e65f57a0fdb2a36371c8eff16e62b7efec79c8355777a63b250961419f148dc1e0197ab8a5bec47317d974088d1b9a92b29e1b14e8c8e4c9ffdfcebb45628fba71cbabc80c5387a07911f6bbfb04952061c91d4cdd5bc7348bb644d2999fc057674be9b130a1c121c4239e2b70c51b76a4dd1e0778b7a838979271d94e76483873be7a7a6994589e3146f413523bfc7f52624443a5fdac7a3a8969ec3ef8443aef6851998678436fa27bfd8d32bcf28480af96fb5ceab59e8f08866e3ba050b89a67ecf9c374717db59ce5a4008cfcbc7f2aec98cfaa6e39ed309a72784d952b1e52c1046d41556dcd431e0360292cd13ab77996671d381dd9e3849d524a5dcef65f48833a52ea63657a9af8b249a37c810e52da68099cdfdb4ebe8aefb3dee048a7d9c08ff92fe3413340c9fe4ea3f3ac449e5557bda911e8a4888e713b3f5502dd4ea4f4a4c43c155c9e1852d01588be8143a6c6acd86f3fe4e715c080751fde8195bb8ba7c95f61448f7dca0a576ba91b6d6f9cfa27fd2f80b91de7fc10123785f75f3504ab2c165076df7fdb8da2ae2ea60064dac946048d525f458495e7e14bb56eda021da105c0849e0a9d9232aee69f32121ce4fc1c62efffb22f5623def2ff3fa5844dd595ff1bd5ec4141b21f341624d215573ce15b951a3451aa9f589732899ca920f4aa018a20d000e91caee6c6756e7243b8b60e14a9c8c9c8b6137eae82fad35bd0d7d2faf07f98408d3930a0c525af2dd18ba86e6973ac6d10e80a39ac6c927344de7dae9634dce8b5afcd7fedc6d742961162900ccb45f882155bb5d93b50200ca9a8c1f4686fe5a55f78045b8089c02a096e7d53a21a16fce81522415869104a382fd5557777706298a6b7ed3232e3ef68c3852f9157cc378524d3122d606e3fd7a4894738818ec2b05399e02819cdaa0be40cbc410f95ff6d59f7b253eb7b4357fb494d64daa4f7b0fe9793caa236a8574a931d3dcaf5f97d9897d0d4d33ea820bb8d60c5cda5fb00fdf977f74dbde56706d96a4c3479b4719aaf80b92ab48983d56fe75531d1fd029ddbd88649235b7d14edc918143ad984ff804deeb2e1e533b39b4666bb4d4965aa7a0b6cb072ebd95e403691d051dbf42629633a962de26d704d6ff56f69ed3ad5a30956dbcc617478ef27e4ca08060770d1ed2e1c4410d92f66f036f81632398ef11df6746dfaf02e46143fc53ddb05a8fb3eae6aed26a5a367309c4597980a3bf08b4bf448ec98f7bac5095658b90a726646e762152423a98c847e354a797c23792bcfd67156e35f33fb8277d691a0fff78e85ec56e307a9fc5e8c57985381b100bd5f2c5bbb273f1109cedafa837946ba223a930197ece7c85d2794369e14ea0733cafcd16e29d9d8755dd5e0dc80f75c2e7ba279d335dee55845dad728e3179a145b8271b917d635b46ceb18b248b80bb5daa4ea291c02b2f867aa47e9bf2432926ad2aefd4823b34e75bcde2c3b64ea1f90ba8607eaf5342c77d28271100b4afb7992d30e3e038a82c1a00ec2856c5f40b377d07762ff99c027cde6b6eccee5405f71d4fa1eedd92fbafeae29b1e810ecf1524445cceb1fc5ac7f53760ba56d21eedb3b78ce130cdadc0a567fa344e75c1dbe382769478eefa1f10b08868a5f2d1d2af82787b3b558c976b75fd431fcb47bf0e31bfea4549c6a681d3609a45a771845175f5284fc9f79a2538069a4f35826707693ebfd9489813f3c92293034ec541d836a5b721759b5f3ccbbc3e7fd3493383ba812b22011f7eb98913019d88548494d85b7419a2768dbd94582dac9eeffd6c5c8b56023998f10e2c9b1df4bd658104c4274af1ff0c35da3c48156f40665a87aceb8d583781c1ab7de2935dce16d4d9fed0ec35f8061f187f30bc08c04262e1c57e4adebe0b4929e115f6044e589d7d24d8b4fc9b1d562a76bb66d1bd3f2415707aeba343fea074814d42bf47d9c633d1ea30c21b095fe5b479c3509a8b81bbda9e91c83024946f79055464e3e38e920ada0596e72b9a9f7137857788e49623ad257eda4eb50dfa9f1eec54ff329e9ead44944b89361a74322de05e208e2056bbc03b9b499e5103a5ebb592f3e4d6e5c0f8aa5c29edfdaf8470590761c4e6a41a613e8f6958eff"}}}}, {0x60, 0x1, @m_skbmod={0x5c, 0x8, {{0xc, 0x1, 'skbmod\x00'}, {0x28, 0x2, [@TCA_SKBMOD_DMAC={0xc, 0x3, @random="7c389028a85d"}, @TCA_SKBMOD_SMAC={0xc, 0x4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}}, @TCA_SKBMOD_SMAC={0xc, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}]}, {0x20, 0x6, "5b92ed08c769f27389945b0f6b02856959a839293c0d4785f9fcb7"}}}}]}, 0x2528}, 0x1, 0x0, 0x0, 0x10}, 0x20000040) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000380)={0x80, 0x59, 0x4, 0x8, 0x0, 0x9}) r3 = creat(&(0x7f0000000080)='./control\x00', 0x8) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f00000001c0)={@l2={0x1f, 0x8, {0xdd, 0x1, 0x404a, 0x7f, 0xbd08, 0x20}, 0x7f, 0x5}, {&(0x7f0000000140)=""/42, 0x2a}, &(0x7f0000000180), 0x9}, 0xa0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x10000000000000}, 0x8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='westwood\x00', 0x9) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000280)={0x5, 0x9, 0xf7d3}) close(r0) [ 336.731612] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 336.739381] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 336.746699] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 336.754010] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 336.761323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 336.768639] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002d 14:04:12 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0)=0x7, 0x21, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x400002, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000000c0)={{0x7, 0x8}, 'port0\x00', 0x10, 0x31060, 0xfffffffffffffc00, 0xffff, 0x5, 0x10001, 0x5e86, 0x0, 0x7, 0x1}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:12 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:12 executing program 4: r0 = request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000000c0)='vboxnet1cpuset-vboxnet0]GPLppp1{md5sumbdev\x00', 0x0) r1 = request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)='+dem1\x00', 0xfffffffffffffffa) keyctl$negate(0xd, r0, 0x9, r1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r3, 0x407, 0x0) vmsplice(r3, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r3, &(0x7f0000000000)={0x18}, 0x18) dup2(r3, r2) 14:04:12 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:12 executing program 6 (fault-call:3 fault-nth:55): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:12 executing program 2 (fault-call:3 fault-nth:46): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) close(r1) [ 337.270757] FAULT_INJECTION: forcing a failure. [ 337.270757] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 337.282608] CPU: 1 PID: 15093 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 337.289890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.299250] Call Trace: [ 337.301857] dump_stack+0x185/0x1e0 [ 337.305504] should_fail+0x8a7/0xae0 [ 337.309251] __alloc_pages_nodemask+0x622/0x6320 [ 337.314034] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 337.319497] ? get_page_from_freelist+0xb01f/0xbb50 [ 337.324526] ? __save_stack_trace+0xa45/0xca0 [ 337.329036] ? task_kmsan_context_state+0x6b/0x120 [ 337.333995] ? page_counter_cancel+0x58b/0x5b0 [ 337.338597] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 337.344317] ? try_charge+0x262b/0x2e90 [ 337.348314] ? kmsan_set_origin_inline+0x6b/0x120 [ 337.353178] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 337.358550] ? memcg_kmem_charge+0x79d/0xac0 [ 337.362979] kmsan_alloc_page+0x80/0xe0 [ 337.366976] __alloc_pages_nodemask+0x105b/0x6320 [ 337.371836] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 337.377038] ? __msan_poison_alloca+0x183/0x220 [ 337.381742] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 337.387118] ? balance_callback+0x48/0x260 [ 337.391370] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 337.392979] FAULT_INJECTION: forcing a failure. [ 337.392979] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 337.396840] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 337.413994] alloc_pages_current+0x6b1/0x970 [ 337.418409] pipe_write+0x7f0/0x1d30 [ 337.422135] ? init_wait_entry+0x1a0/0x1a0 [ 337.426365] ? pipe_read+0x1330/0x1330 [ 337.430248] __vfs_write+0x87e/0xb90 [ 337.433976] vfs_write+0x467/0x8c0 [ 337.437523] __x64_sys_write+0x1cf/0x400 [ 337.442367] ? ksys_write+0x380/0x380 [ 337.446162] do_syscall_64+0x15b/0x230 [ 337.450048] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 337.455262] RIP: 0033:0x455ab9 [ 337.458440] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.477719] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 337.485423] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 337.492686] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 337.499959] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 337.507219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 337.514481] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000037 14:04:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) close(r1) [ 337.521761] CPU: 0 PID: 15098 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 337.529044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.538410] Call Trace: [ 337.541021] dump_stack+0x185/0x1e0 [ 337.544667] should_fail+0x8a7/0xae0 [ 337.548408] __alloc_pages_nodemask+0x622/0x6320 [ 337.553202] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 337.558670] ? get_page_from_freelist+0xb01f/0xbb50 [ 337.563703] ? __save_stack_trace+0xa45/0xca0 [ 337.568240] ? page_counter_cancel+0x58b/0x5b0 [ 337.573636] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 337.579035] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 337.584764] ? try_charge+0x2825/0x2e90 [ 337.588759] ? kmsan_set_origin_inline+0x6b/0x120 [ 337.593628] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 337.599010] ? memcg_kmem_charge+0x79d/0xac0 [ 337.603424] kmsan_alloc_page+0x80/0xe0 [ 337.607407] __alloc_pages_nodemask+0x105b/0x6320 [ 337.612252] ? kmsan_set_origin_inline+0x6b/0x120 [ 337.617089] ? __msan_poison_alloca+0x183/0x220 [ 337.621760] ? perf_event_task_sched_in+0x257/0x2b0 [ 337.626782] ? kmsan_set_origin_inline+0x6b/0x120 [ 337.631639] ? __msan_poison_alloca+0x183/0x220 [ 337.636306] ? _cond_resched+0x4c/0x100 [ 337.640312] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 337.645703] alloc_pages_current+0x6b1/0x970 [ 337.650135] pipe_write+0x7f0/0x1d30 [ 337.653865] ? init_wait_entry+0x1a0/0x1a0 [ 337.658106] ? pipe_read+0x1330/0x1330 [ 337.662006] __vfs_write+0x87e/0xb90 [ 337.665748] vfs_write+0x467/0x8c0 [ 337.669310] __x64_sys_write+0x1cf/0x400 [ 337.673373] ? ksys_write+0x380/0x380 [ 337.677162] do_syscall_64+0x15b/0x230 [ 337.681052] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 337.686235] RIP: 0033:0x455ab9 [ 337.689412] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.708670] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:12 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) close(r1) 14:04:12 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 337.716388] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 337.723668] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 337.730930] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 337.738195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 337.745461] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002e 14:04:12 executing program 6 (fault-call:3 fault-nth:56): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 337.900481] FAULT_INJECTION: forcing a failure. [ 337.900481] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 337.912361] CPU: 1 PID: 15113 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 337.919643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.928998] Call Trace: [ 337.931596] dump_stack+0x185/0x1e0 [ 337.935235] should_fail+0x8a7/0xae0 [ 337.938976] __alloc_pages_nodemask+0x622/0x6320 [ 337.943757] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 337.949225] ? get_page_from_freelist+0xb01f/0xbb50 [ 337.954262] ? __save_stack_trace+0xa45/0xca0 [ 337.958777] ? task_kmsan_context_state+0x6b/0x120 [ 337.963740] ? memcg_kmem_charge+0x5f8/0xac0 [ 337.968165] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 337.973998] ? kmsan_set_origin_inline+0x6b/0x120 [ 337.978864] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 337.984241] ? memcg_kmem_charge+0x79d/0xac0 [ 337.988666] kmsan_alloc_page+0x80/0xe0 [ 337.992654] __alloc_pages_nodemask+0x105b/0x6320 [ 337.997508] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 338.002704] ? __msan_poison_alloca+0x183/0x220 [ 338.007399] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 338.012782] ? balance_callback+0x48/0x260 [ 338.017031] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 338.022502] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 338.027895] alloc_pages_current+0x6b1/0x970 [ 338.032325] pipe_write+0x7f0/0x1d30 [ 338.036077] ? init_wait_entry+0x1a0/0x1a0 [ 338.040331] ? pipe_read+0x1330/0x1330 [ 338.044239] __vfs_write+0x87e/0xb90 [ 338.047986] vfs_write+0x467/0x8c0 [ 338.051552] __x64_sys_write+0x1cf/0x400 [ 338.055637] ? ksys_write+0x380/0x380 [ 338.059451] do_syscall_64+0x15b/0x230 [ 338.063362] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 338.068557] RIP: 0033:0x455ab9 [ 338.071743] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.091099] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:13 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:13 executing program 2 (fault-call:3 fault-nth:47): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:13 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) shmget$private(0x0, 0x4000, 0x54000a18, &(0x7f0000ff9000/0x4000)=nil) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 338.098820] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 338.106097] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 338.113372] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 338.120646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 338.127923] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000038 [ 338.294163] FAULT_INJECTION: forcing a failure. [ 338.294163] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 338.306015] CPU: 1 PID: 15131 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 338.313293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.322647] Call Trace: [ 338.325249] dump_stack+0x185/0x1e0 [ 338.328897] should_fail+0x8a7/0xae0 [ 338.332631] __alloc_pages_nodemask+0x622/0x6320 [ 338.337409] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 338.342872] ? get_page_from_freelist+0xb01f/0xbb50 [ 338.347896] ? task_kmsan_context_state+0x6b/0x120 [ 338.352842] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 338.358215] ? vmalloc_to_page+0x50b/0x630 [ 338.362465] ? task_kmsan_context_state+0x6b/0x120 [ 338.367423] ? memcg_kmem_charge+0x5f8/0xac0 [ 338.371848] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 338.377674] ? kmsan_set_origin_inline+0x6b/0x120 [ 338.382537] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 338.387954] ? memcg_kmem_charge+0x79d/0xac0 [ 338.392382] kmsan_alloc_page+0x80/0xe0 [ 338.396379] __alloc_pages_nodemask+0x105b/0x6320 [ 338.401232] ? kmsan_set_origin_inline+0x6b/0x120 [ 338.406466] ? __msan_poison_alloca+0x183/0x220 [ 338.411136] ? perf_event_task_sched_in+0x257/0x2b0 [ 338.416163] ? kmsan_set_origin_inline+0x6b/0x120 [ 338.420997] ? __msan_poison_alloca+0x183/0x220 [ 338.425657] ? _cond_resched+0x4c/0x100 [ 338.429628] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 338.434998] alloc_pages_current+0x6b1/0x970 [ 338.439409] pipe_write+0x7f0/0x1d30 [ 338.443136] ? init_wait_entry+0x1a0/0x1a0 [ 338.447365] ? pipe_read+0x1330/0x1330 [ 338.451245] __vfs_write+0x87e/0xb90 [ 338.454967] vfs_write+0x467/0x8c0 [ 338.458508] __x64_sys_write+0x1cf/0x400 [ 338.462568] ? ksys_write+0x380/0x380 [ 338.466360] do_syscall_64+0x15b/0x230 [ 338.470246] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 338.475424] RIP: 0033:0x455ab9 14:04:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 338.478598] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.497833] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 338.505534] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 338.512793] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 338.520055] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 338.527319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 338.534576] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000002f 14:04:13 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000140)=0x4, 0x800000, 0x4, &(0x7f0000edfff0), &(0x7f0000048000), 0x0) r1 = dup2(r0, r0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x14}, 0x8}}}, 0x88) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:13 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f00000000c0)={0x7fffffff}, &(0x7f00000c1000), 0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000100)={'yam0\x00', {0x2, 0x4e21, @multicast2=0xe0000002}}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000001380)=""/183) writev(r1, &(0x7f0000001980)=[{&(0x7f0000000180)="dacd9fcb2d37bf1f87c0a29616741fa55d004371fee68a1ce35c593321aaeddc4ef4a07968f252ff447d1fe489e08167f0784069bdf04aec1e97af6a0fd733847733d54b7d49d673d43fcef99496ac928c1406be19b900e9e8086971e1aaef2107bbe383ca674b22f9315bab35f5835f478da60fa0001ca8c709edc36931ed28699b01020a613a3f9ea8038b9c300a848c78adf66ed3cbcdf55b5421"}, {&(0x7f0000000300)="d32a26ba80bcb7a7294728787fc11f2f704fa05dadf6567a19eb416ce1b1732299e891fd2c0ef987113d90392e4049b3a034c51236b25260446ffbf4bf31bd39ea6719b612c71b36410ac031"}, {&(0x7f0000000380)="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"}, {&(0x7f0000001a40)="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"}, {&(0x7f0000001480)="4c92f7ffbe93dd1850e9954b3681bac5dbf25a14bfd91ee2ecbd97cb9b87783879790e517adb7781fd52f5491b933ec7322ed44991b6c2bcb893bcd85272e2a037ab16517ef35da03a6d8b2e3647320fab6dedf8d1663af058f5912c128d8abf69ad12403eb5ba9e74aacc7f42aa4b0a9a67d6cf453a44154c45f4ba4f4302d342b8effe41ad649061b970125f3d55e63b4abe16aa497a23a54b3b62ed7f70f0627c9d1d81c393091e1df1677f2b57c9aafd74e55762c4239b131742ccc5d53c9bacbdafa2ad9d3be35d056ef232a067"}, {&(0x7f0000001580)="3b3a3a9030a638633a474a19deddafa6587d6546b577cfe116ca70e3522cb1c562ea0dacf3dec102f10eb6eef8c0d4b2ec3955aad5bd6149263af8626ddf16018b9c1f6d48b7171f8e36790537b7b2c09ad4152efefcbd3c240a044715312a3c52bd114ac9f9398de6166b76303598e1063af3efab426740e27a3d57e9757f205f6fdd7d29c39084ef509c9f8d8af94ac8d293c9986c384aa990d39665ab8c7b8bb167256b8d850cefe7c03e7960d97239b846cd353cf5a8824c8e4497"}, {&(0x7f0000001640)="74f7ac1df67758cdab5f86451e5de5003eae74e9c637f8637fed920745e2f55be9e2b7ba337c78049a7178dcd5dcb5710f5574be8c13480f03c2a23408849b17d128557ff326d3f857aed794efe77844731d58afc0206f38a217e315966ab57b4fd2ad692bcd577ddc6484c0d3711e160624395af1f7d76ca4c44793cecc925752a8300638e4444174fe8c945c563d7a5200bf63076a25539df862a12213ad2105e9cba48b33a45cda6a7842d06a81bc1419844878d193a9af5fb8e728b6ff96e7a3bd538f71c69fdbbc2f2cfd28360776201e03ba9679ad25cf26d25665697c53"}, {&(0x7f0000001740)="abb2ab842acf1544184bcedf259bcc068ddea769e07a560b7bff05ab8eadbbca6e098aedd0b180d5be71e4cf6cf8c6759f7a97b2c558d996cd772d0852ed3680db23b68feef4ab002091044ba36d2a206c74d1f123d119b32327e0761c47de9aaf03a2608e03bd12e537dbc75407cf6a02e384878d686a0e15e9d522c30289c7a12ae3c5bb730504"}, {&(0x7f0000001800)="87cd32186c5370fc35eb756e44e3b0179c1c1b8bec7c9c1e1593ea84e7910c680a683e15024bdea373c7a147e3f0be35c319fbb68d3b5094aea3888ee5437b80ffc35379824f125902038573a4da5b95fc1c461fff26303c5792969abe15a6e0e88bb28321f967284dd20fc516b59199dc3e3793133f8b4b71ad993c5c482c090e172a162774", 0xfffffffffffffcf0}, {&(0x7f00000018c0)="ae68c04fda1a8c2d7df81b7759de5056d8e1f7c691c281ac349d8c95e7afba194cf12eb22cbd2ca7e664efcc68a3f3c83e2837b5a975355b0127521bbfc9497390efda98847e96863c91c72f1f9146d80256fd13b9daf19c88b9e956ff2568e43f9708104f4c577df8bd3b4bb3ec617a3b5133edeeaf2d72ced6617177728ed8224645a9060c49467ce2b614cf2787ec753986e6e720b98ccd0d2c7100aa08b0672496ad261b99900322"}], 0x1000000000000283) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18, 0xfffffffffffffffe, 0x3}, 0x2512f1cb77901fb4) dup2(r1, r0) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:04:13 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') renameat2(r1, &(0x7f0000000080)='./control/file0\x00', r1, &(0x7f0000000140)='./control/file0\x00', 0x7) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:13 executing program 2 (fault-call:3 fault-nth:48): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:13 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000005c0)={0x0, 0x1000, "bff0dd9dca6465612c9435ad70ed41e2d1541e34d9f7471667a4216d2ef2d2104988e50dbe3b4d64b502c05267f92d01aa0d83bc275b7a20c397f252964468113bf1a9269d4e921f50e1353c9b58dd990b9f9a0a489902e9540a0cafadaa10f52754bf0c527557572a09d26d64c28d04d48a5e3360b6c8710b16e0af67de36bf5a4ba5d58160b367937f7996e8b0cb26ed25cea77c4ae9cf9e0ee7f5782cbcff481eeceeb9efdcb155e0a592cba5140ed62afe10dfd602d20d1e73a20bf599fa5330d41a7f6a030aa99f63f42602eed47ee80424b3e614f6580c5a2cdeaeb5811c4f6c2659d3c45e4ea729ba648cfdefb0e3a173f297941581ee4f76b7d036db28ab4f0886dab3ee95a2255a152a5eb70a990a69cb485c80d98673860449cf39a962169fe10e95d4ab4f54db877ae401c2754612b5a59f3d311ea5b31ba52164b75483b9172982cc3c83613cc5273442a9c0703faddae05a4e6f737b149dafdbacc47a8ca6d053eb4054307494ed42190677a1168a4b3293a2def533e8a014c0f2c3398ca62e8c29e282896e888a257b686058ef1bfd426a7c63a601835eea510dd5468734495715419fb9f0a5df5152ac6e3a867ebd121519c062e4974211335ff5a1dfb68dde8feb1c5c6e130edce09ac62bae01b4e51631cf8aded4d781cfbe754db1f166f93761b1667255f372ecdcfea0519acc13a2b903ce5a07d11b44fc028db35cc9ee254ed364976d2895816dc6a9ba483d0ad002786e25456335a1e1d3b6f4617a8269b4d528cba8eecb5f9029db01d88dd91a04fe8b93076666b2eda4cd016893937a4d1c89033c5d91706a93d04f54dca8fc7edfefdd31bce2f332865d3ba3123b0cee841ce36956808030caf95483ede7bb9062c15f6767fd8ba2ec855f52d7afe89563305c2c15a2becd757f61e7204f50c1d5d520b3f09b606d1187f53dae1d934bb19f415961f7f5f1a7df8e203633ac204d4e669ab5d578a76c7b8dfcd6153c1eeb2ec7a62547e5bebe2902957ffee9a5cbcbc34d49ce372b409bac0fb41c7995ab66738e9ffe6ff48c1dc9fcdb36984649a6de9f11f2bb0bc9ec5a40767e69835e9699001be0f26ffb136c895e9bfc44c1766f8d0723e9b142e128244b48b36f656c94273437b38ae5f769db7571db760f0107795d70e7aefd4f35d49cec28c12db9ef20055617958e17bf99fca914699d9341d37339b91bba9b562a08ca3d9fa33a05079074ed8c3df0288300931493620a202d388f2ae2466ada6218c1930ae53e49da4c69bf00e8fe3a04f214e1063a174b024e795a12502e968a69ed8bd422119b48e7334521dd5034cf1d086c02be2db3df083da3ba6c33855f7422740051c2e353ddcfdcf0488305d82e69b81a141f1667bae539a8f74acf3022a8e16c2f3a544e73c53698832fb7aa511f98dc3cace9d179f10c443b13511353f17837ff394cbef0639f2a46506a17528b9829e5432edc114f3fe711dacafa67ed8718a030897e6ae7beafdcf0e2dd0a627982fa44406ca903f629d797e8d0d5add28cdc8156faec4a4ce54f4ee902e83ea52b9088c0c13c49521a234273888821f7e8cd34006a69f4a680c474e49434d8cdb50dc97f693d3255c0433252a2056948eabb2db20ff8982053be4842683c33c692957845b040fe5664ceea67ce976d61fd8f3e53a994bee4ede2a0837232666b6bc30043582ada66cb7e18f3470b2af7f01fa2960960896d6db3c0b773472fb3d6c2b02a4b516871c875a7d6dc8816fe1b4b714b2b0a79b2ae285931f080736ab64150ed45ead432471f796c65c8e56a497c7e054bc96ee2b323c93488470012c68665d40294690a0ba5d44c412c8faa8457ace95323f70dfd10136f49f8519353e4637ed34ca113fe4b89ff97fa84f824e96dd2e06b18f88247a193c4076ef31c33ba2068eca75616d1a98f608151c104c22a88dba22eb94d2d90cbd2248465b95f3dc2078d53a6e962ed9930dce7473222a2f1b3a0f0bc3bb7ac0dc813e1e057ebc2a7107fe0471ea3f31ddf5464f5f34b85994a065894e57c8e846378acd6fe90d112c7e24dd99e8939ca8b3d70050fa5c907d3cc1867a3bca69cf4da20bd59fa40cfcf998b6bb4d88e22d035da3998140b8b76b411695ac7b0abc8f0691c393297739aa4648c03ddbee39add0b478dc8dc98d5782ff50f9854498a6d35e82977305e0e886c294fe7a929a8aabb0063886ab9b1d17059528faaac7aaae5a9bfa36d14a4385c9f0548e04392f2d9bdc38d38b2f1988339972d033451b7936034d0d33f4cd1775d339698b4e7b57fa5f255807911cb8cd19d663cc1e2eb197ba747f0079a2be216ca27f88a33bfac9d06e9e9bc2cee4c0383d945cba492566a4276630e9ab7971a93d3a07de375e66dbcd942bd945bccc5966d8df5051dfa90867c0c46d5945872b728ef170d847095a433913b7cbc89ce9e126dcdff640a2612d82532440521d8aad50e49a25e220a7987ad50c868bade29fc1af65f03fb6dcf115abccb750b7537442e7e43365267ac778640075888526fa36031160049770b8d0b35c3afdffa73288c9b54b5652607cc0d39be97f5dadc0f9f1d71d85e92c314b3b50a194238cefa65873590a900f530ef991e1eeb0bc75e79d0c4055c90ff137a7d9cc6caca59109a69fc3622ddddb2d61e09bbb42a80fdca21fce7c7452c572a820d7ad6977771b27dee71969dd25331432a9138e027dd9741838452ff816a67bc09cd024a4f0cd9dcc6288a7a53b0494379b2b0196134676484516803a176faabaa3cb2e29740fced7657dffe52b004e8e9044da69f48f3c23c91ea29f4e2f598c8cf6372308cac9ea9e6ab3d49b5c9d9d335c25d9057e3d65c833e79f63c2ebed0a8b0d8821d19fa4bc3f9efb855aaa4c22409f1f1c5c991f7ef0c51f87d8a4d22553226dba86eec6f8705581cd495df01db1782b71ac480757473be21489cddd34903a9b26a326f524b12f6a7cf9f296a1b839c007ea52e789fade2338ca4893d83aaeee8864213aecf4dea58dcab50f6cbbbda62ad5924d7321f4b540d11e5a676e403122a2773ccb8e82ace9611db537ed42927221e2d28d31a55414068d67b87313d28072129335d42168cba1c59548c07997852412b935988bf4b26f09515f00fe3aff9e94e1a03f75a5922f00b76360e4f49d401ded990d2864542b89f13cb1b17ce98d22781e82ff013dd9e228714d3e64b755850300051eeb4acc364916a4f553031d4c74b43f1fa5239f9c3199d6e464510121f1845547f6bc59c80391b96c119e1ddd6166784b18489b8060aab24d13949766d507aad18314207dae523b4c158c56367de977fec45ce9964468d282da6cd6191724eb9e107018b6b9e7690bbe12efde864cb06595abaccabe2c6d5199249b85814f747597764116f00d5c62f03ee48aeda3c5826176247cf7c9b51c013b147984b2a4aac3e814c1bf596b6a3238caa53bed1d40f8630d986f46792f99ca1d8e52f90ed41290738b81f1f5760a912bb3d62b53766722244f951ca1b90e17a1be536e24924b283a4fd864dce85c0fc52f04f702ea5da7785e2304cab42f565d956abd4e7b05a7b99a8f0895f22f325521e78bb7aa49efef03d164183b08a97965819b44693714ce4a3ffcb7f068742fd8976f743a63070ad858587c136090da31968009178937a2181d66d1e545ee5e72053fcb8f6cdfb1bda10a78045183c9cc0ea1c117529748d690df665ab4ac0c7ac556b3e7237b2a64d8fa8678181aac0f5d8711cfed7e507ef0114edb0c2003528df1a4f632e0d43124a17587d49c86fbe234dfa796fb3401a198045032b45209ae45d20f27bdeabb6367932b722c9bb22f26bb4079c2ab917099e567b7fdeb586b57c7b461dd5572f84dbfab90e0337927081018b738307ea6f35cd2ebb08ede79e1e0c17bac35ff87b5a77f5a8de297ac36ac56fe5424d016a6289d34a168f0db3eeea746b77d4ee34f722d7743450e678017bc6cb8e94062e262433aa74e6b05c100f9fb561585bd90d1ac9da8921d719487e89e9e80fc050a09f8fcedb34250197f1a456329ca996aa5369cab6351820a5ea6da3915fad445ffdb076ed03e703db1763ae2237a6067b3dabbb5ddfe0f1a9eba937d332e069256981635e81d65c5c23a08790eb129b25e626fa386d85a28d3381a635e72935ffd9b042ac2f4d55a2394048081886a842aeebd18cd693e89d3f27f30749492dc73414e61fb220edf9c50fc169d69bdddfb8e8c43837c97dfcd6f2aa2e4457044a0afda857b211cec8a819eeba538486c0f6e0df02a03911e8cb4b9807df548e32fd9b825232e84c977a4c9fbfc94169fc5b267522fcbe9ea02f147ca32ff40d8b58ccea3072b39cb067eee81087e5d04ab705adc55a1c92a534c1235a5fdea8a793dbc52c79714747ed59006fca400cfce294f5a731e0f9e9484c1ff0da8d33f5cc478f1dd5add49b4a886b94cf76eec71087480c451c9c4a6f89b092c637728681c4eeb9e655d735501b19e458b7672a5b728e0677e9d7edd5b71ba911c27fb97a440ce258c1825b84007cc20ff8d0b544f2edde6c196a671762b4d572257d0eeef8ab99392cff270f76d99a55d8f29449b5bfa6158a910af79df5c958d7b0cb907ae9fa6017e4cd600400ee418e6f5cc853c51815d55ec94118cd2ed46d04cbc42125009d849731da472a43be16cdc1e91f643d752553019f177659d7d3e0bf78db042aa9b13b19e64de9d4d2b3cf084566d022c2e2349d3cda71f0fbf61b9d78720e9bacf83b9fbcef858252db39209d3bbaefa73ddb0db6d39c4d7135a296d02dab84b4e5cee45eb3c3f4de0f8555cd417be0034eae4f611516009afd9c13fbbbfb2fbda22dabea24ea09ed9f458d4f5c4e0f91ff9e56be390329a5a95706ba294ec32b7981c9922be9b853a76cd32345fb41fb78666cc82792db6f5357ce66bbdff0c670f582cbc685ec7c79a1bab9aa568a792ad5ead046490c7bbefd5b16ac13407d71e7b5ab7f2de1dbf4fd96f18ab2568003a4174e063ae817768e480d0a00f4656b7798098a20e5b57db0b2b696aefc938621d759ce4e738debdd02d5cf3f165d631e191161804cf4b5b298a83c133bf427ae120c917b2d2cd7feda05eebd823391abdcb62a94c57481b7117e5774aed4bde007eb55f664d7e10e36bb1f8decd7f4d456595693668fda32fdbd4650a7435385fef8da57f3e8ec9bdd22b871ee939ffe153e4a269ee66a485319a880554c5048626d0d7e4ae89647d8681589c780d8478cb0bfa8ce69b2a63a9aafd180a32562c916b11cc445869d391ab262d0efcf13b0f434bc61525d1b6856afc7250d63ba640b7b584b24eeff237fa7643ce051602505ea2ba2c4e2e959cea4b28a2a555fbc6cc6293fa35bae77dbfd6d0b18025f2818cbc849e0e82cd23afbe96c0ed0d28ffbbe5f930b328b9eab622fe72993ad314d3269a44b7f8026b7947654a1ef6d16b7062ad924a580421391377453d9f40e160c7fbdbc9b34c62dca06d358925aecf584596933784c7b32a45711326cefbb4e1599b57aa5a2f856205d02122bf5746dcfaf6b3a6f9aaad8c170f9597f6c6c4be1ae2aa6b8f4e144f3da34d1c83d3af0af3a21950108c0c527432d4e87f00551f28fd02521b6e414230430045ce6fe604c0d19030c497668453486657209c07dd9a6fbd4cbdc6b7a9693661f9d1f75c60b35565fee71162351de85c73a0ea489f68546eb697c4f80cdb6f53c7fa81e5e0914d14b1ce9a3831c"}, &(0x7f0000000180)=0x1008) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000001c0)={r2, 0x6}, 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) pread64(r1, &(0x7f0000000040)=""/222, 0xde, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18, 0x2, 0x0, {0x2}}, 0x18) dup2(r1, r0) [ 338.913571] FAULT_INJECTION: forcing a failure. [ 338.913571] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 338.925783] CPU: 0 PID: 15156 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 338.933081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.942467] Call Trace: [ 338.945117] dump_stack+0x185/0x1e0 [ 338.948821] should_fail+0x8a7/0xae0 [ 338.952594] __alloc_pages_nodemask+0x622/0x6320 [ 338.957424] ? kmsan_set_origin_inline+0x6b/0x120 14:04:13 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 338.962339] ? kmsan_set_origin_inline+0x6b/0x120 [ 338.967222] ? __msan_poison_alloca+0x183/0x220 [ 338.971956] ? _cond_resched+0x4c/0x100 [ 338.976002] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 338.981450] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 338.986963] alloc_pages_current+0x6b1/0x970 [ 338.991427] pipe_write+0x7f0/0x1d30 [ 338.995204] ? init_wait_entry+0x1a0/0x1a0 [ 338.999521] ? pipe_read+0x1330/0x1330 [ 339.003482] __vfs_write+0x87e/0xb90 [ 339.007271] vfs_write+0x467/0x8c0 [ 339.010900] __x64_sys_write+0x1cf/0x400 [ 339.015033] ? ksys_write+0x380/0x380 [ 339.018891] do_syscall_64+0x15b/0x230 [ 339.022835] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 339.028063] RIP: 0033:0x455ab9 [ 339.031272] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.050902] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:14 executing program 6 (fault-call:3 fault-nth:57): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 339.058665] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 339.065975] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 339.073285] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 339.080589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 339.087895] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000030 [ 339.205469] FAULT_INJECTION: forcing a failure. [ 339.205469] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 339.217625] CPU: 1 PID: 15171 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 339.224928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.234312] Call Trace: [ 339.236962] dump_stack+0x185/0x1e0 [ 339.240635] should_fail+0x8a7/0xae0 [ 339.244398] __alloc_pages_nodemask+0x622/0x6320 [ 339.249205] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 339.254428] ? __msan_poison_alloca+0x183/0x220 [ 339.259148] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 339.264548] ? balance_callback+0x48/0x260 [ 339.268838] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 339.274328] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 339.279757] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 339.285255] alloc_pages_current+0x6b1/0x970 [ 339.289740] pipe_write+0x7f0/0x1d30 [ 339.293515] ? init_wait_entry+0x1a0/0x1a0 [ 339.297795] ? pipe_read+0x1330/0x1330 [ 339.301723] __vfs_write+0x87e/0xb90 [ 339.305507] vfs_write+0x467/0x8c0 [ 339.309129] __x64_sys_write+0x1cf/0x400 [ 339.313260] ? ksys_write+0x380/0x380 [ 339.317115] do_syscall_64+0x15b/0x230 [ 339.321050] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 339.326260] RIP: 0033:0x455ab9 [ 339.329464] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:14 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:14 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000000080), 0x6, 0x5) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:14 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x1, 0x448802) execveat(r0, &(0x7f0000000140)='./control/file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='\x00', &(0x7f00000001c0)='\'@systemeth0wlan0vmnet0posix_acl_access\x00', &(0x7f0000000200)='em0#\x00'], &(0x7f00000002c0)=[&(0x7f0000000280)='\x00'], 0x400) mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000300)) close(r1) 14:04:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:14 executing program 2 (fault-call:3 fault-nth:49): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 339.349101] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 339.356861] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 339.364165] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 339.371464] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 339.378759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 339.386063] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000039 [ 339.509616] FAULT_INJECTION: forcing a failure. [ 339.509616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 339.521485] CPU: 1 PID: 15189 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 339.528776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.538152] Call Trace: [ 339.540768] dump_stack+0x185/0x1e0 [ 339.544418] should_fail+0x8a7/0xae0 [ 339.548169] __alloc_pages_nodemask+0x622/0x6320 [ 339.552972] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 339.558450] ? get_page_from_freelist+0xb01f/0xbb50 [ 339.563496] ? __save_stack_trace+0xa45/0xca0 [ 339.568031] ? memcg_kmem_charge+0x5f8/0xac0 [ 339.572469] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 339.578199] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 339.584192] ? __alloc_pages_nodemask+0x105b/0x6320 [ 339.589236] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 339.594632] ? kmsan_set_origin_inline+0x6b/0x120 [ 339.599508] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 339.604902] ? memcg_kmem_charge+0x79d/0xac0 [ 339.609348] kmsan_alloc_page+0x80/0xe0 [ 339.613349] __alloc_pages_nodemask+0x105b/0x6320 [ 339.618219] ? kmsan_set_origin_inline+0x6b/0x120 [ 339.623089] ? __msan_poison_alloca+0x183/0x220 [ 339.627778] ? perf_event_task_sched_in+0x257/0x2b0 [ 339.632826] ? kmsan_set_origin_inline+0x6b/0x120 [ 339.637692] ? __msan_poison_alloca+0x183/0x220 [ 339.642377] ? _cond_resched+0x4c/0x100 [ 339.646375] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 339.651776] alloc_pages_current+0x6b1/0x970 [ 339.656210] pipe_write+0x7f0/0x1d30 [ 339.659979] ? init_wait_entry+0x1a0/0x1a0 [ 339.664234] ? pipe_read+0x1330/0x1330 [ 339.668140] __vfs_write+0x87e/0xb90 [ 339.671891] vfs_write+0x467/0x8c0 [ 339.675466] __x64_sys_write+0x1cf/0x400 [ 339.679556] ? ksys_write+0x380/0x380 [ 339.683370] do_syscall_64+0x15b/0x230 [ 339.687282] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 339.692482] RIP: 0033:0x455ab9 14:04:14 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200000, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:14 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') renameat2(r1, &(0x7f0000000080)='./control/file0\x00', r1, &(0x7f0000000140)='./control/file0\x00', 0x7) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(0xffffffffffffffff) [ 339.695679] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.715041] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 339.722772] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 339.730059] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 339.737344] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 339.744626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 339.751906] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000031 14:04:14 executing program 6 (fault-call:3 fault-nth:58): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:14 executing program 2 (fault-call:3 fault-nth:50): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(0xffffffffffffffff) 14:04:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) getsockopt$sock_int(r0, 0x1, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) msync(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x7) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r2, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f00000000c0)=0x4e7, 0x4) write$FUSE_WRITE(r2, &(0x7f0000000000)={0x18}, 0x18) dup2(r2, r1) msync(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x6) [ 340.018902] FAULT_INJECTION: forcing a failure. [ 340.018902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 340.030768] CPU: 1 PID: 15209 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 340.038057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.047429] Call Trace: [ 340.050043] dump_stack+0x185/0x1e0 [ 340.053697] should_fail+0x8a7/0xae0 [ 340.057446] __alloc_pages_nodemask+0x622/0x6320 [ 340.062241] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 340.067720] ? get_page_from_freelist+0xb01f/0xbb50 [ 340.072781] ? __save_stack_trace+0xa45/0xca0 [ 340.077300] ? task_kmsan_context_state+0x6b/0x120 [ 340.082274] ? memcg_kmem_charge+0x5f8/0xac0 [ 340.086710] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 340.092466] ? kmsan_set_origin_inline+0x6b/0x120 [ 340.097346] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 340.102741] ? memcg_kmem_charge+0x79d/0xac0 [ 340.107184] kmsan_alloc_page+0x80/0xe0 [ 340.111190] __alloc_pages_nodemask+0x105b/0x6320 [ 340.116054] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 340.121266] ? __msan_poison_alloca+0x183/0x220 [ 340.125976] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 340.131361] ? balance_callback+0x48/0x260 [ 340.135620] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 340.141102] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 340.146505] alloc_pages_current+0x6b1/0x970 [ 340.150952] pipe_write+0x7f0/0x1d30 [ 340.154712] ? init_wait_entry+0x1a0/0x1a0 [ 340.158983] ? pipe_read+0x1330/0x1330 [ 340.162896] __vfs_write+0x87e/0xb90 [ 340.166658] vfs_write+0x467/0x8c0 [ 340.170245] __x64_sys_write+0x1cf/0x400 [ 340.174349] ? ksys_write+0x380/0x380 [ 340.178291] do_syscall_64+0x15b/0x230 [ 340.182217] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 340.187548] RIP: 0033:0x455ab9 [ 340.190746] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.210119] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:15 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(0xffffffffffffffff) [ 340.217853] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 340.225141] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 340.232426] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 340.239702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 340.246974] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003a [ 340.256402] FAULT_INJECTION: forcing a failure. [ 340.256402] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 340.268268] CPU: 0 PID: 15215 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 340.275551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.284921] Call Trace: [ 340.287535] dump_stack+0x185/0x1e0 [ 340.291182] should_fail+0x8a7/0xae0 [ 340.294926] __alloc_pages_nodemask+0x622/0x6320 [ 340.299714] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 340.305185] ? get_page_from_freelist+0xb01f/0xbb50 [ 340.310227] ? __save_stack_trace+0xa45/0xca0 [ 340.314762] ? memcg_kmem_charge+0x5f8/0xac0 14:04:15 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) [ 340.319194] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 340.325017] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 340.331014] ? __alloc_pages_nodemask+0x105b/0x6320 [ 340.336067] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 340.341482] ? kmsan_set_origin_inline+0x6b/0x120 [ 340.346367] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 340.351765] ? memcg_kmem_charge+0x79d/0xac0 [ 340.356205] kmsan_alloc_page+0x80/0xe0 [ 340.360209] __alloc_pages_nodemask+0x105b/0x6320 [ 340.365082] ? kmsan_set_origin_inline+0x6b/0x120 14:04:15 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) [ 340.369952] ? __msan_poison_alloca+0x183/0x220 [ 340.374646] ? perf_event_task_sched_in+0x257/0x2b0 [ 340.379695] ? kmsan_set_origin_inline+0x6b/0x120 [ 340.384565] ? __msan_poison_alloca+0x183/0x220 [ 340.389254] ? _cond_resched+0x4c/0x100 [ 340.393255] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 340.398675] alloc_pages_current+0x6b1/0x970 [ 340.403116] pipe_write+0x7f0/0x1d30 [ 340.406873] ? init_wait_entry+0x1a0/0x1a0 [ 340.411133] ? pipe_read+0x1330/0x1330 [ 340.415055] __vfs_write+0x87e/0xb90 [ 340.418838] vfs_write+0x467/0x8c0 [ 340.422423] __x64_sys_write+0x1cf/0x400 [ 340.426527] ? ksys_write+0x380/0x380 [ 340.430351] do_syscall_64+0x15b/0x230 [ 340.434275] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 340.439482] RIP: 0033:0x455ab9 [ 340.442693] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 340.462060] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:15 executing program 3: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) [ 340.469795] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 340.477080] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 340.484361] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 340.491640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 340.498921] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000032 14:04:15 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:15 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) syncfs(r0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x80) write$P9_RUNLINKAT(r1, &(0x7f00000000c0)={0x7, 0x4d, 0x1}, 0x7) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x40000000000001, 0x0) 14:04:15 executing program 6 (fault-call:3 fault-nth:59): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:15 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x4030, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x2}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000180)='./control\x00', &(0x7f0000000140)='./control\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400000, 0x0) close(r0) 14:04:15 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) 14:04:15 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200000, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:15 executing program 2 (fault-call:3 fault-nth:51): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:15 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) r2 = dup2(r1, r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x2}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000280)={r4, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x4e23, 0xfffffffffffffffa, @mcast1={0xff, 0x1, [], 0x1}, 0x2}]}, &(0x7f0000000300)=0x10) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)={0xe0, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {0x8}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xf7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xdbf}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x21}}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9455}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x25, 0x35}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x10}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x22, 0x10}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x73}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x36}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xda}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}]}, 0xe0}, 0x1, 0x0, 0x0, 0x801}, 0x8001) [ 341.013995] FAULT_INJECTION: forcing a failure. [ 341.013995] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 341.025856] CPU: 1 PID: 15255 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 341.033137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.042502] Call Trace: [ 341.045115] dump_stack+0x185/0x1e0 [ 341.048768] should_fail+0x8a7/0xae0 [ 341.052517] __alloc_pages_nodemask+0x622/0x6320 [ 341.057300] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 341.062770] ? get_page_from_freelist+0xb01f/0xbb50 [ 341.067804] ? __save_stack_trace+0xa45/0xca0 [ 341.072313] ? task_kmsan_context_state+0x6b/0x120 [ 341.077275] ? memcg_kmem_charge+0x5f8/0xac0 [ 341.081698] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 341.087527] ? kmsan_set_origin_inline+0x6b/0x120 [ 341.092395] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.097772] ? memcg_kmem_charge+0x79d/0xac0 [ 341.102201] kmsan_alloc_page+0x80/0xe0 [ 341.106197] __alloc_pages_nodemask+0x105b/0x6320 [ 341.111055] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 341.116254] ? __msan_poison_alloca+0x183/0x220 [ 341.120956] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.126330] ? balance_callback+0x48/0x260 [ 341.130575] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 341.136042] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 341.141434] alloc_pages_current+0x6b1/0x970 [ 341.145871] pipe_write+0x7f0/0x1d30 [ 341.149620] ? init_wait_entry+0x1a0/0x1a0 [ 341.153871] ? pipe_read+0x1330/0x1330 [ 341.157775] __vfs_write+0x87e/0xb90 [ 341.161521] vfs_write+0x467/0x8c0 [ 341.165093] __x64_sys_write+0x1cf/0x400 [ 341.169171] ? ksys_write+0x380/0x380 [ 341.172983] do_syscall_64+0x15b/0x230 [ 341.176889] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 341.182088] RIP: 0033:0x455ab9 [ 341.185278] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.204623] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:16 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) 14:04:16 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000140)={0x2f, @multicast1=0xe0000001, 0x4e24, 0x3, 'rr\x00', 0x4, 0xfffffffffffffffa, 0x13}, 0x2c) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000180)='./control/file0\x00', 0x2) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) getpid() pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r1) [ 341.212348] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 341.219632] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 341.226911] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 341.234193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 341.241478] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003b [ 341.282570] FAULT_INJECTION: forcing a failure. [ 341.282570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 341.294657] CPU: 1 PID: 15267 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 341.301969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.311357] Call Trace: [ 341.314006] dump_stack+0x185/0x1e0 [ 341.317708] should_fail+0x8a7/0xae0 [ 341.321476] __alloc_pages_nodemask+0x622/0x6320 [ 341.326283] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 341.331501] ? __msan_poison_alloca+0x183/0x220 [ 341.336245] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.341654] ? balance_callback+0x48/0x260 [ 341.345959] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 341.351478] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 341.356918] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 341.362429] alloc_pages_current+0x6b1/0x970 [ 341.366890] pipe_write+0x7f0/0x1d30 [ 341.370669] ? init_wait_entry+0x1a0/0x1a0 [ 341.374982] ? pipe_read+0x1330/0x1330 [ 341.378938] __vfs_write+0x87e/0xb90 [ 341.382724] vfs_write+0x467/0x8c0 [ 341.386339] __x64_sys_write+0x1cf/0x400 [ 341.390469] ? ksys_write+0x380/0x380 [ 341.394328] do_syscall_64+0x15b/0x230 [ 341.398267] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 341.403486] RIP: 0033:0x455ab9 [ 341.406689] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:16 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) [ 341.426327] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 341.434076] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 341.441377] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 341.448673] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 341.455972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 341.463268] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000033 14:04:16 executing program 6 (fault-call:3 fault-nth:60): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:16 executing program 2 (fault-call:3 fault-nth:52): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 341.609561] FAULT_INJECTION: forcing a failure. [ 341.609561] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 341.621801] CPU: 1 PID: 15280 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 341.629105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.638490] Call Trace: [ 341.641135] dump_stack+0x185/0x1e0 [ 341.644809] should_fail+0x8a7/0xae0 [ 341.648576] __alloc_pages_nodemask+0x622/0x6320 [ 341.653389] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 341.658619] ? __msan_poison_alloca+0x183/0x220 [ 341.663346] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.668751] ? balance_callback+0x48/0x260 [ 341.673051] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 341.678548] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 341.683986] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 341.689488] alloc_pages_current+0x6b1/0x970 [ 341.693979] pipe_write+0x7f0/0x1d30 [ 341.697752] ? init_wait_entry+0x1a0/0x1a0 [ 341.702057] ? pipe_read+0x1330/0x1330 [ 341.706017] __vfs_write+0x87e/0xb90 [ 341.709799] vfs_write+0x467/0x8c0 [ 341.713417] __x64_sys_write+0x1cf/0x400 [ 341.717557] ? ksys_write+0x380/0x380 [ 341.721413] do_syscall_64+0x15b/0x230 [ 341.725350] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 341.730563] RIP: 0033:0x455ab9 [ 341.733763] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:16 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 341.753417] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 341.761172] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 341.768473] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 341.775771] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 341.783070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 341.790369] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003c [ 341.840467] FAULT_INJECTION: forcing a failure. [ 341.840467] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 341.852323] CPU: 1 PID: 15289 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 341.859601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.868961] Call Trace: [ 341.871565] dump_stack+0x185/0x1e0 [ 341.875209] should_fail+0x8a7/0xae0 [ 341.878953] __alloc_pages_nodemask+0x622/0x6320 [ 341.883733] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 341.889196] ? get_page_from_freelist+0xb01f/0xbb50 [ 341.894232] ? __save_stack_trace+0xa45/0xca0 [ 341.898765] ? memcg_kmem_charge+0x5f8/0xac0 [ 341.903192] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 341.908917] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 341.914903] ? __alloc_pages_nodemask+0x105b/0x6320 [ 341.919945] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 341.925331] ? kmsan_set_origin_inline+0x6b/0x120 [ 341.930198] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 341.935577] ? memcg_kmem_charge+0x79d/0xac0 [ 341.940006] kmsan_alloc_page+0x80/0xe0 [ 341.944000] __alloc_pages_nodemask+0x105b/0x6320 [ 341.948855] ? kmsan_set_origin_inline+0x6b/0x120 [ 341.953707] ? __msan_poison_alloca+0x183/0x220 [ 341.958388] ? perf_event_task_sched_in+0x257/0x2b0 [ 341.963423] ? kmsan_set_origin_inline+0x6b/0x120 [ 341.968284] ? __msan_poison_alloca+0x183/0x220 [ 341.972973] ? _cond_resched+0x4c/0x100 [ 341.976975] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 341.982372] alloc_pages_current+0x6b1/0x970 [ 341.986807] pipe_write+0x7f0/0x1d30 [ 341.990557] ? init_wait_entry+0x1a0/0x1a0 [ 341.994809] ? pipe_read+0x1330/0x1330 [ 341.998712] __vfs_write+0x87e/0xb90 [ 342.002467] vfs_write+0x467/0x8c0 [ 342.006038] __x64_sys_write+0x1cf/0x400 [ 342.010128] ? ksys_write+0x380/0x380 [ 342.013948] do_syscall_64+0x15b/0x230 [ 342.017862] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 342.023062] RIP: 0033:0x455ab9 14:04:17 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) 14:04:17 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:17 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 342.026253] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.045596] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 342.053317] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 342.060586] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 342.067850] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 342.075130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 342.082411] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000034 14:04:17 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) futex(&(0x7f0000000080)=0x1, 0x3, 0x2, &(0x7f0000000100)={r0, r1+10000000}, &(0x7f0000000140), 0x2) 14:04:17 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={r0, 0x0, 0x1, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:17 executing program 2 (fault-call:3 fault-nth:53): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:17 executing program 6 (fault-call:3 fault-nth:61): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:17 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x6, 0x2, [0x1c, 0xb2]}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e23, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0xbf2}}, 0x2, 0x9, 0x68e, 0x100000000, 0x80}, 0x98) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r2) 14:04:17 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:17 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) [ 342.565626] FAULT_INJECTION: forcing a failure. [ 342.565626] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 342.577483] CPU: 1 PID: 15328 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 342.584776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.594144] Call Trace: [ 342.596757] dump_stack+0x185/0x1e0 [ 342.600404] should_fail+0x8a7/0xae0 [ 342.604140] __alloc_pages_nodemask+0x622/0x6320 [ 342.608936] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 342.614403] ? get_page_from_freelist+0xb01f/0xbb50 [ 342.619437] ? __save_stack_trace+0xa45/0xca0 [ 342.623970] ? memcg_kmem_charge+0x5f8/0xac0 [ 342.628400] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 342.634127] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 342.640123] ? __alloc_pages_nodemask+0x105b/0x6320 [ 342.645167] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 342.650567] ? kmsan_set_origin_inline+0x6b/0x120 [ 342.655450] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 342.660856] ? memcg_kmem_charge+0x79d/0xac0 [ 342.665324] kmsan_alloc_page+0x80/0xe0 [ 342.669329] __alloc_pages_nodemask+0x105b/0x6320 [ 342.674214] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 342.679433] ? __msan_poison_alloca+0x183/0x220 [ 342.684136] ? kmsan_set_origin_inline+0x6b/0x120 [ 342.689004] ? __msan_poison_alloca+0x183/0x220 [ 342.693694] ? _cond_resched+0x4c/0x100 [ 342.697693] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 342.703090] alloc_pages_current+0x6b1/0x970 [ 342.707532] pipe_write+0x7f0/0x1d30 [ 342.711282] ? init_wait_entry+0x1a0/0x1a0 [ 342.715537] ? pipe_read+0x1330/0x1330 [ 342.719444] __vfs_write+0x87e/0xb90 [ 342.723199] vfs_write+0x467/0x8c0 [ 342.726773] __x64_sys_write+0x1cf/0x400 [ 342.730862] ? ksys_write+0x380/0x380 [ 342.734687] do_syscall_64+0x15b/0x230 [ 342.738604] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 342.743807] RIP: 0033:0x455ab9 [ 342.747002] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:17 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080)=0x1ff, 0x4) fcntl$setpipe(r1, 0x407, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) connect$bt_rfcomm(r1, &(0x7f0000000140)={0x1f, {0x66ab, 0x8, 0x5, 0x80, 0x0, 0xbdf}, 0x800}, 0xa) r3 = dup2(r1, r0) r4 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x800, 0x100000000, 0x0, 0x0, 0x0, 0x7, 0x200, 0x4, 0x10000, 0x7f, 0x7, 0x9, 0x9a, 0xc8fd, 0x1, 0xfffffffffffffff9, 0x3, 0x5, 0xfffffffffffffe00, 0x10000, 0x6e26e5, 0x9, 0x10001, 0x1, 0x3, 0x8, 0x5, 0x1, 0x1, 0x10001, 0x100000001, 0x1, 0x40, 0x1, 0x3, 0xffffffffffff0000, 0x0, 0x3f, 0x0, @perf_config_ext={0x7, 0xfffffffffffffffd}, 0x200, 0x1, 0xf701, 0x7, 0x1, 0x0, 0x3}, r4, 0xb, r3, 0x3) fcntl$dupfd(r3, 0x0, r3) ioctl$RTC_PIE_ON(r1, 0x7005) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000040)="aec10dfbb9971c2aa726b8ba3c83f274", 0x10) 14:04:17 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:17 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x0, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 342.766343] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 342.774074] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 342.781356] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 342.788637] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 342.795921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 342.803211] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003d [ 342.818228] FAULT_INJECTION: forcing a failure. [ 342.818228] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 342.830089] CPU: 0 PID: 15331 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 342.837381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.846765] Call Trace: [ 342.849376] dump_stack+0x185/0x1e0 [ 342.853029] should_fail+0x8a7/0xae0 [ 342.856783] __alloc_pages_nodemask+0x622/0x6320 [ 342.861586] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 342.867063] ? get_page_from_freelist+0xb01f/0xbb50 [ 342.872111] ? __save_stack_trace+0xa45/0xca0 [ 342.876659] ? memcg_kmem_charge+0x5f8/0xac0 [ 342.881109] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 342.886945] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 342.892954] ? __alloc_pages_nodemask+0x105b/0x6320 [ 342.898028] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 342.903447] ? kmsan_set_origin_inline+0x6b/0x120 [ 342.908331] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 342.913725] ? memcg_kmem_charge+0x79d/0xac0 14:04:17 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000000c0)=""/112) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) [ 342.918164] kmsan_alloc_page+0x80/0xe0 [ 342.922161] __alloc_pages_nodemask+0x105b/0x6320 [ 342.927019] ? kmsan_set_origin_inline+0x6b/0x120 [ 342.931880] ? __msan_poison_alloca+0x183/0x220 [ 342.936565] ? perf_event_task_sched_in+0x257/0x2b0 [ 342.941599] ? kmsan_set_origin_inline+0x6b/0x120 [ 342.946474] ? __msan_poison_alloca+0x183/0x220 [ 342.951166] ? _cond_resched+0x4c/0x100 [ 342.955176] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 342.960579] alloc_pages_current+0x6b1/0x970 [ 342.965016] pipe_write+0x7f0/0x1d30 [ 342.968769] ? init_wait_entry+0x1a0/0x1a0 [ 342.973046] ? pipe_read+0x1330/0x1330 [ 342.976969] __vfs_write+0x87e/0xb90 [ 342.980716] vfs_write+0x467/0x8c0 [ 342.984298] __x64_sys_write+0x1cf/0x400 [ 342.988384] ? ksys_write+0x380/0x380 [ 342.992200] do_syscall_64+0x15b/0x230 [ 342.996113] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 343.001311] RIP: 0033:0x455ab9 [ 343.004498] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.023880] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 343.031619] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 343.038899] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 343.046191] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 343.053488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 343.060770] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000035 14:04:18 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:18 executing program 6 (fault-call:3 fault-nth:62): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 343.308962] FAULT_INJECTION: forcing a failure. [ 343.308962] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 343.320823] CPU: 0 PID: 15352 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 343.328100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.337459] Call Trace: [ 343.340060] dump_stack+0x185/0x1e0 [ 343.343709] should_fail+0x8a7/0xae0 [ 343.347453] __alloc_pages_nodemask+0x622/0x6320 [ 343.352234] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:04:18 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 343.357691] ? get_page_from_freelist+0xb01f/0xbb50 [ 343.362720] ? __save_stack_trace+0xa45/0xca0 [ 343.367239] ? task_kmsan_context_state+0x6b/0x120 [ 343.372209] ? memcg_kmem_charge+0x5f8/0xac0 [ 343.376634] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 343.382454] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 343.388444] ? __alloc_pages_nodemask+0x105b/0x6320 [ 343.393481] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 343.398867] ? kmsan_set_origin_inline+0x6b/0x120 [ 343.403743] ? __msan_metadata_ptr_for_load_8+0x10/0x20 14:04:18 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$tun(r1, &(0x7f0000000040)={@val={0x0, 0x6000}, @val={0x1, 0x3, 0x0, 0x9, 0x2, 0x8}, @llc={@snap={0x1, 0xaa, "a827", '*pL', 0x86dd}}}, 0x17) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 343.409125] ? memcg_kmem_charge+0x79d/0xac0 [ 343.413554] kmsan_alloc_page+0x80/0xe0 [ 343.417547] __alloc_pages_nodemask+0x105b/0x6320 [ 343.422410] ? kmsan_set_origin_inline+0x6b/0x120 [ 343.427281] ? __msan_poison_alloca+0x183/0x220 [ 343.431966] ? perf_event_task_sched_in+0x257/0x2b0 [ 343.436999] ? kmsan_set_origin_inline+0x6b/0x120 [ 343.441859] ? __msan_poison_alloca+0x183/0x220 [ 343.446540] ? _cond_resched+0x4c/0x100 [ 343.450547] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 343.455939] alloc_pages_current+0x6b1/0x970 [ 343.460371] pipe_write+0x7f0/0x1d30 [ 343.464118] ? init_wait_entry+0x1a0/0x1a0 [ 343.468373] ? pipe_read+0x1330/0x1330 [ 343.472278] __vfs_write+0x87e/0xb90 [ 343.476021] vfs_write+0x467/0x8c0 [ 343.479587] __x64_sys_write+0x1cf/0x400 [ 343.483683] ? ksys_write+0x380/0x380 [ 343.487530] do_syscall_64+0x15b/0x230 [ 343.491488] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 343.496694] RIP: 0033:0x455ab9 [ 343.499894] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.519299] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 343.527034] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 343.534322] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 343.541605] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 343.548881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 14:04:18 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 343.556159] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003e 14:04:18 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x3000000000000, 0x0) 14:04:18 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x807fd) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:18 executing program 2 (fault-call:3 fault-nth:54): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:18 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:18 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:18 executing program 6 (fault-call:3 fault-nth:63): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 344.001938] FAULT_INJECTION: forcing a failure. [ 344.001938] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 344.014051] CPU: 0 PID: 15390 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 344.021355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.030740] Call Trace: [ 344.033382] dump_stack+0x185/0x1e0 [ 344.037076] should_fail+0x8a7/0xae0 [ 344.040838] __alloc_pages_nodemask+0x622/0x6320 [ 344.045636] ? kmsan_set_origin_inline+0x6b/0x120 [ 344.050520] ? __msan_poison_alloca+0x183/0x220 [ 344.055225] ? perf_event_task_sched_in+0x257/0x2b0 [ 344.060290] ? kmsan_set_origin_inline+0x6b/0x120 [ 344.065172] ? __msan_poison_alloca+0x183/0x220 [ 344.069876] ? _cond_resched+0x4c/0x100 [ 344.073894] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 344.079298] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 344.084797] alloc_pages_current+0x6b1/0x970 [ 344.089282] pipe_write+0x7f0/0x1d30 [ 344.093064] ? init_wait_entry+0x1a0/0x1a0 [ 344.097397] ? pipe_read+0x1330/0x1330 [ 344.101366] __vfs_write+0x87e/0xb90 [ 344.105155] vfs_write+0x467/0x8c0 [ 344.108771] __x64_sys_write+0x1cf/0x400 [ 344.112898] ? ksys_write+0x380/0x380 [ 344.116750] do_syscall_64+0x15b/0x230 [ 344.120683] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 344.125901] RIP: 0033:0x455ab9 [ 344.129104] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:19 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000000c0)=""/112) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) [ 344.148730] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 344.156489] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 344.163793] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 344.171092] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 344.178387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 344.185693] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003f 14:04:19 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:19 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) io_setup(0x2898, &(0x7f00000001c0)=0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/packet\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x8000) r5 = openat(0xffffffffffffffff, &(0x7f00000013c0)='./control/file0\x00', 0x484001, 0x20) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001480)='/dev/snapshot\x00', 0x100, 0x0) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001580)='/dev/vsock\x00', 0x10202, 0x0) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001600)='/dev/ppp\x00', 0x101800, 0x0) r10 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) io_submit(r0, 0x5, &(0x7f0000001780)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x6, 0x1f7, r1, &(0x7f0000000380)="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", 0x1000, 0x2, 0x0, 0x0, r2}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x1, 0x4, r3, &(0x7f00000002c0)="cb7b975185c25d1ac09a4cf5d73074a647b7d54cdaa3b148ed517e5bc415aa4632fe086c5f64e4bc93298e73a60f2614be0d265b028a8436707bea37", 0x3c, 0x0, 0x0, 0x1, r4}, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x2, 0x2, r5, &(0x7f0000001400)="374e522dedcdc4f3fdb561efbcc8ad4988cb6c366d396d1cf452b6faba8a29e6f870b442c67393b68cc46091e33b5c93544664d73acc636cf7502f52e8a4bae8562a379bab478dc7a1700e47991a865926f104197f7a3c5a5781d852cf60e6bc4716", 0x62, 0x74b9, 0x0, 0x0, r6}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x2, r7, &(0x7f0000001500)="4b4fb61904109903a64e7dac24781783ce9dd0a58407383cb221870f5f9dcbd3613b9fcb2aeeaf524f53ac29f4c5d19aff7a9bff68020d3d6fd5628588587c1435c39f959814e661e9756124869abb", 0x4f, 0x100000000, 0x0, 0x1, r8}, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x1, 0xffffffffffffff65, r9, &(0x7f0000001640)="ecac180d03324708d15204bd78c487bab3e92b28692bc46b6b4d080c1039e150625e342282de4e4d50b240abace248e491dd7e1e760d1a5c5fa279046f1ea5ad5f9931a8397c40ade9bc5920e70eb611a2441db0c9b08d888cacddbed0bbb0a8ee56a7185ce154de1b0795d48d0fca049ec9e6a4850c634ccf60fb09d43938d4e4ad3ae1dbb158ababc28fefdb16c506a0a60140933e6742e7ef79789684aa302734bd5e0a01e4fd7a0f008ad4b55db2d62f4d23d6d6add8269c737e7a1834417659c6fa471557917aad432e3deca8489f3895260ab30c6df1116a8e42d56cca", 0xe0, 0xd310, 0x0, 0x1, r10}]) r11 = userfaultfd(0x0) ioctl$UFFDIO_API(r11, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r12 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x173, 0x40) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r12, 0x40505330, &(0x7f0000000140)={{0x1f, 0x8}, {0x3, 0x13}, 0x4, 0x3, 0x2}) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r13 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r13, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r11) [ 344.323163] FAULT_INJECTION: forcing a failure. [ 344.323163] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 344.335232] CPU: 0 PID: 15399 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 344.342531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.351888] Call Trace: [ 344.354501] dump_stack+0x185/0x1e0 [ 344.358168] should_fail+0x8a7/0xae0 [ 344.361901] __alloc_pages_nodemask+0x622/0x6320 [ 344.366670] ? kmsan_set_origin_inline+0x6b/0x120 [ 344.371529] ? __msan_poison_alloca+0x183/0x220 [ 344.376209] ? perf_event_task_sched_in+0x257/0x2b0 [ 344.381233] ? kmsan_set_origin_inline+0x6b/0x120 [ 344.386085] ? __msan_poison_alloca+0x183/0x220 [ 344.390773] ? _cond_resched+0x4c/0x100 [ 344.394773] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 344.400162] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 344.405657] alloc_pages_current+0x6b1/0x970 [ 344.410088] pipe_write+0x7f0/0x1d30 [ 344.413825] ? init_wait_entry+0x1a0/0x1a0 [ 344.418095] ? pipe_read+0x1330/0x1330 [ 344.422009] __vfs_write+0x87e/0xb90 [ 344.425753] vfs_write+0x467/0x8c0 [ 344.429311] __x64_sys_write+0x1cf/0x400 [ 344.433382] ? ksys_write+0x380/0x380 [ 344.437204] do_syscall_64+0x15b/0x230 [ 344.441107] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 344.446301] RIP: 0033:0x455ab9 [ 344.449481] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:19 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 344.468917] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 344.476637] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 344.483906] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 344.491173] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 344.498444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 344.505714] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000036 14:04:19 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f0000000040), 0x8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rfkill\x00', 0x400, 0x0) sendmsg$alg(r2, &(0x7f0000003700)={0x0, 0x0, &(0x7f0000003640)=[{&(0x7f00000015c0)="c615ee6e41d8668f93165508693a9993b3826ca5ec21dc8acd68bec987db027e0c27f30e4900ee8fdff0c3e01886c6cc570df66f91636ce807d0c35e21db0733223bf1549ef4b738465c513aa3a27b4da491838d7c75851fb0ef26c6a36358ab68172e675d3d0a9b914d56ecafa3558027fe71b4b616380d36f3aa39296c77d28faeb4a6ccb2b6232eb6cbd952ebdac8fcc2fd28bad9a41e81b75128e232b1614febdde0f40795628414fde2bcd5d94830592bf97913b8155a783cee8442149ecb83e0b0e2ccd68c53f3da26cb5be45dc722757a7a1a9e2ab3ccf444c81b0b524c21230f2ca781da15d1c7cfc693d34d89bd5483f2250018d9d71ff0680ce7d29437bd2983a9b18c2f4f8043881cbc2441a26f37c6a88a9ae7051af718465f7246f3d6615989151193d42577b6ffb4edef0ec2c8dbd8e85e38de14b0643f8ce480b5cde319ac24132a919067064cb117d09eedf9940cd1e9792bc15bcfda700059fc6f8a65faf9777634427b63af66bf219dba338222408fe4dbd27693dedbedb08a5b7ec1afacf1ad4236007922800f3aeec763729b7dc3f59ba3781820e74ced7f2ba162bea0f0c12bf2d77ee27cd7a660ca9d047f6911fb9b8438b4be8eb069396809934f9218327ab5f889527f24fdf1a5b659580d480e2b591cef95da29e3589d69bb4fc1bfa911d9322fa1c6de9a492f24d66cf1220a31a5e53017d2e9633142d008be9b3784999cf6c536ad073b2eaf7b192bd1a155747af09090a1960f1e93633599b4dfc696977b9c3a4d7ac06702dac14696a4f1769c5329fdf7fa44abf20cc74e1fc5ae26d113d1ba2ecf3c24c3c7f159c9ed7b33439338fcfe772cbf0d2ed1fb9b6400cf342b95696e2482c6a25bac4184c6df35fdc956652e73e615ac043371b1207fa8bbeafc5aab33faa6faece12d98b3c171a157db8156a34a2c4266572ad3c41f47d5461b946e8bde700da716e8dd51dfe8f1963ad68ee4efd5c828da0e1afb5f528834db093eb6afdaee1f1fcb5cc80cddb3de6401240fd2b2977269107c3cfeda04ab08c95ed7ece08157425f6e4276fb3abc65e10216c9772a232b6bcf7637081462bb0a6002428f2abce3c0d3f6afc1872038d9d4788b1bde9148efb82494309b454c74ee69b884980e7dd3c367acbbdb5f97a78d9a9be4762e814221ac75b94663e6fc4a81b8982fe532c867f89cce163920b88cc206fa4e4671a2e5f83cfc76ccb0f52040199cf6d3d65c9583691bc74c71f5dcb4175827fce5c153189a04acb4c90b531d81a8dd87dc1bcfeaff9458202a883e2be9c78a13980541c24551d9a8a48c9826423825d77229134df0e0a2a5208b94c7884efa72a20f5f538522635445a095af82aa084a4a1b9effd631c91c12b7f6ee410a59afcfccbc0a0b42dd2c01e4105ffd9a150a0ee6d371d7a1531cccef164b561782e415e3502f6e69d2b89ee1b8a97794152ea3957ccb11bb40c8204abac93cab98be0b76d9067065b91173b8fed16930d238ea5638c74fed4c8adb279ed1c255ee545e3e936d7985ed0b015d8627e4ca084d9b72652cdd1b9f777ab9e5aeb3fa6938a3ceffec9238c4db6fcdbfc7f1b576687242433a6db6ec065c518b305eadff2b6d8b3b5c1900966386bf6f9c1c1a32e9437b66458f3757d5b1c10598c974b5a5d6fce07e10d0a729db58587b50ac8f7b6c61f3bdf589e512a4a203c5e64f66f7d20e8e141c240c380e8eaf168e2baaa6b326d63f8983ecbaba74137cc42eae3cbcfb3b1da7921cc576bdeaf1953bf63add67807e7cad9ab8ae57885b8c40006d35e2abf2b8ace86eb13a7bf4bc63bf98ccf33430185fff0c8f2cc5a77e3fbcf03dbe91db1d9aef1cd15f006aa42bcab889683ee5e324431e1297c8d18401a33b49669237a1549955543afe8ab243ad30b4cc810968b44153ec0373509e0eee33b86ae89c35f27d5a81dabc283ddeb74df976c4afad1a58fdb544454ae3d047be582a67d86a08fc397b4bba44b4f7bc7dfe30f2e717f5602d0b145a0b819349b42b6427dbfed59a3ed2fc42be30f959e76d3ef57d4d2609c7e2681b5e769ff3011e515a2fb96c559507c4e21d62dc233d536791f72fe3707d2eea43c66fb6278f68073e70433538b6c50d919524a2b58b588be63bb2ffb2464eb5e9d3b91f4e8f401f29c5d055553e44467eca93b2177397482f9bd35b5108f945020342b7d661a82b47ba527cb445ad25db4852878a070bdbbd670de6b602d3c84d4274fddb9a8446724928c051440323f7c66b9a0bb1221cd769d9f57165456a8655a23428c31404fcf0733a6ddf34a5adeae4b43c92c93535fa5776ba9ea43ca4f8d4d69cc2c3d27d3514672bccb6b416ae7bb509311590f1b7c5b792d860191c7c9aa24c1abc929e6c6d0500628a913b3ed589e1e427919105f69d4c15f7b8aaf6b99a31fcb56d2a87b512027994a22f0c14ec076543628cc7e6a572b2e793f441cb610790c88ec4abf8c547f73d9d8660e1a29f6a0ace4ccda89b0be977cba55b09da478c87390af60b59298d9fa6313a80499bbbf133dc1f4fb668f9e1480c641afaa9e981255d4cbfdf946097a95c902eec5d8a877e6ad03d3e366eb9c1a1a07600c3460347f964fa2aac2dbfbebae37d6b38b80104c5eff6c379ff9c8b7e83066c074093cd0f9016c16322a0c05f42b861cdf4b64835144f7247fc0cfa4c2b2aa1a479505a10539447928cfda5a648239f8e262a01b8605a58853e637e869aaf1ef05298a7c7920b5f0de7135ea4cec047d300e63e9b0720ae58ec66fee1da4cc4bc994f102dc6f774f8cdf0b3e1e8d470e72b737a1cd7a20e0fb8bedaed12dc5bab5f8fab3af7cfe3dfeefda1d7a93987df06c1bb75dba059f3530b97a808f32a57cbcf31aa4aa342dadde6ba89d65462c1b5ca7cb6571c15210cf5ba05a7d9734ab90d4b63958ca44b6fbec4666e403d38fc51121d8c30305dc34adb70cb47567cc691c6efae0675f5fc7b4b56c6432c8c1bd2e982ab64ac71fbe3a9917403ccfb78d72bca96444c02be461a5512351ddf9e89c368e2ec68ca5d67a3c4a2f98fc37620fe02879003b8f422e8429eb3b4a8af550dc21e3a4b4966554be71b45fe39136d9d4be121ab9d88615b45f234bbd0136e6f10a0887cc5525299b34602e80ae705e22e0f418d8e8d9113e9c68e895686cf850b853db1129d0a94acb5be7033aafdf0b0303ecddac66cd48868c7e58dc0f0816200af62bb3f07191e714c85a19c985f27e3e0a0bb7ee547d67e91d40f7e5d6037a1e8ef57d29691b04270865f7722f4046b691f8eb6ae25c61994e1d88e1b9912493bfe563302b30531d048ce018b15be155277279a60d13b516de6c08695dd94984a115f6cc821a660a08ab81355dcdf8e058e3a10a214e312bd9f87ecacb44a194cac45e306537f700ddf0760c3e70f28c281c86106c334f38f57194bf58bce40c6c77271b6c488b99f76fbabf64e72bc48e67909240f2f65877db73a18328c42a49aaa3914dfdf4b5e3cfc64e17d002661eb9f6513b1dc6ca8d0ddc1303af67e82898a9b88de3f13673203a6e0e0d9a0cdcf3d1042b0ddd0554c975eacb6510a88c40c3e45f36f3787b8382568b7146e5fbc49ce9dabe8dfb9208587da34674891398d227cc72123424e6e5f8f8a272e16e0bd4886777985b358b1d2f13fcca77979d74d909b38a3753f4168395691e22d1aec54d4da5c3eb9b04e90bc01f05e6f45cb333209d92e7cc4b28fb8402837da25ef452751f7fbc3623f83900b33fca3269a30caa7bbbd85085994380f4ad6be981c03a86dc1bfae45dc5873e0733f581f44123c778f7b490b1eab11e43ad5b6bbc3edbc0d8acbe52b92cd9479f9d769b9e15cb2b683323182f68f66e2c8d18ea758f1546af215693ddb86274a60ec8f2b490709d754d6fb6c46fdbf33c187813a7ead83cb7df2c710e158b4a2fe13ec1636935b2acb23cf8f6004fbf89772b5254d6d998ae5a4f358cca69578579ceb240f9b6850f2ebc8c3088a6a0843a8d620c71f35658dafac98d43ee49b1064e0297dc7dc322d37f5e603afc3a16f0b75543f442118040089030031e99b564045e859f46ef34ba9c45a4ce7f0e4e4d1ff2bc3b07a08876a038b430ff0efe1112732f785d6d894688222d9627795769c1b32dd495691c04f9e5e96742e4b5985d514cb1fb6ae9f92087c46676d32f6c5b780baa4e377c8fd620a92b389a67d85e615288b0f636d2b569e3fe7a97407ff65a4ca837095c841d2b96fa243b0fc147ed48a5f44d3dafff4709e9f6d3672226e578c50cb3dcbe32d15b73b898e74884ef4ab34710c841d69c3bbd8a7275e47f965205aa28a8f53a186ca7836883b3c0c605f614d79d643e1efbcad24969fb8878a8a224d44bd9bbba58539c46086c53260bb4ffd7478f5e1b03fb41ebe3bde341e39c078b90382848c44b06614acf8cf8192853790508cb9c12868e8fd0ab5fd8eb7f7a056d204c949e2261b572d760a8c4d3f779b2ccab872ead39a181ef7f1e57b7efc505d47c034f5caa1433cf015f27f6de48f34368fe0c6cfcac02d86a0c2699ff913ec5842560d03695d90660b82b3ecaebda644c115994af3b1de57aad55b4fdd065e318d9621d0f2dc70ab2500d4942b2c534e492b4da7b18d87baac9ad733cc06938845d0c81280e075ca42b269c9c75ab914ef4cc0c920c3632a4412e26842fcd76a48fc905052a1fec701dbc2d21126bdc1d59716305bff59cae36552b3cb3f8e3f81bc75e3f785822ee3d09193faa11ab80801a3456c86e80800b00d3f1b7b674005c309f3561dd127f46ab195ea44ddd212e4913fa8fe86611e1cee2c0f1c3443e48567bee13f99f5d90c2a1f4893419ac8d1d44d2f5f000397d2ac83a5054bd8628db0cf6eab7cff206fad57b12a87522ec4e3b86c114eb1445537a086e98fbd399012b06b2001726ffab7d79345bcb0b38f3efde84d2e9092ce332ef53527aad005248a3ad5c3058aa25b3228726fe05467f8996569798bdd03492b26eb7cf1acdfa07cf30b135dcf78ba8de16b989b058c38354577a62d4bfc574d418f571c1e810049709d484a406c9ef1cbb0282e0988e439c459a0646bcb5f3368d967907a453a59e15814d89e6ec49687a63f82b0205ce21a69a7f18670205dd1c58548cebf3d2cd4e10f36fcabe57f4b9f98d103c09cb01bb564cb8c15c5541f7a977e59dc5dc8c8e43a93c27d7e3ca5e6601633a0328c5481f82180642f7864052efc404e0a99aeb62432645321a9f81efa2c89a242cf8da989b11d5a2f2611b4ad0bdf72744acc18091e32d7da6e31d775497e62f8faad75d6fe0126f1572d664a85fa96b6595416c3391de00eabc921ffe01dbad8bfa259cdb4eb0520578285ba2f14493199dda25a8f7e5c712eba5a220bd273af6b3c2091b3203818b4a0cec3dbf2128fa193d6deb1affee8050ae8d41931b8ccf4fb4ef5f3209bbc7cf72ae1b5c42b58d7163404c664405f8a5fbb27b0bbc8edece76812c17275a1919c1a2e84527833dcc38f34e9a3ef3ae8b78bda75948e895def380b5349de14277b230ae1cd9410ee51197d65a64ee7d67add3c6d166f0cb8c721ae1ef914314a7c3326e1d2a8842a11d7b0dcf211f7291a7fbe37fee394771f96bf25e372923c255f5ffff0929699ec5ed07e1ccfef1a6aee86bff070b21d48537a283b2104ea8b661b59cee621da3a476baf0b2b463aea6f001357cee3e6b954195b0bc963b4b015fa626ecd89466a1e58ee23985dd18209d8e8", 0x1000}, {&(0x7f00000025c0)="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", 0x1000}, {&(0x7f0000000480)="ad08ac36248e6fa4b7df2f993dadd35a435941d53deaca9c875aa95b8137d866e7e65bd56c6da9f0682fddc3a53ab66338295e718d4ea275250e40ac1e47d207895ea5737a41f27eec11f97a23a3e092f85ec7e385d699be0754d136b9c2461d59bbed3931487936bb1a2d6dfbbd3d", 0x6f}, {&(0x7f0000000500)="184cf66761a49273e5d72119dab1154a070b85682004c56d3a750dbda412697137930119a24e5423964a186b10fe7aeafcb97814c1577a80c220cc1873619e1d68648d1b561ab9ce91d82c5f1ac0bd960807d2245402087e07e7a1eb10b7ada92b746f438238", 0x66}, {&(0x7f00000035c0)="bf1ebf47973b5ecc81f2c76143162778edd2ac5156bcf8f06d2347a4ad405f17a734588de4a0af3421ed712adf2430fee1dc092d63f65e01ad04b8acfe61f71ba52e508dd2fe885a992480cda5a4c398555925ef895a442b076d034657950c318e71ecc31b485756c69da345b1e769e0d5fa2a4a1af4aa6a63", 0x79}], 0x5, &(0x7f00000036c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x80000000}], 0x30, 0x40040}, 0x1) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0xfffffffffffffffd) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x200, 0x2000) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x2) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000080)={{0x2, 0x4e22, @multicast1=0xe0000001}, {0x307}, 0x10, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, 'bcsh0\x00'}) 14:04:19 executing program 6 (fault-call:3 fault-nth:64): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:19 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 344.757045] FAULT_INJECTION: forcing a failure. [ 344.757045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 344.768917] CPU: 1 PID: 15416 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 344.776207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.785575] Call Trace: [ 344.788183] dump_stack+0x185/0x1e0 [ 344.791824] should_fail+0x8a7/0xae0 [ 344.795560] __alloc_pages_nodemask+0x622/0x6320 [ 344.800340] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:04:19 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3f, 0xc0) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x20000) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000100)=r0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) fcntl$getown(r2, 0x9) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000000)={0x18}, 0x18) dup2(r2, r1) [ 344.805808] ? get_page_from_freelist+0xb01f/0xbb50 [ 344.810837] ? __save_stack_trace+0xa45/0xca0 [ 344.815350] ? task_kmsan_context_state+0x6b/0x120 [ 344.820316] ? memcg_kmem_charge+0x5f8/0xac0 [ 344.824745] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 344.830469] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 344.836456] ? __alloc_pages_nodemask+0x105b/0x6320 [ 344.841487] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 344.846872] ? kmsan_set_origin_inline+0x6b/0x120 [ 344.851734] ? __msan_metadata_ptr_for_load_8+0x10/0x20 14:04:19 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 344.857125] ? memcg_kmem_charge+0x79d/0xac0 [ 344.861550] kmsan_alloc_page+0x80/0xe0 [ 344.865546] __alloc_pages_nodemask+0x105b/0x6320 [ 344.870401] ? kmsan_set_origin_inline+0x6b/0x120 [ 344.875255] ? __msan_poison_alloca+0x183/0x220 [ 344.879956] ? perf_event_task_sched_in+0x257/0x2b0 [ 344.884990] ? kmsan_set_origin_inline+0x6b/0x120 [ 344.889844] ? __msan_poison_alloca+0x183/0x220 [ 344.894527] ? _cond_resched+0x4c/0x100 [ 344.898523] ? kmsan_internal_unpoison_shadow+0x83/0xe0 14:04:19 executing program 2 (fault-call:3 fault-nth:55): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 344.903917] alloc_pages_current+0x6b1/0x970 [ 344.908352] pipe_write+0x7f0/0x1d30 [ 344.912102] ? init_wait_entry+0x1a0/0x1a0 [ 344.916356] ? pipe_read+0x1330/0x1330 [ 344.920259] __vfs_write+0x87e/0xb90 [ 344.924004] vfs_write+0x467/0x8c0 [ 344.927572] __x64_sys_write+0x1cf/0x400 [ 344.931654] ? ksys_write+0x380/0x380 [ 344.935467] do_syscall_64+0x15b/0x230 [ 344.939387] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 344.944584] RIP: 0033:0x455ab9 [ 344.947770] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.967129] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 344.974866] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 344.982152] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 344.989441] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 344.996719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 345.003997] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000040 [ 345.006987] FAULT_INJECTION: forcing a failure. [ 345.006987] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 345.023078] CPU: 0 PID: 15427 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 345.030360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.039730] Call Trace: [ 345.042331] dump_stack+0x185/0x1e0 [ 345.045976] ? task_kmsan_context_state+0x6b/0x120 [ 345.050917] should_fail+0x8a7/0xae0 [ 345.054660] __alloc_pages_nodemask+0x622/0x6320 [ 345.059447] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 345.064915] ? get_page_from_freelist+0xb01f/0xbb50 [ 345.069946] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 345.075323] ? pick_next_entity+0x1a71/0x1ac0 [ 345.079858] ? memcg_kmem_charge+0x5f8/0xac0 [ 345.084287] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 345.090018] ? __perf_event_task_sched_in+0x74/0xab0 [ 345.095145] ? kmsan_set_origin_inline+0x6b/0x120 [ 345.100009] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 345.105383] ? memcg_kmem_charge+0x79d/0xac0 [ 345.109806] kmsan_alloc_page+0x80/0xe0 [ 345.113797] __alloc_pages_nodemask+0x105b/0x6320 [ 345.118653] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 345.123853] ? __msan_poison_alloca+0x183/0x220 [ 345.128551] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 345.133926] ? balance_callback+0x48/0x260 [ 345.138171] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 345.143631] ? apic_timer_interrupt+0xa/0x20 [ 345.148052] ? check_preempt_wakeup+0x1590/0x1590 [ 345.152928] alloc_pages_current+0x6b1/0x970 [ 345.157355] pipe_write+0x7f0/0x1d30 [ 345.161100] ? init_wait_entry+0x1a0/0x1a0 [ 345.165348] ? pipe_read+0x1330/0x1330 [ 345.169244] __vfs_write+0x87e/0xb90 [ 345.172986] vfs_write+0x467/0x8c0 [ 345.176550] __x64_sys_write+0x1cf/0x400 [ 345.180631] ? ksys_write+0x380/0x380 [ 345.184447] do_syscall_64+0x15b/0x230 [ 345.188354] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 345.193546] RIP: 0033:0x455ab9 [ 345.196731] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.216077] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 345.223796] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 345.231072] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 345.238350] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 345.245624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 345.252901] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000037 14:04:20 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)={0x60002006}) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0xffffffff) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000080)=0x10f, 0x8) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000240)={0x81, 0x5}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x18) 14:04:20 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:20 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:20 executing program 2 (fault-call:3 fault-nth:56): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:20 executing program 6 (fault-call:3 fault-nth:65): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 345.526359] FAULT_INJECTION: forcing a failure. [ 345.526359] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 345.538225] CPU: 0 PID: 15448 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 345.545513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.554876] Call Trace: [ 345.557484] dump_stack+0x185/0x1e0 [ 345.561127] should_fail+0x8a7/0xae0 [ 345.564860] __alloc_pages_nodemask+0x622/0x6320 [ 345.569642] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 345.575726] ? get_page_from_freelist+0xb01f/0xbb50 [ 345.580765] ? __save_stack_trace+0xa45/0xca0 [ 345.585275] ? task_kmsan_context_state+0x6b/0x120 [ 345.590243] ? memcg_kmem_charge+0x5f8/0xac0 [ 345.594670] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 345.600505] ? kmsan_set_origin_inline+0x6b/0x120 [ 345.605379] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 345.610757] ? memcg_kmem_charge+0x79d/0xac0 [ 345.615186] kmsan_alloc_page+0x80/0xe0 [ 345.619178] __alloc_pages_nodemask+0x105b/0x6320 [ 345.624035] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 345.629239] ? __msan_poison_alloca+0x183/0x220 [ 345.633956] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 345.639330] ? balance_callback+0x48/0x260 [ 345.643586] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 345.649055] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 345.654460] alloc_pages_current+0x6b1/0x970 [ 345.658896] pipe_write+0x7f0/0x1d30 [ 345.662645] ? init_wait_entry+0x1a0/0x1a0 [ 345.666896] ? pipe_read+0x1330/0x1330 [ 345.670797] __vfs_write+0x87e/0xb90 14:04:20 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 345.674549] vfs_write+0x467/0x8c0 [ 345.678119] __x64_sys_write+0x1cf/0x400 [ 345.682201] ? ksys_write+0x380/0x380 [ 345.686007] do_syscall_64+0x15b/0x230 [ 345.689913] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 345.695105] RIP: 0033:0x455ab9 [ 345.698294] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 345.718882] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 345.726613] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 345.733900] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 345.741183] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 345.748463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 345.755780] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000041 [ 345.784317] FAULT_INJECTION: forcing a failure. [ 345.784317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 345.796165] CPU: 0 PID: 15457 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 345.803451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.812806] Call Trace: [ 345.815408] dump_stack+0x185/0x1e0 [ 345.819062] should_fail+0x8a7/0xae0 [ 345.822799] __alloc_pages_nodemask+0x622/0x6320 [ 345.827589] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 345.833053] ? get_page_from_freelist+0xb01f/0xbb50 [ 345.838089] ? __save_stack_trace+0xa45/0xca0 [ 345.842625] ? memcg_kmem_charge+0x5f8/0xac0 [ 345.847052] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 345.852866] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 345.858849] ? __alloc_pages_nodemask+0x105b/0x6320 [ 345.863882] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 345.869265] ? kmsan_set_origin_inline+0x6b/0x120 [ 345.874138] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 345.879520] ? memcg_kmem_charge+0x79d/0xac0 [ 345.883947] kmsan_alloc_page+0x80/0xe0 [ 345.887940] __alloc_pages_nodemask+0x105b/0x6320 [ 345.892792] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 345.897994] ? __msan_poison_alloca+0x183/0x220 [ 345.902681] ? kmsan_set_origin_inline+0x6b/0x120 [ 345.907537] ? __msan_poison_alloca+0x183/0x220 [ 345.912218] ? _cond_resched+0x4c/0x100 [ 345.916211] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 345.921600] alloc_pages_current+0x6b1/0x970 [ 345.926030] pipe_write+0x7f0/0x1d30 [ 345.929776] ? init_wait_entry+0x1a0/0x1a0 [ 345.934028] ? pipe_read+0x1330/0x1330 [ 345.937930] __vfs_write+0x87e/0xb90 [ 345.941678] vfs_write+0x467/0x8c0 [ 345.945244] __x64_sys_write+0x1cf/0x400 [ 345.949326] ? ksys_write+0x380/0x380 [ 345.953132] do_syscall_64+0x15b/0x230 [ 345.957038] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 345.962235] RIP: 0033:0x455ab9 [ 345.965431] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:21 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x100) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:21 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) 14:04:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:21 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x101000, 0x0) faccessat(r1, &(0x7f0000000140)='./control\x00', 0x2, 0x700) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r1) 14:04:21 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x6}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x8200) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 345.984768] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 345.992499] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 345.999788] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 346.007051] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 346.014320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 346.021585] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000038 14:04:21 executing program 6 (fault-call:3 fault-nth:66): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:21 executing program 2 (fault-call:3 fault-nth:57): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:21 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 346.316504] FAULT_INJECTION: forcing a failure. [ 346.316504] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 346.328683] CPU: 1 PID: 15479 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 346.335986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.345360] Call Trace: [ 346.348002] dump_stack+0x185/0x1e0 [ 346.351678] should_fail+0x8a7/0xae0 [ 346.355445] __alloc_pages_nodemask+0x622/0x6320 [ 346.360253] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 346.365482] ? __msan_poison_alloca+0x183/0x220 [ 346.370205] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 346.375399] FAULT_INJECTION: forcing a failure. [ 346.375399] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 346.375622] ? balance_callback+0x48/0x260 [ 346.391659] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 346.397139] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 346.402528] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 346.408617] alloc_pages_current+0x6b1/0x970 [ 346.413091] pipe_write+0x7f0/0x1d30 [ 346.416841] ? init_wait_entry+0x1a0/0x1a0 [ 346.421119] ? pipe_read+0x1330/0x1330 [ 346.425041] __vfs_write+0x87e/0xb90 [ 346.428791] vfs_write+0x467/0x8c0 [ 346.432375] __x64_sys_write+0x1cf/0x400 [ 346.436476] ? ksys_write+0x380/0x380 [ 346.440316] do_syscall_64+0x15b/0x230 [ 346.444223] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 346.449415] RIP: 0033:0x455ab9 [ 346.452600] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.472082] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 346.479803] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 346.487074] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 346.494348] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 346.501621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 346.508897] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000042 14:04:21 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) [ 346.516199] CPU: 0 PID: 15482 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 346.523500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.532875] Call Trace: [ 346.535510] dump_stack+0x185/0x1e0 [ 346.539206] should_fail+0x8a7/0xae0 [ 346.542969] __alloc_pages_nodemask+0x622/0x6320 [ 346.547754] ? kmsan_set_origin_inline+0x6b/0x120 [ 346.552632] ? __msan_poison_alloca+0x183/0x220 [ 346.557333] ? perf_event_task_sched_in+0x257/0x2b0 [ 346.562403] ? kmsan_set_origin_inline+0x6b/0x120 [ 346.567286] ? __msan_poison_alloca+0x183/0x220 [ 346.571987] ? _cond_resched+0x4c/0x100 [ 346.576020] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 346.581453] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 346.586946] alloc_pages_current+0x6b1/0x970 [ 346.591393] pipe_write+0x7f0/0x1d30 [ 346.595160] ? init_wait_entry+0x1a0/0x1a0 [ 346.599457] ? pipe_read+0x1330/0x1330 [ 346.603401] __vfs_write+0x87e/0xb90 [ 346.607177] vfs_write+0x467/0x8c0 [ 346.610789] __x64_sys_write+0x1cf/0x400 [ 346.614922] ? ksys_write+0x380/0x380 [ 346.618770] do_syscall_64+0x15b/0x230 [ 346.622701] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 346.627915] RIP: 0033:0x455ab9 [ 346.631113] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 346.650728] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 346.658469] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 14:04:21 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) sendmsg$unix(r0, &(0x7f0000000280)={&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000200)=[{&(0x7f00000000c0)="38c1ea561ae2c78b4bc9663f827c3eaffc6b571dffd7a2c543eee92876b31c88e86e0b8e72c7a1d52e4549f8c8d36b5ce6b982bd11ec1a7839325be99c156cb840a19e03e3c009fe2eb257461c35eed8ca4a46895b2f088b7c58df8d9715c18ae04be69980a1d11233e9acdba2a1cae656fe713ca79261cbb1ba236d95a9", 0x7e}, {&(0x7f0000000180)="144b5d803c3a05ca0e77ed5347fa83f45d6abca59f058b4402786e76266dee2120f9e36764971eef04a215", 0x2b}, {&(0x7f0000000380)="ac1884d646825fc5bdd6958a356ca5f241c711fb6e993bc70b5f5d2f61f9b2f2eb006e5f2f0ba87ef586faf365229131e32206e2fcc70ce58840af562ee39f0e83bb42344bb91aa76f2163d2198bb49bd98a4fb6cf47db8abdf34a809d64032bfa30dfa3b88e90fbdd7b1de570b9f09ac7a7461c00b1aeb30c09313630b10570ce09e3258cb4bd75dca776cf588f63ec723ecf15810fb5ab8408586bb8d1d7ebc20d5865acf1e4", 0xa7}, {&(0x7f00000001c0)="6277e3365d6c9ce5d684c37aa12ec3f09533cf6a17", 0x15}], 0x4, 0x0, 0x0, 0x20000000}, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f00000005c0)={0x15, 0x110, 0xfa00, {r2, 0x7, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x8c8, @loopback={0x0, 0x1}, 0x8}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x118) fcntl$setpipe(r1, 0x407, 0xfffffffffffffffc) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 346.665765] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 346.673059] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 346.680351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 346.687643] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000039 14:04:21 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)={0x18}) 14:04:21 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:21 executing program 6 (fault-call:3 fault-nth:67): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:21 executing program 2 (fault-call:3 fault-nth:58): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:21 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) fchdir(r1) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={r2, 0x1, 0x20, 0x8001, 0x7}, &(0x7f0000000100)=0x18) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000180)=0x2) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000001c0)={{0xe2, 0x3}, {0xfa, 0xca12}, 0x0, 0x1, 0xfff}) 14:04:21 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) close(r0) [ 346.994303] FAULT_INJECTION: forcing a failure. [ 346.994303] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.006240] CPU: 0 PID: 15505 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 347.013520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.022876] Call Trace: [ 347.025550] dump_stack+0x185/0x1e0 [ 347.029201] should_fail+0x8a7/0xae0 [ 347.032949] __alloc_pages_nodemask+0x622/0x6320 [ 347.037732] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 347.043200] ? get_page_from_freelist+0xb01f/0xbb50 [ 347.048235] ? __save_stack_trace+0xa45/0xca0 [ 347.052776] ? memcg_kmem_charge+0x5f8/0xac0 [ 347.057206] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 347.062930] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 347.068917] ? __alloc_pages_nodemask+0x105b/0x6320 [ 347.073959] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.079347] ? kmsan_set_origin_inline+0x6b/0x120 [ 347.084216] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 347.089598] ? memcg_kmem_charge+0x79d/0xac0 [ 347.094027] kmsan_alloc_page+0x80/0xe0 [ 347.098024] __alloc_pages_nodemask+0x105b/0x6320 [ 347.102891] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 347.108096] ? __msan_poison_alloca+0x183/0x220 [ 347.112782] ? kmsan_set_origin_inline+0x6b/0x120 [ 347.117637] ? __msan_poison_alloca+0x183/0x220 [ 347.122310] ? _cond_resched+0x4c/0x100 [ 347.126298] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 347.131688] alloc_pages_current+0x6b1/0x970 [ 347.136115] pipe_write+0x7f0/0x1d30 [ 347.139852] ? init_wait_entry+0x1a0/0x1a0 [ 347.144105] ? pipe_read+0x1330/0x1330 [ 347.148014] __vfs_write+0x87e/0xb90 [ 347.151759] vfs_write+0x467/0x8c0 [ 347.155325] __x64_sys_write+0x1cf/0x400 [ 347.159411] ? ksys_write+0x380/0x380 [ 347.163228] do_syscall_64+0x15b/0x230 [ 347.167138] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.172340] RIP: 0033:0x455ab9 [ 347.175528] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:22 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r1, 0x1) [ 347.194862] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 347.202585] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 347.209859] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 347.217135] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 347.224421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 347.231704] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000043 [ 347.247290] FAULT_INJECTION: forcing a failure. [ 347.247290] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.259180] CPU: 1 PID: 15515 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 347.259189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.259194] Call Trace: [ 347.259235] dump_stack+0x185/0x1e0 [ 347.282090] should_fail+0x8a7/0xae0 [ 347.285836] __alloc_pages_nodemask+0x622/0x6320 [ 347.290634] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 347.296104] ? get_page_from_freelist+0xb01f/0xbb50 [ 347.301127] ? __save_stack_trace+0xa45/0xca0 [ 347.305657] ? memcg_kmem_charge+0x5f8/0xac0 [ 347.310089] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 347.315819] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 347.321806] ? __alloc_pages_nodemask+0x105b/0x6320 [ 347.326834] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.332222] ? kmsan_set_origin_inline+0x6b/0x120 [ 347.337097] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 347.342490] ? memcg_kmem_charge+0x79d/0xac0 [ 347.346920] kmsan_alloc_page+0x80/0xe0 [ 347.350908] __alloc_pages_nodemask+0x105b/0x6320 [ 347.355766] ? kmsan_set_origin_inline+0x6b/0x120 [ 347.360618] ? __msan_poison_alloca+0x183/0x220 [ 347.365307] ? perf_event_task_sched_in+0x257/0x2b0 [ 347.370349] ? kmsan_set_origin_inline+0x6b/0x120 [ 347.375201] ? __msan_poison_alloca+0x183/0x220 [ 347.379864] ? _cond_resched+0x4c/0x100 [ 347.383850] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 347.389240] alloc_pages_current+0x6b1/0x970 [ 347.393671] pipe_write+0x7f0/0x1d30 14:04:22 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00') close(r0) [ 347.397415] ? init_wait_entry+0x1a0/0x1a0 [ 347.401670] ? pipe_read+0x1330/0x1330 [ 347.405573] __vfs_write+0x87e/0xb90 [ 347.409312] vfs_write+0x467/0x8c0 [ 347.412870] __x64_sys_write+0x1cf/0x400 [ 347.416951] ? ksys_write+0x380/0x380 [ 347.420761] do_syscall_64+0x15b/0x230 [ 347.424670] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.429866] RIP: 0033:0x455ab9 [ 347.433051] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 347.452390] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 347.460117] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 347.467404] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 347.474685] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 347.481994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 347.489279] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003a 14:04:22 executing program 2 (fault-call:3 fault-nth:59): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:22 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:22 executing program 6 (fault-call:3 fault-nth:68): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:22 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:22 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r1, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) [ 347.803969] FAULT_INJECTION: forcing a failure. [ 347.803969] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.815835] CPU: 1 PID: 15540 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 347.823122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.832490] Call Trace: [ 347.835102] dump_stack+0x185/0x1e0 [ 347.838754] should_fail+0x8a7/0xae0 [ 347.842499] __alloc_pages_nodemask+0x622/0x6320 [ 347.847291] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 347.852761] ? get_page_from_freelist+0xb01f/0xbb50 [ 347.857798] ? __save_stack_trace+0xa45/0xca0 [ 347.862337] ? memcg_kmem_charge+0x5f8/0xac0 [ 347.866766] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 347.872586] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 347.878576] ? __alloc_pages_nodemask+0x105b/0x6320 [ 347.883618] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.889009] ? kmsan_set_origin_inline+0x6b/0x120 [ 347.893882] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 347.899268] ? memcg_kmem_charge+0x79d/0xac0 [ 347.903698] kmsan_alloc_page+0x80/0xe0 [ 347.907690] __alloc_pages_nodemask+0x105b/0x6320 [ 347.912548] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 347.917751] ? __msan_poison_alloca+0x183/0x220 [ 347.922489] ? kmsan_set_origin_inline+0x6b/0x120 [ 347.927344] ? __msan_poison_alloca+0x183/0x220 [ 347.932024] ? _cond_resched+0x4c/0x100 [ 347.936020] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 347.941417] alloc_pages_current+0x6b1/0x970 [ 347.945850] pipe_write+0x7f0/0x1d30 [ 347.949596] ? init_wait_entry+0x1a0/0x1a0 [ 347.953855] ? pipe_read+0x1330/0x1330 [ 347.957754] __vfs_write+0x87e/0xb90 [ 347.961495] vfs_write+0x467/0x8c0 [ 347.965063] __x64_sys_write+0x1cf/0x400 [ 347.969144] ? ksys_write+0x380/0x380 [ 347.972956] do_syscall_64+0x15b/0x230 [ 347.976862] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 347.982054] RIP: 0033:0x455ab9 [ 347.985240] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:23 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x6}, &(0x7f0000000040), 0x8) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f00000000c0)=0x9) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)="41b2", 0xffffffffffffff59}], 0x38) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000580)={@ll={0x11, 0x4, r2, 0x1, 0x8, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, {&(0x7f0000000480)=""/221, 0xdd}, &(0x7f0000000280), 0x1e}, 0xa0) fcntl$setpipe(r1, 0x407, 0x5) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) getsockopt$netlink(r0, 0x10e, 0x7, &(0x7f0000000100)=""/29, &(0x7f0000000180)=0x1d) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:23 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) 14:04:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 348.004585] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 348.012308] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 348.019580] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 348.026857] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 348.034131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 348.041405] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000044 [ 348.073375] FAULT_INJECTION: forcing a failure. [ 348.073375] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 348.085232] CPU: 0 PID: 15536 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 348.092509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.101864] Call Trace: [ 348.104471] dump_stack+0x185/0x1e0 [ 348.108122] should_fail+0x8a7/0xae0 [ 348.111862] __alloc_pages_nodemask+0x622/0x6320 [ 348.116657] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 348.122129] ? get_page_from_freelist+0xb01f/0xbb50 [ 348.127162] ? __save_stack_trace+0xa45/0xca0 [ 348.131697] ? memcg_kmem_charge+0x5f8/0xac0 [ 348.136131] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 348.141946] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 348.147945] ? __alloc_pages_nodemask+0x105b/0x6320 [ 348.152986] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 348.158382] ? kmsan_set_origin_inline+0x6b/0x120 [ 348.163264] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 348.168652] ? memcg_kmem_charge+0x79d/0xac0 [ 348.173083] kmsan_alloc_page+0x80/0xe0 [ 348.177073] __alloc_pages_nodemask+0x105b/0x6320 [ 348.181934] ? kmsan_set_origin_inline+0x6b/0x120 [ 348.186795] ? __msan_poison_alloca+0x183/0x220 [ 348.191480] ? perf_event_task_sched_in+0x257/0x2b0 [ 348.196514] ? kmsan_set_origin_inline+0x6b/0x120 [ 348.201368] ? __msan_poison_alloca+0x183/0x220 [ 348.206050] ? _cond_resched+0x4c/0x100 [ 348.210043] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 348.215445] alloc_pages_current+0x6b1/0x970 [ 348.219878] pipe_write+0x7f0/0x1d30 [ 348.223625] ? init_wait_entry+0x1a0/0x1a0 [ 348.227875] ? pipe_read+0x1330/0x1330 [ 348.231777] __vfs_write+0x87e/0xb90 [ 348.235519] vfs_write+0x467/0x8c0 [ 348.239091] __x64_sys_write+0x1cf/0x400 [ 348.243174] ? ksys_write+0x380/0x380 [ 348.246989] do_syscall_64+0x15b/0x230 [ 348.250900] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 348.256096] RIP: 0033:0x455ab9 [ 348.259283] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.278628] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 348.286345] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 348.293618] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 348.300888] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 348.308159] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 348.315437] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003b 14:04:23 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000200)) setreuid(r1, r2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:23 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:23 executing program 6 (fault-call:3 fault-nth:69): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:23 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="394e2abf621687ce35cb1b1041408f273f8893770f", 0x15, 0xfffffffffffffffc) keyctl$update(0x2, r1, &(0x7f0000000380)="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", 0x1000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}], 0x10) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) ioctl$PPPIOCGMRU(r3, 0x80047453, &(0x7f0000000080)) write$FUSE_NOTIFY_POLL(r3, &(0x7f00000002c0)={0x18, 0x1, 0x0, {0x707d}}, 0x18) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x9d44}, 0x8) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:23 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:23 executing program 2 (fault-call:3 fault-nth:60): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 348.677694] FAULT_INJECTION: forcing a failure. [ 348.677694] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 348.689854] CPU: 1 PID: 15571 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 348.697159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.706542] Call Trace: [ 348.709190] dump_stack+0x185/0x1e0 [ 348.712888] should_fail+0x8a7/0xae0 [ 348.716669] __alloc_pages_nodemask+0x622/0x6320 [ 348.721473] ? kmsan_set_origin_inline+0x6b/0x120 14:04:23 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffff7f) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 348.726355] ? __msan_poison_alloca+0x183/0x220 [ 348.731063] ? perf_event_task_sched_in+0x257/0x2b0 [ 348.736118] ? kmsan_set_origin_inline+0x6b/0x120 [ 348.740997] ? __msan_poison_alloca+0x183/0x220 [ 348.745723] ? _cond_resched+0x4c/0x100 [ 348.749759] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 348.755190] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 348.760689] alloc_pages_current+0x6b1/0x970 [ 348.765175] pipe_write+0x7f0/0x1d30 [ 348.768949] ? init_wait_entry+0x1a0/0x1a0 [ 348.773257] ? pipe_read+0x1330/0x1330 [ 348.777214] __vfs_write+0x87e/0xb90 [ 348.781000] vfs_write+0x467/0x8c0 [ 348.784618] __x64_sys_write+0x1cf/0x400 [ 348.788749] ? ksys_write+0x380/0x380 [ 348.792607] do_syscall_64+0x15b/0x230 [ 348.796547] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 348.801765] RIP: 0033:0x455ab9 [ 348.804968] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 348.824572] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 348.832335] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 348.839634] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 348.846941] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 348.854243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 348.861548] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000045 [ 348.892031] FAULT_INJECTION: forcing a failure. [ 348.892031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 348.904256] CPU: 0 PID: 15584 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 348.911557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.920929] Call Trace: [ 348.923566] dump_stack+0x185/0x1e0 [ 348.927231] should_fail+0x8a7/0xae0 [ 348.930990] __alloc_pages_nodemask+0x622/0x6320 [ 348.935793] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 348.941019] ? __msan_poison_alloca+0x183/0x220 [ 348.945763] ? kmsan_set_origin_inline+0x6b/0x120 [ 348.950640] ? __msan_poison_alloca+0x183/0x220 [ 348.955341] ? _cond_resched+0x4c/0x100 [ 348.959377] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 348.964807] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 348.970297] alloc_pages_current+0x6b1/0x970 [ 348.974749] pipe_write+0x7f0/0x1d30 [ 348.978514] ? init_wait_entry+0x1a0/0x1a0 [ 348.982815] ? pipe_read+0x1330/0x1330 [ 348.986767] __vfs_write+0x87e/0xb90 [ 348.990546] vfs_write+0x467/0x8c0 [ 348.994158] __x64_sys_write+0x1cf/0x400 [ 348.998288] ? ksys_write+0x380/0x380 [ 349.002148] do_syscall_64+0x15b/0x230 [ 349.006089] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 349.011307] RIP: 0033:0x455ab9 [ 349.014507] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.033890] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:24 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:24 executing program 6 (fault-call:3 fault-nth:70): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 349.041638] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 349.048933] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 349.056225] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 349.063518] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 349.070811] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003c [ 349.178948] FAULT_INJECTION: forcing a failure. [ 349.178948] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 349.190802] CPU: 1 PID: 15596 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 349.198076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.207431] Call Trace: [ 349.210033] dump_stack+0x185/0x1e0 [ 349.213679] should_fail+0x8a7/0xae0 [ 349.217425] __alloc_pages_nodemask+0x622/0x6320 [ 349.222207] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:04:24 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 349.227663] ? get_page_from_freelist+0xb01f/0xbb50 [ 349.232692] ? __save_stack_trace+0xa45/0xca0 [ 349.237218] ? memcg_kmem_charge+0x5f8/0xac0 [ 349.241640] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 349.247362] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 349.253343] ? __alloc_pages_nodemask+0x105b/0x6320 [ 349.258367] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 349.263747] ? kmsan_set_origin_inline+0x6b/0x120 [ 349.268613] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 349.273984] ? memcg_kmem_charge+0x79d/0xac0 14:04:24 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x8200, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000300)={@broadcast, @remote}, &(0x7f0000000440)=0x8) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r2, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) prctl$setmm(0x23, 0x7, &(0x7f0000ffb000/0x3000)=nil) fcntl$setpipe(r2, 0x407, 0x0) vmsplice(r2, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x4}}, [0x8000, 0xfff, 0xffff, 0x0, 0xffff, 0x7fffffff, 0x4, 0x4, 0x0, 0x4, 0x10000, 0x7, 0x4, 0xfffffffffffffffc, 0x3]}, &(0x7f0000000180)=0x100) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000380)=ANY=[@ANYRES32=r3, @ANYBLOB="810000009956f2931efa3910a79020b2d3a1c94aad0e97ec0ad3be035cec71a515e1d1236aa62ceb163fe9c91a8bf81348da273ab3d4dcf2c31c35cbd5caa50d0fc5c6878f8102c8fc922c744e105b011a7f7eeb97792e6b3be639d15fb3512d02acbe059b2300e00caea8a0d7232e5b1faddd98a0b5ce0000000000000000000000000000"], &(0x7f00000001c0)=0x89) write$FUSE_WRITE(r2, &(0x7f0000000000)={0x18}, 0x18) dup2(r2, r1) getitimer(0x1, &(0x7f00000005c0)) [ 349.278409] kmsan_alloc_page+0x80/0xe0 [ 349.282402] __alloc_pages_nodemask+0x105b/0x6320 [ 349.287261] ? kmsan_set_origin_inline+0x6b/0x120 [ 349.292120] ? __msan_poison_alloca+0x183/0x220 [ 349.296803] ? perf_event_task_sched_in+0x257/0x2b0 [ 349.301833] ? kmsan_set_origin_inline+0x6b/0x120 [ 349.306687] ? __msan_poison_alloca+0x183/0x220 [ 349.311363] ? _cond_resched+0x4c/0x100 [ 349.315356] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 349.320746] alloc_pages_current+0x6b1/0x970 [ 349.325176] pipe_write+0x7f0/0x1d30 14:04:24 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x0) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 349.328931] ? init_wait_entry+0x1a0/0x1a0 [ 349.333186] ? pipe_read+0x1330/0x1330 [ 349.337084] __vfs_write+0x87e/0xb90 [ 349.340824] vfs_write+0x467/0x8c0 [ 349.344382] __x64_sys_write+0x1cf/0x400 [ 349.348460] ? ksys_write+0x380/0x380 [ 349.352266] do_syscall_64+0x15b/0x230 [ 349.356168] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 349.361361] RIP: 0033:0x455ab9 14:04:24 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x0) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:24 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socket$inet6(0xa, 0x1, 0x8010000000000084) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 349.364546] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 349.383848] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 349.391581] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 349.398860] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 349.406137] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 349.413414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 349.420691] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000046 14:04:24 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000080)) writev(r1, &(0x7f0000001200)=[{&(0x7f00000000c0)="b1e86826e59f99873a64d22a742e7e70fc98a59daff6cc367718e222a0bdaa79e4b6f5c9f4476e44f46401f665fef1b786f129f88db522f5a8171357e4230c61", 0x40}, {&(0x7f0000000100)="fbacb2d31df772f4d58ac6928c90c7703018eebbd6341573287c82f095d38f9b54a77938dd18598dad230ed43c6b9c47bbada2ceafe486ad2a9bba0de707c4f4db9db31d878fb6badcfaaf61fe6c9de27f20fcd81fc9ad420e4e6bc2f2388b686400df51787c8f0261", 0x69}, {&(0x7f0000000200)="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", 0x1000}], 0x3) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000001240)={0xffffffffffff7b50, 0x5, 0x800}) 14:04:24 executing program 2 (fault-call:3 fault-nth:61): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:24 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:24 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2), 0x0) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:24 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) r2 = openat(r1, &(0x7f0000000080)='./control/file0\x00', 0xa0000, 0x3) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000140)={{0x2, 0x3, 0x2, 0x2, 0x3}}) 14:04:24 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:24 executing program 6 (fault-call:3 fault-nth:71): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 349.898020] FAULT_INJECTION: forcing a failure. [ 349.898020] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 349.909883] CPU: 1 PID: 15627 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 349.917175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.926544] Call Trace: [ 349.929153] dump_stack+0x185/0x1e0 [ 349.932799] should_fail+0x8a7/0xae0 [ 349.936546] __alloc_pages_nodemask+0x622/0x6320 [ 349.941331] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 349.946797] ? get_page_from_freelist+0xb01f/0xbb50 [ 349.951830] ? __save_stack_trace+0xa45/0xca0 [ 349.956358] ? memcg_kmem_charge+0x5f8/0xac0 [ 349.960779] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 349.966590] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 349.972575] ? __alloc_pages_nodemask+0x105b/0x6320 [ 349.977611] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 349.982997] ? kmsan_set_origin_inline+0x6b/0x120 [ 349.987864] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 349.993236] ? memcg_kmem_charge+0x79d/0xac0 [ 349.997660] kmsan_alloc_page+0x80/0xe0 [ 350.001648] __alloc_pages_nodemask+0x105b/0x6320 [ 350.006502] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 350.011698] ? __msan_poison_alloca+0x183/0x220 [ 350.016385] ? kmsan_set_origin_inline+0x6b/0x120 [ 350.021238] ? __msan_poison_alloca+0x183/0x220 [ 350.025919] ? _cond_resched+0x4c/0x100 [ 350.029916] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 350.035307] alloc_pages_current+0x6b1/0x970 [ 350.039738] pipe_write+0x7f0/0x1d30 [ 350.043489] ? init_wait_entry+0x1a0/0x1a0 [ 350.047740] ? pipe_read+0x1330/0x1330 [ 350.051644] __vfs_write+0x87e/0xb90 [ 350.055388] vfs_write+0x467/0x8c0 [ 350.058955] __x64_sys_write+0x1cf/0x400 [ 350.063041] ? ksys_write+0x380/0x380 [ 350.066859] do_syscall_64+0x15b/0x230 [ 350.070770] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 350.075961] RIP: 0033:0x455ab9 [ 350.079146] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:25 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:25 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(0xffffffffffffffff, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 350.098491] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 350.106212] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 350.113493] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 350.120775] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 350.128049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 350.135328] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000047 [ 350.153150] FAULT_INJECTION: forcing a failure. [ 350.153150] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 350.164988] CPU: 0 PID: 15642 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 350.172265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.181717] Call Trace: [ 350.184316] dump_stack+0x185/0x1e0 [ 350.187954] should_fail+0x8a7/0xae0 [ 350.191685] __alloc_pages_nodemask+0x622/0x6320 [ 350.196469] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:04:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 350.201939] ? get_page_from_freelist+0xb01f/0xbb50 [ 350.206972] ? __save_stack_trace+0xa45/0xca0 [ 350.211506] ? memcg_kmem_charge+0x5f8/0xac0 [ 350.215933] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 350.221661] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 350.227645] ? __alloc_pages_nodemask+0x105b/0x6320 [ 350.232680] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 350.238067] ? kmsan_set_origin_inline+0x6b/0x120 [ 350.242939] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 350.248313] ? memcg_kmem_charge+0x79d/0xac0 [ 350.252734] kmsan_alloc_page+0x80/0xe0 [ 350.256727] __alloc_pages_nodemask+0x105b/0x6320 [ 350.261585] ? kmsan_set_origin_inline+0x6b/0x120 [ 350.266448] ? __msan_poison_alloca+0x183/0x220 [ 350.271133] ? perf_event_task_sched_in+0x257/0x2b0 [ 350.276167] ? kmsan_set_origin_inline+0x6b/0x120 [ 350.281021] ? __msan_poison_alloca+0x183/0x220 [ 350.285706] ? _cond_resched+0x4c/0x100 [ 350.289705] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 350.295100] alloc_pages_current+0x6b1/0x970 [ 350.299531] pipe_write+0x7f0/0x1d30 [ 350.303272] ? init_wait_entry+0x1a0/0x1a0 [ 350.307526] ? pipe_read+0x1330/0x1330 [ 350.311431] __vfs_write+0x87e/0xb90 [ 350.315175] vfs_write+0x467/0x8c0 [ 350.318740] __x64_sys_write+0x1cf/0x400 [ 350.322820] ? ksys_write+0x380/0x380 [ 350.326627] do_syscall_64+0x15b/0x230 [ 350.330534] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 350.335729] RIP: 0033:0x455ab9 14:04:25 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 350.338913] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 350.358250] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 350.365967] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 350.373242] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 350.380521] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 350.387800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 350.395081] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003d 14:04:25 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000040)="cc18cdd095213cb4375d7874893b99efea75b83f0b257fa61a4302814c85eb8e5d611696f14585d62aa6789bed1e047e07e67616a6039e5b432dec892e777ba006dbed1edea95a4b9571cfe30624d5b21b3d5e010b134ad65740e26205f3afb58a89290b8ea860e3fe160fbf5d13d08d92302e44117372154fe3e44b1cb21f84524d535024cd741d5fde3c7e42b03abdbbb7e1b165ea55f5c8d5ebf8cdafdca91d27c01a8181c781eee4da23395a6d30666317daed49ed0c8395e94037b24f6dd6c4c083760ce6cfcf0f43263307b337b5e1582fe4a2215e54adc25c9c4bf356a749d00ae1", 0xe5}, {&(0x7f0000000380)="51d03efa0a9a8eef77ede7f416333594e0670d588571f459c6a3e2050113521861660de55bb6b74c1261ffd1264b78dcbaef4787ef97290dc53ab412a390176ce041ad9ffbbff8ab31afe35f0e8b3e8b620db16d42309ebd56a20ad71026571a259f7c9645b8b701dfb87161fa897156649469bbfd0f82da38b577e12f60dfac2d4e341c0813d328423624df1c9f2eb99ec310fb0e673e11b9cebbb64d3e4b841aa56f96b7ece5fdcd93e93a5d24e3d1d009d083516014d4a563e8a2f7f14eb47081c1e934d2f5e98f7ef9198336b64d9c4b94f2e9e8ffe1fdb2692b136c19be3c1cde9704bfb69ee7e7042ffc69b0de45", 0xf1}, {&(0x7f00000005c0)="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", 0x1000}, {&(0x7f0000000180)="a8d660216217803a8c6a8514500a1e71bc94f1", 0x13}, {&(0x7f00000001c0)="c4ac904d5c5d5758b17454ee6c4fff535bbe4819524ce7e3a958f6c3c18393e0687340487b46fb", 0x27}], 0x5) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:25 executing program 6 (fault-call:3 fault-nth:72): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:25 executing program 2 (fault-call:3 fault-nth:62): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:25 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 350.630221] FAULT_INJECTION: forcing a failure. [ 350.630221] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 350.642338] CPU: 0 PID: 15661 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 350.649647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.659033] Call Trace: [ 350.661679] dump_stack+0x185/0x1e0 [ 350.665360] should_fail+0x8a7/0xae0 [ 350.669134] __alloc_pages_nodemask+0x622/0x6320 [ 350.673953] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 350.679190] ? __msan_poison_alloca+0x183/0x220 [ 350.683974] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 350.689436] ? balance_callback+0x48/0x260 [ 350.693749] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 350.699274] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 350.704723] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 350.710225] alloc_pages_current+0x6b1/0x970 [ 350.714432] FAULT_INJECTION: forcing a failure. [ 350.714432] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 350.714708] pipe_write+0x7f0/0x1d30 [ 350.730193] ? init_wait_entry+0x1a0/0x1a0 [ 350.734499] ? pipe_read+0x1330/0x1330 [ 350.738429] __vfs_write+0x87e/0xb90 [ 350.742177] vfs_write+0x467/0x8c0 [ 350.745765] __x64_sys_write+0x1cf/0x400 [ 350.749870] ? ksys_write+0x380/0x380 [ 350.753699] do_syscall_64+0x15b/0x230 [ 350.757606] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 350.762802] RIP: 0033:0x455ab9 [ 350.765987] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 350.785541] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 350.793262] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 350.800536] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 350.807810] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 350.815079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 350.822353] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000048 [ 350.829640] CPU: 1 PID: 15664 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 350.836923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.846277] Call Trace: [ 350.848876] dump_stack+0x185/0x1e0 [ 350.852525] should_fail+0x8a7/0xae0 [ 350.856264] __alloc_pages_nodemask+0x622/0x6320 [ 350.861045] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 350.866509] ? get_page_from_freelist+0xb01f/0xbb50 [ 350.871537] ? __save_stack_trace+0xa45/0xca0 [ 350.876061] ? memcg_kmem_charge+0x5f8/0xac0 [ 350.880487] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 350.886290] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 350.892273] ? __alloc_pages_nodemask+0x105b/0x6320 [ 350.897366] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 350.902753] ? kmsan_set_origin_inline+0x6b/0x120 [ 350.907619] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 350.912995] ? memcg_kmem_charge+0x79d/0xac0 [ 350.917419] kmsan_alloc_page+0x80/0xe0 [ 350.921409] __alloc_pages_nodemask+0x105b/0x6320 [ 350.926266] ? __perf_event_task_sched_in+0xa3b/0xab0 14:04:25 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 350.931466] ? __msan_poison_alloca+0x183/0x220 [ 350.936153] ? kmsan_set_origin_inline+0x6b/0x120 [ 350.941007] ? __msan_poison_alloca+0x183/0x220 [ 350.945682] ? _cond_resched+0x4c/0x100 [ 350.949669] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 350.955057] alloc_pages_current+0x6b1/0x970 [ 350.959485] pipe_write+0x7f0/0x1d30 [ 350.963244] ? init_wait_entry+0x1a0/0x1a0 [ 350.967490] ? pipe_read+0x1330/0x1330 [ 350.971391] __vfs_write+0x87e/0xb90 [ 350.975135] vfs_write+0x467/0x8c0 [ 350.978697] __x64_sys_write+0x1cf/0x400 [ 350.982776] ? ksys_write+0x380/0x380 [ 350.986586] do_syscall_64+0x15b/0x230 [ 350.990497] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 350.995695] RIP: 0033:0x455ab9 [ 350.998883] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.018143] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 351.025857] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 351.033110] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 351.040369] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 351.047622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 351.054887] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003e 14:04:26 executing program 7: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x8000, 0x0) getsockname$packet(r0, &(0x7f00000005c0), &(0x7f0000000600)=0x14) syz_open_dev$sndseq(&(0x7f0000000640)='/dev/snd/seq\x00', 0x0, 0x200000) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x4000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)=@allocspi={0x238, 0x16, 0x200, 0x70bd2b, 0x25dfdbfd, {{{@in6=@loopback={0x0, 0x1}, @in=@loopback=0x7f000001, 0x4e23, 0x4, 0x4e24, 0x0, 0xa, 0x20, 0xa0, 0x62, r2, r3}, {@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4d6, 0xff}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, {0x6, 0x8, 0xffffffff, 0xff, 0x80000000, 0x81, 0x1}, {0x0, 0x80, 0x4, 0x2}, {0x9, 0x7fff, 0x100000001}, 0x70bd25, 0x0, 0xa, 0x0, 0xffff, 0x8}, 0x0, 0x7}, [@algo_comp={0xe0, 0x3, {{'lzs\x00'}, 0x4a8, "d17d644fb4e26aab85a0529b624887a8740e40fed75cc592b80cb3365c6f3a31fe0422fca46a068739e09058623e775503fd83f6517234c97f8764ec4e454d2d6e96bba3fe061038a7e569df4184e205d283c4e5cd5055747662dba3340e72fb44e37955f44709e8bfe02e204805fa9c8ad0a8d430083be903b9e0b7aabb088a9909b97e858959f7fb4206beb5e1535625a2b7c81b"}}, @lifetime_val={0x24, 0x9, {0x31, 0x4b77, 0x3ff, 0xbcb}}, @address_filter={0x28, 0x1a, {@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0xa, 0x2000000020, 0x2}}, @tfcpad={0x8, 0x16, 0x8047}, @mark={0xc, 0x15, {0x350759, 0x6}}]}, 0x238}, 0x1, 0x0, 0x0, 0x4}, 0x800) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:26 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:26 executing program 6 (fault-call:3 fault-nth:73): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:26 executing program 0: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x5) mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r1) 14:04:26 executing program 2 (fault-call:3 fault-nth:63): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:26 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(0xffffffffffffffff, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:26 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x1) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000140)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000002000)=[{{&(0x7f0000000180)=@ipx, 0x80, &(0x7f0000000240)=[{&(0x7f0000000200)=""/60, 0x3c}], 0x1}}], 0x1, 0x0, &(0x7f0000002100)) getpid() getgroups(0x5, &(0x7f0000000740)=[0xee01, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) pwrite64(r4, &(0x7f0000000900)="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", 0x1000, 0x0) writev(r3, &(0x7f00000000c0), 0xec) setuid(r2) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$binfmt_script(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x13e) getitimer(0x1, &(0x7f0000000100)) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000000c0)=0x14, 0x4) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000280)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) dup2(r1, r0) [ 351.518506] FAULT_INJECTION: forcing a failure. [ 351.518506] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 351.530357] CPU: 1 PID: 15692 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 351.537638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.547009] Call Trace: [ 351.549637] dump_stack+0x185/0x1e0 [ 351.553294] should_fail+0x8a7/0xae0 [ 351.557043] __alloc_pages_nodemask+0x622/0x6320 [ 351.561831] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 351.567304] ? get_page_from_freelist+0xb01f/0xbb50 [ 351.572340] ? __save_stack_trace+0xa45/0xca0 [ 351.576877] ? memcg_kmem_charge+0x5f8/0xac0 [ 351.581312] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 351.586031] FAULT_INJECTION: forcing a failure. [ 351.586031] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 351.587035] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 351.587056] ? __alloc_pages_nodemask+0x105b/0x6320 [ 351.587082] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 351.587111] ? kmsan_set_origin_inline+0x6b/0x120 [ 351.587142] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 351.587162] ? memcg_kmem_charge+0x79d/0xac0 [ 351.587199] kmsan_alloc_page+0x80/0xe0 [ 351.633789] __alloc_pages_nodemask+0x105b/0x6320 [ 351.638625] ? kmsan_set_origin_inline+0x6b/0x120 [ 351.643461] ? __msan_poison_alloca+0x183/0x220 [ 351.648126] ? perf_event_task_sched_in+0x257/0x2b0 [ 351.653138] ? kmsan_set_origin_inline+0x6b/0x120 [ 351.657976] ? __msan_poison_alloca+0x183/0x220 [ 351.662637] ? _cond_resched+0x4c/0x100 [ 351.666610] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 351.671981] alloc_pages_current+0x6b1/0x970 [ 351.676392] pipe_write+0x7f0/0x1d30 [ 351.680116] ? init_wait_entry+0x1a0/0x1a0 [ 351.684346] ? pipe_read+0x1330/0x1330 [ 351.688228] __vfs_write+0x87e/0xb90 [ 351.691951] vfs_write+0x467/0x8c0 [ 351.695498] __x64_sys_write+0x1cf/0x400 [ 351.699559] ? ksys_write+0x380/0x380 [ 351.703349] do_syscall_64+0x15b/0x230 [ 351.707235] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 351.712433] RIP: 0033:0x455ab9 [ 351.715611] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.734856] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 351.742558] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 351.749816] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 351.757076] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 351.764333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 351.771591] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000049 [ 351.778886] CPU: 0 PID: 15699 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 351.786198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.795585] Call Trace: [ 351.798225] dump_stack+0x185/0x1e0 [ 351.801900] should_fail+0x8a7/0xae0 [ 351.805668] __alloc_pages_nodemask+0x622/0x6320 [ 351.810486] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 351.815710] ? __msan_poison_alloca+0x183/0x220 [ 351.820442] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 351.825839] ? balance_callback+0x48/0x260 [ 351.830124] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 351.835612] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 351.841015] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 351.846509] alloc_pages_current+0x6b1/0x970 [ 351.850964] pipe_write+0x7f0/0x1d30 [ 351.854732] ? init_wait_entry+0x1a0/0x1a0 [ 351.859056] ? pipe_read+0x1330/0x1330 [ 351.863003] __vfs_write+0x87e/0xb90 14:04:26 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 351.866777] vfs_write+0x467/0x8c0 [ 351.870388] __x64_sys_write+0x1cf/0x400 [ 351.874524] ? ksys_write+0x380/0x380 [ 351.878374] do_syscall_64+0x15b/0x230 [ 351.882310] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 351.887520] RIP: 0033:0x455ab9 [ 351.890713] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 351.910313] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 351.918050] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 351.925347] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 351.932641] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 351.939928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 351.947220] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000003f 14:04:27 executing program 6 (fault-call:3 fault-nth:74): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:27 executing program 2 (fault-call:3 fault-nth:64): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 352.188366] FAULT_INJECTION: forcing a failure. [ 352.188366] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 352.200216] CPU: 1 PID: 15712 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 352.207494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.216853] Call Trace: [ 352.219454] dump_stack+0x185/0x1e0 [ 352.223098] should_fail+0x8a7/0xae0 [ 352.226837] __alloc_pages_nodemask+0x622/0x6320 [ 352.231629] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 352.237096] ? get_page_from_freelist+0xb01f/0xbb50 [ 352.242132] ? __save_stack_trace+0xa45/0xca0 [ 352.246644] ? task_kmsan_context_state+0x6b/0x120 [ 352.251611] ? memcg_kmem_charge+0x5f8/0xac0 [ 352.256038] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 352.261864] ? kmsan_set_origin_inline+0x6b/0x120 [ 352.266734] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 352.272113] ? memcg_kmem_charge+0x79d/0xac0 [ 352.276541] kmsan_alloc_page+0x80/0xe0 [ 352.280532] __alloc_pages_nodemask+0x105b/0x6320 [ 352.285387] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 352.290590] ? __msan_poison_alloca+0x183/0x220 [ 352.295286] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 352.300676] ? balance_callback+0x48/0x260 [ 352.304925] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 352.310391] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 352.315785] alloc_pages_current+0x6b1/0x970 [ 352.320221] pipe_write+0x7f0/0x1d30 [ 352.323973] ? init_wait_entry+0x1a0/0x1a0 [ 352.328222] ? pipe_read+0x1330/0x1330 [ 352.332121] __vfs_write+0x87e/0xb90 [ 352.335863] vfs_write+0x467/0x8c0 [ 352.339436] __x64_sys_write+0x1cf/0x400 [ 352.343524] ? ksys_write+0x380/0x380 [ 352.347338] do_syscall_64+0x15b/0x230 [ 352.351248] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.356448] RIP: 0033:0x455ab9 [ 352.359635] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.379000] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:27 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 352.386719] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 352.393999] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 352.401273] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 352.408960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 352.416236] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004a [ 352.429693] FAULT_INJECTION: forcing a failure. [ 352.429693] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 352.441527] CPU: 0 PID: 15720 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 352.448806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.458160] Call Trace: [ 352.460762] dump_stack+0x185/0x1e0 [ 352.464402] should_fail+0x8a7/0xae0 [ 352.468146] __alloc_pages_nodemask+0x622/0x6320 [ 352.472927] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 352.478393] ? get_page_from_freelist+0xb01f/0xbb50 [ 352.483442] ? __save_stack_trace+0xa45/0xca0 14:04:27 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 352.487977] ? memcg_kmem_charge+0x5f8/0xac0 [ 352.492411] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 352.498134] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 352.504121] ? __alloc_pages_nodemask+0x105b/0x6320 [ 352.509154] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.514539] ? kmsan_set_origin_inline+0x6b/0x120 [ 352.519413] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 352.524789] ? memcg_kmem_charge+0x79d/0xac0 [ 352.529214] kmsan_alloc_page+0x80/0xe0 [ 352.533209] __alloc_pages_nodemask+0x105b/0x6320 [ 352.538067] ? kmsan_set_origin_inline+0x6b/0x120 [ 352.543011] ? __msan_poison_alloca+0x183/0x220 [ 352.547692] ? perf_event_task_sched_in+0x257/0x2b0 [ 352.552728] ? kmsan_set_origin_inline+0x6b/0x120 [ 352.557587] ? __msan_poison_alloca+0x183/0x220 [ 352.562263] ? _cond_resched+0x4c/0x100 [ 352.566261] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 352.571664] alloc_pages_current+0x6b1/0x970 [ 352.576101] pipe_write+0x7f0/0x1d30 [ 352.579855] ? init_wait_entry+0x1a0/0x1a0 [ 352.584110] ? pipe_read+0x1330/0x1330 [ 352.588011] __vfs_write+0x87e/0xb90 [ 352.591759] vfs_write+0x467/0x8c0 [ 352.595333] __x64_sys_write+0x1cf/0x400 [ 352.599415] ? ksys_write+0x380/0x380 [ 352.603229] do_syscall_64+0x15b/0x230 [ 352.607130] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 352.612324] RIP: 0033:0x455ab9 [ 352.615511] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 352.634852] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 352.642575] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 352.649852] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 352.657124] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 352.664395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 352.671677] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000040 14:04:28 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000000c0), 0x1d, 0x2) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000140)=0x3) setregid(r3, r4) 14:04:28 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r0, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:28 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000040)="cc18cdd095213cb4375d7874893b99efea75b83f0b257fa61a4302814c85eb8e5d611696f14585d62aa6789bed1e047e07e67616a6039e5b432dec892e777ba006dbed1edea95a4b9571cfe30624d5b21b3d5e010b134ad65740e26205f3afb58a89290b8ea860e3fe160fbf5d13d08d92302e44117372154fe3e44b1cb21f84524d535024cd741d5fde3c7e42b03abdbbb7e1b165ea55f5c8d5ebf8cdafdca91d27c01a8181c781eee4da23395a6d30666317daed49ed0c8395e94037b24f6dd6c4c083760ce6cfcf0f43263307b337b5e1582fe4a2215e54adc25c9c4bf356a749d00ae1", 0xe5}, {&(0x7f0000000380)="51d03efa0a9a8eef77ede7f416333594e0670d588571f459c6a3e2050113521861660de55bb6b74c1261ffd1264b78dcbaef4787ef97290dc53ab412a390176ce041ad9ffbbff8ab31afe35f0e8b3e8b620db16d42309ebd56a20ad71026571a259f7c9645b8b701dfb87161fa897156649469bbfd0f82da38b577e12f60dfac2d4e341c0813d328423624df1c9f2eb99ec310fb0e673e11b9cebbb64d3e4b841aa56f96b7ece5fdcd93e93a5d24e3d1d009d083516014d4a563e8a2f7f14eb47081c1e934d2f5e98f7ef9198336b64d9c4b94f2e9e8ffe1fdb2692b136c19be3c1cde9704bfb69ee7e7042ffc69b0de45", 0xf1}, {&(0x7f00000005c0)="3d46d2f10d4f5ab6c164dd8c42f9828209e2097ae3940b766c71bea5502ec91e9511feac6a6ec89215659a05e2eb29c9f5e32dfacf81b65850b27ed08f04c3fdbafbb859d78942c2b4911168af1e2fbbe4a3500b1c35ea077801468ccb9803ee95d4527dc2cd478f4ad0b0fad7bace364f79835b025b81f95ebdd6286c1c4b7282f3e68e9ccdf78642f61cc5258dc20cde4438a872c5ae6db7ed55df86c67050b6698dff6285a34dbad0622405e3453cabe82d6cbd199f45d25c51dca7c74891f8c42f688603a9800818077e2f6641d9b48a7535c6f0e2c1e9ae0b3b240bb06323ef2782aa7318a805a72c979a4bb25b544ffcb98d742de1ae3d87df2e0e20012ab3b6df3af0353a5454caddcd3d24be9f7ff70daec9063c67274e33820bcf6d7bd691e52301bbcc90edf385263f13a341ce6b6cddd1d2df6c02af8811668113092d967d67a54676dcc6bf649f5e130624ed036b908c6b9af2993333c603ccf21880ee4362c47fba1259b138de9cd7fef92f6241f4b0b43ba67d0645da3ec827bbc16ddd22a53e86fa720fef89d32a30cd39aa32a0fecdc9ac8e6ff97f15d54afb756d466dac7ac0104705c1bfc7730f4c766138311169035b460fed871395b37edc86eac25f237656f9b46b024744ded7b17b31483e750a7b918a5de3c3cffcd6c40d506d7c67c4f14a8db7687240cc6b36c24fc4e198f8c4a5d6e6365d5bad69bb8e0e725c30e32eec890bf9d37eb6b91698b3accdd96f9878389baed70ea810ff93cbb212b2a933597502a403ccb8a24ecc7b75a1fad450c7a4402272d4058c2ace4d698f3bfef3d91c6ec42e451817c8e334644eaa767346779daa227f514df6de11bbeb432cffcf26762d4886d5d421fbd2d76d3aeb2cd0ff0166a7ba6d0ff7dcccb0bc42c9a14183e9300407be0ae9bc3c5fd8fe8e3879429ef34cd0e42c869281bce3c0825bbef61e17afd1baed4b81897b58b4f2c257d4d15ac3b508e39ef4240678a1b3d30c40e6a8554ae52c02388846445981342c2121884eb9c6d1be3f18fe3fc5b7019856b0eba5cfae410f6c80161bea1fb1462a137ed9c3f735f83624d5672e52c926cadcc97b99079697274b2712a1024080c931d34265777ae87f1eb7554ee2889ff76701f0b0c33386345abb95d49b573f949a0e5466efa7cad076ee8e4a007c7c5e3e8cd4cd285589e35bc19771e93c7ab84a7ce42f6fcbcda81d259a89ffca3d2444dbcfe11ed044048ddac127ab534e03a881fcb601ac65071ed3933acad9205626417a4afc3b7b64b99d839cafcb51c9954fb21711eba16623e2a54fda55f8dde2fd0753f4d130f1230e277eb21b8ff2bc21e3a1e93bdc8fe34dfa13c64c738fb36d32c1ae3846dfe8d4bab44731d9511b25717c05a699df5a2e84ca54f3441cabf4b27f86007cf0e016cb0972457091d6c5c0efcb23af55da2d90dcfa67b608e9dbf2e90f6e973167363e6a8998d81451ef5e2e17e41c82eaab4a89f7fbf5eccb7817203d28f619c75d2c5fc97312fcda2ad1ed878740d6a2d7235ac6e5e5f7fc0d4f21d1266919945786860ea55362959ce88237e3e39856b7f27b9fd5c685b21efb9ae885638154eaff09217802d8d21be978f11d6410b6a08c6b5b04c951a7ac4db4585078e07cc0ce688a927d617898157fd72609c8ce49d9818f89e8bf8dc494ca2edaced6ca728c1cc220cc9687057d58a1ebb041ac0f52547d8242051f05a8b9750a36ae675188e640974b75f65b279fd0a6141390a517835588b4c2811f2d2f87ee63d53f332c1203cd36e20ff7c596ac0c92feadc3d74d64313c8ea885967add17a538d133e1829e523b8762ad91fbcdad62bc37dfd7f13e95d8bfbda63a445a1a1ca5c82e04ccbd241c16741a31def2fb680e180723e46161cac3e780f97f2e96f4c0ecbec1420b0d0ff975d5d04757ca5c8eeefc86d94f356f2f2c1035ef18cf0b2fbf6958f4bb1f9ff758f4847215d1048238aa38e191c16f69dac2ccacab7752becc4c7528c39b986360fc123d5b2220efcf0a0bcee506f1bbed4d663dd5610a648a65bac2be0941323c71f30395fc82ecfb65fb8ce6ff44107157e69c29e5ef3e1c6e36fda8cc86eb861bbbaa65db125582fa8b53bf60ee72b670a524da4b0bceb11341c74fa6514a1233373e1b285587b8e5820767fbaa19e0164bba68dcfeb60cd5418a69f323f9b08c267fb5b9a68886cc46a7cf12e1eff5946e4033138d4b90f2931e2218e6f4e42f2340ebf3f977d34cf958c00140c80a2699b8de6fec4925e410962ad1f3a088a870c5a3ddeccfed7d9abca9c215f9d468bedfb6effcc3c42d671071274ac01f8b3e4dd33551f6db0af24ff0b00b6b706f15c29b0bebcce0640a0254a4bd4a94abaf5333ec4ef495efa63b0ea8929570af1ee463c53cb5475691197338698658d6d09e21b9f9601b7ce15a98848ef451370bdc89f97dd7d7fa6e1d04e9d7172b5acfd7ba8df5a6dfa9da9202711d2e97d4d014fadebc8f16506215e53cc1660accf07d4be314d9178a95d0503766de0ea6fe6619eafe20f9450145283392321e5e6feda5181eabc55f2abf0cabf843fe59459c8aeb680dd90eb2863f1b87d84a1c333fe748261ef1a876e9a6d7da6814115faa2e4ec939aa005ffc26f7e450c0d0bd45c4716d9a0cfd3274c766609b261f224ddc4916bd02cf00390ee54a78a765638b8d19ab34a39b1ea5a54ae707675acf9967f0da1a25e0d7b0740dc68085a24d08be041904d303486b641f67a5cb8d2bdeea27ad3bb35732b2491ea1086a41f776afc0532bb2cd30e04fe36895968dc5e86d2ce8b8ca74719c7a377ce6e9d6a921ae8e7cb58110dc00de7453b1daf7077a4f0c4cc1f354d19d2e9bd57d2ba9122c371bcd8b9a211f481cd6f8afb47109c5df55489e3fd14c54da926aa25002aa93629bd6fa85f5d1e8446d43038a04fa98d295573b1afc5cd28b93967f5fba03ab779c40ea08656172e72d8d3e48f0410e8bf216d832326fc68ff821ed9c4b507ad283d5811e2d08c6f8d110c5670b8a2522c3277a6f4e879b68eb5f11284c9fd70782d19c894877cf4bf0d43f0d16a6979f1b643c2637ba41bd8c3ecb368a9aba8d6168ae671e3897b2b4d5d1a61e5a2c77aa4d3fe8e399733c57bff04d3b52cfbcd6f69bb84d13dc755e1776712921ad65ab83185819dda10899a48821d5db991dbf23c3c3bcc3614d85a2ec56fe98442c9a5a5c1a8b1231a49cbfe75d894b3b669d01e2b19990e045c030462d498e75f173d015e22b3a9280855d5185840f2b7fd8b6641b202be4d86886bcda5cde338ddf73aef5f313d6d11c846f5e59dcb426c83c36e4f48f5f43a9c12e542fcefd8a332c563b6b7a47afa894980b396d8cf29fcb2e62c703bffdf6d630939ab26964d1a4cfc71f7230fa8a042e23d6f8303d406eedd9990e9347612f5d6a6de829c37090abab3bcfb6ead3c81f5c41558de0c63955e49d20611898f553dd9534c909579b13aec61b5f8e970495a263631f9de5445a3c1b5861d99df3e50f6f892f18d294f96ab88621c2c0d6bfdcd4b5aec710e027b477bf83ecefa10be2f06f428af8d948a49a6d386f1406278ea4075648469e2d5f63f777500c428a758868356313d8b439e34cd9fee7c99b8725bf3d35459f83e2120c8a76e91bf3de4b6d7d58689180d88cbda51c544f6f93847d8dc20995f5bed2f4f24b24ce5e6665d42cc0738a2f8ab691bdfb1926ecd8675c051857bfc6785ab3961ea858480915ff4ce13a3e0b00af1bdd51689827323e2e15053bcc29c59807b79d3d8d8e331d6fcbc6957c89e9366b9a27dee18e186d1960c6045a99100daeb6e37712110f9d4fe17ff79e6b885363b0593a85929e2d10074dded9b940b68d13309f5c6ca12c8986e3c55fb4a8c3b6c14c39ae1b32ae4791b1e96f1d41e188d21196ffe3d5826c55c92b4c075e6eb87d102bbbd8967dabfca4f2a64067dc321fec44e6ac45e9d07e0196858711f9d633cf10fc8fc6c857240c5aae91024cc0c137165d3ac5a8d324e9b95ef79cbfb415231a723cc9bae58a3c7b2c543d9cee0b2bbe41a56e2cc8a9271c66af80d103988f0a0c2be8b2a03acac2553cc91b97d77e2b5f543666dc4d79e96ca2f2b2ed341c7bf9ddcd19407e25989f5a2b2c93f446d72573831172bcf478e9c21cd86fd9d321adece710d2969402cb617d7896af43e80c36bee66ba393f25b96048b555d5f77101d4a7d2a41814b2501338c1261a6306b192d519775d9f1aea0d9b3e7879e34ce80429a5dc6c652b2394eb757fe227c9618891bd80b0142951b59119772a5dab55c242b104c1b028131a47ed0d116067e986eca46b4543f065506823cc1b6f1da8810a9086e6446f0c2a26a5aafd0c2f60cff50f770f7a053194a896e82810ed53a0f7a579a35c9e0126e5c43a104c425542d38fc708215c3d0efaad45e1f31e6d04a758311efc64ac512774853a5d19581b450e8034ea2778f2015f495bf47c7e779f5a41293186c4fb5fe3d631d386fd7293a9698e6b61877e6e9d2b0499547b8f7009e34c68a6da89410cbbafea1801451bb3d92091e3255180f3691c96ad5e49d1aec84fb53b9d3f0b7227305b7c0193249ca0b7cc05725b04e6964ca3f579d585b669cb1a61a7339e16a84c52cc3029eb266235b43db9b6fba517edc040aaf85a27b9e0f5cdba62807c77beab8ebc5fa740c8f43ba6e0a84072e290c9c981dc67ed293932df9460b93956c60135d7cb5992fec33c3fb9986592ba7e87ede28bb47e1a95966be95fad25b801981f2aabc7bd020c682d03e8127da53ccc09dbbd1d935a16229562bad22c9c1a306de2cb91af484a8754d5cbfe8ab1763a1605b490c75f55dfd3479dce0d62cab1d828c904c1a8dccf10f090e6913607d8f7538920ec5d313120b5614d5f4fd6e8b3bb6e4c0aac6512c39ee7997a95ac50bcd69c6f2f607555f5bfb70afe7b4bc28be0b4b7a68656d68f5ab86ddec3feefe958d3372c7efa41c1a82514343af3cefb2dbafca185b159a68374ca8bb3da67218ab127048fa2627a45814056a9567e93ac995f1460f916af2df317e6426f2fbd5354224b68edb68bba1969768d45977b5c56e5df3ac8441ced2f9f31b33a12f94a0161360f63ee5fc4950dd574e237f9767449352e3ebef8217a69245015acfde17d5ccc7ec2347b374bc51f8f0594b580b86188e8ae1697e5cade9e480b27d8fefd5c28858cb9837f0c619987cda59ae60ac417c6c95b0167e034a62583a81579107e7e64f57ad037e66510b1825a3e4a2718f7f47e9d7e2fb00e833142f555b852b67d2998c9cf24c66c1eb4e2b5a8c82b9aef545aaccee7b106544a6fc84103800ef8dfc7ddab7aaaac34109775dd6bec7ca0baea6bd93006c23f38c4584a8aadb4dffdee58343fc471762b9df2786696650035219587dbd684b9633ff3cced7e4827541624a3de39754f16addb214087e0c30334e328e6beffffc3214b1140e21d5faa5529eb507b46377e05f643132537c37bc3a19816c03a25c34522e2e1d0ac032613fc695ab1f6d0d30b94694d88ce25c0ba69152387ceb7a048cf1691f8959ab21b7daaf8af04256459410f9458805aebc1cc631bd49f2c181fbb88269a78dead6d3544511515fca7bd92d2b140cd708add228eb85a640a5d8d8c25eb67ca730e2713f028f1ecaaad61a0e8115a020ec7a0fdaf8b13412d94ff08cb6d68f2fa35342de46ca5be791f0c37e10a0841b7d59ed8de4c614be23be99ec9668cd8c9d1ec0", 0x1000}, {&(0x7f0000000180)="a8d660216217803a8c6a8514500a1e71bc94f1", 0x13}, {&(0x7f00000001c0)="c4ac904d5c5d5758b17454ee6c4fff535bbe4819524ce7e3a958f6c3c18393e0687340487b46fb", 0x27}], 0x5) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:28 executing program 6 (fault-call:3 fault-nth:75): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:28 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(0xffffffffffffffff, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:28 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000240)) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) write$P9_RSTATFS(r2, &(0x7f0000000140)={0x43, 0x9, 0x2, {0x3f, 0x5, 0x1, 0x401, 0x5, 0x8, 0x4, 0x20, 0x7}}, 0x43) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000000c0)) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000280), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:28 executing program 2 (fault-call:3 fault-nth:65): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 353.150794] FAULT_INJECTION: forcing a failure. [ 353.150794] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 353.162876] CPU: 1 PID: 15761 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 353.170194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.179570] Call Trace: [ 353.182210] dump_stack+0x185/0x1e0 [ 353.185883] should_fail+0x8a7/0xae0 [ 353.189656] __alloc_pages_nodemask+0x622/0x6320 [ 353.194458] ? kmsan_set_origin_inline+0x6b/0x120 14:04:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 353.199343] ? __msan_poison_alloca+0x183/0x220 [ 353.204049] ? perf_event_task_sched_in+0x257/0x2b0 [ 353.209120] ? kmsan_set_origin_inline+0x6b/0x120 [ 353.213996] ? __msan_poison_alloca+0x183/0x220 [ 353.218712] ? _cond_resched+0x4c/0x100 [ 353.222742] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 353.228165] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 353.233660] alloc_pages_current+0x6b1/0x970 [ 353.238131] pipe_write+0x7f0/0x1d30 [ 353.241896] ? init_wait_entry+0x1a0/0x1a0 [ 353.246208] ? pipe_read+0x1330/0x1330 [ 353.250157] __vfs_write+0x87e/0xb90 [ 353.253941] vfs_write+0x467/0x8c0 [ 353.257564] __x64_sys_write+0x1cf/0x400 [ 353.261699] ? ksys_write+0x380/0x380 [ 353.265557] do_syscall_64+0x15b/0x230 [ 353.269493] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 353.274709] RIP: 0033:0x455ab9 [ 353.277917] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.297533] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 353.305278] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 353.312577] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 353.319884] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 353.327185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 353.334480] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004b [ 353.365575] FAULT_INJECTION: forcing a failure. [ 353.365575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 353.377440] CPU: 1 PID: 15771 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 353.384719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.394080] Call Trace: [ 353.396685] dump_stack+0x185/0x1e0 [ 353.400328] should_fail+0x8a7/0xae0 [ 353.404069] __alloc_pages_nodemask+0x622/0x6320 [ 353.408850] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 353.414314] ? get_page_from_freelist+0xb01f/0xbb50 [ 353.419344] ? __save_stack_trace+0xa45/0xca0 [ 353.423850] ? task_kmsan_context_state+0x6b/0x120 [ 353.428821] ? memcg_kmem_charge+0x5f8/0xac0 [ 353.433255] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 353.439089] ? kmsan_set_origin_inline+0x6b/0x120 [ 353.443970] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.449358] ? memcg_kmem_charge+0x79d/0xac0 [ 353.453792] kmsan_alloc_page+0x80/0xe0 [ 353.457791] __alloc_pages_nodemask+0x105b/0x6320 [ 353.462651] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 353.467852] ? __msan_poison_alloca+0x183/0x220 [ 353.472550] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.477932] ? balance_callback+0x48/0x260 [ 353.482182] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 353.487648] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 353.493044] alloc_pages_current+0x6b1/0x970 [ 353.497474] pipe_write+0x7f0/0x1d30 [ 353.501222] ? init_wait_entry+0x1a0/0x1a0 [ 353.505474] ? pipe_read+0x1330/0x1330 [ 353.509380] __vfs_write+0x87e/0xb90 [ 353.513127] vfs_write+0x467/0x8c0 [ 353.516693] __x64_sys_write+0x1cf/0x400 [ 353.520762] ? ksys_write+0x380/0x380 [ 353.524553] do_syscall_64+0x15b/0x230 [ 353.528433] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 353.533617] RIP: 0033:0x455ab9 [ 353.536802] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.555983] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:28 executing program 6 (fault-call:3 fault-nth:76): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:28 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 353.563710] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 353.570974] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 353.578246] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 353.585524] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 353.592795] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000041 [ 353.663373] FAULT_INJECTION: forcing a failure. [ 353.663373] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 353.675233] CPU: 1 PID: 15776 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 353.682519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.691882] Call Trace: [ 353.694519] dump_stack+0x185/0x1e0 [ 353.698170] should_fail+0x8a7/0xae0 [ 353.701917] __alloc_pages_nodemask+0x622/0x6320 [ 353.706705] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:04:28 executing program 2 (fault-call:3 fault-nth:66): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 353.712170] ? get_page_from_freelist+0xb01f/0xbb50 [ 353.717209] ? __save_stack_trace+0xa45/0xca0 [ 353.721742] ? memcg_kmem_charge+0x5f8/0xac0 [ 353.726170] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 353.731906] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 353.737900] ? __alloc_pages_nodemask+0x105b/0x6320 [ 353.742950] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 353.748353] ? kmsan_set_origin_inline+0x6b/0x120 [ 353.753227] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 353.758611] ? memcg_kmem_charge+0x79d/0xac0 [ 353.763047] kmsan_alloc_page+0x80/0xe0 [ 353.767046] __alloc_pages_nodemask+0x105b/0x6320 [ 353.771910] ? kmsan_set_origin_inline+0x6b/0x120 [ 353.776772] ? __msan_poison_alloca+0x183/0x220 [ 353.779959] FAULT_INJECTION: forcing a failure. [ 353.779959] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 353.781452] ? perf_event_task_sched_in+0x257/0x2b0 [ 353.781477] ? kmsan_set_origin_inline+0x6b/0x120 [ 353.781497] ? __msan_poison_alloca+0x183/0x220 [ 353.781516] ? _cond_resched+0x4c/0x100 [ 353.781545] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 353.781582] alloc_pages_current+0x6b1/0x970 [ 353.781611] pipe_write+0x7f0/0x1d30 [ 353.781652] ? init_wait_entry+0x1a0/0x1a0 [ 353.781673] ? pipe_read+0x1330/0x1330 [ 353.781691] __vfs_write+0x87e/0xb90 [ 353.781727] vfs_write+0x467/0x8c0 [ 353.781759] __x64_sys_write+0x1cf/0x400 [ 353.781785] ? ksys_write+0x380/0x380 [ 353.781798] do_syscall_64+0x15b/0x230 [ 353.781838] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 353.857612] RIP: 0033:0x455ab9 [ 353.860788] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.880053] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 353.887754] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 353.895016] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 353.902281] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 353.909540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 353.916799] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004c [ 353.924093] CPU: 0 PID: 15783 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 353.931410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.940795] Call Trace: [ 353.943441] dump_stack+0x185/0x1e0 [ 353.947113] should_fail+0x8a7/0xae0 [ 353.950881] __alloc_pages_nodemask+0x622/0x6320 [ 353.955689] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 353.960916] ? __msan_poison_alloca+0x183/0x220 [ 353.965655] ? kmsan_set_origin_inline+0x6b/0x120 [ 353.970536] ? __msan_poison_alloca+0x183/0x220 [ 353.975253] ? _cond_resched+0x4c/0x100 [ 353.979274] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 353.984766] alloc_pages_current+0x6b1/0x970 [ 353.989224] pipe_write+0x7f0/0x1d30 [ 353.992987] ? init_wait_entry+0x1a0/0x1a0 [ 353.997287] ? pipe_read+0x1330/0x1330 [ 354.001234] __vfs_write+0x87e/0xb90 [ 354.005007] vfs_write+0x467/0x8c0 [ 354.008621] __x64_sys_write+0x1cf/0x400 [ 354.012749] ? ksys_write+0x380/0x380 [ 354.016600] do_syscall_64+0x15b/0x230 [ 354.020530] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 354.025741] RIP: 0033:0x455ab9 [ 354.028933] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 354.049917] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 354.057680] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 354.064986] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 354.072278] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 354.079573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 354.086866] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000042 14:04:29 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f00000000c0)=0x1e4, &(0x7f0000000100)=0x2) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x1, r2}) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) fcntl$dupfd(r1, 0x406, r1) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x8879}}, 0xfef2) dup2(r1, r0) 14:04:29 executing program 0: mkdir(&(0x7f0000000140)='./control\x00', 0x8) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:29 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(0xffffffffffffffff) 14:04:29 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x8000, 0x0) getsockname$packet(r0, &(0x7f00000005c0), &(0x7f0000000600)=0x14) syz_open_dev$sndseq(&(0x7f0000000640)='/dev/snd/seq\x00', 0x0, 0x200000) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x4000, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000140)=0x14) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)=@allocspi={0x238, 0x16, 0x200, 0x70bd2b, 0x25dfdbfd, {{{@in6=@loopback={0x0, 0x1}, @in=@loopback=0x7f000001, 0x4e23, 0x4, 0x4e24, 0x0, 0xa, 0x20, 0xa0, 0x62, r2, r3}, {@in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4d6, 0xff}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, {0x6, 0x8, 0xffffffff, 0xff, 0x80000000, 0x81, 0x1}, {0x0, 0x80, 0x4, 0x2}, {0x9, 0x7fff, 0x100000001}, 0x70bd25, 0x0, 0xa, 0x0, 0xffff, 0x8}, 0x0, 0x7}, [@algo_comp={0xe0, 0x3, {{'lzs\x00'}, 0x4a8, "d17d644fb4e26aab85a0529b624887a8740e40fed75cc592b80cb3365c6f3a31fe0422fca46a068739e09058623e775503fd83f6517234c97f8764ec4e454d2d6e96bba3fe061038a7e569df4184e205d283c4e5cd5055747662dba3340e72fb44e37955f44709e8bfe02e204805fa9c8ad0a8d430083be903b9e0b7aabb088a9909b97e858959f7fb4206beb5e1535625a2b7c81b"}}, @lifetime_val={0x24, 0x9, {0x31, 0x4b77, 0x3ff, 0xbcb}}, @address_filter={0x28, 0x1a, {@in=@dev={0xac, 0x14, 0x14, 0x1a}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0xa, 0x2000000020, 0x2}}, @tfcpad={0x8, 0x16, 0x8047}, @mark={0xc, 0x15, {0x350759, 0x6}}]}, 0x238}, 0x1, 0x0, 0x0, 0x4}, 0x800) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:29 executing program 6 (fault-call:3 fault-nth:77): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:29 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x0, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:29 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) io_setup(0x4, &(0x7f0000000340)=0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x101000, 0x0) ioctl$FICLONERANGE(r2, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x9, 0x1, 0x8000}) r3 = memfd_create(&(0x7f0000000280)='\x00', 0x2) io_submit(r1, 0x2, &(0x7f0000000300)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2a50, r0, &(0x7f00000000c0)="dbdb7cca04768d9cea0a4644fb15f4468ddea4ca01abc3e8edf1cb599ad17da6f2012c1906cd10ce7bb4aae0c7528844581a4d92dd76c8d99d7c7d0cd59f82fc1fdfba16b00214e573687ebf070dc4ad0cb6f28a127a2077689afd7581533e", 0x5f, 0x1ff, 0x0, 0x1, r2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x80, r0, &(0x7f0000000240)="bbef3af4e0af869c48783e074d4d81002e426031", 0x14, 0x6, 0x0, 0x0, r3}]) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:29 executing program 2 (fault-call:3 fault-nth:67): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 354.598240] FAULT_INJECTION: forcing a failure. [ 354.598240] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 354.610092] CPU: 0 PID: 15819 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 354.617377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.626744] Call Trace: [ 354.629348] dump_stack+0x185/0x1e0 [ 354.632993] should_fail+0x8a7/0xae0 [ 354.636737] __alloc_pages_nodemask+0x622/0x6320 [ 354.641525] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 354.646993] ? get_page_from_freelist+0xb01f/0xbb50 [ 354.652035] ? __save_stack_trace+0xa45/0xca0 [ 354.656547] ? task_kmsan_context_state+0x6b/0x120 [ 354.661513] ? memcg_kmem_charge+0x5f8/0xac0 [ 354.665937] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 354.671321] FAULT_INJECTION: forcing a failure. [ 354.671321] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 354.671751] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 354.689478] ? __alloc_pages_nodemask+0x105b/0x6320 [ 354.694496] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 354.699863] ? kmsan_set_origin_inline+0x6b/0x120 [ 354.704717] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 354.710079] ? memcg_kmem_charge+0x79d/0xac0 [ 354.714488] kmsan_alloc_page+0x80/0xe0 [ 354.718459] __alloc_pages_nodemask+0x105b/0x6320 [ 354.723296] ? kmsan_set_origin_inline+0x6b/0x120 [ 354.728133] ? __msan_poison_alloca+0x183/0x220 [ 354.732793] ? perf_event_task_sched_in+0x257/0x2b0 [ 354.737805] ? kmsan_set_origin_inline+0x6b/0x120 [ 354.742638] ? __msan_poison_alloca+0x183/0x220 [ 354.747300] ? _cond_resched+0x4c/0x100 [ 354.751275] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 354.756647] alloc_pages_current+0x6b1/0x970 [ 354.761054] pipe_write+0x7f0/0x1d30 [ 354.764778] ? init_wait_entry+0x1a0/0x1a0 [ 354.769007] ? pipe_read+0x1330/0x1330 [ 354.772884] __vfs_write+0x87e/0xb90 [ 354.776606] vfs_write+0x467/0x8c0 [ 354.780150] __x64_sys_write+0x1cf/0x400 [ 354.784212] ? ksys_write+0x380/0x380 [ 354.788005] do_syscall_64+0x15b/0x230 [ 354.791890] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 354.797070] RIP: 0033:0x455ab9 [ 354.800244] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 354.819519] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 354.827220] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 354.834481] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 354.841738] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 354.849002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 354.856259] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004d [ 354.863550] CPU: 1 PID: 15823 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 354.870829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.880182] Call Trace: [ 354.882782] dump_stack+0x185/0x1e0 [ 354.886426] should_fail+0x8a7/0xae0 [ 354.890165] __alloc_pages_nodemask+0x622/0x6320 [ 354.894949] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 354.900409] ? get_page_from_freelist+0xb01f/0xbb50 [ 354.905444] ? __save_stack_trace+0xa45/0xca0 [ 354.909952] ? task_kmsan_context_state+0x6b/0x120 [ 354.914921] ? memcg_kmem_charge+0x5f8/0xac0 [ 354.919349] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 354.925092] ? kmsan_set_origin_inline+0x6b/0x120 [ 354.929963] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 354.935339] ? memcg_kmem_charge+0x79d/0xac0 [ 354.939760] kmsan_alloc_page+0x80/0xe0 [ 354.943745] __alloc_pages_nodemask+0x105b/0x6320 [ 354.948600] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 354.953786] ? __msan_poison_alloca+0x183/0x220 [ 354.958466] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 354.963836] ? balance_callback+0x48/0x260 [ 354.968080] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 354.973544] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 354.978937] alloc_pages_current+0x6b1/0x970 [ 354.983360] pipe_write+0x7f0/0x1d30 [ 354.987102] ? init_wait_entry+0x1a0/0x1a0 [ 354.991347] ? pipe_read+0x1330/0x1330 [ 354.995239] __vfs_write+0x87e/0xb90 [ 354.998977] vfs_write+0x467/0x8c0 [ 355.002538] __x64_sys_write+0x1cf/0x400 [ 355.006614] ? ksys_write+0x380/0x380 [ 355.010425] do_syscall_64+0x15b/0x230 [ 355.014333] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 355.019527] RIP: 0033:0x455ab9 [ 355.022715] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 355.042050] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 355.049771] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 355.057050] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 355.064319] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 355.071575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 355.078834] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000043 14:04:30 executing program 2 (fault-call:3 fault-nth:68): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:30 executing program 6 (fault-call:3 fault-nth:78): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:30 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x2, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:30 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x100, 0x8000) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000300), 0x4) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = accept4(r2, &(0x7f0000000200)=@pppoe={0x0, 0x0, {0x0, @link_local}}, &(0x7f0000000280)=0x80, 0x800) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000340)={0x0, 0x92}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000003c0)={r4, 0x800, 0xfffffffffffff30e}, &(0x7f0000000400)=0x8) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r5, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) close(r1) open(&(0x7f0000000140)='./control/file0\x00', 0x404401, 0x0) setsockopt$sock_timeval(r5, 0x1, 0x15, &(0x7f0000000080)={0x77359400}, 0x10) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 355.349953] FAULT_INJECTION: forcing a failure. [ 355.349953] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 355.351618] FAULT_INJECTION: forcing a failure. [ 355.351618] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 355.361808] CPU: 0 PID: 15845 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 355.361818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.361824] Call Trace: [ 355.361852] dump_stack+0x185/0x1e0 [ 355.361878] should_fail+0x8a7/0xae0 [ 355.361909] __alloc_pages_nodemask+0x622/0x6320 [ 355.361942] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 355.361983] ? get_page_from_freelist+0xb01f/0xbb50 [ 355.415427] ? __save_stack_trace+0xa45/0xca0 [ 355.419936] ? memcg_kmem_charge+0x5f8/0xac0 [ 355.424345] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 355.430142] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 355.436110] ? __alloc_pages_nodemask+0x105b/0x6320 [ 355.441128] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 355.446493] ? kmsan_set_origin_inline+0x6b/0x120 [ 355.451340] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 355.456699] ? memcg_kmem_charge+0x79d/0xac0 [ 355.461120] kmsan_alloc_page+0x80/0xe0 [ 355.465115] __alloc_pages_nodemask+0x105b/0x6320 [ 355.469956] ? kmsan_set_origin_inline+0x6b/0x120 [ 355.474795] ? __msan_poison_alloca+0x183/0x220 [ 355.479457] ? perf_event_task_sched_in+0x257/0x2b0 [ 355.484466] ? kmsan_set_origin_inline+0x6b/0x120 [ 355.489302] ? __msan_poison_alloca+0x183/0x220 [ 355.493962] ? _cond_resched+0x4c/0x100 [ 355.497935] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 355.503307] alloc_pages_current+0x6b1/0x970 [ 355.507714] pipe_write+0x7f0/0x1d30 [ 355.511439] ? init_wait_entry+0x1a0/0x1a0 [ 355.515667] ? pipe_read+0x1330/0x1330 [ 355.519546] __vfs_write+0x87e/0xb90 [ 355.523269] vfs_write+0x467/0x8c0 [ 355.526812] __x64_sys_write+0x1cf/0x400 [ 355.530872] ? ksys_write+0x380/0x380 [ 355.534663] do_syscall_64+0x15b/0x230 [ 355.538551] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 355.543728] RIP: 0033:0x455ab9 [ 355.546901] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 355.566160] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 355.574249] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 355.581510] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 355.588769] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 355.596029] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 355.603296] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000044 [ 355.610592] CPU: 1 PID: 15843 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 355.617905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.627282] Call Trace: [ 355.629924] dump_stack+0x185/0x1e0 [ 355.633594] should_fail+0x8a7/0xae0 [ 355.637357] __alloc_pages_nodemask+0x622/0x6320 [ 355.642166] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 355.647392] ? __msan_poison_alloca+0x183/0x220 [ 355.652129] ? kmsan_set_origin_inline+0x6b/0x120 [ 355.657000] ? __msan_poison_alloca+0x183/0x220 [ 355.661696] ? _cond_resched+0x4c/0x100 [ 355.665740] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 355.671175] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 355.676678] alloc_pages_current+0x6b1/0x970 [ 355.681171] pipe_write+0x7f0/0x1d30 [ 355.684938] ? init_wait_entry+0x1a0/0x1a0 [ 355.689230] ? pipe_read+0x1330/0x1330 [ 355.693173] __vfs_write+0x87e/0xb90 [ 355.696946] vfs_write+0x467/0x8c0 [ 355.700559] __x64_sys_write+0x1cf/0x400 [ 355.704688] ? ksys_write+0x380/0x380 [ 355.708539] do_syscall_64+0x15b/0x230 [ 355.712473] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 355.717685] RIP: 0033:0x455ab9 [ 355.720879] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 355.740486] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:30 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:30 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(0xffffffffffffffff) [ 355.748231] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 355.755520] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 355.762808] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 355.770097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 355.777392] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004e 14:04:30 executing program 2 (fault-call:3 fault-nth:69): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:30 executing program 6 (fault-call:3 fault-nth:79): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:30 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000000c0), 0x1d, 0x2) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000140)=0x3) setregid(r3, r4) 14:04:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 356.066197] FAULT_INJECTION: forcing a failure. [ 356.066197] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 356.078056] CPU: 1 PID: 15864 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 356.085336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.094695] Call Trace: [ 356.097298] dump_stack+0x185/0x1e0 [ 356.100951] should_fail+0x8a7/0xae0 [ 356.104691] __alloc_pages_nodemask+0x622/0x6320 [ 356.109478] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 356.114944] ? get_page_from_freelist+0xb01f/0xbb50 [ 356.119980] ? __save_stack_trace+0xa45/0xca0 [ 356.124491] ? task_kmsan_context_state+0x6b/0x120 [ 356.129457] ? memcg_kmem_charge+0x5f8/0xac0 [ 356.133885] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 356.139617] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 356.145602] ? __alloc_pages_nodemask+0x105b/0x6320 [ 356.150634] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 356.156022] ? kmsan_set_origin_inline+0x6b/0x120 [ 356.160893] ? __msan_metadata_ptr_for_load_8+0x10/0x20 14:04:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 356.166276] ? memcg_kmem_charge+0x79d/0xac0 [ 356.170695] kmsan_alloc_page+0x80/0xe0 [ 356.174687] __alloc_pages_nodemask+0x105b/0x6320 [ 356.179540] ? kmsan_set_origin_inline+0x6b/0x120 [ 356.184399] ? __msan_poison_alloca+0x183/0x220 [ 356.189081] ? perf_event_task_sched_in+0x257/0x2b0 [ 356.194110] ? kmsan_set_origin_inline+0x6b/0x120 [ 356.198967] ? __msan_poison_alloca+0x183/0x220 [ 356.203659] ? _cond_resched+0x4c/0x100 [ 356.207654] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 356.213048] alloc_pages_current+0x6b1/0x970 [ 356.217479] pipe_write+0x7f0/0x1d30 [ 356.221229] ? init_wait_entry+0x1a0/0x1a0 [ 356.225486] ? pipe_read+0x1330/0x1330 [ 356.229393] __vfs_write+0x87e/0xb90 [ 356.233133] vfs_write+0x467/0x8c0 [ 356.236694] __x64_sys_write+0x1cf/0x400 [ 356.240779] ? ksys_write+0x380/0x380 [ 356.244596] do_syscall_64+0x15b/0x230 [ 356.248502] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 356.253694] RIP: 0033:0x455ab9 14:04:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 356.256880] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 356.276258] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 356.283985] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 356.291273] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 356.298552] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 356.305836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 356.313123] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004f [ 356.355045] FAULT_INJECTION: forcing a failure. [ 356.355045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 356.367248] CPU: 1 PID: 15877 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 356.374562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.383949] Call Trace: [ 356.386615] dump_stack+0x185/0x1e0 [ 356.390320] should_fail+0x8a7/0xae0 [ 356.394091] __alloc_pages_nodemask+0x622/0x6320 [ 356.398910] ? kmsan_set_origin_inline+0x6b/0x120 14:04:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 356.404485] ? __msan_poison_alloca+0x183/0x220 [ 356.409193] ? perf_event_task_sched_in+0x257/0x2b0 [ 356.414271] ? kmsan_set_origin_inline+0x6b/0x120 [ 356.419157] ? __msan_poison_alloca+0x183/0x220 [ 356.423891] ? _cond_resched+0x4c/0x100 [ 356.427941] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 356.433371] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 356.438867] alloc_pages_current+0x6b1/0x970 [ 356.443331] pipe_write+0x7f0/0x1d30 [ 356.447107] ? init_wait_entry+0x1a0/0x1a0 [ 356.451416] ? pipe_read+0x1330/0x1330 [ 356.455373] __vfs_write+0x87e/0xb90 [ 356.459153] vfs_write+0x467/0x8c0 [ 356.462770] __x64_sys_write+0x1cf/0x400 [ 356.466955] ? ksys_write+0x380/0x380 [ 356.470827] do_syscall_64+0x15b/0x230 [ 356.474765] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 356.479981] RIP: 0033:0x455ab9 [ 356.483178] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 356.502770] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 356.510527] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 356.517853] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 356.525183] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 356.532479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 356.539776] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000045 14:04:31 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:31 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:31 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x2, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000000c0), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000380)={0x6, 0x197, 0x3, 'queue1\x00', 0x7ff}) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x7fff80000}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r2, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x84) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:31 executing program 6 (fault-call:3 fault-nth:80): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:31 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) write(r0, &(0x7f0000000140)="6ce3d68bd4aca6953de4a47cdd6a9847895a832ef0fe50b291a66e72de99da4b7d32109c3de05dbed23ee989935cbb7a3890108becd1849b1e79e1b7c42a69f98e4e8cfd4112b0e5005b415fcf81343c6cbbe1ef93df1987b339a08e79b50f370f1a1f7301d4b7cc65a46d2cf4a490818ccc758e8769c0ff66dd18bb57a8c5bee1a6e8779b0a1d8c4c22d9af48688c07f40de03bf7089f0ac25d1e9af430f8a7ea8e51d10a5fc187c41579458bd8afc709dba7e8abcd26cb909fc6586f8ed4737827188ff2d75b044cb4693ccb46f3c47bc70af01b3a", 0xd6) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) accept$inet(r1, &(0x7f0000000280)={0x0, 0x0, @dev}, &(0x7f00000002c0)=0x10) mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fchmodat(r3, &(0x7f0000000080)='./control/file0\x00', 0x1) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r2) 14:04:31 executing program 2 (fault-call:3 fault-nth:70): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 356.829155] FAULT_INJECTION: forcing a failure. [ 356.829155] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 356.841026] CPU: 0 PID: 15896 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 356.848311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.857667] Call Trace: [ 356.860272] dump_stack+0x185/0x1e0 [ 356.863914] should_fail+0x8a7/0xae0 [ 356.867655] __alloc_pages_nodemask+0x622/0x6320 [ 356.872459] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 356.877929] ? get_page_from_freelist+0xb01f/0xbb50 [ 356.882968] ? __save_stack_trace+0xa45/0xca0 [ 356.887500] ? memcg_kmem_charge+0x5f8/0xac0 [ 356.892107] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 356.897933] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 356.903916] ? __alloc_pages_nodemask+0x105b/0x6320 [ 356.908955] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 356.914346] ? kmsan_set_origin_inline+0x6b/0x120 [ 356.919216] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 356.924595] ? memcg_kmem_charge+0x79d/0xac0 [ 356.929028] kmsan_alloc_page+0x80/0xe0 [ 356.933025] __alloc_pages_nodemask+0x105b/0x6320 [ 356.937886] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 356.943088] ? __msan_poison_alloca+0x183/0x220 [ 356.947801] ? kmsan_set_origin_inline+0x6b/0x120 [ 356.952658] ? __msan_poison_alloca+0x183/0x220 [ 356.957338] ? _cond_resched+0x4c/0x100 [ 356.961337] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 356.966735] alloc_pages_current+0x6b1/0x970 [ 356.971170] pipe_write+0x7f0/0x1d30 [ 356.974922] ? init_wait_entry+0x1a0/0x1a0 [ 356.979178] ? pipe_read+0x1330/0x1330 [ 356.983079] __vfs_write+0x87e/0xb90 [ 356.986825] vfs_write+0x467/0x8c0 [ 356.990389] __x64_sys_write+0x1cf/0x400 [ 356.994480] ? ksys_write+0x380/0x380 [ 356.998292] do_syscall_64+0x15b/0x230 [ 357.002197] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 357.007392] RIP: 0033:0x455ab9 [ 357.010587] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:32 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(0xffffffffffffffff) [ 357.029954] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 357.037685] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 357.044969] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 357.052256] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 357.059538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 357.066815] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000050 [ 357.077583] FAULT_INJECTION: forcing a failure. [ 357.077583] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 357.089419] CPU: 1 PID: 15911 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 357.096695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.106052] Call Trace: [ 357.108657] dump_stack+0x185/0x1e0 [ 357.112309] should_fail+0x8a7/0xae0 [ 357.116056] __alloc_pages_nodemask+0x622/0x6320 [ 357.120841] ? __msan_metadata_ptr_for_store_8+0x13/0x20 14:04:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 357.126301] ? get_page_from_freelist+0xb01f/0xbb50 [ 357.131335] ? __save_stack_trace+0xa45/0xca0 [ 357.135877] ? memcg_kmem_charge+0x5f8/0xac0 [ 357.140325] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 357.146061] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 357.152046] ? __alloc_pages_nodemask+0x105b/0x6320 [ 357.157082] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 357.162471] ? kmsan_set_origin_inline+0x6b/0x120 [ 357.167341] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 357.172722] ? memcg_kmem_charge+0x79d/0xac0 [ 357.177149] kmsan_alloc_page+0x80/0xe0 [ 357.181145] __alloc_pages_nodemask+0x105b/0x6320 [ 357.186004] ? kmsan_set_origin_inline+0x6b/0x120 [ 357.190860] ? __msan_poison_alloca+0x183/0x220 [ 357.195716] ? perf_event_task_sched_in+0x257/0x2b0 [ 357.200748] ? kmsan_set_origin_inline+0x6b/0x120 [ 357.205612] ? __msan_poison_alloca+0x183/0x220 [ 357.210300] ? _cond_resched+0x4c/0x100 [ 357.214312] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 357.219710] alloc_pages_current+0x6b1/0x970 [ 357.224144] pipe_write+0x7f0/0x1d30 14:04:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 357.227887] ? init_wait_entry+0x1a0/0x1a0 [ 357.232145] ? pipe_read+0x1330/0x1330 [ 357.236043] __vfs_write+0x87e/0xb90 [ 357.239785] vfs_write+0x467/0x8c0 [ 357.243347] __x64_sys_write+0x1cf/0x400 [ 357.247422] ? ksys_write+0x380/0x380 [ 357.251230] do_syscall_64+0x15b/0x230 [ 357.255139] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 357.260329] RIP: 0033:0x455ab9 [ 357.263515] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.282843] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 357.290561] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 357.297839] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 357.305121] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 357.312403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 357.319689] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000046 14:04:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:32 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(0xffffffffffffffff, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:32 executing program 6 (fault-call:3 fault-nth:81): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:32 executing program 2 (fault-call:3 fault-nth:71): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 357.552587] FAULT_INJECTION: forcing a failure. [ 357.552587] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 357.564673] CPU: 0 PID: 15929 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 357.572563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.582208] Call Trace: [ 357.584831] dump_stack+0x185/0x1e0 [ 357.588502] should_fail+0x8a7/0xae0 [ 357.592245] __alloc_pages_nodemask+0x622/0x6320 [ 357.597025] ? kmsan_set_origin_inline+0x6b/0x120 [ 357.601901] ? __msan_poison_alloca+0x183/0x220 [ 357.606608] ? perf_event_task_sched_in+0x257/0x2b0 [ 357.611683] ? kmsan_set_origin_inline+0x6b/0x120 [ 357.616567] ? __msan_poison_alloca+0x183/0x220 [ 357.621290] ? _cond_resched+0x4c/0x100 [ 357.625324] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 357.630744] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 357.636255] alloc_pages_current+0x6b1/0x970 [ 357.640725] pipe_write+0x7f0/0x1d30 [ 357.644493] ? init_wait_entry+0x1a0/0x1a0 [ 357.648799] ? pipe_read+0x1330/0x1330 14:04:32 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000040)={0x0, 0x7, 0x40}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000080)={0x57, ""/87}) dup2(r1, r0) [ 357.652749] __vfs_write+0x87e/0xb90 [ 357.656525] vfs_write+0x467/0x8c0 [ 357.660139] __x64_sys_write+0x1cf/0x400 [ 357.664266] ? ksys_write+0x380/0x380 [ 357.668117] do_syscall_64+0x15b/0x230 [ 357.672056] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 357.677269] RIP: 0033:0x455ab9 [ 357.680471] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.700111] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 357.707864] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 357.715162] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 357.722457] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 357.729750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 357.737054] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000051 [ 357.759780] FAULT_INJECTION: forcing a failure. [ 357.759780] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 357.771617] CPU: 0 PID: 15940 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 357.778891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.788244] Call Trace: [ 357.790865] dump_stack+0x185/0x1e0 [ 357.794505] should_fail+0x8a7/0xae0 [ 357.798252] __alloc_pages_nodemask+0x622/0x6320 [ 357.803045] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 357.808514] ? get_page_from_freelist+0xb01f/0xbb50 [ 357.813547] ? __save_stack_trace+0xa45/0xca0 [ 357.818081] ? memcg_kmem_charge+0x5f8/0xac0 [ 357.822504] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 357.828315] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 357.834321] ? __alloc_pages_nodemask+0x105b/0x6320 [ 357.839358] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 357.844744] ? kmsan_set_origin_inline+0x6b/0x120 [ 357.849611] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 357.855011] ? memcg_kmem_charge+0x79d/0xac0 [ 357.859444] kmsan_alloc_page+0x80/0xe0 [ 357.863439] __alloc_pages_nodemask+0x105b/0x6320 [ 357.868324] ? kmsan_set_origin_inline+0x6b/0x120 [ 357.873192] ? __msan_poison_alloca+0x183/0x220 [ 357.877873] ? perf_event_task_sched_in+0x257/0x2b0 [ 357.882901] ? kmsan_set_origin_inline+0x6b/0x120 [ 357.887755] ? __msan_poison_alloca+0x183/0x220 [ 357.892440] ? _cond_resched+0x4c/0x100 [ 357.896439] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 357.901836] alloc_pages_current+0x6b1/0x970 [ 357.906266] pipe_write+0x7f0/0x1d30 [ 357.910009] ? init_wait_entry+0x1a0/0x1a0 [ 357.914269] ? pipe_read+0x1330/0x1330 [ 357.918166] __vfs_write+0x87e/0xb90 [ 357.921912] vfs_write+0x467/0x8c0 [ 357.925482] __x64_sys_write+0x1cf/0x400 [ 357.929570] ? ksys_write+0x380/0x380 [ 357.933385] do_syscall_64+0x15b/0x230 [ 357.937304] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 357.942503] RIP: 0033:0x455ab9 14:04:33 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000080)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 357.945692] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 357.965065] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 357.972791] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 357.980072] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 357.987354] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 357.994652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 358.001930] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000047 14:04:33 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) futex(&(0x7f000000cffc)=0x1, 0x0, 0x4, &(0x7f0000edfff0)={r0, r1+30000000}, &(0x7f0000000140), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) r2 = gettid() sched_rr_get_interval(r2, &(0x7f0000000280)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) r3 = shmget$private(0x0, 0x4000, 0x100, &(0x7f0000ffc000/0x4000)=nil) shmat(r3, &(0x7f0000001000/0x10000)=nil, 0x1000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, &(0x7f00000000c0)=0x9, 0x121f9e10, 0x3) r4 = shmget$private(0x0, 0x4000, 0x400, &(0x7f0000002000/0x4000)=nil) shmctl$SHM_LOCK(r4, 0xb) 14:04:33 executing program 2 (fault-call:3 fault-nth:72): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:33 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$tun(r1, &(0x7f0000000040)={@val={0x0, 0x6000}, @val={0x1, 0x3, 0x0, 0x9, 0x2, 0x8}, @llc={@snap={0x1, 0xaa, "a827", '*pL', 0x86dd}}}, 0x17) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:33 executing program 6 (fault-call:3 fault-nth:82): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(0xffffffffffffffff, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 358.326787] FAULT_INJECTION: forcing a failure. [ 358.326787] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 358.338649] CPU: 0 PID: 15960 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 358.345931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.355286] Call Trace: [ 358.357886] dump_stack+0x185/0x1e0 [ 358.361531] should_fail+0x8a7/0xae0 [ 358.365265] __alloc_pages_nodemask+0x622/0x6320 [ 358.370047] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 358.375510] ? get_page_from_freelist+0xb01f/0xbb50 [ 358.380540] ? __save_stack_trace+0xa45/0xca0 [ 358.385069] ? memcg_kmem_charge+0x5f8/0xac0 [ 358.389494] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 358.395214] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 358.401192] ? __alloc_pages_nodemask+0x105b/0x6320 [ 358.406223] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 358.411609] ? kmsan_set_origin_inline+0x6b/0x120 [ 358.416465] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 358.421846] ? memcg_kmem_charge+0x79d/0xac0 [ 358.426274] kmsan_alloc_page+0x80/0xe0 [ 358.430267] __alloc_pages_nodemask+0x105b/0x6320 [ 358.435132] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 358.440333] ? __msan_poison_alloca+0x183/0x220 [ 358.440621] FAULT_INJECTION: forcing a failure. [ 358.440621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 358.445041] ? kmsan_set_origin_inline+0x6b/0x120 [ 358.445061] ? __msan_poison_alloca+0x183/0x220 [ 358.445079] ? _cond_resched+0x4c/0x100 [ 358.445106] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 358.445140] alloc_pages_current+0x6b1/0x970 [ 358.445183] pipe_write+0x7f0/0x1d30 [ 358.483835] ? init_wait_entry+0x1a0/0x1a0 [ 358.488072] ? pipe_read+0x1330/0x1330 [ 358.491951] __vfs_write+0x87e/0xb90 [ 358.495670] vfs_write+0x467/0x8c0 [ 358.499213] __x64_sys_write+0x1cf/0x400 [ 358.503276] ? ksys_write+0x380/0x380 [ 358.507072] do_syscall_64+0x15b/0x230 [ 358.510974] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 358.516154] RIP: 0033:0x455ab9 [ 358.519334] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.538584] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 358.546286] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 358.553546] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 358.560806] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 358.568072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 358.575335] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000052 [ 358.582631] CPU: 1 PID: 15968 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 358.589934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.599309] Call Trace: [ 358.601950] dump_stack+0x185/0x1e0 [ 358.605624] should_fail+0x8a7/0xae0 [ 358.609387] __alloc_pages_nodemask+0x622/0x6320 [ 358.614190] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 358.619415] ? __msan_poison_alloca+0x183/0x220 [ 358.624158] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 358.629586] ? balance_callback+0x48/0x260 [ 358.633875] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 358.639386] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 358.644804] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 358.650298] alloc_pages_current+0x6b1/0x970 [ 358.654752] pipe_write+0x7f0/0x1d30 [ 358.658518] ? init_wait_entry+0x1a0/0x1a0 [ 358.662816] ? pipe_read+0x1330/0x1330 [ 358.666763] __vfs_write+0x87e/0xb90 [ 358.670540] vfs_write+0x467/0x8c0 [ 358.674159] __x64_sys_write+0x1cf/0x400 [ 358.678287] ? ksys_write+0x380/0x380 [ 358.682140] do_syscall_64+0x15b/0x230 [ 358.686074] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 358.691289] RIP: 0033:0x455ab9 [ 358.694490] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 358.714101] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:33 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(0xffffffffffffffff, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 358.721853] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 358.729155] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 358.736454] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 358.743746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 358.751037] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000048 14:04:33 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000000080)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000580)="b2"}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:33 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:34 executing program 2 (fault-call:3 fault-nth:73): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:34 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) r0 = epoll_create(0x100000001) mmap(&(0x7f0000013000/0xd000)=nil, 0xd000, 0x1, 0x50011, r0, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) prctl$setendian(0x14, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000080)='./control\x00') ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000600)) r3 = semget$private(0x0, 0x4, 0x1) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000140)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000340)={{{@in6, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) stat(&(0x7f0000000480)='./control\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000540)={{0x9, r4, r5, r6, r7, 0x8, 0x100000001}, 0xffffffff, 0x0, 0xfffffffffffffffc}) timerfd_gettime(r2, &(0x7f00000005c0)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000780)={0x0, 0x5, 0x2, [0x9, 0x51]}, &(0x7f00000007c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000800)={0x8000, 0x7, 0x4, 0x7, 0x5c9, 0x3, 0x8, 0x7, r8}, &(0x7f0000000840)=0x20) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r1) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000640)={{{@in=@dev, @in=@rand_addr}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) 14:04:34 executing program 6 (fault-call:3 fault-nth:83): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:34 executing program 5 (fault-call:6 fault-nth:0): mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:34 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x13, 0x240080) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000340)=@assoc_value={0x0}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0)=@assoc_id=r1, 0x4) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x100, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000140)) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.advise\x00', &(0x7f0000000200)=""/254, 0xfe) [ 359.241183] FAULT_INJECTION: forcing a failure. [ 359.241183] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 359.253056] CPU: 1 PID: 16000 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 359.260344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.269713] Call Trace: [ 359.272327] dump_stack+0x185/0x1e0 [ 359.275984] should_fail+0x8a7/0xae0 [ 359.279734] __alloc_pages_nodemask+0x622/0x6320 [ 359.284528] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 359.290006] ? get_page_from_freelist+0xb01f/0xbb50 [ 359.295050] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 359.300442] ? pick_next_entity+0x1a71/0x1ac0 [ 359.304990] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 359.310820] ? try_charge+0x262b/0x2e90 [ 359.314837] ? kmsan_set_origin_inline+0x6b/0x120 [ 359.319714] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 359.325102] ? memcg_kmem_charge+0x79d/0xac0 [ 359.329538] kmsan_alloc_page+0x80/0xe0 [ 359.333536] __alloc_pages_nodemask+0x105b/0x6320 [ 359.338407] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 359.343798] ? __msan_poison_alloca+0x183/0x220 [ 359.348505] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 359.353889] ? balance_callback+0x48/0x260 [ 359.358155] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 359.363629] ? apic_timer_interrupt+0xa/0x20 [ 359.368066] ? check_preempt_wakeup+0x1590/0x1590 [ 359.372957] alloc_pages_current+0x6b1/0x970 [ 359.377394] pipe_write+0x7f0/0x1d30 [ 359.381145] ? init_wait_entry+0x1a0/0x1a0 [ 359.385406] ? pipe_read+0x1330/0x1330 [ 359.389310] __vfs_write+0x87e/0xb90 [ 359.393064] vfs_write+0x467/0x8c0 [ 359.396639] __x64_sys_write+0x1cf/0x400 [ 359.400731] ? ksys_write+0x380/0x380 [ 359.404554] do_syscall_64+0x15b/0x230 [ 359.408470] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 359.413668] RIP: 0033:0x455ab9 [ 359.416857] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 359.436203] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 359.443937] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 359.451222] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 359.458495] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 359.465757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 359.473033] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000053 [ 359.485366] FAULT_INJECTION: forcing a failure. [ 359.485366] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 359.497246] CPU: 0 PID: 16005 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 359.504531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.513899] Call Trace: [ 359.516515] dump_stack+0x185/0x1e0 [ 359.520165] should_fail+0x8a7/0xae0 [ 359.523910] __alloc_pages_nodemask+0x622/0x6320 [ 359.528700] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 359.534168] ? get_page_from_freelist+0xb01f/0xbb50 [ 359.539203] ? __save_stack_trace+0xa45/0xca0 [ 359.543734] ? memcg_kmem_charge+0x5f8/0xac0 [ 359.548165] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 359.553892] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 359.559876] ? __alloc_pages_nodemask+0x105b/0x6320 [ 359.564912] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 359.570302] ? kmsan_set_origin_inline+0x6b/0x120 [ 359.575602] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 359.580985] ? memcg_kmem_charge+0x79d/0xac0 [ 359.585432] kmsan_alloc_page+0x80/0xe0 14:04:34 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000080)='./control/file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000180)={0x66d1e20, 0x1, 0x0, 0x8001}, 0x8) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') getrandom(&(0x7f0000000000)=""/25, 0x19, 0x1) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f0000000140)={0x1, 0x0, 0x6}) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) [ 359.589477] __alloc_pages_nodemask+0x105b/0x6320 [ 359.594331] ? kmsan_set_origin_inline+0x6b/0x120 [ 359.599192] ? __msan_poison_alloca+0x183/0x220 [ 359.603877] ? perf_event_task_sched_in+0x257/0x2b0 [ 359.608909] ? kmsan_set_origin_inline+0x6b/0x120 [ 359.613767] ? __msan_poison_alloca+0x183/0x220 [ 359.618449] ? _cond_resched+0x4c/0x100 [ 359.622444] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 359.627840] alloc_pages_current+0x6b1/0x970 [ 359.632265] pipe_write+0x7f0/0x1d30 [ 359.636006] ? init_wait_entry+0x1a0/0x1a0 [ 359.640261] ? pipe_read+0x1330/0x1330 [ 359.644164] __vfs_write+0x87e/0xb90 [ 359.647913] vfs_write+0x467/0x8c0 [ 359.651486] __x64_sys_write+0x1cf/0x400 [ 359.655571] ? ksys_write+0x380/0x380 [ 359.659383] do_syscall_64+0x15b/0x230 [ 359.663304] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 359.668506] RIP: 0033:0x455ab9 [ 359.671697] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:34 executing program 1: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(0xffffffffffffffff, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 359.691099] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 359.698850] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 359.706135] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 359.713429] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 359.720715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 359.727996] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000049 14:04:34 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x1) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) 14:04:34 executing program 6 (fault-call:3 fault-nth:84): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:34 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:35 executing program 2 (fault-call:3 fault-nth:74): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 359.987307] FAULT_INJECTION: forcing a failure. [ 359.987307] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 359.999337] CPU: 1 PID: 16029 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 360.006648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.016378] Call Trace: [ 360.019020] dump_stack+0x185/0x1e0 [ 360.022694] should_fail+0x8a7/0xae0 [ 360.026462] __alloc_pages_nodemask+0x622/0x6320 [ 360.031261] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.036147] ? __msan_poison_alloca+0x183/0x220 [ 360.040855] ? perf_event_task_sched_in+0x257/0x2b0 [ 360.045923] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.050813] ? __msan_poison_alloca+0x183/0x220 [ 360.055527] ? _cond_resched+0x4c/0x100 [ 360.059554] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 360.065000] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 360.070532] alloc_pages_current+0x6b1/0x970 [ 360.075004] pipe_write+0x7f0/0x1d30 [ 360.076563] FAULT_INJECTION: forcing a failure. [ 360.076563] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 360.078794] ? init_wait_entry+0x1a0/0x1a0 [ 360.094880] ? pipe_read+0x1330/0x1330 [ 360.098833] __vfs_write+0x87e/0xb90 [ 360.102578] vfs_write+0x467/0x8c0 [ 360.106176] __x64_sys_write+0x1cf/0x400 [ 360.110286] ? ksys_write+0x380/0x380 [ 360.114118] do_syscall_64+0x15b/0x230 [ 360.118028] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 360.123221] RIP: 0033:0x455ab9 [ 360.126411] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.145917] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 360.153642] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 360.160919] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 360.168190] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 360.175461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 360.182846] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000054 [ 360.190131] CPU: 0 PID: 16035 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 360.197420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.206803] Call Trace: [ 360.209408] dump_stack+0x185/0x1e0 [ 360.213053] should_fail+0x8a7/0xae0 [ 360.216792] __alloc_pages_nodemask+0x622/0x6320 [ 360.221570] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 360.227033] ? get_page_from_freelist+0xb01f/0xbb50 [ 360.232068] ? __save_stack_trace+0xa45/0xca0 [ 360.236578] ? task_kmsan_context_state+0x6b/0x120 [ 360.241538] ? memcg_kmem_charge+0x5f8/0xac0 [ 360.245959] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 360.251766] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 360.257744] ? __alloc_pages_nodemask+0x105b/0x6320 [ 360.262775] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 360.268154] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.273017] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 360.278399] ? memcg_kmem_charge+0x79d/0xac0 [ 360.282829] kmsan_alloc_page+0x80/0xe0 [ 360.286836] __alloc_pages_nodemask+0x105b/0x6320 [ 360.291696] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.296544] ? __msan_poison_alloca+0x183/0x220 [ 360.301226] ? perf_event_task_sched_in+0x257/0x2b0 [ 360.306243] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.311097] ? __msan_poison_alloca+0x183/0x220 [ 360.315758] ? _cond_resched+0x4c/0x100 [ 360.319743] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 360.325136] alloc_pages_current+0x6b1/0x970 [ 360.329548] pipe_write+0x7f0/0x1d30 [ 360.333269] ? init_wait_entry+0x1a0/0x1a0 [ 360.337518] ? pipe_read+0x1330/0x1330 [ 360.341397] __vfs_write+0x87e/0xb90 [ 360.345125] vfs_write+0x467/0x8c0 [ 360.348688] __x64_sys_write+0x1cf/0x400 [ 360.352746] ? ksys_write+0x380/0x380 [ 360.356533] do_syscall_64+0x15b/0x230 [ 360.360430] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 360.365604] RIP: 0033:0x455ab9 [ 360.368775] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.387934] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 360.395631] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 360.402885] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 360.410148] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 360.417408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 360.424669] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004a [ 360.475360] FAULT_INJECTION: forcing a failure. [ 360.475360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 360.487386] CPU: 0 PID: 16004 Comm: syz-executor5 Not tainted 4.18.0-rc5+ #29 [ 360.494688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.504058] Call Trace: [ 360.506695] dump_stack+0x185/0x1e0 [ 360.510367] should_fail+0x8a7/0xae0 [ 360.514136] __alloc_pages_nodemask+0x622/0x6320 [ 360.518944] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.523816] ? __msan_poison_alloca+0x183/0x220 [ 360.528520] ? perf_event_task_sched_in+0x257/0x2b0 [ 360.533575] ? __perf_event_task_sched_in+0x74/0xab0 [ 360.538716] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.543594] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.548470] ? __msan_poison_alloca+0x183/0x220 [ 360.553203] ? alloc_pages_vma+0x113/0x1830 [ 360.557587] alloc_pages_vma+0xce5/0x1830 [ 360.561845] shmem_alloc_and_acct_page+0x76b/0x1160 [ 360.566935] shmem_getpage_gfp+0x3d9b/0x6090 [ 360.571454] ? do_page_fault+0x98/0xd0 [ 360.575424] ? page_fault+0x1e/0x30 [ 360.579117] ? shmem_match+0x1e0/0x1e0 [ 360.583053] shmem_write_begin+0x1ae/0x330 [ 360.587381] ? shmem_writepage+0x1980/0x1980 [ 360.591862] generic_perform_write+0x447/0xa00 [ 360.596483] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 360.601900] ? current_time+0x10a/0x2e0 [ 360.605935] __generic_file_write_iter+0x429/0xa00 [ 360.610934] generic_file_write_iter+0x814/0xbf0 [ 360.615763] ? __generic_file_write_iter+0xa00/0xa00 [ 360.620942] __vfs_write+0x87e/0xb90 [ 360.624726] vfs_write+0x467/0x8c0 [ 360.628345] __x64_sys_write+0x1cf/0x400 [ 360.632487] ? ksys_write+0x380/0x380 [ 360.636338] do_syscall_64+0x15b/0x230 [ 360.640268] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 360.645482] RIP: 0033:0x455ab9 [ 360.648680] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 360.668292] RSP: 002b:00007fdfdc1a2c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 14:04:35 executing program 7: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000200)={0x101, 0x2, 0x1, 0x352f, [], [], [], 0x0, 0x10000, 0x8, 0x6, "55d5dd0de684dcb948372e227e8ccf57"}) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:35 executing program 2 (fault-call:3 fault-nth:75): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:35 executing program 6 (fault-call:3 fault-nth:85): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 360.676041] RAX: ffffffffffffffda RBX: 00007fdfdc1a36d4 RCX: 0000000000455ab9 [ 360.683335] RDX: 0000000000000030 RSI: 0000000020011fd2 RDI: 0000000000000014 [ 360.690631] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 360.697923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 360.705216] R13: 00000000004c2d5c R14: 00000000004d4da0 R15: 0000000000000000 [ 360.793279] FAULT_INJECTION: forcing a failure. [ 360.793279] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 360.805129] CPU: 1 PID: 16057 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 360.812407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.814709] FAULT_INJECTION: forcing a failure. [ 360.814709] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 360.821762] Call Trace: [ 360.821792] dump_stack+0x185/0x1e0 [ 360.821818] should_fail+0x8a7/0xae0 [ 360.821849] __alloc_pages_nodemask+0x622/0x6320 [ 360.821905] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 360.853881] ? get_page_from_freelist+0xb01f/0xbb50 [ 360.858905] ? __save_stack_trace+0xa45/0xca0 [ 360.863415] ? memcg_kmem_charge+0x5f8/0xac0 [ 360.867823] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 360.873543] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 360.879511] ? __alloc_pages_nodemask+0x105b/0x6320 [ 360.884524] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 360.889891] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.894736] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 360.900097] ? memcg_kmem_charge+0x79d/0xac0 [ 360.904503] kmsan_alloc_page+0x80/0xe0 [ 360.908478] __alloc_pages_nodemask+0x105b/0x6320 [ 360.913317] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.918156] ? __msan_poison_alloca+0x183/0x220 [ 360.922821] ? perf_event_task_sched_in+0x257/0x2b0 [ 360.927831] ? kmsan_set_origin_inline+0x6b/0x120 [ 360.932668] ? __msan_poison_alloca+0x183/0x220 [ 360.937333] ? _cond_resched+0x4c/0x100 [ 360.941318] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 360.946692] alloc_pages_current+0x6b1/0x970 [ 360.951106] pipe_write+0x7f0/0x1d30 [ 360.954829] ? init_wait_entry+0x1a0/0x1a0 [ 360.959062] ? pipe_read+0x1330/0x1330 [ 360.962955] __vfs_write+0x87e/0xb90 [ 360.966676] vfs_write+0x467/0x8c0 [ 360.970308] __x64_sys_write+0x1cf/0x400 [ 360.974372] ? ksys_write+0x380/0x380 [ 360.978162] do_syscall_64+0x15b/0x230 [ 360.982055] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 360.987238] RIP: 0033:0x455ab9 [ 360.990412] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.009661] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.017362] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 361.024622] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 361.031902] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 361.039161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 361.046424] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000055 [ 361.053717] CPU: 0 PID: 16060 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 361.061021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.070405] Call Trace: [ 361.073043] dump_stack+0x185/0x1e0 [ 361.076713] should_fail+0x8a7/0xae0 [ 361.080475] __alloc_pages_nodemask+0x622/0x6320 [ 361.085275] ? __perf_event_task_sched_in+0xa3b/0xab0 14:04:36 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x78b5e2e5ae333561}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 361.090499] ? __msan_poison_alloca+0x183/0x220 [ 361.095233] ? kmsan_set_origin_inline+0x6b/0x120 [ 361.100115] ? __msan_poison_alloca+0x183/0x220 [ 361.104839] ? _cond_resched+0x4c/0x100 [ 361.108853] ? apic_timer_interrupt+0xa/0x20 [ 361.113307] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 361.118804] alloc_pages_current+0x6b1/0x970 [ 361.123255] pipe_write+0x7f0/0x1d30 [ 361.127019] ? init_wait_entry+0x1a0/0x1a0 [ 361.131337] ? pipe_read+0x1330/0x1330 [ 361.135282] __vfs_write+0x87e/0xb90 [ 361.139051] vfs_write+0x467/0x8c0 14:04:36 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:36 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 361.142661] __x64_sys_write+0x1cf/0x400 [ 361.146783] ? ksys_write+0x380/0x380 [ 361.150632] do_syscall_64+0x15b/0x230 [ 361.154563] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 361.159775] RIP: 0033:0x455ab9 [ 361.162974] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.182592] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.190341] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 361.197646] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 361.204941] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 361.212241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 361.219536] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004b 14:04:36 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000013000/0x4000)=nil, 0x4000}, 0x3}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000000080)={@empty, @loopback, @rand_addr}, &(0x7f00000000c0)=0xc) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) setsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000000)="121ba80c3a95d6d952e999d141293fe3bf9a73fdd997e6547bf5f3e8245af4c1da37a58456e7e27027c36087b8b9c1d8bdb585819328702cf6d100c6e1c5db7f52bc699e9fe89991fcf43c48314bbf855318d9df24dc018c9e4c6a7d32dac8ce1f923f83c29c", 0x66) close(r0) 14:04:36 executing program 6 (fault-call:3 fault-nth:86): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:36 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x280501, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r2, 0x836, 0x70bd2c, 0x25dfdbfd, {0x2}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x40040) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 361.348234] FAULT_INJECTION: forcing a failure. [ 361.348234] name failslab, interval 1, probability 0, space 0, times 0 [ 361.359653] CPU: 0 PID: 16069 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 361.366958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.376340] Call Trace: [ 361.378982] dump_stack+0x185/0x1e0 [ 361.382674] ? __should_failslab+0x278/0x2a0 [ 361.387126] should_fail+0x8a7/0xae0 [ 361.390888] __should_failslab+0x278/0x2a0 [ 361.395192] should_failslab+0x29/0x70 [ 361.399128] kmem_cache_alloc+0x13c/0xbb0 [ 361.403346] ? sctp_get_port_local+0xc38/0x1c60 [ 361.408096] sctp_get_port_local+0xc38/0x1c60 [ 361.412696] sctp_get_port+0x144/0x1e0 [ 361.416624] ? sctp_unhash+0x10/0x10 [ 361.420367] inet_sendmsg+0x626/0x760 [ 361.424234] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 361.429668] ? inet_getname+0x4a0/0x4a0 [ 361.433691] __sys_sendto+0x798/0x8e0 [ 361.437571] ? syscall_return_slowpath+0x108/0x800 [ 361.442564] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 361.448006] __x64_sys_sendto+0x1a1/0x210 [ 361.451139] FAULT_INJECTION: forcing a failure. [ 361.451139] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 361.452223] ? __sys_sendto+0x8e0/0x8e0 [ 361.467977] do_syscall_64+0x15b/0x230 [ 361.471921] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 361.477123] RIP: 0033:0x455ab9 [ 361.480309] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.499828] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 361.507557] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 361.514840] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 361.522116] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c [ 361.529394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 361.536677] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000000 [ 361.543974] CPU: 1 PID: 16077 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 361.551250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.560605] Call Trace: [ 361.563205] dump_stack+0x185/0x1e0 [ 361.566851] should_fail+0x8a7/0xae0 [ 361.570589] __alloc_pages_nodemask+0x622/0x6320 [ 361.575379] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 361.580868] ? get_page_from_freelist+0xb01f/0xbb50 [ 361.585910] ? __save_stack_trace+0xa45/0xca0 [ 361.590415] ? task_kmsan_context_state+0x6b/0x120 [ 361.595372] ? memcg_kmem_charge+0x5f8/0xac0 [ 361.599794] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 361.605600] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 361.611580] ? __alloc_pages_nodemask+0x105b/0x6320 [ 361.616607] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 361.621997] ? kmsan_set_origin_inline+0x6b/0x120 [ 361.626859] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 361.632235] ? memcg_kmem_charge+0x79d/0xac0 [ 361.636655] kmsan_alloc_page+0x80/0xe0 [ 361.640645] __alloc_pages_nodemask+0x105b/0x6320 14:04:36 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 361.645500] ? kmsan_set_origin_inline+0x6b/0x120 [ 361.650352] ? __msan_poison_alloca+0x183/0x220 [ 361.655025] ? perf_event_task_sched_in+0x257/0x2b0 [ 361.660052] ? kmsan_set_origin_inline+0x6b/0x120 [ 361.664905] ? __msan_poison_alloca+0x183/0x220 [ 361.669584] ? _cond_resched+0x4c/0x100 [ 361.673572] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 361.678954] alloc_pages_current+0x6b1/0x970 [ 361.683380] pipe_write+0x7f0/0x1d30 [ 361.687121] ? init_wait_entry+0x1a0/0x1a0 [ 361.691375] ? pipe_read+0x1330/0x1330 [ 361.695271] __vfs_write+0x87e/0xb90 [ 361.699011] vfs_write+0x467/0x8c0 [ 361.702580] __x64_sys_write+0x1cf/0x400 [ 361.706668] ? ksys_write+0x380/0x380 [ 361.707129] FAULT_INJECTION: forcing a failure. [ 361.707129] name failslab, interval 1, probability 0, space 0, times 0 [ 361.710477] do_syscall_64+0x15b/0x230 [ 361.710505] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 361.710518] RIP: 0033:0x455ab9 [ 361.710523] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.753180] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.760885] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 361.768148] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 361.775418] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 361.782676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 361.789933] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000056 [ 361.797232] CPU: 0 PID: 16085 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 361.804538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.813914] Call Trace: [ 361.816552] dump_stack+0x185/0x1e0 [ 361.820239] ? __should_failslab+0x278/0x2a0 [ 361.824688] should_fail+0x8a7/0xae0 [ 361.828471] __should_failslab+0x278/0x2a0 [ 361.832746] should_failslab+0x29/0x70 [ 361.836668] __kmalloc+0xcb/0x370 [ 361.840156] ? sctp_get_port_local+0x1b52/0x1c60 [ 361.844940] ? sctp_add_bind_addr+0xb0/0x630 [ 361.849381] sctp_add_bind_addr+0xb0/0x630 [ 361.853689] sctp_do_bind+0xc34/0xe00 [ 361.857534] sctp_sendmsg+0x48cb/0x6500 [ 361.861553] ? sctp_v6_scope+0xc0/0xc0 [ 361.865497] ? sctp_getsockopt+0x15e30/0x15e30 [ 361.870106] inet_sendmsg+0x3fc/0x760 [ 361.873962] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 361.879381] ? inet_getname+0x4a0/0x4a0 [ 361.883398] __sys_sendto+0x798/0x8e0 [ 361.887271] ? syscall_return_slowpath+0x108/0x800 [ 361.892252] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 361.897680] __x64_sys_sendto+0x1a1/0x210 [ 361.901888] ? __sys_sendto+0x8e0/0x8e0 [ 361.905913] do_syscall_64+0x15b/0x230 [ 361.909841] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 361.915053] RIP: 0033:0x455ab9 [ 361.918250] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.937861] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c 14:04:36 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x20000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000000c0)={r2, 0x46, "fb05b9245fb0d0281f1bb7b4fdee6ef883afa795a147b4b54aa42e9429833a61e0c3f5ce9e06b2e722a1620626089a4b9dba59bc1b4b7ba7715381ffb4bda6f6030c43c953e3"}, &(0x7f0000000180)=0x4e) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r3, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:36 executing program 2 (fault-call:3 fault-nth:76): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 361.945605] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 361.952896] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 361.960188] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c [ 361.967480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 361.974770] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000001 [ 362.080490] FAULT_INJECTION: forcing a failure. [ 362.080490] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 362.092336] CPU: 0 PID: 16099 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 362.099616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.108979] Call Trace: [ 362.111596] dump_stack+0x185/0x1e0 [ 362.115250] should_fail+0x8a7/0xae0 [ 362.118995] __alloc_pages_nodemask+0x622/0x6320 [ 362.123771] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 362.129230] ? get_page_from_freelist+0xb01f/0xbb50 [ 362.134265] ? __save_stack_trace+0xa45/0xca0 [ 362.138778] ? task_kmsan_context_state+0x6b/0x120 [ 362.143739] ? memcg_kmem_charge+0x5f8/0xac0 [ 362.148175] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 362.153909] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 362.159896] ? __alloc_pages_nodemask+0x105b/0x6320 [ 362.164936] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 362.170326] ? kmsan_set_origin_inline+0x6b/0x120 [ 362.175195] ? __msan_metadata_ptr_for_load_8+0x10/0x20 14:04:37 executing program 6 (fault-call:3 fault-nth:87): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:37 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x4}}, 0x18) dup2(r1, r0) [ 362.180574] ? memcg_kmem_charge+0x79d/0xac0 [ 362.185000] kmsan_alloc_page+0x80/0xe0 [ 362.188994] __alloc_pages_nodemask+0x105b/0x6320 [ 362.193851] ? kmsan_set_origin_inline+0x6b/0x120 [ 362.198709] ? __msan_poison_alloca+0x183/0x220 [ 362.203396] ? perf_event_task_sched_in+0x257/0x2b0 [ 362.208433] ? kmsan_set_origin_inline+0x6b/0x120 [ 362.213287] ? __msan_poison_alloca+0x183/0x220 [ 362.217966] ? _cond_resched+0x4c/0x100 [ 362.221959] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 362.227351] alloc_pages_current+0x6b1/0x970 [ 362.231790] pipe_write+0x7f0/0x1d30 [ 362.235534] ? init_wait_entry+0x1a0/0x1a0 [ 362.239781] ? pipe_read+0x1330/0x1330 [ 362.243682] __vfs_write+0x87e/0xb90 [ 362.247437] vfs_write+0x467/0x8c0 [ 362.251002] __x64_sys_write+0x1cf/0x400 [ 362.255083] ? ksys_write+0x380/0x380 [ 362.258897] do_syscall_64+0x15b/0x230 [ 362.262805] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 362.268000] RIP: 0033:0x455ab9 [ 362.271185] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.290530] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 362.291608] FAULT_INJECTION: forcing a failure. [ 362.291608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 362.298245] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 362.298257] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 362.298267] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 362.298279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 362.298289] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004c [ 362.347223] CPU: 1 PID: 16107 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 362.354516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.363892] Call Trace: [ 362.366559] dump_stack+0x185/0x1e0 [ 362.370234] should_fail+0x8a7/0xae0 [ 362.374000] __alloc_pages_nodemask+0x622/0x6320 [ 362.378805] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 362.384029] ? __msan_poison_alloca+0x183/0x220 [ 362.388754] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 362.394180] ? balance_callback+0x48/0x260 [ 362.398477] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 362.404394] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 362.409818] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 362.415315] alloc_pages_current+0x6b1/0x970 [ 362.419799] pipe_write+0x7f0/0x1d30 [ 362.423567] ? init_wait_entry+0x1a0/0x1a0 [ 362.427864] ? pipe_read+0x1330/0x1330 [ 362.431822] __vfs_write+0x87e/0xb90 [ 362.435602] vfs_write+0x467/0x8c0 [ 362.439191] __x64_sys_write+0x1cf/0x400 [ 362.443319] ? ksys_write+0x380/0x380 [ 362.447173] do_syscall_64+0x15b/0x230 [ 362.451104] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 362.456343] RIP: 0033:0x455ab9 [ 362.459549] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:37 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:37 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x40000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x28000) signalfd(r0, &(0x7f0000000140)={0x5}, 0x8) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000100)=r0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000000c0)={0x5, 0x100000001, 0x8000, 0x8000, 0xfff, 0x7, 0x668, 0x0, 0x9, 0x0, 0x9db, 0x6}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000200)={0x303, 0x33}, 0x4) mq_timedreceive(r0, &(0x7f0000000240)=""/61, 0x3d, 0x2, &(0x7f0000000280)={0x0, 0x1c9c380}) [ 362.479198] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 362.486945] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 362.494238] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 362.501536] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 362.508833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 362.516124] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000057 [ 362.537541] FAULT_INJECTION: forcing a failure. [ 362.537541] name failslab, interval 1, probability 0, space 0, times 0 [ 362.548890] CPU: 1 PID: 16117 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 362.556183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.565555] Call Trace: [ 362.568187] dump_stack+0x185/0x1e0 [ 362.571860] should_fail+0x8a7/0xae0 [ 362.575645] __should_failslab+0x278/0x2a0 [ 362.579948] should_failslab+0x29/0x70 [ 362.583875] __kmalloc+0xcb/0x370 [ 362.587381] ? sctp_association_new+0xd7/0x2fe0 [ 362.592080] ? sctp_association_new+0x82/0x2fe0 [ 362.596805] sctp_association_new+0xd7/0x2fe0 [ 362.601364] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 362.606814] ? security_sctp_bind_connect+0xa4/0x220 [ 362.611963] sctp_sendmsg+0x4ad7/0x6500 [ 362.616118] ? sctp_getsockopt+0x15e30/0x15e30 [ 362.620923] inet_sendmsg+0x3fc/0x760 [ 362.624787] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 362.630210] ? inet_getname+0x4a0/0x4a0 [ 362.634226] __sys_sendto+0x798/0x8e0 [ 362.638102] ? syscall_return_slowpath+0x108/0x800 [ 362.643094] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 362.648530] __x64_sys_sendto+0x1a1/0x210 [ 362.652748] ? __sys_sendto+0x8e0/0x8e0 [ 362.656780] do_syscall_64+0x15b/0x230 [ 362.660713] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 362.665934] RIP: 0033:0x455ab9 14:04:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:37 executing program 2 (fault-call:3 fault-nth:77): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 362.669131] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 362.688755] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 362.696505] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 362.703803] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 362.711101] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c [ 362.718427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 362.725726] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000002 14:04:37 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000080)) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:37 executing program 1 (fault-call:1 fault-nth:3): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:37 executing program 6 (fault-call:3 fault-nth:88): socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 362.950816] FAULT_INJECTION: forcing a failure. [ 362.950816] name failslab, interval 1, probability 0, space 0, times 0 [ 362.962240] CPU: 1 PID: 16132 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 362.969562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.978977] Call Trace: [ 362.981631] dump_stack+0x185/0x1e0 [ 362.985308] should_fail+0x8a7/0xae0 [ 362.989084] __should_failslab+0x278/0x2a0 [ 362.993389] ? sctp_sched_fcfs_dequeue_done+0x10/0x10 [ 362.998632] should_failslab+0x29/0x70 [ 363.002564] __kmalloc+0xcb/0x370 [ 363.006066] ? sctp_stream_init+0x234/0xd20 [ 363.010434] ? sctp_sched_fcfs_dequeue_done+0x10/0x10 [ 363.015662] ? sctp_sched_fcfs_dequeue_done+0x10/0x10 [ 363.020894] sctp_stream_init+0x234/0xd20 [ 363.025139] sctp_association_new+0x18b5/0x2fe0 [ 363.029858] sctp_sendmsg+0x4ad7/0x6500 [ 363.033903] ? sctp_getsockopt+0x15e30/0x15e30 [ 363.038517] inet_sendmsg+0x3fc/0x760 [ 363.042377] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 363.047802] ? inet_getname+0x4a0/0x4a0 [ 363.051815] __sys_sendto+0x798/0x8e0 [ 363.055692] ? syscall_return_slowpath+0x108/0x800 [ 363.060680] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 363.066115] __x64_sys_sendto+0x1a1/0x210 [ 363.070336] ? __sys_sendto+0x8e0/0x8e0 [ 363.074367] do_syscall_64+0x15b/0x230 [ 363.078302] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 363.083521] RIP: 0033:0x455ab9 [ 363.086720] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.106351] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 363.114121] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 363.121443] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 363.127543] FAULT_INJECTION: forcing a failure. [ 363.127543] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 363.128743] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c 14:04:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:38 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @remote}, &(0x7f0000000040)=0x10) pwrite64(r0, &(0x7f0000000080)="049528dd7ba0f8b81ebee74af9ba9f21c1a357c9981018b787a70d64c8974bcb91fd98359d450bdf88d750fb01d213", 0x2f, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) accept$inet6(r2, 0x0, &(0x7f0000000680)) r3 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x6, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@mcast1}}, &(0x7f0000000240)=0xe8) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) r5 = creat(&(0x7f00000000c0)='./control/file0\x00', 0x0) write$sndseq(r5, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r5, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r1) [ 363.147794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 363.155090] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000003 [ 363.162408] CPU: 0 PID: 16131 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 363.169688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.179040] Call Trace: [ 363.181642] dump_stack+0x185/0x1e0 [ 363.185279] should_fail+0x8a7/0xae0 [ 363.189019] __alloc_pages_nodemask+0x622/0x6320 [ 363.193803] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 363.199265] ? get_page_from_freelist+0xb01f/0xbb50 [ 363.204295] ? __save_stack_trace+0xa45/0xca0 [ 363.208825] ? memcg_kmem_charge+0x5f8/0xac0 [ 363.213246] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 363.219061] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 363.225047] ? __alloc_pages_nodemask+0x105b/0x6320 [ 363.230079] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 363.235462] ? kmsan_set_origin_inline+0x6b/0x120 [ 363.240327] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 363.245703] ? memcg_kmem_charge+0x79d/0xac0 [ 363.250125] kmsan_alloc_page+0x80/0xe0 [ 363.254113] __alloc_pages_nodemask+0x105b/0x6320 [ 363.258974] ? kmsan_set_origin_inline+0x6b/0x120 [ 363.263834] ? __msan_poison_alloca+0x183/0x220 [ 363.268513] ? perf_event_task_sched_in+0x257/0x2b0 [ 363.273545] ? kmsan_set_origin_inline+0x6b/0x120 [ 363.278409] ? __msan_poison_alloca+0x183/0x220 [ 363.283083] ? _cond_resched+0x4c/0x100 [ 363.287075] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 363.292469] alloc_pages_current+0x6b1/0x970 [ 363.295622] FAULT_INJECTION: forcing a failure. [ 363.295622] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 363.296896] pipe_write+0x7f0/0x1d30 [ 363.312399] ? init_wait_entry+0x1a0/0x1a0 [ 363.316630] ? pipe_read+0x1330/0x1330 [ 363.320512] __vfs_write+0x87e/0xb90 [ 363.324236] vfs_write+0x467/0x8c0 [ 363.327782] __x64_sys_write+0x1cf/0x400 [ 363.331845] ? ksys_write+0x380/0x380 [ 363.335639] do_syscall_64+0x15b/0x230 [ 363.339530] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 363.344709] RIP: 0033:0x455ab9 [ 363.347883] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.367149] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 363.374849] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 363.382106] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 363.389374] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 363.396639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 363.403908] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004d [ 363.411186] CPU: 1 PID: 16137 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 363.418467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.427822] Call Trace: [ 363.430422] dump_stack+0x185/0x1e0 [ 363.434062] should_fail+0x8a7/0xae0 [ 363.437817] __alloc_pages_nodemask+0x622/0x6320 [ 363.442604] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 363.448066] ? get_page_from_freelist+0xb01f/0xbb50 [ 363.453096] ? __save_stack_trace+0xa45/0xca0 [ 363.457633] ? memcg_kmem_charge+0x5f8/0xac0 [ 363.462060] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 363.467784] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 363.473764] ? __alloc_pages_nodemask+0x105b/0x6320 [ 363.478797] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 363.484270] ? kmsan_set_origin_inline+0x6b/0x120 [ 363.489139] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 363.494530] ? memcg_kmem_charge+0x79d/0xac0 [ 363.498959] kmsan_alloc_page+0x80/0xe0 [ 363.502953] __alloc_pages_nodemask+0x105b/0x6320 [ 363.507812] ? kmsan_set_origin_inline+0x6b/0x120 [ 363.512669] ? __msan_poison_alloca+0x183/0x220 [ 363.517348] ? perf_event_task_sched_in+0x257/0x2b0 [ 363.522380] ? kmsan_set_origin_inline+0x6b/0x120 [ 363.527240] ? __msan_poison_alloca+0x183/0x220 [ 363.531926] ? _cond_resched+0x4c/0x100 [ 363.535935] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 363.541330] alloc_pages_current+0x6b1/0x970 [ 363.545766] pipe_write+0x7f0/0x1d30 [ 363.549535] ? init_wait_entry+0x1a0/0x1a0 14:04:38 executing program 1 (fault-call:1 fault-nth:4): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 363.553787] ? pipe_read+0x1330/0x1330 [ 363.557679] __vfs_write+0x87e/0xb90 [ 363.561417] vfs_write+0x467/0x8c0 [ 363.564975] __x64_sys_write+0x1cf/0x400 [ 363.569051] ? ksys_write+0x380/0x380 [ 363.572860] do_syscall_64+0x15b/0x230 [ 363.576769] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 363.581962] RIP: 0033:0x455ab9 14:04:38 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 363.585146] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.604468] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 363.612187] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 363.619461] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 363.626763] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 363.634040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 363.641317] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000058 [ 363.691873] FAULT_INJECTION: forcing a failure. [ 363.691873] name failslab, interval 1, probability 0, space 0, times 0 [ 363.703228] CPU: 1 PID: 16157 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 363.710531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.719920] Call Trace: [ 363.722570] dump_stack+0x185/0x1e0 [ 363.726293] should_fail+0x8a7/0xae0 [ 363.730058] __should_failslab+0x278/0x2a0 [ 363.734371] should_failslab+0x29/0x70 [ 363.738318] __kmalloc+0xcb/0x370 14:04:38 executing program 2 (fault-call:3 fault-nth:78): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 363.741807] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 363.747302] ? sctp_stream_interleave_init+0xad/0x130 [ 363.752531] ? sctp_auth_asoc_copy_shkeys+0x180/0x7a0 [ 363.757778] sctp_auth_asoc_copy_shkeys+0x180/0x7a0 [ 363.762874] sctp_association_new+0x26e6/0x2fe0 [ 363.767601] sctp_sendmsg+0x4ad7/0x6500 [ 363.771650] ? sctp_getsockopt+0x15e30/0x15e30 [ 363.776292] inet_sendmsg+0x3fc/0x760 [ 363.780156] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 363.785607] ? inet_getname+0x4a0/0x4a0 [ 363.789651] __sys_sendto+0x798/0x8e0 [ 363.793531] ? syscall_return_slowpath+0x108/0x800 [ 363.798527] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 363.803968] __x64_sys_sendto+0x1a1/0x210 [ 363.808187] ? __sys_sendto+0x8e0/0x8e0 [ 363.812221] do_syscall_64+0x15b/0x230 [ 363.816155] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 363.821381] RIP: 0033:0x455ab9 [ 363.824583] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 363.844236] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 363.852164] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 363.859469] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 363.866766] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c [ 363.874056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 363.881354] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000004 [ 363.885214] FAULT_INJECTION: forcing a failure. [ 363.885214] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 363.900931] CPU: 0 PID: 16166 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 363.908220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.917590] Call Trace: [ 363.920220] dump_stack+0x185/0x1e0 [ 363.923888] should_fail+0x8a7/0xae0 [ 363.927672] __alloc_pages_nodemask+0x622/0x6320 [ 363.932461] ? __msan_poison_alloca+0x183/0x220 [ 363.937162] ? __switch_to+0x2b3/0x420 [ 363.941094] ? switch_fpu_finish+0x7b/0x4f0 [ 363.945443] ? __switch_to+0x2b3/0x420 [ 363.949387] ? kmsan_set_origin_inline+0x6b/0x120 [ 363.954256] ? __msan_poison_alloca+0x183/0x220 [ 363.958957] ? _cond_resched+0x4c/0x100 [ 363.962951] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 363.968360] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 363.973865] alloc_pages_current+0x6b1/0x970 [ 363.978341] pipe_write+0x7f0/0x1d30 [ 363.982121] ? init_wait_entry+0x1a0/0x1a0 [ 363.986427] ? pipe_read+0x1330/0x1330 [ 363.990376] __vfs_write+0x87e/0xb90 [ 363.994158] vfs_write+0x467/0x8c0 [ 363.997771] __x64_sys_write+0x1cf/0x400 [ 364.001899] ? ksys_write+0x380/0x380 [ 364.005749] do_syscall_64+0x15b/0x230 [ 364.009683] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 364.014897] RIP: 0033:0x455ab9 [ 364.018096] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:39 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) dup2(r1, r0) 14:04:39 executing program 1 (fault-call:1 fault-nth:5): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 364.037723] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 364.045477] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 364.052773] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 364.060066] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 364.067398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 364.074694] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004e [ 364.173386] FAULT_INJECTION: forcing a failure. [ 364.173386] name failslab, interval 1, probability 0, space 0, times 0 [ 364.184864] CPU: 1 PID: 16181 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 364.192185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.201567] Call Trace: [ 364.204211] dump_stack+0x185/0x1e0 [ 364.207879] ? __should_failslab+0x278/0x2a0 [ 364.212334] should_fail+0x8a7/0xae0 [ 364.216092] __should_failslab+0x278/0x2a0 14:04:39 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) ppoll(&(0x7f0000000100)=[{r0, 0x28}], 0x1, &(0x7f0000000140), &(0x7f0000000200)={0xff}, 0x8) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x800, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:39 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) bind$bt_rfcomm(r1, &(0x7f0000000100)={0x1f, {0x9, 0x4, 0x6, 0x4, 0x5, 0x7}, 0xa94f}, 0xa) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000180)='./control\x00', &(0x7f0000000240)='./control\x00') ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)=0x0) prctl$setptracer(0x59616d61, r3) write$P9_RSETATTR(r2, &(0x7f0000000080)={0x7, 0x1b, 0x2}, 0x7) close(r0) [ 364.220379] should_failslab+0x29/0x70 [ 364.224304] __kmalloc+0xcb/0x370 [ 364.227792] ? sctp_add_bind_addr+0xb0/0x630 [ 364.232233] sctp_add_bind_addr+0xb0/0x630 [ 364.236498] ? sctp_bind_addr_state+0x32b/0x370 [ 364.241210] sctp_copy_local_addr_list+0x4e8/0x660 [ 364.246183] ? accept_all+0x30/0x30 [ 364.249850] sctp_copy_one_addr+0x210/0xc40 [ 364.254218] sctp_bind_addr_copy+0x28c/0x970 [ 364.258708] sctp_assoc_set_bind_addr_from_ep+0x21b/0x280 [ 364.264301] sctp_sendmsg+0x4b49/0x6500 [ 364.268340] ? sctp_getsockopt+0x15e30/0x15e30 [ 364.272958] inet_sendmsg+0x3fc/0x760 [ 364.276818] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 364.282242] ? inet_getname+0x4a0/0x4a0 [ 364.286258] __sys_sendto+0x798/0x8e0 [ 364.290140] ? syscall_return_slowpath+0x108/0x800 [ 364.295134] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 364.300574] __x64_sys_sendto+0x1a1/0x210 [ 364.304796] ? __sys_sendto+0x8e0/0x8e0 [ 364.308830] do_syscall_64+0x15b/0x230 [ 364.312769] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 364.317984] RIP: 0033:0x455ab9 14:04:39 executing program 2 (fault-call:3 fault-nth:79): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:39 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0x7}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000080)={r2, 0x7}, 0x8) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 364.321182] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.340839] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 364.348599] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 364.355902] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 364.363201] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c [ 364.370504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 364.377801] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000005 14:04:39 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) [ 364.463435] FAULT_INJECTION: forcing a failure. [ 364.463435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 364.475299] CPU: 1 PID: 16190 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 364.482581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.491939] Call Trace: [ 364.494545] dump_stack+0x185/0x1e0 [ 364.498195] should_fail+0x8a7/0xae0 [ 364.501939] __alloc_pages_nodemask+0x622/0x6320 [ 364.506725] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 364.512188] ? get_page_from_freelist+0xb01f/0xbb50 [ 364.517221] ? __save_stack_trace+0xa45/0xca0 [ 364.521737] ? task_kmsan_context_state+0x6b/0x120 [ 364.526699] ? memcg_kmem_charge+0x5f8/0xac0 [ 364.531128] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 364.536856] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 364.542847] ? __alloc_pages_nodemask+0x105b/0x6320 [ 364.547899] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 364.553281] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 364.558674] ? kmsan_set_origin_inline+0x6b/0x120 [ 364.563549] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 364.568926] ? memcg_kmem_charge+0x79d/0xac0 [ 364.573353] kmsan_alloc_page+0x80/0xe0 [ 364.577348] __alloc_pages_nodemask+0x105b/0x6320 [ 364.582208] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 364.587677] ? kmsan_set_origin_inline+0x6b/0x120 [ 364.592533] ? __msan_poison_alloca+0x183/0x220 [ 364.597214] ? _cond_resched+0x4c/0x100 [ 364.601209] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 364.606601] alloc_pages_current+0x6b1/0x970 [ 364.611029] pipe_write+0x7f0/0x1d30 [ 364.614780] ? init_wait_entry+0x1a0/0x1a0 [ 364.619031] ? pipe_read+0x1330/0x1330 [ 364.622931] __vfs_write+0x87e/0xb90 [ 364.626677] vfs_write+0x467/0x8c0 [ 364.630240] __x64_sys_write+0x1cf/0x400 [ 364.634323] ? ksys_write+0x380/0x380 [ 364.638135] do_syscall_64+0x15b/0x230 [ 364.642044] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 364.647240] RIP: 0033:0x455ab9 [ 364.650430] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.669778] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 364.677502] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 364.684783] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 364.692058] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 364.699334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 364.706611] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 000000000000004f 14:04:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:39 executing program 1 (fault-call:1 fault-nth:6): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:39 executing program 2 (fault-call:3 fault-nth:80): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 364.970533] FAULT_INJECTION: forcing a failure. [ 364.970533] name failslab, interval 1, probability 0, space 0, times 0 [ 364.982374] CPU: 0 PID: 16202 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 364.989695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.999084] Call Trace: [ 365.001725] dump_stack+0x185/0x1e0 [ 365.005428] ? __should_failslab+0x278/0x2a0 [ 365.009908] should_fail+0x8a7/0xae0 [ 365.013683] __should_failslab+0x278/0x2a0 [ 365.017978] should_failslab+0x29/0x70 [ 365.021908] __kmalloc+0xcb/0x370 [ 365.025407] ? sctp_add_bind_addr+0xb0/0x630 [ 365.029861] sctp_add_bind_addr+0xb0/0x630 [ 365.034147] ? sctp_bind_addr_state+0x2a0/0x370 [ 365.038866] sctp_copy_local_addr_list+0x4e8/0x660 [ 365.043863] sctp_copy_one_addr+0x210/0xc40 [ 365.048232] sctp_bind_addr_copy+0x28c/0x970 [ 365.052716] sctp_assoc_set_bind_addr_from_ep+0x21b/0x280 [ 365.058302] sctp_sendmsg+0x4b49/0x6500 [ 365.062344] ? sctp_getsockopt+0x15e30/0x15e30 [ 365.066959] inet_sendmsg+0x3fc/0x760 [ 365.070821] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 365.076242] ? inet_getname+0x4a0/0x4a0 [ 365.080252] __sys_sendto+0x798/0x8e0 [ 365.084127] ? syscall_return_slowpath+0x108/0x800 [ 365.089114] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 365.094553] __x64_sys_sendto+0x1a1/0x210 [ 365.098779] ? __sys_sendto+0x8e0/0x8e0 [ 365.102820] do_syscall_64+0x15b/0x230 [ 365.106756] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 365.111974] RIP: 0033:0x455ab9 [ 365.115175] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 365.134767] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 365.142530] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 365.149836] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 365.157158] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c 14:04:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:40 executing program 4: rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) r0 = socket$alg(0x26, 0x5, 0x0) writev(r0, &(0x7f0000001200)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000300)={0xffffffffffffffff}, 0x4000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_dev$sndseq(&(0x7f0000000740)='/dev/snd/seq\x00', 0x0, 0x1) r7 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000780)='/dev/urandom\x00', 0x10000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000007c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000800)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000900)=0xe8) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = fcntl$getown(0xffffffffffffff9c, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000b00)=0xe8) r13 = getgid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000b40)=0x0) r15 = getuid() stat(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = syz_open_dev$sg(&(0x7f00000011c0)='/dev/sg#\x00', 0x1000010002, 0x483d) r18 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x12, 0x1, &(0x7f0000000c80)=@raw=[@jmp={0x5, 0x8, 0xd, 0x0, 0x7, 0xffffffffffffffff, 0xffffffffffffffff}], &(0x7f0000000cc0)='GPL\x00', 0x8d4, 0xc5, &(0x7f0000000d00)=""/197, 0x0, 0x1, [], 0x0, 0xf}, 0x48) r19 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/autofs\x00', 0x4000, 0x0) r20 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/uinput\x00', 0x511000, 0x0) r21 = socket$nl_route(0x10, 0x3, 0x0) r22 = openat$md(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/md0\x00', 0x280, 0x0) r23 = eventfd2(0x5, 0x800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000f40)={0x0}, &(0x7f0000000f80)=0xc) stat(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0}) r26 = getegid() r27 = socket$bt_hidp(0x1f, 0x3, 0x6) sendmsg$unix(r1, &(0x7f0000001180)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000180)="7b4650f6c1b005db07e889463e6093788748899c75a4efd35ae0e5aa94624d4eb305c5d2847c780a9b7a4e61a5fd63b82240d6ce5db56c13b978dbaba9b6ed68478ef2ce8f3388793740ea8b82d60083d927203bd36a6a5cbc169dfbea1890b05c62ac45a6ec8aa5220b38a4f537ba1a4720ed80f7daa5ae1309cc88dfe5f47efe5f65316bc741d2b5b3cf099878a2daf4a7fbabd870e978c6f72e2770ff3d7c7ff02f703e71194a982142d8efd3c80b453df327266b20", 0xb7}, {&(0x7f0000000380)="f1e80fb95e521015996b959b76b77cf6276247331bf27b21cbbedf2acf27aa6e5663b4dcef6f3410466730e2bd09e5d79c8064c2ab538992502274877d872683228d0bc5e181dd273a4c6071fc654ec2029b116a480b81da8c0717bb45919eec80f7a21dc6ff7707ac0b0ebf5fcec8c6a9832a48c7f19001b2f3c501757aa1ac17f8b6155e881492c1eb1eee79c9f7ad26a160ce9cd7b09c3d3c54fc8cf69a7278a802bbf18183dbb436434e7ae3667ea18f06eb2d7d86385c9d8e8d20d758e82a256f2c", 0xc4}, {&(0x7f0000000240)="49746536d9bd5869b39b1b4a38aae98fa8c360ffdd8ff8c34469ddb02db35cbd5f4795ae70c71e4aa87197b6607e0d58749f37445c81d69db5d47639f934ff8d102f68aaa2f38fc68fa5e5c2d130558584109ee463c3bc", 0x57}, {&(0x7f0000000480)="a200498ee1adbaaef81897d8ee604dcbaa91a0512ecac1c17a9241177c837892abe3d3678f92eece5f0ab53eba83b426b5fce47a2293121f8ef24a9b04dd33960149a1f3d5508c42e26586044a84049b526158e501268370d356845e898bc0912912d09af560ec7304c88016deb6275a7fed3f25576366964d1758d6389da839b8b1aba0eb115453f7ec34fd050268fd83fcbee6624e6a09cb6551ace73e4e3d47644c2368387b318bfe2f210b062a73d3368ccb6c903d7a8a4b33948f2a6c232b77c7f4ee9751d736b62f8f111771fa8453693203b4df968768d082da327a07bf0e93a0780e", 0xe6}, {&(0x7f00000005c0)="d74b7ceb490b7bc0c10d1a2f30ee1ad5301de9a17c993eda98726ea2b624d484e376cf4f2b058fae9a720ae1068387ae56f4c36f48d7d914c3d9b911516b4641b1aa037f8996ce10b4eebcc23a579d340c5331dcaadb4778179d0c9ed974a327b8fa88e612bb5a29bd6490d40ec8cbad0da144b0d3712f73f2b61635d4715a93b63a87661b9370982daa77934548ea7fc4273d079365ddab7c0df90507d8418ed09a78c9d29eec6a3c53c216e9f7932fdffe03ef42", 0xb5}], 0x5, &(0x7f00000014c0)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="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", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYRES32=r23, @ANYBLOB="0000000020000000000000000100000002000000b0dd1d044e1373657f98ea865872beaa4a0260cc7c25bae8ce4cf67da3721d5a6b3714883fbd089a3f583f19", @ANYRES32=r24, @ANYRES32=r25, @ANYRES32=r26, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r27, @ANYBLOB='\x00\x00\x00\x00'], 0xf0, 0x10}, 0x40) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000000)={0x18}, 0x18) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 365.164457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 365.171761] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000006 [ 365.212718] FAULT_INJECTION: forcing a failure. [ 365.212718] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 365.224574] CPU: 1 PID: 16206 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 365.231854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.241217] Call Trace: [ 365.243821] dump_stack+0x185/0x1e0 [ 365.247468] should_fail+0x8a7/0xae0 [ 365.251205] __alloc_pages_nodemask+0x622/0x6320 [ 365.255993] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 365.261456] ? get_page_from_freelist+0xb01f/0xbb50 [ 365.266486] ? __save_stack_trace+0xa45/0xca0 [ 365.271021] ? memcg_kmem_charge+0x5f8/0xac0 [ 365.275453] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 365.281268] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 365.287254] ? __alloc_pages_nodemask+0x105b/0x6320 [ 365.292289] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 365.297682] ? kmsan_set_origin_inline+0x6b/0x120 [ 365.302551] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 365.307927] ? memcg_kmem_charge+0x79d/0xac0 [ 365.312350] kmsan_alloc_page+0x80/0xe0 [ 365.316339] __alloc_pages_nodemask+0x105b/0x6320 [ 365.321194] ? kmsan_set_origin_inline+0x6b/0x120 [ 365.326046] ? __msan_poison_alloca+0x183/0x220 [ 365.330727] ? perf_event_task_sched_in+0x257/0x2b0 [ 365.335758] ? kmsan_set_origin_inline+0x6b/0x120 [ 365.340620] ? __msan_poison_alloca+0x183/0x220 [ 365.345300] ? _cond_resched+0x4c/0x100 [ 365.349291] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 365.354681] alloc_pages_current+0x6b1/0x970 [ 365.359110] pipe_write+0x7f0/0x1d30 14:04:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 365.362867] ? init_wait_entry+0x1a0/0x1a0 [ 365.367160] ? pipe_read+0x1330/0x1330 [ 365.371063] __vfs_write+0x87e/0xb90 [ 365.374811] vfs_write+0x467/0x8c0 [ 365.378382] __x64_sys_write+0x1cf/0x400 [ 365.382468] ? ksys_write+0x380/0x380 [ 365.386287] do_syscall_64+0x15b/0x230 [ 365.390199] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 365.395398] RIP: 0033:0x455ab9 [ 365.398585] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 365.417945] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 365.425681] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 365.432969] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 365.440257] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 365.447541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 365.454823] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000050 14:04:40 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:40 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000200000000400000000022fb98dd4ba30000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:40 executing program 1 (fault-call:1 fault-nth:7): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:40 executing program 2 (fault-call:3 fault-nth:81): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:40 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r0, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18}, 0x18) dup2(r1, r0) [ 365.754431] FAULT_INJECTION: forcing a failure. [ 365.754431] name failslab, interval 1, probability 0, space 0, times 0 [ 365.765815] CPU: 0 PID: 16235 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 365.773113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.782496] Call Trace: [ 365.785139] dump_stack+0x185/0x1e0 [ 365.788853] ? __should_failslab+0x278/0x2a0 [ 365.793335] should_fail+0x8a7/0xae0 [ 365.797100] __should_failslab+0x278/0x2a0 [ 365.801409] should_failslab+0x29/0x70 [ 365.805336] __kmalloc+0xcb/0x370 [ 365.808833] ? sctp_add_bind_addr+0xb0/0x630 [ 365.813280] sctp_add_bind_addr+0xb0/0x630 [ 365.817552] ? sctp_bind_addr_state+0x2a0/0x370 [ 365.822274] sctp_copy_local_addr_list+0x4e8/0x660 [ 365.827252] sctp_copy_one_addr+0x210/0xc40 [ 365.831624] sctp_bind_addr_copy+0x28c/0x970 [ 365.836116] sctp_assoc_set_bind_addr_from_ep+0x21b/0x280 [ 365.841701] sctp_sendmsg+0x4b49/0x6500 [ 365.845741] ? sctp_getsockopt+0x15e30/0x15e30 [ 365.850354] inet_sendmsg+0x3fc/0x760 [ 365.854216] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 365.859637] ? inet_getname+0x4a0/0x4a0 [ 365.863647] __sys_sendto+0x798/0x8e0 [ 365.867531] ? syscall_return_slowpath+0x108/0x800 [ 365.868657] FAULT_INJECTION: forcing a failure. [ 365.868657] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 365.872549] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 365.872622] __x64_sys_sendto+0x1a1/0x210 [ 365.872685] ? __sys_sendto+0x8e0/0x8e0 [ 365.872735] do_syscall_64+0x15b/0x230 [ 365.872795] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 365.907097] RIP: 0033:0x455ab9 [ 365.910287] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 365.929761] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 365.937486] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 365.944761] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 365.952036] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c [ 365.959316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 365.966589] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000007 [ 365.973890] CPU: 1 PID: 16243 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 365.981186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.990560] Call Trace: [ 365.993205] dump_stack+0x185/0x1e0 [ 365.996902] should_fail+0x8a7/0xae0 [ 366.000667] __alloc_pages_nodemask+0x622/0x6320 [ 366.005460] ? kmsan_set_origin_inline+0x6b/0x120 [ 366.010341] ? __msan_poison_alloca+0x183/0x220 [ 366.015046] ? perf_event_task_sched_in+0x257/0x2b0 [ 366.020098] ? kmsan_set_origin_inline+0x6b/0x120 [ 366.024972] ? __msan_poison_alloca+0x183/0x220 [ 366.029695] ? _cond_resched+0x4c/0x100 [ 366.033725] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 366.039144] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 366.044638] alloc_pages_current+0x6b1/0x970 [ 366.049093] pipe_write+0x7f0/0x1d30 [ 366.052860] ? init_wait_entry+0x1a0/0x1a0 [ 366.057161] ? pipe_read+0x1330/0x1330 [ 366.061106] __vfs_write+0x87e/0xb90 [ 366.064874] vfs_write+0x467/0x8c0 [ 366.068488] __x64_sys_write+0x1cf/0x400 [ 366.072610] ? ksys_write+0x380/0x380 [ 366.076462] do_syscall_64+0x15b/0x230 [ 366.080389] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 366.085602] RIP: 0033:0x455ab9 [ 366.088800] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 366.108422] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 366.116175] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 366.123486] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 366.130781] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 366.138081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 366.145407] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000051 14:04:41 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7526, 0x8000) bind$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000140)={0x0, r0}) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) 14:04:41 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}, @in6={0xa, 0x4e20, 0x7, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x9}], 0x2c) llistxattr(&(0x7f0000000140)='./control\x00', &(0x7f0000000180)=""/27, 0x1b) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x800, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:41 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) acct(&(0x7f0000000100)='./control/file0/file0\x00') r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) r2 = semget(0x3, 0x4, 0x108) semctl$IPC_INFO(r2, 0x3, 0x3, &(0x7f0000000000)=""/250) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:41 executing program 1 (fault-call:1 fault-nth:8): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 366.359355] FAULT_INJECTION: forcing a failure. [ 366.359355] name failslab, interval 1, probability 0, space 0, times 0 [ 366.370753] CPU: 0 PID: 16254 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 366.378055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.387432] Call Trace: [ 366.390074] dump_stack+0x185/0x1e0 [ 366.393743] ? __should_failslab+0x278/0x2a0 [ 366.398192] should_fail+0x8a7/0xae0 [ 366.401955] __should_failslab+0x278/0x2a0 [ 366.406243] should_failslab+0x29/0x70 [ 366.410170] __kmalloc+0xcb/0x370 [ 366.413660] ? sctp_add_bind_addr+0xb0/0x630 [ 366.418104] sctp_add_bind_addr+0xb0/0x630 [ 366.422372] ? sctp_bind_addr_state+0x2a0/0x370 [ 366.427096] sctp_copy_local_addr_list+0x4e8/0x660 [ 366.432077] sctp_copy_one_addr+0x210/0xc40 [ 366.436439] sctp_bind_addr_copy+0x28c/0x970 [ 366.440921] sctp_assoc_set_bind_addr_from_ep+0x21b/0x280 [ 366.446508] sctp_sendmsg+0x4b49/0x6500 [ 366.450547] ? sctp_getsockopt+0x15e30/0x15e30 [ 366.455161] inet_sendmsg+0x3fc/0x760 [ 366.459025] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 366.464454] ? inet_getname+0x4a0/0x4a0 [ 366.468467] __sys_sendto+0x798/0x8e0 [ 366.472352] ? syscall_return_slowpath+0x108/0x800 [ 366.477362] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 366.482814] __x64_sys_sendto+0x1a1/0x210 [ 366.487040] ? __sys_sendto+0x8e0/0x8e0 [ 366.491080] do_syscall_64+0x15b/0x230 [ 366.495025] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 366.500238] RIP: 0033:0x455ab9 [ 366.503437] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 366.523075] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 366.530823] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 366.538118] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 366.545416] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c [ 366.552708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 14:04:41 executing program 2 (fault-call:3 fault-nth:82): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="dc"], 0x1) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 366.560002] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000008 14:04:41 executing program 1 (fault-call:1 fault-nth:9): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:41 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000834000)={0x7fffffff}, &(0x7f00000c1000), 0x8) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000580)="b2", 0x1}], 0x1) fcntl$setpipe(r1, 0x407, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000140)='\b', 0x1}], 0x1, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000000)={0x18, 0x0, 0x7}, 0x2) dup2(r1, r0) 14:04:41 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x0) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 366.831857] FAULT_INJECTION: forcing a failure. [ 366.831857] name failslab, interval 1, probability 0, space 0, times 0 [ 366.843339] CPU: 1 PID: 16272 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 366.850637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.860015] Call Trace: [ 366.862655] dump_stack+0x185/0x1e0 [ 366.866351] ? __should_failslab+0x278/0x2a0 [ 366.870831] should_fail+0x8a7/0xae0 [ 366.874603] __should_failslab+0x278/0x2a0 14:04:41 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x2f) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x2e9, 0x200) write$P9_RFLUSH(r2, &(0x7f0000000180)={0x7, 0x6d, 0x1}, 0x7) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) epoll_create1(0x80000) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) [ 366.878896] should_failslab+0x29/0x70 [ 366.882841] __kmalloc+0xcb/0x370 [ 366.886339] ? sctp_add_bind_addr+0xb0/0x630 [ 366.890783] sctp_add_bind_addr+0xb0/0x630 [ 366.895050] ? sctp_bind_addr_state+0x2a0/0x370 [ 366.899764] sctp_copy_local_addr_list+0x4e8/0x660 [ 366.904731] sctp_copy_one_addr+0x210/0xc40 [ 366.909095] sctp_bind_addr_copy+0x28c/0x970 [ 366.913584] sctp_assoc_set_bind_addr_from_ep+0x21b/0x280 [ 366.919171] sctp_sendmsg+0x4b49/0x6500 [ 366.923228] ? sctp_getsockopt+0x15e30/0x15e30 [ 366.927842] inet_sendmsg+0x3fc/0x760 [ 366.931729] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 366.937171] ? inet_getname+0x4a0/0x4a0 [ 366.941185] __sys_sendto+0x798/0x8e0 [ 366.945062] ? syscall_return_slowpath+0x108/0x800 [ 366.950054] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 366.955495] __x64_sys_sendto+0x1a1/0x210 [ 366.959723] ? __sys_sendto+0x8e0/0x8e0 [ 366.963749] do_syscall_64+0x15b/0x230 [ 366.967678] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 366.972898] RIP: 0033:0x455ab9 [ 366.976092] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 366.995705] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 367.003455] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 367.010752] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 367.018093] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c [ 367.018111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 14:04:42 executing program 1 (fault-call:1 fault-nth:10): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:42 executing program 2 (fault-call:3 fault-nth:83): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 367.018129] R13: 00000000004c1164 R14: 00000000004d1860 R15: 0000000000000009 [ 367.042909] FAULT_INJECTION: forcing a failure. [ 367.042909] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:04:42 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x0) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) [ 367.042929] CPU: 0 PID: 16270 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 367.042938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 14:04:42 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r1, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') seccomp(0x1, 0x1, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x40, 0xf4, 0x7, 0xfffffffffffffffb}, {0xffffffffffffffff, 0x100000000, 0x7fffffff, 0x3}, {0xfffffffffffffff9, 0xa1, 0x9, 0x2}, {0x8001, 0x3, 0x1, 0x2}, {0x6fc3, 0x2, 0x100, 0xffffffffffffe1d0}, {0x7fffffff, 0xfff, 0xbea, 0x401}]}) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) [ 367.042943] Call Trace: [ 367.042969] dump_stack+0x185/0x1e0 [ 367.042992] should_fail+0x8a7/0xae0 14:04:42 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) [ 367.043026] __alloc_pages_nodemask+0x622/0x6320 [ 367.043058] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 367.043077] ? get_page_from_freelist+0xb01f/0xbb50 [ 367.043100] ? __save_stack_trace+0xa45/0xca0 [ 367.043143] ? memcg_kmem_charge+0x5f8/0xac0 [ 367.043166] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 367.043186] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 367.043201] ? __alloc_pages_nodemask+0x105b/0x6320 [ 367.043223] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 367.043250] ? kmsan_set_origin_inline+0x6b/0x120 [ 367.043279] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 367.043298] ? memcg_kmem_charge+0x79d/0xac0 [ 367.043320] kmsan_alloc_page+0x80/0xe0 [ 367.043343] __alloc_pages_nodemask+0x105b/0x6320 [ 367.043361] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 367.043380] ? __msan_poison_alloca+0x183/0x220 [ 367.043406] ? kmsan_set_origin_inline+0x6b/0x120 [ 367.043424] ? __msan_poison_alloca+0x183/0x220 [ 367.043441] ? _cond_resched+0x4c/0x100 [ 367.043469] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 367.043502] alloc_pages_current+0x6b1/0x970 [ 367.043530] pipe_write+0x7f0/0x1d30 [ 367.043570] ? init_wait_entry+0x1a0/0x1a0 [ 367.043590] ? pipe_read+0x1330/0x1330 [ 367.043607] __vfs_write+0x87e/0xb90 [ 367.043642] vfs_write+0x467/0x8c0 [ 367.043672] __x64_sys_write+0x1cf/0x400 [ 367.043696] ? ksys_write+0x380/0x380 [ 367.043711] do_syscall_64+0x15b/0x230 [ 367.043735] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 367.043748] RIP: 0033:0x455ab9 [ 367.043753] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.044029] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.044046] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 367.044055] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 367.044065] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 367.044074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 367.044083] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000052 [ 367.372636] FAULT_INJECTION: forcing a failure. [ 367.372636] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 367.372654] CPU: 1 PID: 16296 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 367.372663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.372668] Call Trace: [ 367.372692] dump_stack+0x185/0x1e0 [ 367.372715] should_fail+0x8a7/0xae0 [ 367.372745] __alloc_pages_nodemask+0x622/0x6320 [ 367.372775] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 367.372792] ? get_page_from_freelist+0xb01f/0xbb50 [ 367.372816] ? __save_stack_trace+0xa45/0xca0 [ 367.372862] ? memcg_kmem_charge+0x5f8/0xac0 [ 367.372891] kmsan_internal_alloc_meta_for_pages+0x10b/0x730 [ 367.372912] ? kmsan_internal_alloc_meta_for_pages+0x157/0x730 [ 367.372931] ? __alloc_pages_nodemask+0x105b/0x6320 [ 367.372956] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 367.372985] ? kmsan_set_origin_inline+0x6b/0x120 [ 367.373015] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 367.373034] ? memcg_kmem_charge+0x79d/0xac0 [ 367.373057] kmsan_alloc_page+0x80/0xe0 [ 367.373080] __alloc_pages_nodemask+0x105b/0x6320 [ 367.373098] ? kmsan_set_origin_inline+0x6b/0x120 [ 367.373117] ? __msan_poison_alloca+0x183/0x220 [ 367.373134] ? perf_event_task_sched_in+0x257/0x2b0 [ 367.373152] ? kmsan_set_origin_inline+0x6b/0x120 [ 367.373170] ? __msan_poison_alloca+0x183/0x220 [ 367.373186] ? _cond_resched+0x4c/0x100 [ 367.373212] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 367.373246] alloc_pages_current+0x6b1/0x970 [ 367.373272] pipe_write+0x7f0/0x1d30 [ 367.373309] ? init_wait_entry+0x1a0/0x1a0 [ 367.373330] ? pipe_read+0x1330/0x1330 [ 367.373347] __vfs_write+0x87e/0xb90 [ 367.373381] vfs_write+0x467/0x8c0 [ 367.373412] __x64_sys_write+0x1cf/0x400 [ 367.373439] ? ksys_write+0x380/0x380 [ 367.373454] do_syscall_64+0x15b/0x230 [ 367.373478] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 367.373491] RIP: 0033:0x455ab9 [ 367.373496] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 367.373782] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.373800] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 367.373809] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 367.373818] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 367.373828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 367.373837] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000053 [ 367.684719] FAULT_INJECTION: forcing a failure. [ 367.684719] name failslab, interval 1, probability 0, space 0, times 0 [ 368.040527] CPU: 0 PID: 16297 Comm: syz-executor1 Not tainted 4.18.0-rc5+ #29 [ 368.040544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.040556] Call Trace: [ 368.040604] dump_stack+0x185/0x1e0 [ 368.040640] ? __should_failslab+0x278/0x2a0 [ 368.040673] should_fail+0x8a7/0xae0 [ 368.040710] __should_failslab+0x278/0x2a0 [ 368.040747] should_failslab+0x29/0x70 [ 368.040777] __kmalloc+0xcb/0x370 [ 368.040808] ? sctp_add_bind_addr+0xb0/0x630 [ 368.040838] sctp_add_bind_addr+0xb0/0x630 [ 368.040864] ? sctp_bind_addr_state+0x2a0/0x370 [ 368.040905] sctp_copy_local_addr_list+0x4e8/0x660 [ 368.040943] sctp_copy_one_addr+0x210/0xc40 [ 368.040977] sctp_bind_addr_copy+0x28c/0x970 [ 368.041052] sctp_assoc_set_bind_addr_from_ep+0x21b/0x280 [ 368.041092] sctp_sendmsg+0x4b49/0x6500 [ 368.041143] ? sctp_getsockopt+0x15e30/0x15e30 [ 368.041168] inet_sendmsg+0x3fc/0x760 [ 368.041212] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 368.041239] ? inet_getname+0x4a0/0x4a0 [ 368.041269] __sys_sendto+0x798/0x8e0 [ 368.041329] ? syscall_return_slowpath+0x108/0x800 [ 368.041371] ? __msan_metadata_ptr_for_load_1+0x10/0x20 14:04:42 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xb663, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x3) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) clone(0x0, &(0x7f00000000c0), &(0x7f0000000180), &(0x7f0000003ffc), &(0x7f0000000000)) mbind(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, &(0x7f00000001c0), 0x1d, 0x2) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000080)) 14:04:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[], 0x0) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:43 executing program 2 (fault-call:3 fault-nth:84): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) [ 368.041429] __x64_sys_sendto+0x1a1/0x210 [ 368.041484] ? __sys_sendto+0x8e0/0x8e0 [ 368.041526] do_syscall_64+0x15b/0x230 [ 368.041567] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 368.041588] RIP: 0033:0x455ab9 [ 368.041596] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 368.192194] RSP: 002b:00007fd753e38c68 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 368.199940] RAX: ffffffffffffffda RBX: 00007fd753e396d4 RCX: 0000000000455ab9 [ 368.207234] RDX: 0000000000000001 RSI: 0000000020e33fe0 RDI: 0000000000000013 [ 368.214521] RBP: 000000000072bea0 R08: 000000002005ffe4 R09: 000000000000001c [ 368.221833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 368.229126] R13: 00000000004c1164 R14: 00000000004d1860 R15: 000000000000000a [ 368.331527] FAULT_INJECTION: forcing a failure. [ 368.331527] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.343523] CPU: 0 PID: 16324 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 368.350817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.360185] Call Trace: [ 368.362817] dump_stack+0x185/0x1e0 [ 368.366510] should_fail+0x8a7/0xae0 [ 368.370277] __alloc_pages_nodemask+0x622/0x6320 [ 368.375074] ? kmsan_set_origin_inline+0x6b/0x120 14:04:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) unshare(0x24020400) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$LOOP_SET_STATUS64(r0, 0x1268, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) [ 368.379960] ? __msan_poison_alloca+0x183/0x220 [ 368.384667] ? perf_event_task_sched_in+0x257/0x2b0 [ 368.389716] ? kmsan_set_origin_inline+0x6b/0x120 [ 368.394588] ? __msan_poison_alloca+0x183/0x220 [ 368.399302] ? _cond_resched+0x4c/0x100 [ 368.403334] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 368.408776] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 368.414274] alloc_pages_current+0x6b1/0x970 [ 368.418730] pipe_write+0x7f0/0x1d30 [ 368.422499] ? init_wait_entry+0x1a0/0x1a0 [ 368.426800] ? pipe_read+0x1330/0x1330 [ 368.430750] __vfs_write+0x87e/0xb90 [ 368.434522] vfs_write+0x467/0x8c0 [ 368.438136] __x64_sys_write+0x1cf/0x400 [ 368.442263] ? ksys_write+0x380/0x380 [ 368.446109] do_syscall_64+0x15b/0x230 [ 368.450042] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 368.455255] RIP: 0033:0x455ab9 [ 368.458449] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:04:43 executing program 6: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x78) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000003c0)=0x7) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) pselect6(0x40, &(0x7f0000000200)={0x6, 0x1, 0x8, 0x400, 0x7, 0x3, 0x2, 0x7ff}, &(0x7f0000000280)={0x9, 0x2, 0xffffffffffffff81, 0x40, 0x7c7, 0x1, 0x0, 0x9}, &(0x7f00000002c0)={0x8, 0x4, 0x9, 0x1f, 0xc2e1, 0x2, 0xffff, 0x1}, &(0x7f0000000300)={0x77359400}, &(0x7f0000000380)={&(0x7f0000000340)={0x4}, 0x8}) [ 368.478057] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 368.485799] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 368.493088] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 368.500389] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 368.507681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 368.514970] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000054 14:04:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:43 executing program 0: mkdir(&(0x7f000082f000)='./control\x00', 0x40) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f0000000340)='./control/file0\x00') setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f00000000c0), 0x8) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) r3 = getuid() r4 = getegid() ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000029c0)=0x0) r6 = geteuid() getgroups(0x5, &(0x7f0000002a00)=[0xffffffffffffffff, 0xee01, 0x0, 0x0, 0x0]) r8 = fcntl$getown(r1, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000002a40)={0x0, 0x0}, &(0x7f0000002a80)=0xc) getresgid(&(0x7f0000002ac0), &(0x7f0000002b00), &(0x7f0000002b40)=0x0) sendmmsg$unix(r1, &(0x7f0000003040)=[{&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001500)=[{&(0x7f00000001c0)="92cdee58ad9ca404a78b311436744ca537ea33c599d18cbfe7d20cb37aade3609ac7592bde98acc48b7f27423a8935c447aa5e301a439b75016e5741b9c23c339c193dc6c2bc58122c19d3207c8edcf7b0cc6b19f74dafd6a5e18061ef1d8fcbac8778d03fa297148c0c1b2b286066", 0x6f}, {&(0x7f0000000240)="2ced4e77c00ab588b3c5588e8f2689da7d02b53afd5083f794b20725e617f9ec136e995fafdb86ff3b2a9dafcdb710299f5232bd556c70986ed1075ac6eac98e548fe6d4d4a831b7f5582b7a970e40deddc1ed41b085ee8c310369fdb12e1e8062cb2c0b953f44253962bc3573466f11d65119062516b405ca957bf69f11ecbcbca4a495800d3d1416cb26c33e153a8b6d630be2b555593268fa9fa292ae2ce60b8fcf3625dec6b7ffbfdd76309be4946b79d984036ee53dbe71a997d1495eadb99d2c82b556baac7febe3f2b6", 0xcd}, {&(0x7f0000000380)="ecd00fcdffa7218ec65b036e28859313a5bbbdc43cb99b3124accbaf5b9b5238eb95145aa4e023a3261ced09640eb60f9fa36802b882c5b3742cab67e5ccbfb5e38bd8eceacb618bdf71f387c7afce230440c224c014588084b7986433f5d866071be83ec573b224f785243fa07fdf624bc6040f7ab9369ebbd1fcc33b150fb85aa26de58e02ba4dba929855d148d9b7437e581836d0822f2c64041c870838cc0e2d1f011bfc8e", 0xa7}, {&(0x7f0000000440)="413ba6f3e9c92527e1a721a5f8a6eca0856b5a0d0c7484fcafa9c091f4222133954a94c04d5bee09b57ee23ad0aa9eb57f731abf6caa340450aec51afdc5be4b52fd8b11684e588b094c625c5ba66edff37e49825e521dfca5e6276be56a26087e7dd0d49d4ae74face9cde8572c3ce9b64b0718b0f426e193136b61e0be42bc55c10124a7408a231f5aad2b309f0b7632d068b6486f50d7f9ce479b654650329c6ee5f11b90065f42bbf230854162fa36", 0xb1}, {&(0x7f0000000500)="4904e26b3c420685e11826849958d715f30fed88327335df8b754a580677e7145c2f4b8ce9c39744b211cdc3aad7fd2523a246dce448f0e4a599b8420180ea26e4f8d1b3344534921587547ac4de6b29029e0224e07cc77eb1f6828e66dbdfea73abf9f2c47a13657711693f5a728cc621f8d603d98b957d953a25d9178cc1c42ccf8d39cccba3c093bfbe36cfb9e971ccee8a2a97d07cba5a5a41ebf7ae0e33ff58d75f2fdc225387720fac38756f75e9944b0fdaa14a7ca779227f3dd4a4400fead8d655b2b8cc823db05fa4e355ee99c6dddb31706249913fa676417c333732c08bd5f59cf9dfb19a15ddcae7dc673a00a71c09742551fcf120f3d01e7f609cf2c37dd76f10bb9a511408bdfda5db32dd188826fa07433f7c494b30640733b04547d81d46cdd9c0af187074f3814b22123eea2f52c550c678c442ef553fe3f2e2572a68bd34dab0062598b4f507b2d6b31bd6f3f76af5a66e07d8325d439e1fdb040a40c8bb8cf2641b79138a1a7f69530d44b9c9898e1eadb025115735c8db31b031a5467024804f88e06cafe1920d0586d1b825e3da9016efea9ad4d5707a04ba9957b6d297b6e984f32d3354021cc87dff41d6fec74b2e5eaf31a4d07d825d1948be8361dc70ca9b55148768648e6bd9e28cd395f29c2cdb66de18fe155a43fbe22be0367d4757fdf2c83f08449f801816de42ff563a5708f5d048315ec68c1ea3c2f09b9136661828714eef54fee6da122ac03cf912c68efebe0904bd8c2604f91b39666823febf06a0f1662bdaf1d06bf878f4f9095fba8fa3455b3894926315e4fe9960b60dc9f7de5d3b30fe83e9b66d24b06560f1691fcf67a251b6b91e5818fa7d4b0dcdf2a130097236ae0c63377d75a847013cbc21f1fb9e77afb4dff708500e3b9fec705afd0e7c596a220e9579962a16bd39928a6057d6c58adeb9bb16ecb8f862e490b3c906fed80f7c299a161e35848e3977eacf0c1dc8ad16bb427a543c75d9b56eb921be6bf2755860f2d35401f71696a4b2e1d54c95341ba5a6ad2f9328b25a63ab1fc789ca04e56e92b3a79a90d78942f5a0d772079c77e048f3009586c84903416b40be1af2129cf8440c6d430a58e555fc158eff3fd7bd30c4e28cbe36c22532e214f79e84690235697e83f7a7ca740183d42998eb65c6c507f257a6931f3c847680ad95383bae6c89094f9552d60199165ebdd823c100c0257ddf4ab675f9271d7442d42ece414552203dbdc857192305383d237cf6e5817d4a4e68f61aad31147246c18aee9f0f49cea1d4b3642e60b03cf16f3bc24c7652ae71da1ce2d1467f680aac78a5b5adb381e15f676abdc2110da51eb413876a63d1ab27e8a9b28b75ea8c871bbb5b750b03e35a2389da7f105787462325890638447882479f771161c268599bbbec5dcc900a243ea145fe80f53803cfbf7ec549853f517a5c7c6f28f5d98fd01a76211ef1c8e1b527f835e63bbd40780b5a5a7ca6e8dd0da5aefadd657a1c6b19b9490359d528eb1229044be02a51e17f4b2d169ffbcb4ea5bd3c418b18c819047ca508074891fd9c150dcda8de742256df715d259b86fb6afe72e706b3bcbefed42a806276f1114473b8302132cffb32c85c7eb88861bb885eba156c6417144c61defa724358c7b1aa517670abdb53ed04830de22f57e27c5c0dbdec6df0f22578ba9a0313d1cc8601a1ae21b9c16596fdcea731cdef2d5a0beecc8343532a174b04df0b18ad64a5caa48614613b3bfab263c51a3f824694e4d78d8db0f16831ba029c625a35bbd929d8683788f3375476034a84896c09ce550f057fce4780f95a94e47e0acd8af2464c7c46bd87a68c5cf1765a67a19623e01af3512d3298d9fd2daf7d9eff74b25790d029fbae3810c06679978287824fbe48ccd4aa2e365012fed5b030d354909b5d13b493b540fa4c70a69d8d11da01dd804d8bc3d186be4f247dca68a6dfe0c0fb887606f3937b2e990d0d21adb4367755cd28bfb638fd6831db02b0302c308ae18e3f04507ddb1269d05118d778043520d12406e417025a8e8d5d78812de316726c7bc491b2f2e69e37794dc947c5ad1e15f0f6e890a6dc50eee4ee9647467d112609a6c04a1099c94f2e730fc811d6df17cdd5ec2adb09fc3267eef3e775f494147ffcecb4b5a70db10e3d77188d20a84073e30099ec012a852ce3f0d6c691661caa9d825b0763bd6590a6f3773d7dbc3608cdd842010168f459b58b2b71a2f1717a97515722e0367227ffe59eebc3b95338829769256e8cf783bbc028c84d3f3e04d87aeeb5165c841401aa2fd100c352ed4463d0b71c6b616e7f4339d337c4bb0acb3bdde019cbca66a8764c8dda9e610393710c4cc532f2e2350cc0dd3ac236f77aa136842a7ed1d7cdfed6e96ccb6da7071e54fa801a7019e316738d1203c8b098293bf673b8b329e373ec2c56fe792037828f861d6700ae6b5e0eba7ede4048bff11b58035a097645aa1ea500937d8b21bb0dabee933b93873bc072624d50c2a929d92e5e16de61bed1704383b180826fef112c6f4110c4df09fd1a2ececafa34499797baa95b521c114ae1b55dea60fec89aa60c42c97e3d0a9842e104d0974409d2f565c68234dcfb1f0f492f7f216c008212257c99cc5dbbbec7c32cf0db2cbaebe028b91181efc58f7ed753be0d4c59734849fadb8fe28c9c761d7c091074eaef2ca892c5c91016661aed2a15e93d6415db0ec84968651c28a31daac85db2cc82cdb33ec97469b85c7f260697e026b1f14982002f01aa228f7147807f005d4818a16a27b8fe2bbe18510d5f8e8b821ee78a1af1821bcfc254ad28df747f13cbfebe1f2a74215c209586104b0700fef8ef8489de5db9a772daa8878ed382db9e972014bfe5546aff40f593347156a7c02c34bcec7457e3ebb587b6f02d441321e1f7cba7bb5e8e27cfab3944bfc0e2c4ef73e7a98d4ae86357c8f3db66912148d834705b713d8d061b6f21f9d2a6846ee4dcf1972e7128c37114a35daf7c0d21b62a1fd68ad6437549df70039fd4dcc5a7ed0baee5f472c58b20e4f4fe5c90a861d606af8b818259c91a335385d6e8b7ecf0949dec7b543b87090b5fa5ad3a9587f51181f0484e0407eb5d71e34af41bf1f059abc185359280aabe650b705b146607a5071431acdaf390349a6ec3642dff340ccc95384164924f15c96a5ac75fff0155e5572a921b502f4b8ae208f02017c3f0120ca92e1cfecf48464381a2357c1a025bb62ab77d5b4774f435daa03099183a84d9c96bde8c52f85ce4097fe2b69fec6f1557cad0180b852f1065c7a2a8ff5ecc5626bd9ce24d89798c7fb2fd1cf3cef020d3f40709575c7067884d2ef3c6c7aceef8784d787ebd71bc7bd05e9c43f3d0f9ec429907f5c624df1e6b1e4d266c309a6ae0418f78ad3afdd31e745c629666000106bca7407dcf54fc242b4f6d19cf2ec98b1b9cab1f03ebc9e0bbac51b716d1c976734ad0398b8012aebda7ac71aa4d4d040dcbcb174e4d0f05e0fc1aaa6a2cb04bc41058fd7d7357c9ce5db0028096f7bd4851110d3eaae2ae5359a7c7d295a64ea87e7f7a2bb3a8bfdc3a0eca9e4ebd47babf6eda13e794d472edcb01ba8775628a9b24d6e0276932937fff1a325c614d47eea3c8f3f49322b9d1043ff3820487842f9ab287e86628676cd1916f8be51a1f7d40ebfaae2330c661c729d2edb2475222f29990798b77a281a6d22caac745ceb090e62ff24226e44e0885ad0059f7b9430bb22ec8633cfc92592f6727dcd8f720bde5f369f2404d1619cd278e2891afecc8bc6cfbe0970ee8440b24b1e9655d859a1ce4607545fd5fbfc88a0cbbcfa78bbda4f1aa7037c4989de9e588fa8de888ee2ee8078e3364e8c783fc8191c34dec3bcfb62229d4acce07c8905f9e76d7e4f54cfbd903ff2aa5635f8e021951866384659215929a9a44ee44b44de9e1d5b18ade20d8ed3d46d24b8fbbe79cc14fa51cdfbd5edcb0c5634676c240bc08e234598ae150827e999b24062f63093b40d7233d36b758c022eeded0d52bc3691ad445631de1afc52769c2b6e89a1d006a4ec9cace029e44478952da367c1cce45226b39dc121cc1f4bc840188576145a11624851c0a9272c0fc898c5e766c37840b3c6797384745f29c7fc945bff2acf103a6ecf5583095e84d75e5234e4bc573fc764248ebaddeb401b7352bf8a5f16eb5e20a846caea439c3266bb78385094726482f606d7bced4078b6ee2d2ca9394dd4e120d0673ad818a54f71e6761d253c59976cc8a419e310e656ec991655b1d1761c4a1f8fe2e4f98be338d578e35ed328288515cf54e46ebfc05167dc45d2ca6ea155f3387abe5f343f6dc09eca98d1abd6a2ccd63bcaddf0db1a3738c80183b32d7fd391a51dc499ea59d2621518c52e461e71966ac19c9b5b0657b796be8994e7016c5a08c0035336004a6e1d8c0d829ddb263d61131138b0d61acdea76a6af94b604645b040f3d7b75ee9a4a93344de187aaf2d4c44c43b7c0e63fef0671ebec350fe60afb1c32dee542ad9112931eea09a1988f7f7af7648d3d5969ee8669507bcd4634f5f5ad3e3dff33d74a2ff9c12fdc69392f24149d46c117b3e4c53d877f7c3a977602d37f395beabc2b451c2417b0046c1c39b587c8547f910bf1c820671ad214f86751a891fb2f7c3e1b8344525163dfc8d0e614940492635c1abd67332c194bae6e4d4e28d100aace51ad4d21ded66eb93ac7640776ecc3a95c9e9748d56a2108ab5a89e1141ea63640d882db1013945f640a92da7b778a8b411b777777ab300f1080e69fe4f5d4f1d73786f490402e75e4bc5ee48a167307eddb8e63b8e149c7478894e4e1db4c1dcc3f4db9ce3c5de4c64fa061b6725e580578114d0d3704f3a229410a8d2cd18c4ac82dba5ffc48718737a1688722b4360f3fcbda2395dd081498aadc4efa4dbc0539f7219d895570ce45c5c3a4138df8bc784b81c9039538e7bcea84ad848004a88bb70af3f089c14dff67db2876a9cc65a3eb89aac952f0e38807bcbd10c6d0d355ecbf11e8bd6503daa4681c5a46578c3c2b8b1d3bb77c0b47918cdc6526e5c0ada37e0ad8f68c27152b6b457a49e8a342de1d8909ae875e8a394a8d84120002f3fb6fecef4d31fef23712f769d077bc6d12926b02f88ddb474378435ed65da369908d36cc8faeced0d24e7c2ad89f50788d8a2d0afe8daa242a2f8344af54b3b47e4b49f4bc17c82292dc2da9eccfd0e9bf214b634a128ea0a982d3cb9b23765b8692e36808a19efd2fa8b213eb5b2131c99a1468cc4bd4cd47fbc6a4beb1b89d0ae20794a8ee30c56eb59a3970e45ba9f00b85f88d54ae39bba46deea6c2369dfff684adc7d17caf8dd0c49c9af1e084b0b6e0fefba6042ce4ba78b9894cdb5fad9d123a38cdf84815451616ff4d4a33d1b9f556eeb3024218939bf3a466514d5c07f4565adb80a88e62949059ec13581d2fa8a25f096f965e7755f1a58f04c76a8e11f525e83cd6529dba1e8003c8235b063201e7a493979432427397ec0af0cf74063acbd963efeb481ab6bae10b1aacbca6726afdec0cf9a35f16f93a4c9d9a6c509bb439450e3b910c46fe0be35b0d53a56b0d57624203a6eac3d03d9853c4cf34efc2ae2d218b14fa5e56ec3efdd2fe3e13771922759d14ae9715b282b83659ea42deb10823b1d20249bc9c8d3700c3d3415bf076d5ba4090d6573d23a953ce37d3dd43a45e9b6226bc36bc3a57eb0d2d89a169facdaa0afd9618e5ba1e4f10b3296082e", 0x1000}], 0x5, &(0x7f0000001580)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r1, r0, r1, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x38, 0x1, 0x1, [r0, r1, r1, r1, r1, r0, r1, r1, r0]}], 0xa0, 0x800}, {&(0x7f0000001640)=@file={0x0, './control/file0\x00'}, 0x6e, &(0x7f0000002940)=[{&(0x7f00000016c0)="96044930fbe80ff6369b4d27cfeff66eb8f47ffa09c88cb2428368becafbdb6c721057cb7bd31ac7b8ebe88b7959d0e821317784f2da90f9c7d1aab23760f1312b38e58b9151e56f0ffdecaea42f2acfc59a9650b10cb4b8c9abae62fc23d6d9", 0x60}, {&(0x7f0000001740)="0a9ce73c0bbfa55cf8b19cacdb235e9f4c4193f8726663b10325364e8c078d522433526a19e60510b824ab88f59242319b1d7fa7da63826d2ca9f3171f66bf44dd16f3db1efbd17c0face75263b30672a766c2ee8f13", 0x56}, {&(0x7f00000017c0)="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", 0x1000}, {&(0x7f00000027c0)="de510074f828f90848a693a4169ee8a48dba25a7ae030c021d11d9059a19c9f9e1fdeb482716336de0de82a46ca5d4f5038f09b39dd6a795f34b7e629af2280989baf62608dd6c53c2fb2e90a3d312c2380c915a5a7ae1c960822ea3f7aec42c0efd7cd38f3d9c15c5453eb9a6f901207c9dc4bfce5935c4aec131a2dc52ae6cdc53a0", 0x83}, {&(0x7f0000002880)="d97fa18545eb", 0x6}, {&(0x7f00000028c0)="e1e46fcbfc427da5e5b9802caf550791898e734b15657c123b8140543f36e9165ea7b3a6092d5998d4f06758096b052307ee2c9c0611f6112d661a3817bda9ed4242f405b0f5181947a493d21d3b80f0bd3fe0eea3c68902c81ae420c7a495a0b26418000f3c1e368e104b3ee745b76d6e44", 0x72}], 0x6, &(0x7f0000002b80)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r0, r1]}], 0x58, 0x40440c1}, {&(0x7f0000002c00)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002e00)=[{&(0x7f0000002c80)="06f525c8369baf5d9ee792bf4fa73cf2874df5dac87a0c8c8ca58b766094f711100238b32b857a7eaf123845ac7c218f50607b", 0x33}, {&(0x7f0000002cc0)="9e4becaeb6218464e88519fbde3136427432b0eb5cbf2b8c9fba3211699aa96b6632db21c1f9162c84fb638885bad320847a5da128cc39ea1928fede6afe27d5a1c4b0858fe038dcc7c44915", 0x4c}, {&(0x7f0000002d40)="b2c28b866980ca0cf4042f4a64fed6ea169d55e5c8c3e0c655ee147c99865ec6ce64a19a8878ce6fe8caaa7958eb4511a5efd2dbf2fd97d2cbebc751bd43c9b84c4ef0186db542ec3d3566a49b7215133cda2b1a22823ea7615a570f91fc1a7beaa19bdf0a948fc645cd58569088a3b068103e6216ff1c629e0cd28fa07c50aabee8b67df57336b37bd8559d315017cf2a624f64a83f9bd2dae765dba9d266d099476d4f018f1bae3f14373c8c055b819a4e1dae", 0xb4}], 0x3, &(0x7f0000002e40)=[@rights={0x10, 0x1, 0x1}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r1]}, @rights={0x28, 0x1, 0x1, [r0, r0, r1, r0, r1, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r1]}, @rights={0x20, 0x1, 0x1, [r0, r1, r1, r1]}, @rights={0x20, 0x1, 0x1, [r0, r1, r0, r1]}], 0xb8, 0x20000011}, {&(0x7f0000002f00)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000003000)=[{&(0x7f0000002f80)="82d15edec1814575c45ebc434b19f9b49530880740b08bb83d0dd42cfbfc986ecc0d20edc204e4f18fc9ccf16c90c6257ee066f9f71194900203bb923115cff7ae8ceae4336be48f6104383d0c2ff95c5809763ffd8189bc3ab9a8dd8d903323917bc698e8685acfe46033570fdf9e35b95ad1cb92839dc98d9e279c", 0x7c}], 0x1, 0x0, 0x0, 0x20000050}], 0x4, 0x20000000) pivot_root(&(0x7f0000000040)='./control\x00', &(0x7f0000000100)='./control\x00') close(r0) 14:04:43 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000014000/0x2000)=nil, 0x2000}, 0x1}) r2 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r2, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:43 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x0) unshare(0x24020400) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$LOOP_SET_STATUS64(r0, 0x1268, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "fe047b3177f4fc2eb04172daa8e7d1c4c4cf144a23173b6605afb988de9bbae0932dee7e07195d78f7ddd19a37cb5aa0a5629eef628582fba5bf4af44acfe059", "ee42e3ef1d1772a9432c220303b70b708ad791139c2982fccc5d747a3131995a"}) 14:04:43 executing program 6: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x20200, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) unlink(&(0x7f0000000380)='./file0\x00') r2 = getegid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x4000, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000023de7c780af5d00f3010326245605acc23faf4471687fc3edb0c96e0243f43753637c4ad6a40bed881a", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB=',default_permissions,allow_other,max_read=0x0000000000000003,blksize=0x0000000000000200,max_read=0x0000000000000000,allow_other,allow_other,\x00']) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)) socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockname(r3, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) getresgid(&(0x7f0000000200), &(0x7f0000000600), &(0x7f0000000640)) fanotify_mark(r0, 0x2, 0x8, r0, &(0x7f0000000500)='./file0\x00') ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000340)={0x3, 0x8}) write$binfmt_elf64(r4, &(0x7f0000000680)=ANY=[@ANYBLOB="dc6ee30d69b34c88b788f6557da8c994d6ce84438a58467445adcd0ae056a6bf08ccb001e36aa2732f395464aff23588baea7e3b37da73e0086ef96931e488b77b1d2f1bfdbf2920e52237a9567d8687a268acb121915c39cc417173aa72d33a5643fbbb3f1b5d2fa7517831a30d7b4bd38236924d20a34f8fd744e4df9fdec206075a20b6ae85dac7f0cf4b1d1010201147bcbae512408ac1fa060b4e6ec4b008383347d079205927d223713c10f48ab53dce6a76d45c8c9e7914db1938e0459aba236aa67c34d9bd84c4b1d0624c0e194e108e5631688adb9b15f39d22993fde25df77b9094f19a76faca30efcd21daa8f97"], 0xffffffffffffff4e) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) 14:04:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r1, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) write$binfmt_elf64(r2, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0) sendto$inet6(r2, &(0x7f0000000000)="a7", 0x1, 0x0, 0x0, 0x0) shutdown(r2, 0x1) close(r1) 14:04:44 executing program 1 (fault-call:1 fault-nth:11): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 14:04:44 executing program 2 (fault-call:3 fault-nth:85): openat$zero(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/zero\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f0000000080)=0x80) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfffffc53) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x0, 'veth1\x00'}, 0x18) 14:04:44 executing program 5: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = getuid() ioprio_set$uid(0x3, r1, 0x9) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000140)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) getdents64(r2, &(0x7f0000000900)=""/213, 0xd5) unlink(&(0x7f0000000340)='./control/file0\x00') ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r0) 14:04:44 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x100000023ffc) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000000)) 14:04:44 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, &(0x7f00000000c0)=0x1c1) write$binfmt_elf64(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000600610000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000146e00000000000000000000000000000000000000000000"], 0x378) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x4, 0x20080) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = socket$kcm(0x11, 0x1000000000003, 0x0) sendmsg$kcm(r4, &(0x7f0000001540)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="c1000f00b0b6718067061fe4ac141414eb", 0x11}], 0x1}, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0xff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000240)={0x1, 'veth1\x00', 0x4}, 0x18) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000280)=""/77) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000140)={@empty, 0x3, 0x0, 0xff, 0xa, 0x2, 0x100, 0x800}, 0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0x1a, "842d0b001d40f5c1dbc3c3ebdd8d2b59d390bf0a83017d33bd56"}, &(0x7f0000000180)=0x22) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r5, 0x4) [ 369.202937] ================================================================== [ 369.210351] BUG: KMSAN: uninit-value in __ip_select_ident+0x45e/0x840 [ 369.216951] CPU: 0 PID: 16371 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #29 [ 369.224230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.233583] Call Trace: [ 369.236186] dump_stack+0x185/0x1e0 [ 369.239830] kmsan_report+0x195/0x2c0 [ 369.243653] __msan_warning+0x7d/0xe0 [ 369.247474] __ip_select_ident+0x45e/0x840 [ 369.251734] iptunnel_xmit+0x7fb/0xdb0 [ 369.255657] ip_tunnel_xmit+0x373a/0x3b10 [ 369.259843] ipgre_xmit+0xe16/0xef0 [ 369.263497] ? ipgre_close+0x230/0x230 [ 369.267408] dev_hard_start_xmit+0x60f/0xcc0 [ 369.271849] __dev_queue_xmit+0x3060/0x3c70 [ 369.276204] dev_queue_xmit+0x4b/0x60 [ 369.280022] ? __netdev_pick_tx+0xb60/0xb60 [ 369.284361] packet_sendmsg+0x8469/0x9010 [ 369.288530] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 369.293911] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 369.299385] ? rw_copy_check_uvector+0x630/0x710 [ 369.303489] FAULT_INJECTION: forcing a failure. [ 369.303489] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 369.304177] ? copy_msghdr_from_user+0x75e/0x8c0 [ 369.320695] ? compat_packet_setsockopt+0x360/0x360 [ 369.325709] ___sys_sendmsg+0xed9/0x1350 [ 369.329772] ? __msan_poison_alloca+0x183/0x220 [ 369.334434] ? __fdget+0x4e/0x60 [ 369.337802] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 369.343158] ? __fget_light+0x6e6/0x760 [ 369.347151] __x64_sys_sendmsg+0x3b0/0x520 [ 369.351396] ? ___sys_sendmsg+0x1350/0x1350 [ 369.355709] do_syscall_64+0x15b/0x230 [ 369.359596] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 369.364785] RIP: 0033:0x455ab9 [ 369.367958] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.387236] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 369.394935] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 369.402193] RDX: 0000000000000000 RSI: 0000000020001540 RDI: 0000000000000016 [ 369.409450] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 369.416707] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 369.423965] R13: 00000000004c1066 R14: 00000000004d16c8 R15: 0000000000000000 [ 369.431231] [ 369.431251] CPU: 1 PID: 16376 Comm: syz-executor2 Not tainted 4.18.0-rc5+ #29 [ 369.432858] kmsan_internal_chain_origin+0x13c/0x240 [ 369.440120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.445216] __msan_chain_origin+0x76/0xd0 [ 369.454556] Call Trace: [ 369.458779] iptunnel_xmit+0xa68/0xdb0 [ 369.461342] dump_stack+0x185/0x1e0 [ 369.465205] ip_tunnel_xmit+0x373a/0x3b10 [ 369.468812] ? task_kmsan_context_state+0x6b/0x120 [ 369.472934] ipgre_xmit+0xe16/0xef0 [ 369.477845] should_fail+0x8a7/0xae0 [ 369.481451] dev_hard_start_xmit+0x60f/0xcc0 [ 369.485149] __alloc_pages_nodemask+0x622/0x6320 [ 369.489529] __dev_queue_xmit+0x3060/0x3c70 [ 369.494291] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 369.498583] dev_queue_xmit+0x4b/0x60 [ 369.504012] ? get_page_from_freelist+0xb01f/0xbb50 [ 369.507793] packet_sendmsg+0x8469/0x9010 [ 369.512795] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 369.516941] ___sys_sendmsg+0xed9/0x1350 [ 369.522288] ? pick_next_entity+0x1a71/0x1ac0 [ 369.526327] __x64_sys_sendmsg+0x3b0/0x520 [ 369.530912] ? memcg_kmem_charge+0x5f8/0xac0 [ 369.535101] do_syscall_64+0x15b/0x230 [ 369.539489] kmsan_internal_alloc_meta_for_pages+0x9f/0x730 [ 369.543359] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 369.549053] ? __perf_event_task_sched_in+0x74/0xab0 [ 369.554208] [ 369.559308] ? kmsan_set_origin_inline+0x6b/0x120 [ 369.560898] Uninit was stored to memory at: [ 369.565737] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 369.570027] kmsan_internal_chain_origin+0x13c/0x240 [ 369.575389] ? memcg_kmem_charge+0x79d/0xac0 [ 369.575409] kmsan_alloc_page+0x80/0xe0 [ 369.580509] __msan_chain_origin+0x76/0xd0 [ 369.584903] __alloc_pages_nodemask+0x105b/0x6320 [ 369.588859] ip_tunnel_xmit+0xa9b/0x3b10 [ 369.593069] ? __perf_event_task_sched_in+0xa3b/0xab0 [ 369.597882] ipgre_xmit+0xe16/0xef0 [ 369.597902] dev_hard_start_xmit+0x60f/0xcc0 [ 369.601942] ? __msan_poison_alloca+0x183/0x220 [ 369.607108] __dev_queue_xmit+0x3060/0x3c70 [ 369.610721] ? kmsan_set_origin_inline+0x6b/0x120 [ 369.615103] dev_queue_xmit+0x4b/0x60 [ 369.619750] ? __msan_poison_alloca+0x183/0x220 [ 369.624057] packet_sendmsg+0x8469/0x9010 [ 369.628883] ? _cond_resched+0x4c/0x100 [ 369.632659] ___sys_sendmsg+0xed9/0x1350 [ 369.637308] ? apic_timer_interrupt+0xa/0x20 [ 369.641436] __x64_sys_sendmsg+0x3b0/0x520 [ 369.645409] alloc_pages_current+0x6b1/0x970 [ 369.649435] do_syscall_64+0x15b/0x230 [ 369.653827] pipe_write+0x7f0/0x1d30 [ 369.658039] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 369.662442] ? init_wait_entry+0x1a0/0x1a0 [ 369.666280] [ 369.669981] ? pipe_read+0x1330/0x1330 [ 369.675148] kmsan_internal_chain_origin+0x13c/0x240 [ 369.679363] __vfs_write+0x87e/0xb90 [ 369.680972] kmsan_memcpy_origins+0x13d/0x1b0 [ 369.684853] vfs_write+0x467/0x8c0 [ 369.689919] __msan_memcpy+0xe7/0x150 [ 369.693624] __x64_sys_write+0x1cf/0x400 [ 369.698087] pskb_expand_head+0x3a6/0x1a70 [ 369.701612] ? ksys_write+0x380/0x380 [ 369.705389] ipgre_xmit+0x4c3/0xef0 [ 369.709428] do_syscall_64+0x15b/0x230 [ 369.713640] dev_hard_start_xmit+0x60f/0xcc0 [ 369.717425] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 369.721031] __dev_queue_xmit+0x3060/0x3c70 [ 369.724903] RIP: 0033:0x455ab9 [ 369.729291] dev_queue_xmit+0x4b/0x60 [ 369.734452] Code: [ 369.738777] packet_sendmsg+0x8469/0x9010 [ 369.741935] 1d [ 369.745730] ___sys_sendmsg+0xed9/0x1350 [ 369.747848] ba [ 369.751982] __x64_sys_sendmsg+0x3b0/0x520 [ 369.753839] fb [ 369.757879] do_syscall_64+0x15b/0x230 [ 369.757898] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 369.759754] ff [ 369.763965] [ 369.765831] c3 [ 369.769703] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 369.774861] 66 [ 369.776739] kmsan_kmalloc+0xa1/0x120 [ 369.778336] 2e [ 369.780211] kmsan_slab_alloc+0x10/0x20 [ 369.785281] 0f [ 369.787158] __kmalloc_node_track_caller+0xb48/0x11d0 [ 369.790922] 1f [ 369.792796] __alloc_skb+0x2cb/0x9e0 [ 369.796738] 84 [ 369.798615] alloc_skb_with_frags+0x1e6/0xb80 [ 369.803782] 00 [ 369.805658] sock_alloc_send_pskb+0xb59/0x11e0 [ 369.809609] 00 [ 369.811487] packet_sendmsg+0x68cb/0x9010 [ 369.815947] 00 [ 369.817827] ___sys_sendmsg+0xed9/0x1350 [ 369.822394] 00 [ 369.824270] __x64_sys_sendmsg+0x3b0/0x520 [ 369.828388] 00 [ 369.830275] do_syscall_64+0x15b/0x230 [ 369.834303] 66 [ 369.836182] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 369.840386] 90 [ 369.842254] Disabling lock debugging due to kernel taint [ 369.846117] 48 [ 369.847989] Kernel panic - not syncing: panic_on_warn set ... [ 369.847989] [ 369.853163] 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.883655] RSP: 002b:00007fca5a150c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 369.891369] RAX: ffffffffffffffda RBX: 00007fca5a1516d4 RCX: 0000000000455ab9 [ 369.898634] RDX: 00000000fffffc53 RSI: 0000000020000100 RDI: 0000000000000000 [ 369.905893] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 369.913153] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 369.920411] R13: 00000000004c2c3e R14: 00000000004d4c38 R15: 0000000000000055 [ 369.927691] CPU: 0 PID: 16371 Comm: syz-executor6 Tainted: G B 4.18.0-rc5+ #29 [ 369.936348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.945709] Call Trace: [ 369.948307] dump_stack+0x185/0x1e0 [ 369.951951] panic+0x3d0/0x9b0 [ 369.955170] kmsan_report+0x2bf/0x2c0 [ 369.958986] __msan_warning+0x7d/0xe0 [ 369.962804] __ip_select_ident+0x45e/0x840 [ 369.967065] iptunnel_xmit+0x7fb/0xdb0 [ 369.970982] ip_tunnel_xmit+0x373a/0x3b10 [ 369.975183] ipgre_xmit+0xe16/0xef0 [ 369.978827] ? ipgre_close+0x230/0x230 [ 369.982723] dev_hard_start_xmit+0x60f/0xcc0 [ 369.987159] __dev_queue_xmit+0x3060/0x3c70 [ 369.991510] dev_queue_xmit+0x4b/0x60 [ 369.995320] ? __netdev_pick_tx+0xb60/0xb60 [ 369.999657] packet_sendmsg+0x8469/0x9010 [ 370.003812] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 370.009194] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 370.014654] ? rw_copy_check_uvector+0x630/0x710 [ 370.019454] ? copy_msghdr_from_user+0x75e/0x8c0 [ 370.024236] ? compat_packet_setsockopt+0x360/0x360 [ 370.029262] ___sys_sendmsg+0xed9/0x1350 [ 370.033342] ? __msan_poison_alloca+0x183/0x220 [ 370.038026] ? __fdget+0x4e/0x60 [ 370.041411] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 370.046782] ? __fget_light+0x6e6/0x760 [ 370.050777] __x64_sys_sendmsg+0x3b0/0x520 [ 370.055034] ? ___sys_sendmsg+0x1350/0x1350 [ 370.059363] do_syscall_64+0x15b/0x230 [ 370.063259] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 370.068439] RIP: 0033:0x455ab9 [ 370.071615] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 370.090846] RSP: 002b:00007f1b57e9ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 370.098547] RAX: ffffffffffffffda RBX: 00007f1b57e9b6d4 RCX: 0000000000455ab9 [ 370.105816] RDX: 0000000000000000 RSI: 0000000020001540 RDI: 0000000000000016 [ 370.113080] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 370.120340] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 370.127597] R13: 00000000004c1066 R14: 00000000004d16c8 R15: 0000000000000000 [ 370.135330] Dumping ftrace buffer: [ 370.138860] (ftrace buffer empty) [ 370.142547] Kernel Offset: disabled [ 370.146153] Rebooting in 86400 seconds..