&(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:25 executing program 4: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x1, &(0x7f0000000380)=ANY=[]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000800)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0x2}}, 0x50) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000540)="4234c726e09ba293ee9b08db1ef52903dfc1e1c245c7cce67ca2559659a328d721069d1772d8e14922a18a401462a8a2ff9a22da", 0x34, 0xfffffffffffffffa) keyctl$negate(0xd, r1, 0x7, r1) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000400)={0x24, 0x3, 0x0, {0x0, 0x3, 0x0, '\xea\"}'}}, 0x24) accept4$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000a40)=0x6e, 0x449d6679264c2574) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f0000000100)='./file1/file0\x00', 0xfff, 0x5, &(0x7f0000000780)=[{&(0x7f0000000580)="d9057853a064a1f5831b3de764f59e41877ed697ea437e0dd5b7911cccd37fa87adc3f5c851cd540d85e7b403085fe14262601ea9c51d89bbb7d9a36fc71267dd7d9625f17c60ac5f5d53ed26da8b58ad0b3240fdc4237658f2a0008612eaf285b3925f31b18312c9a51ac91c30785cb0ecc672305855f53d75ac7fb83192387b5cdd23aaab7ea28b5918dd3628d0feca20eeabd3509284a7d31c4c586955d2952e9d74682b01da10eda5057f7c374aa5e15e6a4848cd5a365bd8c252de6ec661d7f7f3115f373f418b31cde59db1eb7239fb095fb737926ddb8890c1f7f51cda226f9bf6a5923de5b7675cf5e653584d440", 0xf2, 0x2b82}, {&(0x7f0000000140)="c959941130cf2d71d3c73552e6e3b050af500efd3ee05bfa222ee28828387644c305499ea0be13dfc986cf9b16efe041675a6982037c4965f7473a6f", 0x3c, 0xfe0e}, {&(0x7f00000001c0)="3f5e9724ac4ec1011b4c7a94cd987516a619577097cc7a6e6ffe3e07e094e39cad6afd7ec632b7eaee000195198c", 0x2e, 0xe7}, {&(0x7f00000003c0)="34c07b16f9df53d85d70db4442a60db1e266503c1854b0b886f6eda396628a771d0be21c99acf84473b8d43e67", 0x2d, 0x9c0}, {&(0x7f0000000440)="26ae9f73215f65773f5e9d116ff26445360aa14f59de5fc3bc6ae5fe8d8e8d", 0x1f, 0x7}], 0x2000008, &(0x7f0000000700)={[{@acl='acl'}, {@nouser_xattr='nouser_xattr'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '\'#'}}, {@permit_directio='permit_directio'}]}) mkdir(&(0x7f00000000c0)='./file1\x00', 0x100009e) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000340)=""/91) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:11:25 executing program 3: r0 = memfd_create(&(0x7f0000000100)='\xac\x00\x00', 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x40000, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) fremovexattr(r0, &(0x7f0000000080)=@random={'osx.', '\xac\x00'}) fallocate(r0, 0x0, 0x0, 0x44) ftruncate(r0, 0x0) 12:11:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000001340)={0xc8, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x21}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x200}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fff}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x824}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_hsr\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7d3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4000}, 0x2400c000) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x3}, 0x0) 12:11:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x300}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x360, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) connect$ax25(r1, &(0x7f0000000080)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default]}, 0x48) 12:11:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:25 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/241, 0xf1, 0x10100, &(0x7f00000001c0)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e21, 0x2}}, 0x80) sendmsg$sock(r0, &(0x7f0000000000)={&(0x7f0000000040)=@generic={0x0, "55c11de3b72c2c54e522ad859ec451ab669c2b38b5583df5f2ebe9a1ce9fc2ddb43213109aa7cd671874c953e0a2e152ed36b266f0ebbec8d6fcd0d00713a2eb6970816d687e2aa228527cfd44d11fa401171bafc780732c51f6568c2dbbaef48e78a65ee110642a39443ed9b59d3791252e1c2f355ae22aaf1cb4995c3d"}, 0x326, 0x0}, 0x0) 12:11:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x800000029, &(0x7f0000000000)=""/145, &(0x7f0000695ffc)=0x91) 12:11:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:26 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000380)="03f441322927769b0d7dc76e9a24bd43bc22c8bc5ceb65eaae30c9769f83c8ae21d6e50d92496c837368fbc795b45d416bf0450d4a433722d44fa6778325", 0x3e, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r1, 0x9, 0x2a}, &(0x7f0000000100)=ANY=[], &(0x7f0000000180)="9e846e6f7924c1cdde", &(0x7f0000000200)=""/42) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x6, 0x2}, &(0x7f0000000100)=0x90) prctl$PR_SET_ENDIAN(0x14, 0x5) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={r3, 0x9b1}, &(0x7f0000000300)=0x8) prctl$PR_SET_UNALIGN(0x6, 0x3) 12:11:26 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0xe) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getegid() setfsgid(0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) shmget(0x3, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000200), 0x10) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 12:11:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x3000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000001340)=[{0x6, 0x0, 0x0, 0x7ff00000}]}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0xcc}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x2, 0x10}, 0xc) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000040)) 12:11:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000040), 0x315, 0x0) 12:11:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$isdn_base(0x22, 0x3, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f00000000c0)=[{r0, 0xf1d7934ab96b29f5}, {r1, 0x8084}, {r1, 0x10}, {r0, 0x8}, {r0}, {r0, 0x4000}], 0x6, &(0x7f0000000140)={r2, r3+30000000}, &(0x7f0000000180), 0x8) getsockname(r1, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000080)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x701}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:26 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x3, 0x0, @mcast2, 0x9}, 0x1c) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004080)=[{&(0x7f0000002b80)=@abs, 0x6e, 0x0}], 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0xfdef) 12:11:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@req={0x28, &(0x7f0000000040)={'hwsim0\x00', @ifru_settings={0x8001, 0x7f, @te1=&(0x7f0000000000)={0x0, 0x9, 0x7f, 0x100000001}}}}) 12:11:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) symlinkat(0x0, r0, 0x0) mbind(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x0, 0xaa000000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x75308a9e, 0x2, 0x800, 0x8001}, 0x8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r2, 0x0, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffffffffffc0}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) mlock2(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000000c0), 0x4) fchdir(0xffffffffffffffff) 12:11:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x7000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0xa, &(0x7f0000000080)='net/snmp6\x00'}, 0x30) write$P9_RGETLOCK(r1, &(0x7f0000000100)={0x28, 0x37, 0x2, {0x1, 0x8000, 0x2, r2, 0xa, 'net/snmp6\x00'}}, 0x28) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) getsockopt$sock_int(r1, 0x1, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 12:11:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000900)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0xda85}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r1, @in={{0x2, 0x4e21, @rand_addr=0x2}}}, &(0x7f0000000340)=0x84) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'.o\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x00\x06\x00'}) r2 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r2, 0x29, 0x22, &(0x7f0000000040)=r2, 0x50) 12:11:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:27 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001400)='/dev/vcs\x00', 0x34600, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x1) ioctl$sock_netdev_private(r0, 0x89f3, &(0x7f0000000000)="9e0b6a84e4d62c9f7cec6dae1e18bcfa3988e3c9451c0cb15ace33bc0d6c800826023f956f1edddb0796a2c3dd9604561cb28ed4dddd7cb836cff6b45946b94cfd4686b3ec954a03650a6ac79537eb48df4739a6b062bf3b5b52c114003443a6c56fc23cca1b5f5feb3f") getsockopt$inet_int(r1, 0x0, 0x32, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000240)={{0x2, @dev={0xac, 0x14, 0x14, 0x10}, 0x4e24, 0x0, 'wrr\x00', 0x8, 0x1, 0x1f}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x3, 0x40, 0x10001, 0x8}}, 0x44) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r2, 0xfac, 0xfffffffffffffff8, 0x5}, &(0x7f0000000200)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0x89, 0x2e, &(0x7f00000002c0)="038bb7c6aafa56c019c59d77cf02beaf76e227395b3db698b2f82d2bc42fbc2e1b24ac5e4a752266c1dbcbd912d442e98e9a76051de2c0c116d9b337aa065392016bb817de2adb3040b9e26c375a7d087173a3ad642c5790c280d563f157e345b8086a7a55c80a0e6e76dd7d40b1d2b866a61c71e6d1fc925688bf6878cc8062c9d98bb333f2070320", &(0x7f0000000080)=""/46, 0x3}, 0x28) 12:11:27 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000280)='security.SMACK64EXEC\x00', &(0x7f00000002c0)='trustedem0+Eem1wlan0lo[[\x00', 0x19, 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e21, 0x2, @ipv4={[], [], @broadcast}, 0x2}}, [0x3, 0x7, 0x4, 0x5, 0xfff, 0x5, 0x7545, 0x4000000000, 0x0, 0x2, 0xe1, 0x1, 0x8000, 0x8, 0x2]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000200)={r4, 0x0, 0x1, 0x6, 0x401, 0x200}, &(0x7f0000000240)=0x14) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 464.663214] IPVS: set_ctl: invalid protocol: 2 172.20.20.16:20004 12:11:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e020000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x900}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 464.715820] IPVS: set_ctl: invalid protocol: 2 172.20.20.16:20004 12:11:27 executing program 4: r0 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000004, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1c) setsockopt$inet6_tcp_int(r4, 0x6, 0xc, &(0x7f0000000080)=0x20000005, 0x4) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='rdma.current\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r5, 0x12, 0x2, &(0x7f00000002c0)=""/209, &(0x7f00000003c0)=0xd1) 12:11:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001ff) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x5, 0x2, 0xfffffffffffffffd, 0x104, 0x1, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000040), 0x10, 0x0}, 0x0) [ 464.845672] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:11:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x7, 0x3, 0xfffffffffffffffe, 0x9, 0x3, 0x1, 0x0, 0x0, 0x0, 0x80, 0x80000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000040)={0x7ff, 0x0, 'client1\x00', 0x5, "9601b77dc784fd19", "af28b0d2a2927a1004a5321eec74917958afcddf4636f6ebc06157ac75a90fa0", 0x101, 0x7fffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) [ 464.917476] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:11:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x8000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="af33000000008000e8140800000004000100"], 0x18}}, 0x0) 12:11:28 executing program 4: r0 = socket(0x40000000000001e, 0x800000080801, 0x0) sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, 0x0}, 0x0) recvfrom(r0, &(0x7f0000000040)=""/230, 0xe6, 0x2, 0x0, 0x0) listen(r0, 0x8) connect$bt_rfcomm(r0, &(0x7f0000000140)={0x1f, {0xffff, 0xf35e, 0x1f, 0x1ff, 0x5}, 0x9}, 0xa) accept$packet(r0, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', r1}) setsockopt$llc_int(r0, 0x10c, 0x4, &(0x7f0000000000)=0x20, 0x4) 12:11:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:28 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x6400}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) close(r0) 12:11:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:28 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x800, 0x0) r1 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000)={{}, [@remote, @rose, @null, @netrom, @rose, @default, @default, @default]}, &(0x7f0000000080)=0x48, 0x800) listen(r2, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') getsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000140)={@rand_addr, @empty}, &(0x7f0000000180)=0x8) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:28 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x801, 0x0) write$cgroup_int(r0, 0x0, 0x693ce90e) poll(&(0x7f0000000280)=[{r0}], 0x1, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x1, {0x9, 0x2f, 0x6, 0x5, 0xa, 0x4, 0x2, 0x10a}}) 12:11:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffe17, &(0x7f0000000180)=[{&(0x7f0000000100)="2e000000160481aee4050cecce4cb90402485e510befccdf7f3e9cf0758ef900e10080ebb1cb4c100c0003720000db5f04135506eb56dfeeb0dc3738de45c97d7c1cbbd19729d917d443493eea09", 0x4e}], 0x1}, 0x10) [ 465.955796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1046 sclass=netlink_route_socket pig=23796 comm=syz-executor.4 12:11:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x9000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) syz_emit_ethernet(0xc2, &(0x7f0000000200)={@local, @random="ed9f575596fc", [], {@x25={0x805, {0x0, 0x5, 0x1, "4bc2b9726787326f68ef67d401a02ecfbb4e7603f75f9ff154f1b31c684a81e3f841c1a860762ff36e8aae68d4016649724417fb3151d879139b801e7c8c10007f0f172465d748ebb37805298be8f8e600756f07393c6b06f55d0ab1ebcb908c3c4a3e5b7acb7cb803c9495f65600ec57525389e4c8b730f500a5354d1abc7a9f1f401b4070b94fd205e15e38be17296e6d8a7d13d30a5fe4083ea72c12d8ae23c0f82718aa6d5f056243b3be8c73f75a9"}}}}, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000000)=0xc0aa) fstatfs(r0, &(0x7f0000000300)=""/225) ioctl$sock_proto_private(r1, 0x89e7, &(0x7f0000000040)="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") 12:11:29 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:29 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, &(0x7f0000000100)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0}, &(0x7f0000000880)=0xc) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff00000001, 0x5, &(0x7f0000000480)=[{&(0x7f00000002c0)="4873fb71748af5e924c288807fba9b166bc8838d8963e9ef27868b63ff99f298201c2dc4cdb962252e626c3a218c9c383d94c2fc780c3b4f4b088055493e5b10743ce59ddf3c10d006bd091c323721bbe1987c49fef87efd1f1ac474d922ca4f04adfe4be10386a35751cc8749078085aeefdf0382da73474af53dff890db93c9b100cd8228ed4028a82975db25ed4139103e433b7a60d9310475f01efa76d52c928d1cad76381321718328375b33fb1eb2576a6f3e56322ad3ee0fa0d016f11be8bf592723efc4d2f374347a4c66602928f45022b0ef531b1929fa90f19ccd3ce4784c40f9988df5a9637022084dc9d", 0xf0, 0x1}, {&(0x7f00000003c0)="bea4df344908281e73d661b2cebbe2fe4962826c20ad16073e92e52c79ac48596b2ea68af560aafd2ffafff3526de13dc329d2ced432a0d2223e6fe16d36d6c3193a19723603614459b478105110478c7446b61fa2c1c5149fa065f376f8c0169b7d41471373b435827fb3f2298f82c16b1267dd30013093ceb897b2dd176fc88fe1b89f1f32ff73513dcbf85f367a5a2f7a0a2064850274aa8edf1f8fb02284cbe2912bd3f9807a5fbaced728f173791f134206b8f5ef8235de5c", 0xbb, 0x4}, {&(0x7f0000000680)="92888909459c42056457d01d9b00f3085e7729bd40a9e8640c67b6873a38395dd407c6a1591779453977537de0adecc0d9291412ed83e22ead76b0d2b2b3db8daec654aaf0d13d7c143d778ae55f4fa9c9d1863b2ae121e5712cc6d734e4c2e4a2a513527d5638da957a590d1d909e0efa4af22279d94d053b43fd02dbb59af328bb5c01099ee117f561c4f3a86520eef644185da5ec35d5d97dacf7a46778c9c21a4f9209390f1114efe8601c829f1bfdfbe32ade7db8100817dc18b7084dce1200cfc8224dc1928550150246d235c903443c587094364db5d734af8182da84c3487c74fa3f5a476e1c2f60b7e08de815c94d8e", 0xf4, 0xe53}, {&(0x7f0000000780)="3e94ec65d107f99c8181bf6005e8bbd347693d99090fb8357c46873fca1867913df2916b30665950b6c1879a3cb811bdd0970f32dcd9325dfcacfddf84e68d270deeaf819766db1654ad0511f8e2eacbe65f03610505951548e370faa09938243f4ab6cb4098fab5d6b358af2814076c280989690c16e50c9c3b05a46f8bbfb030471d1416c5f0c05e1115d5cb", 0x8d, 0xa20}, {&(0x7f0000000140)="636d771ee31145ae670a00223f4c407c18c39788a8398ef6edc9fb35e2c8659a48ccf53e8d9c30b987b046a6f25c8e270e78b8035b85bd567b32209ce632709b458c3074f387ebc55f0d4f3c3a479e9dca48af5e07e77b3bf6c891a4650a42", 0x5f, 0x7f}], 0x8000, &(0x7f00000008c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@nojournal_checksum='nojournal_checksum'}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x20}}, {@nomblk_io_submit='nomblk_io_submit'}], [{@fowner_gt={'fowner>', r1}}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000980)=""/19) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x6, 0x1, 0x7fff, 0x8, 0x800, 0xdd33, 0x6, 0x10000, 0xff, 0x400, 0x52}, 0xb) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f00000009c0)={0xf618, "5fad3a4ff5677786e910f4b12b4a757b5dccbf78e78c6b4ba2d81bad3a41173c", 0x20, 0x3, 0x7fffffff, 0x51ba234cf213d8bf, 0x1}) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000a40)=0xfffffffffffff000, &(0x7f0000000a80)=0x1) sendto$inet(r2, 0x0, 0x600, 0x1000000, 0x0, 0xb2) 12:11:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:29 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) sendto$rxrpc(r0, &(0x7f0000000000)="523d19789ce51ae8d7677099c6efd512452373ccb3a6a8b614edb9b0fff66bfc77f2ddb52db84bac02880baa4091339991871557162a245321a465b050a7c80490ebd33e04d9d487a16ff20dd9db166948a05fa4b2d96e5b72ed6374068de6a003ed64587131fa8a2dd7285e266cb4d0fbc84bd7a3452d1ccd984a", 0x7b, 0x4008800, &(0x7f0000000080)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @empty}}, 0x24) 12:11:29 executing program 4: socket$kcm(0x2b, 0x1, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create1(0x80000) connect$bt_sco(r1, &(0x7f0000000300)={0x1f, {0x400, 0x3, 0x100000000, 0xff, 0x10000, 0xfff}}, 0x8) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xfb2f, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/context\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x40, 0x0, 0x9b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/.yz1\x00', 0x1ff) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000001c0)={0xa1, 0x0, 0x10000, 0x3}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f00000002c0)={0x8, r4}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x501, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000980)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A\x91\xb4\x11031N\xa55\xfc\x12\xf1\x9b#\x80\x1e\x1e\xa2\xec\x04Y\x7f\xce\xd8\x1d\xbe\n\xf2F\xe1\xd1\xf8\xa3\xa1~X\xc7I \x1d\xd8\xd9.\xed') write$cgroup_subtree(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000001007d961fdde77144e19414064e6928ca6699f55d488ee9804c53feb8225c154d27a17a28f73570fc47"], 0x70ad) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="c90f397782c5518aa5e47c04a53e5adefa1e2df2655d896349cc16da2031b5c9b70326", 0xfffffffffffffd9f, 0x4, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xfffffffffffffffe) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) connect$bt_l2cap(r6, &(0x7f0000000080)={0x1f, 0x3, {0x2, 0x1, 0x90, 0x8, 0x4, 0x1c0}, 0x2, 0x1}, 0xe) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000000140)=0x807) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x8) ioctl$TIOCGICOUNT(r6, 0x545d, 0x0) r7 = shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_INFO(r7, 0xe, &(0x7f0000000000)=""/7) 12:11:29 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:31 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000000c0)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400800, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000040)=0x3fffffff800000) 12:11:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nfsfs\x00') ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)={0x0, {0x9, 0x7fffffff}}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:31 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:31 executing program 4: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2c, &(0x7f0000a83000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) 12:11:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x7010000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x10000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:31 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000040)=0x3, 0x4) socketpair(0x4, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000180)=0xe8) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f00000001c0)={r2, 0x1, 0x6}, 0x10) 12:11:31 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x4, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net\xd7?\x00snmp6\x00\xbbMsOA\xbfV\xe9Y\xd4r9W\x8a\x1d\xdd\xd7)\x8cK\xd6x\xa4\xcf\nq\x8f\xc4pY\x96\x84\xbb}\xcaQ\xea\xbej\xc5\v\xaa\xb3\xb0\xfb3\x80\x84\xc0\x8eJ\x94\x82_\xbb\xde\x8c\xf2\xcf\x86\x88\x18gp\xb2\xa1<\xf7\x14\x19\xff\xb9\x92+\xa9\x9c?&DoLSw8\xa29\x10\x97g\xb7fOuY\xf1\x00\x98\xa2\xc6\xab\x92R\xd0\xe5B\xf5Y\xcd\x1fr\xce\x05#\a\xb1\x1c\n8SZ)\x15\x99i\x14t\xca\xa7PCJ`\xa2\x00I\x11b9\xb8\x01\xafp\xd2/C\xc9M\x17\xc5\xb7\x01\xff8\xe1\xf7\xdf\x1c\xbe\x9a \xa0n\x9fG\xcc\xcd\xb8\x89!\xc4}\xcaz\xac\xc5\x1f\'\xa5\xcf\xeef\xc6\x1aZ\xf1\xa0\xe8w\xba\xb4\xa2\x8c\x9e\x9eO\xe8g\xbc\xc7\xfb\xb2\xb6\xe0\x96\x82\xaa\xc0\xc2\x8c=\x1e];\x1aO\xc2[ve\xbfn\xcbzgr\xc2y\xbe\x1f\xf7\x83\x81\x8e\x1b\xb0\xa7k\x95\xba\x06,\xa7\xc6\x1b\xda\x1f\xc8\xbc\xc3\xe2W\xd9#\xd5\xba\xa4I1\xa2\x03\xef6J\xdd\xd5\\\xb5\x06\x04\xcc\xde\xb8.\xb1\x83KI\x89kO\xdb\xad') pwrite64(r0, &(0x7f0000000140)="ba23f79e666f9376dc317fc8db22f49dd4da385044975974b5f6da3e9ee9f6862f505cc727ddbc4200758fbaf91159a5b479a24e875cfb15fa194dc2ab40c9159170a3d3f236cb93f369703268dac98d815a66800324007a5790d5b95c9c170f68532b3957bff3c94c13d5db2fbb2f733fa13d4cc02ef9f63de3b7bee1d02c765c39e7a913bd94ef7743fe094f51597b281a17347903b875ede24074fba55dbc04baa46579c1f2a1433d6c2b346edb82b19a2627591f5f4caad6221e972217c4c414d7db0abba89b301fe2379db516b7f699eb4fe037333dc5df9658bd037d4ae0", 0xe1, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:31 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x1, 0x2) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f00000002c0)={0x3, 0x1, [0x8, 0x9, 0xf9b, 0x8, 0x800, 0x7ff, 0x5]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x1, 0x4000) ioctl$KVM_SET_XCRS(r2, 0x4188aea7, &(0x7f0000000100)={0x2, 0x2, [{0x5}, {0x6, 0x0, 0x7}]}) r3 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000fffbac141400000000000000000005000600000d55289600000000000000fe0000000000ff0000000000000000"], 0xa0}}, 0x0) sendmsg$key(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)={0x2, 0x13, 0x0, 0x0, 0x2}, 0x10}}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000300)={0x0, 0x8, 0x7fffffff, 0x9}, &(0x7f0000000340)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f0000000380)={r5, 0x3, 0x17}, 0x8) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x8000, 0x1b4}]}, 0xc, 0x1) 12:11:31 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x2100, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f00000000c0)=""/68) syz_emit_ethernet(0x10041, &(0x7f0000000000)={@local, @random="192bce5e2dfb", [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x273, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 12:11:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000100)=""/173) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000000)="39714efcea5717824bfb21e2dcad2a93f25f6455f2449185dcee137c5ef5b928f93ced5d55cef27b25ec42a803e6d45088cff694d1ca9393c65594cc137b54f4e53a852622b177a81a0e6a8ce72a22a6a84ce93305a159977d4dbe695033b2e8155feea8560d335088b82661f45df120ec2595f9c00eb82148bcad554ff109546b4d5ce73e68733123b0746c908a7c10bcf5e5b7f7c2c80b931ad3074a825ddbbb44fb882b14ce24f6d4df365b1ed3a7dcb43104b1f4a46846de6db180d4b29289baf821cdc10d7ad29a02e3ef55d2152c4158cdde", 0xd5) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:31 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:32 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8932, &(0x7f0000000040)={'nr0\x00'}) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) 12:11:32 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000000)={0x1, 0x9, 0x60b73084, 0x1, 0x7fffffff, 0x800}) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x8000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x3f000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:32 executing program 4: r0 = getpid() r1 = syz_open_dev$sndseq(&(0x7f0000000440)='/dev/snd/seq\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x80000, 0x0) read(r1, &(0x7f0000000200)=""/28, 0x1cc) socketpair(0x3, 0x4, 0x80010002, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=0x0, &(0x7f0000000340)=0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000003c0)={r4, 0xc2, 0xb0fd85c018df2d39}, 0xc) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000300)=@int=0x10001, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x1, @tick=0xcda7}) timer_create(0x5, &(0x7f0000000100)={0x0, 0x12, 0x3}, &(0x7f00000001c0)) r5 = syz_open_dev$dmmidi(&(0x7f0000000600)='/dev/dmmidi#\x00', 0xdb7, 0x10080) setsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000640), 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0xc0bc5351, &(0x7f0000000000)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0x4058534c, &(0x7f0000000180)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x1000000000013) 12:11:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = accept$ax25(r0, &(0x7f0000000080)={{0x3, @netrom}, [@netrom, @null, @netrom, @rose, @netrom, @netrom, @netrom, @rose]}, &(0x7f0000000240)=0x48) getsockname$ax25(r1, &(0x7f0000000140)={{0x3, @bcast}, [@bcast, @rose, @default, @bcast, @bcast, @null, @bcast, @netrom]}, &(0x7f0000000200)=0x48) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00'/10) preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000040)='gre0\x00') 12:11:32 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x4000000001, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x48f, &(0x7f0000000000)={0x88, @local, 0x4e24, 0x0, 'lblcr\x00', 0x2, 0x0, 0x1000000000006c}, 0x2c) 12:11:32 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0x7d681655}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="000000f5ae713017c8a6efa3745c92fd57b608fa9c452a851b5c3915bc0d0daf8045d0a6d65bfc7218bfed0d05c3c562d814555b0c4917bd2423068e25c8a3605f02ced0f36d690b51ce9e5a760d5b35ff764a5b3d06719750870019444f212907704028421400000000000000000000000000a73aa03ff9f0fe2baf33d5cd7196452907404c7c8550cdab2e9c59ea4dc868c668b57ac8094c0246d4904f2e58fd907c774d8df90704df9bf8fc66166425d215e60c9b78d35d8924f0cd307624d2804350b932b4686332933a75d8c6124b67e2fe23439cea92ce2d955d7f47f844016123cdbdb858d86c86a73ff19f79546f288d99f2ab6fdb45414ccc48b974c23bea13114c1f1a", @ANYRES16=r1, @ANYBLOB="dd172abd7000fcdbdf25140000000c000900080001009c00000004000400"], 0x24}, 0x1, 0x0, 0x0, 0x20000844}, 0x20008000) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/4\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000000c0)=0x24) [ 469.793845] IPVS: set_ctl: invalid protocol: 136 172.20.20.170:20004 [ 469.807616] IPVS: set_ctl: invalid protocol: 136 172.20.20.170:20004 12:11:32 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x18, 0x2f, 0x305, 0x0, 0x0, {0x202, 0x1000000, 0xa00000000000000}, [@typed={0x4, 0x5a}]}, 0x18}, 0x1, 0xffffff7f0e000000}, 0x0) 12:11:32 executing program 1: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/snmp6\x00N\x1f\x82\x87J\x18&\x85Z\xf4\xaeG\x98\xf2\xb6\xc7\x05\x1bh\xf6,{\xb3&\x838\xee\xe9\b\xefx\x0e\xf2[\xbd\x8a/\xdc\xa1jq\x87\xb9\xc1U\x8cB\x91P{\x9d\xba\xe43\x88r\x83\x1cp%A\xf84\x91c\xee\xc2*\x8a\xb4Pl\x10\x0ex_\xc24\x148\xcd?\x86\x91U4O~,\bBJ|[\f\x02') perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x1e, 0x0) preadv(r3, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:32 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000100)={0x100000001, 0x9, 0x9}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) listen(r2, 0x26) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000200)={0x7, 0x70, 0x2, 0x0, 0x8, 0x9, 0x0, 0x7b68000000, 0x1800, 0x91cb9db4d440ea20, 0x7, 0x77, 0x1ff, 0x4, 0xe2a, 0x9, 0x0, 0x3, 0x3, 0x0, 0x10001, 0xc7d, 0x101, 0x5, 0xfff, 0x7fff, 0xb6, 0xc1e, 0x59, 0x7, 0xbd, 0x2, 0x2, 0x7, 0x10001, 0xfffffffffffffffd, 0xffffffffffffff80, 0x6, 0x0, 0x7fffffff, 0x6, @perf_bp={&(0x7f00000001c0), 0x7}, 0x4, 0x7f, 0x101, 0x9, 0x3f, 0xffffffff, 0x7fff}) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1ff, 0x800) write$P9_RREADLINK(r2, &(0x7f0000000180)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 12:11:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x9000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:33 executing program 3: r0 = socket$inet6(0xa, 0x8000008000080001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00', 0x0}) inotify_init1(0x80000) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="8176bc9ab7f38af6000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000000000004001a00"], 0x24}}, 0x0) [ 470.645238] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=62391 sclass=netlink_route_socket pig=23957 comm=syz-executor.3 [ 470.660161] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=62391 sclass=netlink_route_socket pig=23958 comm=syz-executor.3 12:11:35 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f00000000c0)={0xe9b0}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000080)={0x0, 0x0, 0x2, &(0x7f0000000040)=0x9}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) kexec_load(0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0x0, 0x19000}], 0x0) 12:11:35 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:35 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101100, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x13) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000080)=r1) sendmsg(r1, &(0x7f00000003c0)={&(0x7f00000000c0)=@ethernet={0x6, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000200)="b867af1e9837da28aa09c611d3483e47e1fac21791c51ba89170b71a294625330cc89c713b7f6f85c01ff231c2ae40a6e8882541df9a3740c41abc053a5c97bd68354d9b4fb59d91b85f1f553cb41888cb4d8d89daeee72a3e39a68c09f9fd181f42ba46bf91ebc59e6fd799f2adcc616e936b9a7aabc03f65641497b8570b0c90d236877fef3fa1f990797fd2381eae95c6a95479057891ca06d874b182669c84357e330728ac76e4b031cf3ccca06e07892281c7c7d695517ac3675c339929446de528f7880cf1789cf8d0768afa85faf92991e4117a2088185c", 0xdb}, {&(0x7f0000000300)="52be32e290a582823a194079ac60f96feceed691ac278d712936ef11f67fe5b2fc6e0ed24f9729bff6628109d83498b645ba142c3995d7b2aa76fa9a7b952b07e89a65a1ae94c1eeed62eb6a3e6a1765e46977b1661d6450821a222b45dbd49698948f0e68a910d0950f543a6e4d8cda3a87ff2c1c587a880aa6899415321219ec1f62417732f3da58b36d9b7cd264", 0x8f}, {&(0x7f0000000500)="f57bc8103a3ab5bd9e3b0b9aa421d6201ee5a83baaa539f3a43d85c82daa21adca0ff785a6027789b92015d3748180b7a04c8dae6fe2fba40d7d2c5bac9f6c6e8bfc43708fc4b3db53851ba357f68df5fb4a1a73fd6481bac8d9ed4683cd58da2178ff4816bab396a5c80909dfeeeabdb90f31f7d06aa3cf55d79688072bdace1a3ee5cc94418bdd31de91e77c87d3676eb0238d8e23f845754cf4500e1fb215d6162c5fd3cb82d1d8f392842ebe86454259f544255292", 0xb7}, {&(0x7f0000000140)="2051ed0aed18f45264479393aef493f6ef2712375cf95c2987", 0x19}, {&(0x7f00000005c0)="c0c6b33a730ae3487c2dcbf23df4eb3d83aa65772afbca3cb5f3eeae4bb59054b0b5b050a5e97a5061cd1a255809f80e82ea2325b6a618898d888092ed0490a9bf75dd906dcd49e4c7bfa844", 0x4c}, {&(0x7f0000000640)="e1e6fd0d6143bf25c56889e318ab463b44932fe9d87652888c094b052ed6689c560d39deb30a3655aab88cb1464203027a8a524b2b1f0d512358fc8966e5951ebda4e71edc70a59d8fdae8ad58007e38555bad261e48dc41fd9d80836363abfc48fc6dd62e4c470b6ec75e049872edf440b86f8e63aeceb31cf6dbf09132ea5564b849bf39b45183a748f783bb3e24e8dfbcfa6dd0c4090f2944803e6cead956a0731b5cad1908e03fc820fa85f8e6cacdacef6e4056e896fe26328b085014a27e82b0d8aaba58bce0b68aff1b8a67b4e2a004b43e", 0xd5}, {&(0x7f0000000740)="10f6ca1f284322673acbab4f2ce6d1f063ebc66ec8ba1af7e5716d556290cd0bfcf3043ae6af515412c3e2a0236b4163e17956cd11ee37576bf03a387caecf9a5f4c67b6ff7026ce46eb1dc3ff0b886b74ac6c8c7c60ca42f50a7ad55b856e90d161ad0779567c3eb737288d56c5c32f274477e231a28f3b58b14824a3a59d50be3ca5f8a4dea780b0df14ce3cf2bc5dc1b53dcd1112d28df8ed09eb028af9e677dc535b480901b2a71c0bf5a90606c54112", 0xb2}, {&(0x7f0000000180)="042f4fd71e8022ac7f371e", 0xb}, {&(0x7f0000000800)="6f820455de9b7662c277daa3f7f9e6fe8f7064bb43f970c9f3f2362134ba0de25fe0518c2855aadecd0027d36f696694e3ae96de389ac4f8fdccfbc8776ff58ca12c7b5d3236b378f846c2da8238563924146c6975fa7d1dc5707dd3dbde7bdf19d3104eaea6da056444", 0x6a}], 0x9, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], 0x448}, 0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000001580)='/dev/hwrng\x00', 0x200, 0x0) socket$inet6(0xa, 0x5, 0x7fff) lstat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000dc0)='f2fs\x00', &(0x7f0000000e00)='./file0\x00', 0xfffffffffffffffb, 0x8, &(0x7f0000001380)=[{&(0x7f0000000e40)="01cac4c0b977092c8127fdfbf7a68d8600a3ec54b0b0e2c463aa64805a3ac111dab29e01703ffcfc5cd8f702d097996323bb3f22e5162bfcf5a7f42633657beb17a74f4737375f30cee2bc5b3f1232c15b21aa7d441dab01e043c57a4a8e42832a3befbf1e70ffa07432aac6d3dd49a39cd6b1b159a6d3a5a3bf403d80a7791f53c30a23f05363821d5d40cd0f0766e94d2d5f7ce04c320cb7", 0x99, 0x5}, {&(0x7f0000000f00)="6e2b40a08d66a066b384cffd08c2d75f7f20854e2866514a11c7907730b12619bb71af794e6a7dccb2cf2c0ec252020531a1344b840e270f2a0b321fc898c988af6dba44ca3df2f02c255b857796a5f41d1edd9c2fffb3c5a15f81cfd73040b34e631644c1f3bc9534d5b50667ed7ac7bcf00e4f7ebfc08a8e5ce8baf6dfb834164e5fd4a6d47f7a65105bbf1f0ab1c5", 0x90, 0xfffffffffffffffa}, {&(0x7f0000000fc0)="cb0c0d1724bfdf96ee06258874b814183bf5833a7b59a19c56e5177307e28066745d8bee8e414057bfc6e6a07dc0fdc2495e4695d931220c5eca3a288b6ae49b3c83d66a64e9cbd5e30a6ad443323b33cddf2e5db362f5efb3214837b61e2199265817f6a919c4a463033719de759ed9482ad6bd201928222be531ee22103b", 0x7f, 0xffffffffffff0000}, {&(0x7f0000001040)="c0eb531175d169286e0cf9687f414e0c25fd13218a60c5561a3a87f00d04", 0x1e, 0xb49}, {&(0x7f0000001080)="a7553bbf791210e17e992303cb7eb0582ac7869ed1910f8d738e36fdc73f36079aa3fcf31cbc6c2b6b3ee0b5dd27e4f912dca189aff8d579831367e364086fd5a13ef483f9b8e4", 0x47, 0x1000}, {&(0x7f0000001100)="852ba13b8cb4c3a52ae0a9882113a4a675bfe2f51a513e156573dee8a0fedab6584c32c94cf3a3671aa6d1eb100e018e715983951cc741faab1b96505f85606daedea1d09a42fdbefdcbab68886741733386a702fd4dee91222d50ea6f2e30dbc20662c32e4d0d9602687f6f164ff07be3b35608dbdb20c60d817b378a777f1d0da5204b639d535d1ba54f5f22b1b020601a5e7e5574c9dfd07245f9e41a742969ac8da1e19f94111649ee66850d7e2297e7498e57f651afa11214363783ac5ff4b4db95b50a803c221e278aa33131342727cf497531102f13c2b69c4f1250fe9811d3ad193677dedae48d4b33aad9b325219ef38cb52977ae", 0xf9, 0x7}, {&(0x7f0000001200)="07c1078c4c82675220af1abd36a4224b550aa337e080d1e282c70fa93be6b4032744971336ce9fa12baa35d2a43532b06b5fb31f4313af94756a2491ab9b9d5e762c4f624d51de905a80c16bd0daea70c86efeab8160a20b4e1f6ceb4207324d814baa67e1943bf5b7aba108ff876a265ffd81bc64cba3f3ae7670", 0x7b, 0x1}, {&(0x7f0000001280)="429849339ae6acaefe3c344cc1dd63a37e526e6ffb1d974430ba43bded33f7cb7f47492a57d44aa4b5773517e85358c65fef97d052b6594e000c881e33d6398d906353fc5a55e7bbf189d511ccd636b1d5f4bed735666d114138c691e785bfc7349f767f4fd11a66d32c6eb93abf0a917a53ee68429ddced0517abf801f3eeac12abf80df6bfaa98d30f6b1ebbdad04380809f5d64e5ec43b3e53be7fd4c12dca875c8f00d4470b9c5d7e872ee4fa72337b3cfa2f90ae00b6012f9892e458c0de96318198d32a7dd4d899a1b713f9c6aaf49", 0xd2, 0x80}], 0x0, &(0x7f0000001500)={[{@disable_ext_identify='disable_ext_identify'}, {@noflush_merge='noflush_merge'}, {@noinline_xattr='noinline_xattr'}, {@fsync_mode_posix='fsync_mode=posix'}, {@noextent_cache='noextent_cache'}], [{@uid_gt={'uid>', r2}}, {@dont_hash='dont_hash'}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') setgid(r3) 12:11:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x64000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:35 executing program 3: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x8, 0xfffbffffffffffff, 0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) dup2(r0, r1) 12:11:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x10000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:35 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='\f\xcd\x80\xbf\xcd\xbd\xfb\x8bwa\xc1WvU\xff\xc6\xb5%\xbd\n\x90\x9e\xa8\x94\xefC\xaf]\xae\xd5MTy/o\xef\x9f\xb9\xf4\x8arA\xa1P\x91\x9dt&\xc4B|\x88\xef\"/\xcd@\x19(\xb58\x88\xca\x8de*\xed\x89\x99\xa9*\xc3W&\xa4y]\xb5\x85P\xa7M\xf84\xcc\x91\xe7(\xf4\xe4\xb0*\x18\xd2\xd7\xc0\xdf\x9a\xaa*\xaa+60M#\x98\x1c\xa4:}\xae\xf6a\x02\x91\xf2\xc1\xc9\xcb\x90X0\xad\x02\xe9\x9b\xdd\x01\x8f\xfa\x9f\x16,I\xc0\xbfA\xcf.\x88\xf8b\x83e\x93K\x8ai\xb0|\xa6\xec\n\xf5\xe1|\xc6\x935\x92q\xaa\xfbv\x11\x02w/\xdb\xca\x94\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ftruncate(r0, 0x8000) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0xc) ftruncate(r0, 0x0) [ 472.828541] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 472.861395] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 12:11:35 executing program 4: ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, 0x0) futex(&(0x7f0000000540), 0x3, 0x0, 0x0, &(0x7f0000000600), 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x5) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x10000, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x35) r1 = socket$vsock_stream(0x28, 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x6, 0x0) getsockopt$inet6_int(r1, 0x28, 0x2, &(0x7f0000000040), &(0x7f0000000100)=0xffffffffffffff26) socket$isdn_base(0x22, 0x3, 0x0) getpeername(r1, &(0x7f0000000240)=@xdp, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) futex(0x0, 0xc, 0x0, 0x0, 0x0, 0x1) 12:11:35 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 472.922828] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 472.945578] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 12:11:35 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) [ 472.997097] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 473.013251] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 473.042397] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 12:11:35 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getitimer(0x2, &(0x7f0000000080)) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60d8652b00142b00fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="ed76406856aab104"], 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "efc6149c6e27504bc84167d64c59e41cc4"}, 0x12, 0x1) [ 473.083638] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 12:11:36 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f00000009c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x10ffff) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000240)={0x0, 0x1}) connect$x25(r2, &(0x7f0000000a40)={0x9, @remote={[], 0x3}}, 0x12) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000980)=0x0, &(0x7f0000000680), &(0x7f00000006c0)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) lstat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a00)={r10, r3, r12}, 0xc) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32=r3, @ANYBLOB="9a2595b01b244eecac7ea8816008abdd627f8726a186fabce6dca86c2b329652e8074b2f725bbd9f0c17ecde6a095a0bb319770da577092a117ddd9854db8c994713a092478ed212ea5149e50bdb52", @ANYRES32=r4, @ANYBLOB="00000000d622ee7e0f41ff86857fefd4301c34f0f7c2576913c401f0e395111a84104d6812051a20312df3889546ba86a99d4a15d6f022b3a4d3b4387bc1d97094189b59d3539a290cad03e75621fc1db19a4584bacd0a77beb9f3e2561fb29d", @ANYRES32=r5, @ANYBLOB="02000600", @ANYRES32=r6, @ANYBLOB="02000400", @ANYRES32=r7, @ANYBLOB="02000300", @ANYRES32=r8, @ANYBLOB="02000200", @ANYRES32=r9, @ANYBLOB="040004000000000008000200", @ANYRES32=r11, @ANYBLOB="08000400", @ANYRES32=r12, @ANYBLOB="08000200", @ANYRES32=r13, @ANYBLOB="08000500", @ANYRES32=r14, @ANYBLOB="10000100000000002000040000000000"], 0x7c, 0x3) [ 473.178828] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 473.261241] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 12:11:36 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000100)={0x5, 0x0, 0x2, {0x2, 0x200, 0x2256, 0x100000000}}) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000040)=0x1) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/33, &(0x7f00000000c0)=0x21) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) listen(r0, 0x5) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:11:36 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80040, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/144, 0x90}, {&(0x7f0000000100)=""/64, 0x40}], 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0xbc010000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x18) ioctl(r0, 0x1000003000008912, &(0x7f0000000900)="11dca50d5e0bcfe47bf070") r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r2, 0x6, 0x19, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) 12:11:36 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:36 executing program 4: r0 = socket(0x10, 0x2, 0xc) capset(&(0x7f0000002ffa)={0x20080522}, &(0x7f0000002000)) write(r0, &(0x7f0000000a80)="1f0000000104fffffd3b54c007110000f30501000b000600480010d10200cf", 0x1f) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x82000, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000040)) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000080)) 12:11:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x64000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000180)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = epoll_create(0x8001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r2, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x0, 0x2, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x7, 0x0, 0x10000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x20000000000d1f, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x7a05, 0x1700) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000000)={0x6, 0x8001, 0x8e, &(0x7f0000000100)="662e7cddd73d92774773c4b70e09f62d463d4641e7fce66f60b420b77330a8a68d1030e15ce3a6d6bc60820239481cb00ce1cf38319ecf50639f98b3d033a1b2c2a829cc50d9fb413b8352ece571259ace3f95477413251c29289178d405d36c413acd03bba7cb5519e4fd7b06657a0b27a376402a33521b8d22415e1166b9ed7451363fcd207e629958f940230e"}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000740)={0x338, r3, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x23d}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x15}]}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5983}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x88c0}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_LINK={0x2c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa7d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8e6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xa8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe48}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x10c, 0x1, [@TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'eql\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x993, @ipv4={[], [], @rand_addr=0xb9}, 0x7}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x401, @local, 0xffff}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @empty, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xaef}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e20, @local}}}}]}, @TIPC_NLA_LINK={0xbc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ce}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4aed}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x195}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1de0586c}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5c20}]}]}]}, 0x338}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r4 = shmget(0x1, 0x3000, 0x78000000, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_LOCK(r4, 0xb) syncfs(r1) 12:11:36 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:36 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x6, 0x8, 0x8, 0x82}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="00009aa44ebf00de650000"], &(0x7f0000000200)=0x1b) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x76, 0x0, &(0x7f0000000000)) 12:11:36 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xff) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f00000003c0)=[{&(0x7f0000000000)=""/228, 0xe4}, {&(0x7f0000000200)=""/235, 0x3f4}, {&(0x7f0000000100)=""/165, 0xa5}, {&(0x7f0000000300)=""/148, 0x94}], 0x4, 0x0) 12:11:36 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r1, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d24000)=[@in={0x2, 0x0, @multicast1}], 0x10) clock_gettime(0x0, &(0x7f0000000000)) 12:11:37 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4800008}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xf4, r1, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x7f}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x30b}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @local}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x20}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x19, 0x13}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x10}, 0x4000004) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0xff000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0xb759, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000000)={0x0, 0x3, 0xcab, 0x8, 0x4, 0x2}) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) semget(0x2, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400000, 0x0) getdents(r5, &(0x7f00000001c0)=""/65, 0x41) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xdc8}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) fcntl$dupfd(r6, 0x0, r2) 12:11:37 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) r1 = socket(0x11, 0x80000, 0x9) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000000)={0xa3c1, 0xff, 0xe44, 0x7}, 0x8) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x196) 12:11:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x1000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:37 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="fe46b0759fd64441d13534cd71e1a7f65a19440c3035b581ae0b82c7504508740a28180fe85caa4f36e98d3be735a601", 0x30}], 0x1}, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 12:11:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) getgroups(0x2, &(0x7f00000001c0)=[0xee01, 0xffffffffffffffff]) setgroups(0x1, &(0x7f0000000280)=[r0]) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:37 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 474.609694] audit: type=1400 audit(1566475897.416:114): avc: denied { map } for pid=24076 comm="syz-executor.4" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=78432 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 474.728784] device nr0 entered promiscuous mode [ 474.759751] audit: type=1400 audit(1566475897.566:115): avc: denied { map } for pid=24101 comm="syz-executor.2" path="/root/syzkaller-testdir698985045/syzkaller.Wntd1Z/785/bus" dev="sda1" ino=16555 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 12:11:37 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0xb759, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_open_procfs(0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000000)={0x0, 0x3, 0xcab, 0x8, 0x4, 0x2}) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) semget(0x2, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400000, 0x0) getdents(r5, &(0x7f00000001c0)=""/65, 0x41) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0xdc8}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000040)=0x1) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) fcntl$dupfd(r6, 0x0, r2) 12:11:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x100, 0x0) sendto$rose(r0, &(0x7f0000000040)="85028bbec72b0078d6fa830e013ad5d44fbf77baa867bd802397592f68711bace0d3e118cf520623b5697b1976984259d38957630292f82359451a8d62a1e0acb061c2a67e15b60a8aca236f9344857747aa288e4deaeb104008e66787fb628b3a10c40d1ba3ec8744103a80056474c0e42cd66efbe014ad2abecfba719508b9e4aa66e9d200e36faa27f68d9f31942c10ab9c9e556c2b4f2a896acd205db3153460bd8232ee96f0143ed7d686181042f5983850f86448e19dfac770e61543521d7cfcc2db90f6f35ac46f939958ac64ff3455436e8be6bbd8da0228647707453e49f94a396a0b5e9e32a9431192c307a835099b", 0xf4, 0x40080, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:37 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:38 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x7ff, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000340)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000003c0)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000380)={r2, 0x80000, r1}) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x5bd5cb865561314f, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000280)={r3, 0x80000, r4}) ftruncate(r0, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) setsockopt$bt_BT_POWER(r5, 0x112, 0x9, &(0x7f00000002c0)=0x4, 0x1) recvfrom$rxrpc(r5, &(0x7f0000000000)=""/99, 0x63, 0x40000000, &(0x7f0000000080)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e21, @rand_addr=0xff}}, 0x24) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x5) 12:11:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x300000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0xa48a7bac37cf997e) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[@ANYRES16=r2], 0xffffffffffffff50) [ 475.548408] device nr0 entered promiscuous mode 12:11:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x410402) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) read$rfkill(r0, &(0x7f0000000000), 0x8) 12:11:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:38 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000040)=0xe30) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r2, 0x111, 0x2, 0x8001, 0x4) 12:11:38 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2000, 0x0) recvmmsg(r0, &(0x7f0000002e00)=[{{&(0x7f0000000140)=@ethernet, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/15, 0xf}, {&(0x7f00000001c0)=""/65, 0x41}, {&(0x7f0000000300)=""/248, 0xf8}], 0x3}, 0x61f2}, {{&(0x7f0000000400)=@can, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/48, 0x30}, {&(0x7f0000000480)=""/18, 0x12}], 0x2}, 0x100}, {{&(0x7f0000000500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000580)=""/168, 0xa8}], 0x1, &(0x7f0000000680)=""/119, 0x77}, 0xd01}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000700)=""/49, 0x31}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/97, 0x61}], 0x3}}, {{&(0x7f0000001800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001880)=""/33, 0x21}, {&(0x7f00000018c0)}, {&(0x7f0000001900)=""/98, 0x62}, {&(0x7f0000001a00)=""/196, 0xc4}, {&(0x7f0000001b00)=""/134, 0x86}], 0x5, &(0x7f0000001980)=""/47, 0x2f}, 0x7}, {{&(0x7f0000001c40)=@nfc, 0x80, &(0x7f0000001f40)=[{&(0x7f0000001cc0)=""/168, 0xa8}, {&(0x7f0000001d80)=""/215, 0xd7}, {&(0x7f0000001e80)=""/154, 0x9a}], 0x3}, 0x5}, {{&(0x7f0000001f80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000002100)=[{&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/45, 0x2d}, {&(0x7f0000002080)=""/98, 0x62}], 0x3, &(0x7f0000002140)=""/220, 0xdc}, 0x7fffffff}, {{&(0x7f0000002240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000025c0)=[{&(0x7f00000022c0)=""/46, 0x2e}, {&(0x7f0000002300)=""/194, 0xc2}, {&(0x7f0000002400)=""/183, 0xb7}, {&(0x7f00000024c0)=""/73, 0x49}, {&(0x7f0000002540)=""/80, 0x50}], 0x5}, 0x2}, {{&(0x7f0000002640)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002cc0)=[{&(0x7f00000026c0)=""/109, 0x6d}, {&(0x7f0000002740)=""/162, 0xa2}, {&(0x7f0000002800)=""/178, 0xb2}, {&(0x7f00000028c0)=""/67, 0x43}, {&(0x7f0000002940)=""/58, 0x3a}, {&(0x7f0000002980)=""/155, 0x9b}, {&(0x7f0000002a40)=""/169, 0xa9}, {&(0x7f0000002b00)=""/116, 0x74}, {&(0x7f0000002b80)=""/25, 0x19}, {&(0x7f0000002bc0)=""/218, 0xda}], 0xa, &(0x7f0000002d80)=""/82, 0x52}, 0x6}], 0x9, 0x40000000, &(0x7f0000003040)={0x0, 0x1c9c380}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f0000003600)=0x4) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000033c0)={{{@in6=@mcast1, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000034c0)=0xe8) syz_mount_image$msdos(&(0x7f0000003100)='msdos\x00', &(0x7f0000003140)='./file0\x00', 0x7, 0x3, &(0x7f0000003340)=[{&(0x7f0000003180)="8b5db2586e7d8f94bab5eb0a3090b0f0a0d65724cd80729fd552ba2ef5d0fdd80829a0981e303ac72edba920e2b0fb25c08a4f48985df4ab3262d6311b4f559fc6a1736f261f41851a97a0181ba8abe2", 0x50, 0x6a5}, {&(0x7f0000003200)="0371493ce10df26671d6cd74b2c475f584a0571dad4f79f9e79e4870936e02e995b85ff6e15a3b3f6fc4cbc410eb902ae96a3893a39b0665010f53bb2dc7e8aa79", 0x41, 0x2}, {&(0x7f0000003280)="a27d9a55d123c0d8410b598aaee1bafa6d7458a1c463ca329f708a18ff167d0b3cd4f0946541519f3933fcc00cfd16349546cbb0b8a344e91e93b6d68f220bdecffbdb75f2c8dcc348f44aae522c57a10affaa53cce7960d8304427e4e5ed7b0b0ed0ba8e38f248f9b50a9d8139821dbe5b6693939c2cabcbc36ab21649acc952c81c3efe85a361b2b501c58228fc123f13357f07da07c3e4095", 0x9a, 0x6}], 0x200080, &(0x7f0000003500)={[{@nodots='nodots'}, {@dots='dots'}], [{@subj_role={'subj_role', 0x3d, '/dev/zero\x00'}}, {@dont_measure='dont_measure'}, {@fowner_lt={'fowner<', r4}}, {@subj_role={'subj_role', 0x3d, 'bpf\x00'}}]}) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_buf(r1, 0x0, 0x4, &(0x7f0000003580)=""/40, &(0x7f00000035c0)=0x28) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000003080)=@ccm_128={{0x303}, "ea85dc2b747cab3e", "fc8cc90ada2e9d523a533e11cbe61f12", "baf69fba", "b9b1cff62a9509a6"}, 0x28) clone(0x8c0100, 0x0, 0x0, 0x0, 0x0) sendfile(r1, r0, &(0x7f00000018c0)=0x8, 0x2) 12:11:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x701000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:38 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x200, 0x0) accept$netrom(r1, 0x0, &(0x7f0000000100)) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x100, &(0x7f00000000c0)=0x2) setsockopt$sock_attach_bpf(r0, 0x10d, 0xa, &(0x7f0000000180)=r1, 0xfffffffffffffec3) 12:11:38 executing program 1: syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x7f, 0x8800) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000140)=0x2) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) statx(r1, &(0x7f0000000000)='./file0\x00', 0x400, 0x800, &(0x7f0000000040)) [ 475.975050] FAT-fs (loop3): Unrecognized mount option "subj_role=/dev/zero" or missing value 12:11:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)=@random={'os2.', '\x00'}, &(0x7f0000000240)='{vboxnet1keyring]em1&keyringselinuxmd5sum\x00', 0x2a, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x9, 0x40000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000180)={@ipv4={[], [], @multicast2}, 0x5, 0x4, 0x2, 0x2, 0x6, 0x1}, 0x20) perf_event_open$cgroup(&(0x7f0000000000)={0x7, 0x70, 0x7, 0x8, 0x6, 0x9, 0x0, 0x41ba, 0xd1, 0x4, 0x3, 0x8, 0xc976, 0x80000000, 0x5, 0x6, 0x100, 0x1000, 0x100000000, 0x9, 0x5b53, 0xffffffff, 0x7, 0x7fffffff, 0x53cf, 0xb2e, 0x9, 0x7, 0x7, 0xffffffff7fffffff, 0xffff, 0x5, 0x3f, 0x20, 0x19, 0x6, 0x9, 0x1, 0x0, 0x80000001, 0x7, @perf_config_ext={0x80000000, 0x100000000}, 0x0, 0x5, 0x5, 0x7, 0x1a, 0x100000001, 0x7fffffff}, r2, 0x10, r3, 0x2) 12:11:39 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r0, 0x0, 0xc702abda) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) getsockopt$rose(r1, 0x104, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 12:11:39 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x100000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x2) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000000)=0x4, &(0x7f0000000040)=0x4) 12:11:39 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x2, 0x2) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e1, &(0x7f0000000180)={'eth0\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbe\xc8\x00\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\b\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S\xb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xef\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb4\x1e\xb4s\x85\x94\xaf\xef\x00'}) 12:11:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@rand_addr=0x2, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) 12:11:39 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x800000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:39 executing program 4: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000480)=""/10) r0 = semget$private(0x0, 0x3, 0x105) semctl$GETNCNT(r0, 0x1, 0xe, &(0x7f0000000000)=""/191) 12:11:39 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0x5, &(0x7f00000001c0)=0x0) r2 = eventfd2(0x0, 0x0) r3 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000000)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$XDP_MMAP_OFFSETS(r4, 0x11b, 0x1, &(0x7f0000000200), &(0x7f0000000280)=0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}}, 0xf001, 0xbd, 0x6, 0x1ff, 0x1}, &(0x7f0000000180)=0x98) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r2}]) 12:11:39 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)=""/212, &(0x7f0000000140)=0xd4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:39 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x6) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000200)={r1, 0x5, 0x80000000, 0xfff, 0x4, 0x81, 0x5}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r3, 0xae03, 0x19) 12:11:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/150, 0x96}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x5, 0xf, 0x4, 0x100000, {}, {0x2, 0x0, 0x8, 0x401, 0x9, 0x9, '4Ijq'}, 0x800, 0x4, @offset=0x1, 0x4}) preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 12:11:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x200000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x15, 0x209e1e, 0x8, 0x1}, 0x3c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x111200, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f0000000180)={0x7, 0x0, 0x5, 0x2a48}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffb000/0x4000)=nil) r2 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@sco, &(0x7f0000000300)=0x80, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0xab, "0e08dc142e289bb7883ccb308c26a69aa7394d51a3848dd1b5e3335d2a3c2dfbdc34639c35e910950d4cccc862fdbeccf070ca1816741e3042954c62d2de57fa48b326205a463ca4647e5f3399efeb61337e92f82cc1b3db3bf4360eb1982a98bf748089e11e1169a75d3131dd019dfabcfe6cf4c11db841308b82ff701ae5bf6630bb6219ee304220693292671986b1b22bf5bbcf0132237342d31b0c1d550f4a24386b12240fe2038802"}, &(0x7f0000000240)=0xb3) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000400)={r3, @in6={{0xa, 0x4e23, 0xfffffffffffffffc, @local, 0x777}}, 0x0, 0x3f}, 0x90) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000004c0)="7940989e21d5525ed540c64a03dab2a171bc3efef20d1f2c46f36a1272a490b1de574fe148ecc1a444cd79d8f8481cc54cfba57728d764fc6ef562402f668b769287ce19484737167e425c7ef8a8b5d53f1d618f91a8170a4369bed1973300008711d1bd06f302a132a8c2c7ce60450a568f6f030d7df9c8f4610e5f43e3b7635f05bc5d3cc0a1175bcc75990d25db8833d401430d64a0e80be3c03e2c1686a17b23b37b8263f56a82770180126d3695bda8ee2f788407284f27ea220edc7f2214ef5b567ff7a07580e4dda863e86a5ee0c98c6c0b7380a65067c1e98d90c055e312a831a708b2d6fe3d87bb7348955a4b858dcac9e81d61f640ecfdd231bf9be5e34d27dd9ad01215d54d277f288802f451a11b2b6d31c98b3fcf7ac3912278c593e45c165860f8b4e671e4f0993edfc7a85e292c2e7619de8f8e1ac6c07228d8a03aeac8f7077c8bb16e8bdb4385d199f00ee7274207ade11bcdd4f47d", &(0x7f00000000c0)=""/111}, 0xffffffffffffff83) tee(r0, r0, 0x7505, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000200)={0x18, 0x0, 0x7, {0x100}}, 0x18) 12:11:40 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e21}, 0x1c) 12:11:40 executing program 1: getpgrp(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000040)={0x0, 0x1, @raw_data=[0x7ce8f92, 0x2, 0x9, 0x6c, 0x6, 0x4, 0xffffffff, 0x7, 0x4, 0x5, 0xffe0000000000000, 0x2, 0x4, 0x6, 0x7fff, 0x1fb1390f]}) ustat(0x0, 0x0) 12:11:40 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) symlink(&(0x7f00000000c0)='./file1/file0\x00', &(0x7f0000000100)='./file1/file0\x00') r0 = open$dir(&(0x7f0000000300)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) mkdirat(r0, &(0x7f0000000380)='./file1/file0\x00', 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000200)={0xffffffff, 0x2, 0x100000001, 'queue0\x00', 0x80000001}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") renameat2(r0, &(0x7f0000000000)='./file1/file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x2) 12:11:40 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:40 executing program 3: r0 = socket$kcm(0x10, 0x4000000003, 0x10) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000000)=""/62, &(0x7f0000000080)=0x3e) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000280)) fsetxattr$security_capability(r0, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000180)=@v2={0x2000000, [{0x1, 0x8}, {0x3, 0x4}]}, 0x14, 0x1) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e00000032008157e45ae087185082cf0300b0eb0402000016000a00000000000000000000000000081f401fe091", 0x2e}], 0x1}, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r2 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x7ff, 0xc0800) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f00000002c0)={0x9, 0x4, 0x7, 0x9, 0x5, 0x8}) 12:11:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x800, {{0xa, 0x4e20, 0x628c, @loopback, 0xfff}}, 0xf8f81f3ba7e3af4f, 0x5, [{{0xa, 0x4e24, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0x8}}, {{0xa, 0x4e22, 0xd801, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}}, {{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x15}, 0x60d}}, {{0xa, 0x4e22, 0xffffffff, @remote, 0x9}}, {{0xa, 0x4e21, 0x8, @mcast2, 0x1f}}]}, 0x310) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r1, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f0000000140), r2, 0xd4}}, 0x18) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, 0x0, &(0x7f0000000080)) 12:11:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x900000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 477.814167] audit: type=1400 audit(1566475900.626:116): avc: denied { getopt } for pid=24267 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:11:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xff67, 0x0, 0x0, &(0x7f0000001700)={[{@suiddir='suiddir'}, {@quota_off='quota=off'}]}) 12:11:40 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SIOCRSSCAUSE(r0, 0x89e1, &(0x7f00000000c0)=0x7fff) remap_file_pages(&(0x7f00000cc000/0x2000)=nil, 0x2000, 0x10, 0x0, 0x40) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000000)) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3, 0x0, 0xffffffffffffffff, 0x4) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x4, 0x480) [ 477.848029] audit: type=1400 audit(1566475900.656:117): avc: denied { setattr } for pid=24267 comm="syz-executor.3" name="NETLINK" dev="sockfs" ino=79204 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:11:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x2ba) sendto$inet(r1, 0x0, 0x2, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 12:11:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000003380)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x300000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:41 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) listen(r0, 0x200000000002) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 12:11:41 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x24}]}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [0x0, 0x0, 0x700000000000000], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffffffffffd}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 12:11:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x1000000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:41 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000180)={{0x80}, 'port0\x00'}) socket$alg(0x26, 0x5, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a63540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aab05741d1434c9680337f900"/76, 0x4c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000001380), 0x4000056, 0x3a, &(0x7f0000000200)={0x77359400}) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000300)=0x13, 0xfffffffffffffed4) clock_gettime(0x1, &(0x7f0000005200)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x22) syz_open_dev$loop(0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000080), 0xfffffe38) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) 12:11:41 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:41 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000580)='/dev/vcs#\x00', 0x10001, 0x10000) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000005c0)) r1 = shmget(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000780)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000880)=0xe8) getgroups(0x8, &(0x7f00000008c0)=[0xffffffffffffffff, 0xee00, 0x0, 0xee01, 0x0, 0xffffffffffffffff, 0xee01, 0xee01]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000900)=0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000940)=0x0) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000980)={{0x400000000, r2, r3, r4, r5, 0x4, 0x81}, 0x4, 0x3ff, 0x1, 0x8a36, r6, r7, 0x4}) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = dup3(r9, r9, 0x80000) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r10, 0x80045300, &(0x7f0000000240)) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000010}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) write$binfmt_aout(r11, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r11, 0x40045431, &(0x7f0000000200)) r12 = syz_open_pts(r11, 0x40000) readv(r12, &(0x7f0000000400)=[{&(0x7f0000000440)=""/165, 0x10}, {&(0x7f0000000280)=""/243}, {&(0x7f00000001c0)=""/20}, {&(0x7f0000000380)=""/124}], 0x2c0) setsockopt$TIPC_SRC_DROPPABLE(r10, 0x10f, 0x80, &(0x7f0000000a00)=0x66155e10, 0x4) r13 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) getsockopt$ARPT_SO_GET_INFO(r13, 0x0, 0x60, &(0x7f0000000500)={'filter\x00'}, &(0x7f0000000180)=0x44) perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x2, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x400, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0xfff, 0x7, 0x2, 0x0, 0x0, 0x2, 0x0, 0xd3, 0x6, 0x4, 0x0, 0x9, 0x800, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x4, 0x8}, 0x29400, 0x7, 0x0, 0x5, 0x0, 0xfa8, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x0) 12:11:41 executing program 1: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000300)={0x0, 0x1, 0xffffffff}) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x200, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0106418, &(0x7f0000000100)={0x4, 0xba2, 0x5, 0x3, 0xddb0bf0027e439ee, 0x2}) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfffffffffffffcd9, 0x0, 0x0, 0xfffffffffffffe93) time(&(0x7f0000000340)) clone(0x400, &(0x7f0000000180)="13a7ff7ad545da8e8cd3c228d204926c7fb69c9657dddef455e4064834ccf1f37263ea9d08fadc34a00a97f7b6f4a96902add3a023d9d77d992639172bcbfac047513c8a35701d0905f1bd4dded7fa5c5885e785eaa41c86c2aa5e3d1150cd914bb972c137c3754016c85cfd36889e536372493f80b0f165bfa8aaa3262672d35a6a8b806b3baebecd9078f0cd8dc289d078d2718e917b897289cdfab63a4467becc86739aba9237ba0521af2d122fab702d6bae2fa4195a17b62a5dc919d488ed3c9ff1837701ffac36dbd2aee6dcdb7299def043e44701e05d17f8a346a25ebdce", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000280)="b8c950162708f531ae03f1178a3b33e771a35837e4aff1e6bc6428a82180159e52862c3d53cd9161bc6aed58b8cb3894cd3d45a40a5b873b8a2189276aa8bf7919c940745cc0b0a0923fc393e0dbdabc073a6eb302690af83a4467240c38a256e054b7") [ 478.727790] nla_parse: 34 callbacks suppressed [ 478.727801] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 478.747236] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 478.789750] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 478.798970] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 478.811711] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 478.829290] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 478.864227] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 478.887040] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 12:11:41 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:41 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x900000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:41 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0xc20c1, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x1}, 0x7) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x8, 0x7ff, 0x7f, 0x8000, 0xe, 0x0, 0x10001, 0x7, 0x4, 0x4, 0x5, 0x4}) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x90, 0x100000000}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x1ff, 0x5, 0x1000}, 0x4) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000180)=""/4) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f00000001c0)=0x7fffffff) rt_sigreturn() setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x1000}, 0x8) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000240)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) ptrace$getregs(0xffffffffffffffff, r1, 0x3ff, &(0x7f00000002c0)=""/4096) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000012c0)={0x27, 0x11, 0x8, 0x15, 0x3, 0x2, 0x2, 0x110, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000001300)={@in={{0x2, 0x4e22, @remote}}, 0x0, 0x9, 0x0, "2f40abddcf273ae4fe00f4a280be3221e38dd8a4885398dfe7b75d74acd4bbc984e502c843faa08f2bf9080d10975874832d37844099af1f3b34ec42f6eed337522e19a65974a64945ede364255fb460"}, 0xd8) listen(r0, 0x0) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000001400)={0x0, @ctrl={0x0, 0x0, @value64}}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f00000014c0)={{0x3, 0x0, 0x80000001, 0x80000000, '\x00', 0x7}, 0x0, 0x200, 0x7, r1, 0x0, 0x6, 'syz0\x00', 0xfffffffffffffffe, 0x0, [], [0x9, 0x6, 0x80000000, 0xffffffff]}) io_setup(0x0, &(0x7f0000001600)=0x0) io_cancel(r2, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x6, 0x3, r0, &(0x7f0000001640)="68f00d09476c8134e96589ead8bcef03ac08f685cfe54101279d9b4543ff654b9c7d5f0646fac6186c425915f7c043df7adb36f4e8f58d83ef90193f3c414c422486d939df9911e28bd1c688493875a7408611d16a457a953108e01e18ed6229afaf86332f75d40b838a7494809ceadf815db134971bdbde8cb778771a3fa6c2f076c64127f123b192ebce4c0a4e24ca360255002403ca3bc59abb3324cb88398470259c458fc11e69db91703d6d9bfb552b19ce9ce7aff149eba08f5b3807eecb6c3d6d413f34900cef2319e4e0eb14cb", 0xd1, 0x6}, &(0x7f0000001780)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000017c0)={0x20000000}) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000001840)={0x0, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @rand_addr=0x81e}, {0x2, 0x4e22, @multicast2}, 0x92, 0x0, 0x0, 0x0, 0x40, &(0x7f0000001800)='bcsh0\x00', 0x2, 0xc84, 0x10000}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000018c0)={0x5, 0x2, 'client1\x00', 0x2, "0827b4c50a7fd268", "a59b3d4ec7ae47dabe7a4c215c952c818265497139071921ffd307fca48ccc31", 0x1f, 0x9}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000001980), &(0x7f00000019c0)=0x4) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/mls\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000001a40)=0x100000000) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000001a80)=0x3ff) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001ac0)='/proc/capi/capi20\x00', 0x180, 0x0) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f0000001b00)=""/27) [ 478.949465] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 479.021294] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 12:11:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x700000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") io_setup(0x100000000007c5, &(0x7f00000001c0)=0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000240)={'\x00\x00\x00\x00e&\xa28\x00\x00\x00\x00\x02\x00\xef\f', 0x20000005003}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000100)=0x1) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x2}]) 12:11:42 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x555, 0x0) r1 = gettid() fcntl$getflags(0xffffffffffffffff, 0x0) r2 = dup(r0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000001ec0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001fc0)=0xe8) bind(r2, &(0x7f0000002000)=@ll={0x11, 0xf6, r3, 0x1, 0x4, 0x6, @local}, 0x80) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x0) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0xfffffffffffffd47) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0xc, &(0x7f0000000000), &(0x7f00000000c0)=0x4) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) tkill(r1, 0x800000000000014) 12:11:42 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x800000002, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x1000000050000}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 12:11:42 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x6400000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000080)={0x16}) getegid() 12:11:42 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:11:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000af2000)="8be3000000010000", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000200)=[{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000001500)="93", 0x1}, {&(0x7f00000015c0)="a5", 0x1}], 0x2}], 0x1, 0x0) 12:11:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x900000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:42 executing program 4: syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents(r0, &(0x7f0000001380)=""/4096, 0x1000) 12:11:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:42 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:42 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:11:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000040)={'bridge_slave_1\x00', @ifru_ivalue=0x10e8}) 12:11:42 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) read(r0, &(0x7f00000000c0)=""/120, 0x78) 12:11:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x3}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:43 executing program 4: signalfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x18, 0x0, 0x65}}) syz_open_procfs(0x0, &(0x7f0000000040)='net/protocols\x00') 12:11:43 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:43 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:11:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3c61f5588c1336d6, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0xe2987ac42c8a9e69) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000001c0)={0x6, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdf3}, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000180)={0x7, 0x165}) r2 = socket$inet6(0xa, 0x803, 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000340)=""/79, 0x4f) syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000500)=0x2b3) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 480.500412] bridge0: port 2(bridge_slave_1) entered disabled state [ 480.510727] bridge0: port 1(bridge_slave_0) entered disabled state 12:11:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x900000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:43 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:43 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:11:43 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x8}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:44 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:44 executing program 3: gettid() r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) [ 481.541144] bridge0: port 2(bridge_slave_1) entered blocking state [ 481.547591] bridge0: port 2(bridge_slave_1) entered forwarding state [ 481.554319] bridge0: port 1(bridge_slave_0) entered blocking state [ 481.560716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 481.573338] device bridge0 entered promiscuous mode [ 481.581165] bridge0: port 2(bridge_slave_1) entered disabled state [ 481.587723] bridge0: port 1(bridge_slave_0) entered disabled state [ 481.594999] device bridge0 left promiscuous mode 12:11:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x9}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:44 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:44 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x88002, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000040}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000003040), 0x4000000000003c4, 0x0) tkill(0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000002c0)=""/170) flock(0xffffffffffffffff, 0x4) r3 = socket(0x0, 0xa, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'v=!\x00\x14\xd2\x02\x00\x00\x00\x00\x02 \x00', 0x8}, 0x2d) ioctl(r3, 0x8916, &(0x7f0000000000)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in=@multicast2, @in6=@ipv4={[], [], @multicast2}}}, {{@in=@initdev}, 0x0, @in=@loopback}}, 0x0) 12:11:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:44 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x3c61f5588c1336d6, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0xe2987ac42c8a9e69) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f00000001c0)={0x6, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdf3}, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000180)={0x7, 0x165}) r2 = socket$inet6(0xa, 0x803, 0x3) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) getxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='trusted.overlay.metacopy\x00', &(0x7f0000000340)=""/79, 0x4f) syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$IMDELTIMER(0xffffffffffffffff, 0x80044941, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000500)=0x2b3) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) [ 482.132637] bridge0: port 2(bridge_slave_1) entered blocking state [ 482.139436] bridge0: port 2(bridge_slave_1) entered forwarding state [ 482.147010] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.153858] bridge0: port 1(bridge_slave_0) entered forwarding state [ 482.170056] device bridge0 entered promiscuous mode 12:11:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:45 executing program 3: gettid() r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 12:11:45 executing program 4: semop(0x0, &(0x7f00000003c0)=[{}, {0x1}], 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x20000057d) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 0x7}) write$P9_RLINK(r2, &(0x7f0000000000)={0x6}, 0x5d4) 12:11:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x10}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5010, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) 12:11:45 executing program 1: 12:11:45 executing program 1: 12:11:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x3f00000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:45 executing program 1: 12:11:45 executing program 4: 12:11:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x64}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:46 executing program 3: gettid() r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 12:11:46 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:46 executing program 1: 12:11:46 executing program 4: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000140)=[@acquire], 0x0, 0x0, 0x0}) 12:11:46 executing program 1: 12:11:46 executing program 1: [ 483.310025] binder: BINDER_SET_CONTEXT_MGR already set [ 483.326898] binder: 24543:24545 ioctl 40046207 0 returned -16 12:11:46 executing program 4: 12:11:46 executing program 1: 12:11:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x6400000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:46 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:46 executing program 4: 12:11:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x107}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:46 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) tkill(r0, 0x1000000000013) 12:11:46 executing program 1: 12:11:46 executing program 4: 12:11:46 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:46 executing program 4: 12:11:46 executing program 1: 12:11:47 executing program 4: 12:11:47 executing program 1: 12:11:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0xbc01000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:47 executing program 4: 12:11:47 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x300}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:49 executing program 4: 12:11:49 executing program 1: 12:11:49 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:49 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) tkill(r0, 0x1000000000013) 12:11:49 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x701}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0xff00000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:50 executing program 1: 12:11:50 executing program 4: 12:11:50 executing program 1: 12:11:50 executing program 4: 12:11:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:50 executing program 1: 12:11:50 executing program 4: 12:11:50 executing program 4: 12:11:50 executing program 1: 12:11:53 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) tkill(r0, 0x1000000000013) 12:11:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x900}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x2}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:53 executing program 4: 12:11:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:53 executing program 1: 12:11:53 executing program 4: 12:11:53 executing program 1: 12:11:53 executing program 4: 12:11:53 executing program 1: 12:11:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:53 executing program 4: 12:11:56 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:11:56 executing program 1: 12:11:56 executing program 4: 12:11:56 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:56 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x6400}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x3}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:11:56 executing program 1: 12:11:56 executing program 4: 12:11:56 executing program 4: 12:11:56 executing program 1: 12:11:56 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:56 executing program 1: 12:11:59 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:11:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000080)) 12:11:59 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:11:59 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:11:59 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:11:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x7}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) [ 496.386199] audit: type=1400 audit(1566475919.196:118): avc: denied { map } for pid=24716 comm="syz-executor.4" path="/root/syzkaller-testdir371996449/syzkaller.Ic926t/313/file0/mem" dev="devtmpfs" ino=2243 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:memory_device_t:s0 tclass=chr_file permissive=1 [ 496.387133] x86/PAT: syz-executor.4:24723 freeing invalid memtype [mem 0x00002000-0x00002fff] 12:11:59 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket(0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, 0x0) 12:11:59 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 496.505014] x86/PAT: syz-executor.4:24723 freeing invalid memtype [mem 0x00002000-0x00002fff] 12:11:59 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:11:59 executing program 1: r0 = memfd_create(&(0x7f0000003380)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\x94a\xac\xf8R?\x1c\xe2\xb5!\xfa\xcb\xd4\xb6\xe1_\xb4d>\xf6\xb7h\xb9Uql\b0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x7010000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:02 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:02 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:02 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x8000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:02 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x800000002, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x1000000050000}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:12:02 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x03\xf8', @ifru_flags}) pipe(&(0x7f0000000000)) [ 499.501573] x86/PAT: syz-executor.4:24774 freeing invalid memtype [mem 0x00002000-0x00002fff] 12:12:02 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:02 executing program 1: r0 = getpgrp(0x0) ioprio_get$pid(0x3, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000040)=0x9) sched_getscheduler(r0) ioctl$TCGETX(r2, 0x5432, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f00000000c0)={0x401, 0x77333af9, 0x2, 0x2b13}, 0x8) write$P9_RWALK(r1, &(0x7f0000000100)={0x7e, 0x6f, 0x1, {0x9, [{0x10, 0x0, 0x7}, {0xc2, 0x3, 0x1}, {0x2, 0x3, 0x5}, {0x5, 0x3, 0x7}, {0xc0, 0x2, 0x7}, {0x8, 0x4}, {0x1, 0x3, 0x5}, {}, {0x20, 0x1, 0x7}]}}, 0x7e) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f0000000180)={0x401, 0x3}) ioctl$VT_OPENQRY(r2, 0x5600, &(0x7f00000001c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) r5 = getgid() write$P9_RGETATTR(r2, &(0x7f0000000340)={0xa0, 0x19, 0x1, {0x8, {0x82, 0x0, 0x7}, 0x80, r4, r5, 0x6, 0xff, 0x8, 0x1, 0xffffffffffffffc0, 0x8, 0x5, 0x4, 0xf2, 0x7704, 0x200, 0x7, 0xd09, 0x4, 0x6}}, 0xa0) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) write$evdev(r2, &(0x7f0000000480)=[{{}, 0x1f, 0x9, 0xbc}, {{}, 0x4, 0x64, 0x6}, {{0x0, 0x2710}, 0x1, 0x4, 0x7fff}, {{r6, r7/1000+10000}, 0x14, 0x4c0, 0x1ff}, {{0x0, 0x7530}, 0x1, 0xfffffffffffffffe, 0xc0000000}, {{}, 0x1, 0x5, 0xbe3f}, {{0x0, 0x2710}, 0x3, 0x4, 0x7fffffff}, {{}, 0x1, 0x7, 0x80000001}, {{0x77359400}, 0x0, 0xf9bc, 0x3}, {{r8, r9/1000+30000}, 0x15673357be233335, 0x8001, 0x7}], 0xf0) sendmsg$xdp(r1, &(0x7f0000000600)={&(0x7f0000000580)={0x2c, 0x0, r3, 0x10}, 0x10, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x20000000}, 0x8000) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000640)=0x101) syncfs(r2) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000680)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f00000006c0)) r11 = syz_open_dev$mouse(&(0x7f0000000700)='/dev/input/mouse#\x00', 0x7fff, 0x10000) ioctl$KVM_ENABLE_CAP(r11, 0x4068aea3, &(0x7f0000000740)={0xf5, 0x0, [0x799, 0x4, 0xffff, 0x81]}) recvfrom$netrom(r1, &(0x7f00000007c0)=""/54, 0x36, 0x100, &(0x7f0000000800)={{0x3, @default, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}, 0x48) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000880)={0x10001, 0x0, "331e90aeb9855dd1239fda2ec50ab1d6ae77459bd6b74658", {0x100000000, 0x8}, 0x6}) ioctl$DRM_IOCTL_AGP_ALLOC(r10, 0xc0206434, &(0x7f00000008c0)={0xff5, 0x0, 0x10003, 0x4}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000900)={0x401, r12}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000a80)={'filter\x00', 0x0, 0x4, 0x89, [], 0x7, &(0x7f0000000940)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000009c0)=""/137}, &(0x7f0000000b00)=0x78) openat$cgroup_procs(r11, &(0x7f0000000b40)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000b80)={0x1, 0x9, 0x4, 0x80000, {0x77359400}, {0x5, 0x2, 0xf21, 0xfe, 0x8, 0x6, "583bdbbb"}, 0x1c, 0x3, @offset=0x4, 0x4}) 12:12:02 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 499.687085] x86/PAT: syz-executor.4:24798 freeing invalid memtype [mem 0x00002000-0x00002fff] 12:12:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000080)=0x400000000008002, 0x4) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000300)=0x4, 0x4) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="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", 0x599}], 0x1}}], 0x1, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000100)={0x0, 0x0, 0x2, 0x3, {0x9, 0x8, 0x7, 0x3}}) 12:12:02 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:05 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:05 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:05 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x9000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:05 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105511, &(0x7f0000000040)={{0x25, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz1\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00U\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x0}) 12:12:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:05 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:05 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x40, 0x0) r2 = dup2(r0, r1) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000200)={0x0, @bt={0x3, 0xc5, 0x1, 0x1, 0x40, 0x80, 0x0, 0x3, 0x0, 0x1, 0x8, 0x5, 0x9e4, 0x9c, 0x4, 0x30}}) r3 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) creat(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="636f6e746578743d757365792e22b67979725f752d626f6e7465786ecec6e7ced641743d756e636f6e66696ec5f6ecd445647981902fe5342cb29fac914a80bffaa20ffee687128613e1ed2c3f9f7199fd963a6a4d9091804b96a6c302ce5c799bf78cd7acf0c5c08f737210e9c6a60260b1e5f3867b03236a78d3a8a65d1d50087f591104b17ba700b3c7f25d03842c25ff17e74de2799e874ce3869b8dcac14aa4300a14fa3764755b09901b95b2e967009cdebeb216746fdad66b763927ed683dcac734f660a7e315f85f9768e64a3bca6f6f94095807e34bd9fca101c686"]) 12:12:05 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:05 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 502.689662] SELinux: security_context_str_to_sid(usey.¶yyr_u-bontexnÎÆçÎÖAt=unconfinÅöìÔEdy/å4,²Ÿ¬‘J€¿ú¢þ懆áí,?Ÿq™ý–:jM‘€K–¦ÃÎ\y›÷Œ×¬ðÅÀsréƦ`±åó†{#jxÓ¨¦]PY±{§) failed for (dev bpf, type bpf) errno=-22 12:12:05 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:05 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e020000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:06 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:06 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x10000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x10}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:06 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 503.480993] SELinux: security_context_str_to_sid(usey.¶yyr_u-bontexnÎÆçÎÖAt=unconfinÅöìÔEdy/å4,²Ÿ¬‘J€¿ú¢þ懆áí,?Ÿq™ý–:jM‘€K–¦ÃÎ\y›÷Œ×¬ðÅÀsréƦ`±åó†{#jxÓ¨¦]PY±{§) failed for (dev bpf, type bpf) errno=-22 12:12:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) syncfs(r1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x400000000038) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x3, 0x0, 0x28}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2) creat(&(0x7f0000001200)='./file0\x00', 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 12:12:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:06 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:06 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:06 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x64000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:07 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:07 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:07 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x64}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:07 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:07 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001940)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1, 0x0, 0xffffff96}}], 0x1, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x40800, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f00000000c0)=0x1201020, 0x4) r2 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) writev(r2, &(0x7f00000000c0), 0x20000000000002dd) 12:12:09 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:09 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:09 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:09 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1bc}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:09 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:09 executing program 1: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@statfs_quantum={'statfs_quantum', 0x3d, 0x8cffffff}}]}) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0xf2000000000, 0x2, &(0x7f0000000140)=[{&(0x7f00000001c0)="e93d9cecd29a51fd7db35cbc779961b0370c77f1219faaee4c60861ddfb370f6e2015a1ed07f008bb3026e48a1d1e3e6eb1afcb16ba3015ed7dc0c2e434cc3d2defc5adf9ce663fe9495b4e458525ae410fb71a2384d660d334dc9023a1f7c258fa1c62426c4eed169a62de4d71d9c858d30e48c9ef517ec8bd019952c5771cdd938ad41057a4816a5ac776877783a93078d1ccef71d1f971fb555496351270c9afffdca3b086f31f61dff463a8324c14c619e97612f43c944a9c99d3e2184cac65228b5f997dc8ee00cd6c4c64ec9e0505cb96050dcd6ef054a0c6846fa7bb01107119f3840a4a9f5280abf8d07cd736e4a8cdf6851fb7caa266116e740", 0xfe, 0x6}, {&(0x7f0000000100)="570cbbd67e89559396ac06a0247f6b8423d81930c0a6c2e698a67e529fb21b8a36dfa1744b5308dcb7b2d33f032c8f22d0f24237c7067187f01b", 0x3a, 0x1}], 0x10010, &(0x7f00000002c0)='!\x00') 12:12:09 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 506.781169] gfs2: statfs_quantum mount option requires a non-negative numeric argument 12:12:09 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 506.838526] gfs2: can't parse mount arguments 12:12:09 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 506.906850] ceph: device name is missing path (no : separator in /dev/loop1) 12:12:09 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0xecb3f04c6d43cda5, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000100), 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000400)={0x0, @multicast2, @local}, &(0x7f0000000440)=0xc) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x44, r3, 0x2, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x200}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x804}, 0x2e0030af22888290) r4 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0xff, &(0x7f0000000000)=0x0) write$binfmt_aout(r4, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"/628], 0x274) io_submit(r5, 0x27f, &(0x7f0000001440)=[&(0x7f0000000200)={0x40000000, 0xffffff8d, 0x700000000000000, 0x0, 0x0, r4, &(0x7f0000000340), 0xfdef}]) r6 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x200000) ioctl$SIOCRSSCAUSE(r6, 0x89e1, &(0x7f0000000080)=0x1f) 12:12:09 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:09 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:09 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:10 executing program 1: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x300}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:10 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:10 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:10 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:10 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x20000000, 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) openat$vfio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vfio/vfio\x00', 0x2800, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/validatetrans\x00', 0x1, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x7, 0x100) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) r1 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f00000000c0)={0x2, "a19692fae6ce7614877e2c1f5509cb21e282dae0b9ac39b319c3aa25e0338cc5", 0x3, 0x200, 0x58, 0x9, 0x10, 0x3, 0x6, 0x4}) r2 = socket$netlink(0x10, 0x3, 0x8000000004) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000100)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd00000010000100030c1000418e00600004fcff", 0x58}], 0x1) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x45, &(0x7f00000003c0)="5a9c7658d0afb9fca99f12d8705faf969969bdf95dec2ccba9fbbe6d8ee9def3ea13d684982d279bab0644a52f7eda9c5152d4d8ec29f36f95cb8822f62b8ac1b79c2f0c0c"}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="09d11a8aea4e0000009290b288325fe6dc7b"], &(0x7f0000000300)=0x11) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000340)={r4}, 0x8) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)) 12:12:10 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:10 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x13, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0xffffffbc}}, &(0x7f0000000040)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x5, 0xc3, &(0x7f0000000480)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x10000, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f00000001c0), 0x4) 12:12:10 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:10 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:10 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x701000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x700}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:11 executing program 1: getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x4e21, 0xffffffffffffcb01, @local, 0xfffffffffffffffc}, {0xa, 0x4e20, 0x900000000000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0xffffffff, [0x80, 0x5, 0x10000, 0x792, 0xffffffff, 0x2, 0x4, 0x100000001]}, 0x5c) setreuid(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r4 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000004c0)=0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000500)=0x0) tgkill(r5, r6, 0xf) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x90) 12:12:11 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = dup(0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:11 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:11 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:11 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = dup(0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:11 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:11 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x400000) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000140)={0x0, 0x0, {0xfff, 0xfffffffffffffffb, 0x9, 0x8a6d}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x3e8d91389a4021f2, 0x0) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f00000000c0)={0x7, 0x100, 0x0, {0xffffffff, 0x7, 0x2, 0x4}}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x80800) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xb4, r4, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x51}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7530}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040000) sendmsg$rds(r3, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) 12:12:11 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:11 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = dup(0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:11 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000080)=0xd2e, 0x4) r1 = dup2(r0, r0) ioctl$KDMKTONE(r1, 0x4b30, 0x40) 12:12:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x800000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:12 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:12 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:12 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x900}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:12 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0x80) write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, 'SE Linux', "61e9c7f28de92c59ed08354e8f35c8668883186d181ec8f96f803317a0cc4775f7839666daafa46c1f9c2222f16be6f68f24e5fb332a4f670db7595804730d995df38ffd5d1b7a"}, 0x57) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00\xa8\x19Al\f()\xfb}\xe8+\x89\x90h\xfdY\xc0:\xd9\x11\\?\x14\xe4\xff\x13\xe0$\xa0\xd2|\xd6\x03T\x9a]p\xab\x9d\xbb\xf8\xa0\x8d\xc3\xbb\xe7\x01I\xe8\x04i\x03\xb9K\xb5L[\x14l\xe7') pread64(r1, 0x0, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x5460, 0x0) 12:12:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d6c0bcfe47bf070") r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x24ad504709496d0d) ioctl$KVM_ASSIGN_PCI_DEVICE(r4, 0x8040ae69, &(0x7f0000000580)={0x9d96, 0xb6, 0x10000, 0x2, 0x129d}) setsockopt$sock_void(r4, 0x1, 0x24, 0x0, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = syz_open_dev$usb(&(0x7f0000000480)='/dev/bus/usb/00#/00#\x00', 0x6, 0x200) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f0000000500)={0x4, &(0x7f00000004c0)=[{}, {}, {}, {}]}) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x1, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=""/3}) r8 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x64f70514aa3e9901, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) dup3(r5, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r9, 0x40485404, &(0x7f0000000040)={{0x3, 0x3, 0x2, 0x0, 0x37}, 0x9, 0x8000}) dup2(r3, r8) 12:12:12 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:12 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:12 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:12 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 509.658552] cgroup: fork rejected by pids controller in /syz4 12:12:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:12 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:12 executing program 1: r0 = socket(0x100000010, 0x1000000000003, 0x0) write(r0, &(0x7f0000000100)="2200000021000707000000000900e4010200001e00000001ff0804000504158002af", 0x22) getsockopt$inet6_dccp_buf(r0, 0x21, 0xd, &(0x7f0000000000)=""/11, &(0x7f0000000040)=0xb) [ 509.936283] nla_parse: 34 callbacks suppressed [ 509.936295] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. [ 509.995029] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.1'. 12:12:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x3f00}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:13 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:13 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x100000000000001, 0x0) bind$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") listen(r1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000000000)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x43) r4 = fcntl$dupfd(r2, 0x0, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000180)={r5, 0x7a}, 0x8) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x86) 12:12:13 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x400, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x400, 0x1, 0xff}, 0x20) 12:12:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:13 executing program 3: r0 = gettid() bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:13 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:13 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="72f8404100c2a186f6ce080e0c04fc9de3c87e8ae6e67aed215340b35ab51f18651f802d4e7da625697d40d6d41595f8d06b44dd1317a5de080975da4b59a5c6ca99280000000000000d93d297803eb26c2b2c503287bdad6ba83dcc42c5ecebc9e4506c56f6176a574348b41a6f4d3993fea1f85e67a9f5784bf95f4f291d01f61d4f0d20fd74b881394813ea1493024169fefef99e396968defa47162e9bc85ad1c8077ce9cc8804dbae2a17ec4408ac855a3eb701785c0b0aa20f000000000000"]) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000240)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000380)={@local}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) syncfs(r2) ioctl(0xffffffffffffffff, 0x100000890e, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x7, 0x3, 0x5}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x7) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockname$packet(0xffffffffffffffff, &(0x7f00000005c0), &(0x7f0000000600)=0x14) accept$packet(r0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000e00)={&(0x7f0000000b00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000d80)=""/92, 0x5c}, 0x40000000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001000)={{{@in=@initdev, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000001100)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001200)={{{@in, @in=@local}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000001300)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000016c0)={@loopback}, &(0x7f0000001700)=0x14) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000000)) socket$can_bcm(0x1d, 0x2, 0x2) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000001780)) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000017c0)={@multicast2, @broadcast}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x60) accept$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001e00)=0xff30) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000001e40)={@multicast1, @local}, &(0x7f0000001e80)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000024c0)={@remote, @remote}, &(0x7f0000002500)=0xc) 12:12:14 executing program 3: r0 = gettid() bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6400}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:14 executing program 1: setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) read(0xffffffffffffffff, &(0x7f0000000200)=""/4096, 0x1000) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000040)=0x101) r1 = add_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000001200)="71cb195626528d6956f422cf312f90f7fd3d5f6109712e81ec45d93221169795ef29911d857b0ce074dc5f93235db41f3b224cf572f1d4e6222aa3f7eee3c26c60771e78940a8359af88ecf0627dba3ac2e284da0cf22594ab949ffdd88b146e963c1172090c030d2cf522887e65b196b48d46d1425b44143e75b26b2df35661df4c67ffabad748ca2f530a88b90f651b3676759b3b61d2c040937b5d3f7cce0f042b3ee5737b70d1c22d89c895a87249f953e7be70e22", 0xb7, 0x0) keyctl$clear(0x7, r1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 511.205192] vivid-000: ================= START STATUS ================= [ 511.213792] vivid-000: Interlaced VBI Format: false [ 511.221387] vivid-000: ================== END STATUS ================== 12:12:14 executing program 1: futex(0xfffffffffffffffe, 0x7, 0x0, 0x0, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 12:12:14 executing program 3: r0 = gettid() bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x6400000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000013) 12:12:14 executing program 1: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = add_key$user(&(0x7f0000001340)='user\x00', &(0x7f0000001380)={'syz', 0x0}, &(0x7f00000013c0)="b9fd0c91da8c8f4e20b88ded1e20cf9404b56310512bdffae7d2ae1d77c7d89ddbf2e05bac7d1dc62b598f8e66efe9432a3ad541628d25f31a39fd687620512383fd0856e48ef47e756e5a485e23c5f25e53b8b224b2dd3b159b7dca0014cdb41fcd2a3268078ab757ea6e5b1b2472b063693bf7b29410b632f3881ab49a8ced747135f337622729ae1d56b2db6aefb3df940d2f05d63729cf832a09736a7608983f2913a0e606f774b2c9709eb4d31720e5a47d", 0xb4, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000001480)='blacklist\x00', &(0x7f00000014c0)={'syz', 0x3}, &(0x7f0000001500)='losystem\xd2\'$\'\x00', 0xffffffffffffffff) keyctl$link(0x8, r1, r2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x1000, "5e5cf4cf9ff4fc96af9f7dbc16bf8bd79e01e1198dd8bcd395b2e4de7dfcfb7f53960fa8f68121a230ec65bd0f6772ceb5ce25ef360d120a2ccfd5b203ac2db4ce83ccd746722a08614c2a6157975790af87eb8e8a19e57079425ba1e79b05b50f6d48b2a42f9c414208166f1110e9069d87f6d5e0576f4580bd5ba75ace5168c18ce382e471ed515a6a24cfbeb23c1008e7809dde9a8e6ba78eb3abb5e41e723ab2797f2887da2a6067507e60ac58f6b7be42f3618efcf02fc3a62f8855b85d5de0a4ac156d56220b2dd32304eddd65fb35289f4aa122af241906875980c3d9fea75ae15538799c6c44c7326ac64b9383cf093785919628fa2ea6f9c628acffb45daef4ec6d0a673956294e0619e5cd6a3a572cb8a566984c44ad7d26fe4bc289282ba9d8000c7c833fa4a195e0b7ba9c14f412c79173c13cb093c6fde4bf610f3a882eb00efbd49a53ffe4d630936141ecd69c827709abcd6d72f2415a8cfdb917e261057578493ec8508c6a883efc8644ccbcde35cda5e9490f962783db035dc3da843e364c9214b2ecec9e580cb1cacafd1104d1b6c7847c80bb64aedbce2e8e638d7e5376edfecbeb68caf0066b67aca34d664bb17d214f4b12eac024766f4bc8c64d1117e9e0924060694a373c376ad3c940c101f51fe3b8e7919b2aefd804412bad77964438a37eb71e0d0e09aa40039ff594ad2c079a371d934913b3922f7c7ec42786c6d086be9d4a7a9014596814cc21f176421d0d4df62ff75c98bcc1720e3ad4c73e34d69e35a2c594893e70364df4d8a4f672eda2ee035ddb82e9266f6ebcac83f5e2da380472c69920a17b987ddc0c3caeee07df74e26918f2be35bc76907f0eb94a4b2a88b1cc312afe9a30703ac1490efb23a7cd896608929395ecc33e00d8fd924e071ffd995191d183b3109251417961e964f098cc0cdb3497a144842fda1813afded853bb3e8a561a1ceda663c4ef30596dd303d0a616d8b05f487c038cf48538be5c23d4c7c1fe6620a91ebd5697a63c399a2fbbb3f9c91bedb83b2d135c6043b37799ceac32d658a220c53be23ed2eb4f349c3d8049bb23c02c27cfbe0e93571898c9eb40ca71d523de0dc017b68977b546f202d8edf5fd1429397713826ff03052e40d5c57cde461bcb05d84ec583a5df7b6669e923199528c856e74113b391f0cb54ff05e52f35df5ff52d47e2388d3ff2c1fc64e7d4f7085eae77476041856e68ec737822d1562741bf7175bfdf7c95087fc8fbb5329440871473ecd4ea0c53dae4121a5a688a7b454b1c114ad25150403bdfa60cc5ab1631e8d25dbcc61cd3b212c2d4dc70b3324bc8edaa78685a11f32e0b8f8a1387b21631eac03b880e6d75c42cd2c5aa56c3e7e49a8753e95cee5dfffd72585d9eb5fdf6a4f6a499228d7f33c6c7dc3c72df189f2f597d8e0ff1825759ddac03ae520733c29e00abe541a24a2a8e7f65f712677d94de05dde6a0358ee62b0163a9b70ef24a9f848c9d81e91293f1057c8c755eb3b6d326628d8c2ee0efc355c0e0f0e3347a1bc90d7f27c05c46f48d335394720339a7cab7256b356c902828dce71221c8618a505e2251d7abc331fb6921c927661299183520f85deeb5ff3449f249d49e3364c319c2c6c151b86ce2b897739e1163db0bbf08fc89a89c30bcb16f66360d8a6a3efe62a87cb9ddd9cdc65d78e705b3c14e3acd6afa5391eec838381c4a3ca4724f3b00e53ec640bb793d2a9b6e2ad2ca8265f4e703e64d460c24768ab3e56473bc445b4cb7f3190a9a838ea7db120e4b153ae83c1a4ff17a114650bb120630b0846b6b952d36400f3f4dd278c83372b5a3a779257eacbb9819755a7ee2a04ced2181c3b8dd71faf611637e3ba2d46bc5035816407da4423092c45800283fe97cd75199f72919a41d38dfe2fd54a168674a8df0b8eba850d2b6b93616017df412ed4c30a209f96937358b1ac7fe2343da21cba29172052aa291ccbbb550989e39882b3a4f4933b422dd8a55bd5faced08e878f93e2d2b4aeb8677d15fca7562779eadafc45178ae815fe290bf6b53556ca2cc2e556a791ec5beb4deac175e5d1412d39936577ddbc4b02e6f89dbcbb25441cbc0195507c1f5ee1d8da1bfd217a7b48eb9dfdb15f0a7be969fbbc5c006bf461da4ab88979925d035a9c090bd7fcb11221eaa4edd24ddfad488ac73ffb0b918ee7d6ec338c5ca12c70fe8aab2f3ae4db214fee99b7f8142604932638d2790c67e7011b8caf45353b0197c3257db006e35d59574446c1e7d059360af4789670ae7431c5e72e74020d731fa21173f79033fcf93031636d038addbad83964c09f0d3ec7630e0146aaaef4219ca38c2d856cf4d9ba41606302f1e320a69076bc49c05a76920290709f3ce8b48f1d9b8a60667a0b99a741fc81eda0c5363042d2d2eb418e530e1a0c75e4704b287dceda5cac52e06013dab0a2ed07df60239e7755933cbf7150d6d001eb26834281f20756e0492817b1d64a4be75811bc323bd1356bd8b43786756ad691dfcd5b9403a45ada8b62155566166ec2dae80d6447ebdf5de9d190de0cbed1632f0c2e92861ffe429c3bc3503e44f073d626e138d8d761442a918e536e18ba5b8fb0d27c7f0d3e521cb3804c1d58ed6d257e48e3092e04b4661ffd575ce8d64cdb0a576eff80dc2768c70529e72168df3500a2da3dce3108c554e3fbebe5055932cbe4dc0837d9bb48cc9f83be635de192ae4fe25fdc6207d0fcb3ff65698f4772e6a3a52844326360cc072c4463fe9e6bbdfea5a310333f7109c61fb56d68154e01dd157170a796f6622de9a28e652691ef2e5cba70f717d66a01b3be03cd6da95de8ea0637f909383052ad9304a8a646fc7d1051818ee5742cfacb5f8eb2c9fd55b81259b4bc10681dccc16e8a69ff9dd68390ebcdd01dc0e209a741c202bbac9c5ef236881919f14e486d9b58c0b75cccc8e9b7cb3bba44328b40709c26c84ef12402b253204de12742ee5de90124574b0cd2e8736e199cd43cfadf7a5c480a2e8a1fe0ba41259f0b0ccfa53b951ed7a34a5279910fc4fe54fa9286894ed9ddc0abd21522a95358b3ed9bf3ff0c0aec5803b756149fc0bd64594ec8f49e5e7855d3cc9366bfc0602840fac14c39e87e7ddb1b3b98f3a79526b336a1467172bd0ecf729c33433039a13a2a8cb9f845d0273b42d6107de55e5a702f304d3c59482e93bb893fddecf090ac6116c0f5b18e50ee5fa750f7547fca33e21e3240915bd619199bb1e709f10ed33cc8e17c538f3485fae52ca0fd9fbb2ce6cee46fda4bc553516b477a22fd20f5e458e4b0099b0dbffc698b1c55d8639e1f3e9c43e73a9e4dbbf10eac84e35be4618bbc847fd90b235fd3e8bef80118adb759337be1f1b2e00f76424efa7bb229a3104e3d36311793d10bc0182af62fea198d769fc52a0535d17277d4acffc1a539d776fd2400bef883aa7766d3e4e6075cb3ae5b9bbabed582c59567bb733db176a7b661c4ddc139dcfa971b26df5d7f9ce3979915f3d5ebdb9c18bf5b6f9a509b580a26a77260e80d41ce3c08841d9d250f91122a11b4044379afccc5b1fddd2f938d2ece079810f397ec46ade9a49011caa607689731f516a4d9b3582087f778461cd0ab4f5a7bbc29cef15812b82d88a931f6ca546c4af76a8cc3975fcca5cf74330b00c97a220dc2635e508dfed3b3e82552596783f8c533639454862b103123e7438ae3b8ae9f3c80f421b1dd2744f03d8682d4911d7d1490f92716ceda1b42c23318b77443cbdd475f0edc845a6b65120ae9d38f09c95a24d909793f9d85724e2efb91f3eeed9dae3218df8a0216d6fd3e4b1524c0abd6cac448fa27d46445b4d2b2e7c691bef634ae048fb03890f103fe6cf267e019973cbdba31eb2d25d879b570b83e28646cacddbeaf6a2dd724a6e303671d32fe30ea2294bc72b891251c9bff83146c5b57196f892a0a4ca62331eca724da64a45957aca7d52a9f515d038e85e5724d31af9780487fd4bd98bfb88e8db91ecd18f06dfe2afa4ce3b941a177c6f290af2008e87221f1d0fcd51cb08c532e5d35ac4d9f504fe1395fe974ddd6e0a955e39f152bb7141fba0d2e6463789e60fdd149502389e62f841aef256c9115b65a8c03a9b48e98e242b4a800b29c7fde0bc6af12576a5d2ed269b250161ca5f7928c7355767ab26c175edb21b5356899dfaee0fb49331674c3ec8dd35b7c18573984949394c3c661a8df2d98c196c364c7d60700442e2ab6b95349de2e3a2f838539ebd9af66b4ea1c05bb9b783ee075ee0f9adc4158dd7f55a3044e21cae3c260a0dd7596be067ac3ce6b3f80b755be599731f0bfd4e3c7db81f35c85f6c9685db75f3b747d8b0555c783e8f618825bd14dea496ff3efe3d06f15a2e55f00eda22c0ee72d7682479872f34a54cc887bf6d328cfd4ad241fcf008f624a7f94eb3f50cc98934d39f4714a29907b466e129f6c8878c984d89b1732534b340fc7f8dcbafb18427c9b9e5c0dc4211c37e6820051f78f6d4cee64871128dc0bb266f90118891371a7f75b028651d7a26f8429ef58bfd6eacb00dd7c4981c265401920487eeb60f06ae4f49b07ddcb59dd51aa75b698258cbcd9943bc322f0ccd94d38a892b34f60530aaf1025b95ce8180dbe8d4f9310b3b8e0f387a17709c973d0d364dbad480f593768826b79028c6de008830b76a839dfb82e4f28132011329e1c4f178d659fc36493006b72f75af1e83149774e9bf92eaf77327a9ffc9e67d1c08336ba96272da25910a794bc86e9c71e20a05cf809c132f50029980fe653509ce7512b423e5dd82f6b7624c14ff2a36f50e4a924443a236394c3a82d1e012ce15fd01b1ff91104ac59aff10cd9c2c9e6c5f5ab68176d77e782154f6698e3297631205adf028e3dbf615d2dd9695fe1c32ead652863c08830bbecfa2fae8319d90c8e6eeb8efeebbaeaabaee53b03a116f292cf0fe9d699680e8b2d4a5c6f93ab3678604db3259e1c48e4c4d48c4bb858fe58a50ab9be81dd18c275cf798d0fa04a00a40a8a6525f85163c32d3f320daf8244d7f67b25cefb540f3ed47fa5c4198c179f0b6b0040600e7cc1d4b6d59766f35718d294c9791ee6494aa1328a756e6b3550fe02ad19cb7ced16183b7edcbfd01d12fbef04adf7fd15f5b58769ab27befd15f3b6103cf6c36c6918c73c11aa331942ea172125b3b05fd2aab7195b0126b0201ea1cf3f782b17ab9f46a15cfd2f4a1a8a12e8f4d41c6e52d76bdab06b12d4ddd8df99b50f5a7560a332205e1f4a5af02e8d26ad0dbff0c07859fd4b2114fb45f9769db5f97be57c76751c96b84695073770669902ed3ef6e2f502fc7dd0edaa118b8475f675d2ac498143f194fd2e08cd99a189262d71c0cf87f345b971876b17b1b0198463699a183efdb7fef80ad78fd68b42a241d326286d5853552e6ea4c7615f19690332db97b2d04f39d0253c2bc745947b24306c8dae040d40f8a6a679259e788a43a0a632b9404802befe4504b6e3a1a16df4f7e08b0b52419b7d662255276c2f637617822267712e3235a54fd26f3f8b1fd78c7b4b665861c1c17fe1ad7bb4251e23572d9ca04aa478754c194d514672f3ca144a061762df33eae041b7b542057bb02bd8c032f9d00c6fcce69a128eb539f28547f783bd4671759c2f8c65551983e4b10f6bfd6c9c05bd1f8a34990149bc23129a77a1fef58961b400497413f2b2df4ad0a5bee9c2737c56c17f026cf70cc538442cabb923b5570e0a5cd761ea835b4a292f69"}, &(0x7f0000000040)=0x1008) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000011c0)=ANY=[@ANYRES32=r3, @ANYBLOB="d7000000b0cfd73ae1d5705e98489c58d7c38d66f5658dc1462d4defb9612b0e6e45e7fd7d8e9efbc828f4307c3807467c86b13073f0516661dd5fe805f9d9675d0c989eb15f37a67c914db96f1fc0c8e093036309d069dbc980c5f021361399bbd5857274e1482322c13fa14b9727e781fd8ed140114f12d04d08e0ac4350e3cc4bb8da9313ab279a9b6e68c489b7110fb5d9c9734fc7661dc3600ae24fc8e3d732fd46e5d04664ad3f1a7066b2426b5ab7ce216283f7d6085221a20b4c83092df160b360b350b1190578558e2c60"], &(0x7f0000000080)=0xdf) r5 = socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000001600)={r4, 0x9, 0x202, 0x7}, 0x10) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000001540)={'nat\x00'}, &(0x7f00000015c0)=0x78) r6 = add_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='l', 0x1, 0xfffffffffffffffd) keyctl$unlink(0x9, r6, r6) fcntl$dupfd(r0, 0x406, r5) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001300)='/dev/vcs\x00', 0x40, 0x0) setsockopt$inet_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f00000012c0)='tls\x00', 0x4) 12:12:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x400, 0x0) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r3, 0xae80, 0x0) gettid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000340)=0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000380)) move_pages(r5, 0x14b, &(0x7f0000000300), 0x0, 0x0, 0x4) getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f00000002c0)=0x8, &(0x7f0000000300)=0x4) 12:12:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 511.691187] kvm: pic: non byte read [ 511.701530] kvm: pic: non byte write [ 511.710039] kvm: pic: non byte read [ 511.717060] kvm: pic: non byte write [ 511.724231] kvm: pic: non byte read [ 511.728337] kvm: pic: non byte write [ 511.736439] kvm: pic: non byte read [ 511.742016] kvm: pic: non byte write [ 511.746504] kvm: pic: non byte read [ 511.751371] kvm: pic: non byte write [ 511.757280] kvm: pic: non byte read [ 511.761697] kvm: pic: non byte write [ 511.766520] kvm: pic: non byte read [ 511.770478] kvm: pic: non byte write [ 511.775028] kvm: pic: non byte read [ 511.779317] kvm: pic: non byte write [ 511.783603] kvm: pic: non byte read [ 511.787589] kvm: pic: non byte write [ 511.792997] kvm: pic: non byte read [ 511.797437] kvm: pic: non byte write [ 511.805901] kvm: pic: single mode not supported [ 511.806194] kvm: pic: level sensitive irq not supported [ 511.811996] kvm: pic: single mode not supported [ 511.817549] kvm: pic: level sensitive irq not supported [ 511.879858] kvm: pic: single mode not supported [ 511.879872] kvm: pic: level sensitive irq not supported [ 511.885555] kvm: pic: single mode not supported [ 511.890986] kvm: pic: level sensitive irq not supported 12:12:14 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x141, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000040)={0x2, 0x0, 0x2009, 0x9, 0x308, {0x2, 0x10000}, 0x1}) r2 = socket(0x10, 0x800000000000803, 0x0) sendto(r2, &(0x7f0000000080)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x36d) recvmmsg(r2, &(0x7f0000004e00), 0x27b, 0x2100000000000000, 0x0) 12:12:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xbc01}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:15 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000000)) renameat(r0, &(0x7f0000000040)='./bus\x00', r0, &(0x7f0000000100)='./bus\x00') io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x4000000, r0, &(0x7f0000000000), 0x10000, 0x3000000}]) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000140)={0xfffffffffffff801, {{0xa, 0x4e23, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfff}}}, 0x88) ftruncate(r0, 0x2ffffff) madvise(&(0x7f0000109000/0x1000)=nil, 0x1000, 0x0) 12:12:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000013) 12:12:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000013) 12:12:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xff00}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:15 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:16 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000013) 12:12:16 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:16 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:16 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x2000, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000000200)={@loopback, @multicast1, @initdev}, &(0x7f0000000180)=0xc) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x2) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000380)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000080)={0x8, 0x40}) 12:12:16 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:16 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x2, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x40) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[]}}, 0x0) 12:12:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:16 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r2, &(0x7f0000000200), 0xffffff77) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000013) [ 514.177116] x86/PAT: syz-executor.4:25388 freeing invalid memtype [mem 0x00002000-0x00002fff] 12:12:17 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 514.286037] x86/PAT: syz-executor.4:25388 freeing invalid memtype [mem 0x00000000-0x00001fff] 12:12:17 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:17 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:17 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x2000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x64}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:17 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:17 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:17 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_adj\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x1) sendto$inet6(r3, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000180)={0xa, 0x4ea0, 0x0, @local, 0x7}, 0x1c) 12:12:17 executing program 4 (fault-call:6 fault-nth:0): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:17 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:17 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 515.171767] FAULT_INJECTION: forcing a failure. [ 515.171767] name failslab, interval 1, probability 0, space 0, times 0 [ 515.193325] CPU: 0 PID: 25450 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 515.200380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.209723] Call Trace: [ 515.212315] dump_stack+0x172/0x1f0 [ 515.215935] should_fail.cold+0xa/0x1b [ 515.219831] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.225023] ? lock_downgrade+0x810/0x810 [ 515.229254] __should_failslab+0x121/0x190 [ 515.233486] should_failslab+0x9/0x14 [ 515.237406] kmem_cache_alloc_node+0x26c/0x710 [ 515.241984] ? lockdep_hardirqs_on+0x415/0x5d0 [ 515.246562] ? trace_hardirqs_on+0x67/0x220 [ 515.250906] ? kasan_check_read+0x11/0x20 [ 515.255044] copy_process.part.0+0x1ce0/0x7a30 [ 515.259638] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 515.265178] ? proc_fail_nth_write+0x9d/0x1e0 [ 515.269680] ? proc_cwd_link+0x1d0/0x1d0 [ 515.273735] ? __f_unlock_pos+0x19/0x20 [ 515.277701] ? find_held_lock+0x35/0x130 [ 515.281757] ? __cleanup_sighand+0x70/0x70 [ 515.285977] ? lock_downgrade+0x810/0x810 [ 515.290117] ? kasan_check_write+0x14/0x20 [ 515.294337] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 515.299179] _do_fork+0x257/0xfd0 [ 515.302628] ? fork_idle+0x1d0/0x1d0 [ 515.306343] ? fput+0x128/0x1a0 [ 515.309630] ? ksys_write+0x1f1/0x2d0 [ 515.313441] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 515.318208] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 515.322961] ? do_syscall_64+0x26/0x620 [ 515.326923] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.332277] ? do_syscall_64+0x26/0x620 [ 515.336240] __x64_sys_clone+0xbf/0x150 [ 515.340201] do_syscall_64+0xfd/0x620 [ 515.343995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.349168] RIP: 0033:0x459829 [ 515.352345] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:12:18 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 515.371231] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 515.378927] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 515.386190] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 515.393495] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 515.400764] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 515.408046] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:18 executing program 4 (fault-call:6 fault-nth:1): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 515.606115] FAULT_INJECTION: forcing a failure. [ 515.606115] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 515.618460] CPU: 0 PID: 25463 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 515.625492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.634850] Call Trace: [ 515.637436] dump_stack+0x172/0x1f0 [ 515.641068] should_fail.cold+0xa/0x1b [ 515.644957] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 515.650065] ? __might_sleep+0x95/0x190 [ 515.654029] __alloc_pages_nodemask+0x1ee/0x750 [ 515.658683] ? __alloc_pages_slowpath+0x2870/0x2870 [ 515.663705] ? lockdep_hardirqs_on+0x415/0x5d0 [ 515.668293] ? trace_hardirqs_on+0x67/0x220 [ 515.672599] ? kasan_check_read+0x11/0x20 [ 515.676733] copy_process.part.0+0x3e0/0x7a30 [ 515.681309] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 515.686835] ? proc_fail_nth_write+0x9d/0x1e0 [ 515.691312] ? proc_cwd_link+0x1d0/0x1d0 [ 515.695368] ? __f_unlock_pos+0x19/0x20 [ 515.699339] ? find_held_lock+0x35/0x130 [ 515.703396] ? __cleanup_sighand+0x70/0x70 [ 515.707623] ? lock_downgrade+0x810/0x810 [ 515.711769] ? kasan_check_write+0x14/0x20 [ 515.715989] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 515.720841] _do_fork+0x257/0xfd0 [ 515.724299] ? fork_idle+0x1d0/0x1d0 [ 515.727998] ? fput+0x128/0x1a0 [ 515.731258] ? ksys_write+0x1f1/0x2d0 [ 515.735044] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 515.739785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 515.744538] ? do_syscall_64+0x26/0x620 [ 515.748523] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:12:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x3000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:18 executing program 1: mmap(&(0x7f0000013000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0xba2f8d1c4ae02f6f) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r2, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1c00000000}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x790}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x40085) ioctl$UFFDIO_REGISTER(r0, 0x8010aa01, &(0x7f00000000c0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}}) 12:12:18 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:18 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x107}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 515.753900] ? do_syscall_64+0x26/0x620 [ 515.757890] __x64_sys_clone+0xbf/0x150 [ 515.761877] do_syscall_64+0xfd/0x620 [ 515.765687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.770877] RIP: 0033:0x459829 [ 515.774077] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.792984] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 12:12:18 executing program 4 (fault-call:6 fault-nth:2): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 515.800706] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 515.807984] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 515.815252] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 515.822507] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 515.829768] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000340)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x40}}}, 0x78) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000140)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) pwritev(r2, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000180)='\x00', 0x38b}], 0x7, 0x0) 12:12:18 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 515.950523] FAULT_INJECTION: forcing a failure. [ 515.950523] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 516.001527] CPU: 1 PID: 25481 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 516.008594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.017958] Call Trace: [ 516.020572] dump_stack+0x172/0x1f0 [ 516.024222] should_fail.cold+0xa/0x1b [ 516.028134] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.033257] ? __might_sleep+0x95/0x190 [ 516.037263] __alloc_pages_nodemask+0x1ee/0x750 [ 516.041962] ? __alloc_pages_slowpath+0x2870/0x2870 [ 516.047001] ? lockdep_hardirqs_on+0x415/0x5d0 [ 516.051598] ? trace_hardirqs_on+0x67/0x220 [ 516.055938] copy_process.part.0+0x3e0/0x7a30 [ 516.060457] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.066004] ? proc_fail_nth_write+0x9d/0x1e0 [ 516.070517] ? proc_cwd_link+0x1d0/0x1d0 [ 516.074587] ? __f_unlock_pos+0x19/0x20 [ 516.074604] ? find_held_lock+0x35/0x130 [ 516.074626] ? __cleanup_sighand+0x70/0x70 [ 516.074637] ? lock_downgrade+0x810/0x810 [ 516.074666] ? kasan_check_write+0x14/0x20 [ 516.082679] ? __mutex_unlock_slowpath+0xf8/0x6b0 12:12:18 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) poll(&(0x7f0000000080)=[{r0}], 0x1, 0xb7) close(r0) r1 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(r1, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0x1, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000100)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4}}, &(0x7f0000000040)=0xe8) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000200)={r2, 0x1, 0x6, @random="e4ae7b775aa4"}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x5) [ 516.082700] _do_fork+0x257/0xfd0 [ 516.082719] ? fork_idle+0x1d0/0x1d0 [ 516.108062] ? fput+0x128/0x1a0 [ 516.111360] ? ksys_write+0x1f1/0x2d0 [ 516.115180] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 516.119946] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 516.124713] ? do_syscall_64+0x26/0x620 [ 516.128699] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.134075] ? do_syscall_64+0x26/0x620 [ 516.138066] __x64_sys_clone+0xbf/0x150 [ 516.142054] do_syscall_64+0xfd/0x620 [ 516.145880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.151075] RIP: 0033:0x459829 [ 516.154277] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.173668] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 516.181399] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 516.188683] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 12:12:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 516.195972] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 516.203260] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 516.210633] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:19 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:19 executing program 4 (fault-call:6 fault-nth:3): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 516.403450] FAULT_INJECTION: forcing a failure. [ 516.403450] name failslab, interval 1, probability 0, space 0, times 0 [ 516.423470] CPU: 0 PID: 25509 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 516.430525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.439883] Call Trace: [ 516.442470] dump_stack+0x172/0x1f0 [ 516.446085] should_fail.cold+0xa/0x1b [ 516.449978] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.455067] ? lock_downgrade+0x810/0x810 [ 516.459204] __should_failslab+0x121/0x190 [ 516.463436] should_failslab+0x9/0x14 [ 516.467221] __kmalloc_track_caller+0x2de/0x750 [ 516.471875] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.477394] ? selinux_cred_prepare+0x49/0xb0 [ 516.481892] kmemdup+0x27/0x60 [ 516.485074] selinux_cred_prepare+0x49/0xb0 [ 516.489378] security_prepare_creds+0x77/0xc0 [ 516.493861] prepare_creds+0x32a/0x400 [ 516.497729] copy_creds+0x7b/0x610 [ 516.501251] ? lockdep_init_map+0x9/0x10 [ 516.505297] copy_process.part.0+0xb54/0x7a30 [ 516.509781] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.515299] ? proc_fail_nth_write+0x9d/0x1e0 [ 516.519785] ? proc_cwd_link+0x1d0/0x1d0 [ 516.523831] ? __f_unlock_pos+0x19/0x20 [ 516.527791] ? find_held_lock+0x35/0x130 [ 516.531841] ? __cleanup_sighand+0x70/0x70 [ 516.536055] ? lock_downgrade+0x810/0x810 [ 516.540193] ? kasan_check_write+0x14/0x20 [ 516.544425] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 516.549265] _do_fork+0x257/0xfd0 [ 516.552706] ? fork_idle+0x1d0/0x1d0 [ 516.556400] ? fput+0x128/0x1a0 [ 516.559663] ? ksys_write+0x1f1/0x2d0 [ 516.563449] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 516.568203] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 516.572942] ? do_syscall_64+0x26/0x620 [ 516.576901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.582259] ? do_syscall_64+0x26/0x620 [ 516.586231] __x64_sys_clone+0xbf/0x150 [ 516.590195] do_syscall_64+0xfd/0x620 [ 516.593994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.599167] RIP: 0033:0x459829 [ 516.602346] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.621254] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 516.628947] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 516.636199] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 516.643451] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 516.650701] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 516.657952] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:19 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:19 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x7000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:19 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = getpid() rt_tgsigqueueinfo(r0, r1, 0x3f, &(0x7f0000000080)) syz_open_dev$evdev(0x0, 0xfffffffffffffc01, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) r2 = open(0x0, 0x0, 0x0) fcntl$setlease(r2, 0x400, 0x0) unlink(0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) r3 = socket$rxrpc(0x21, 0x2, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0x3d4d) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x3, 0x0, 0xc0) epoll_create(0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000240)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0x10) gettid() clock_gettime(0x0, 0x0) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000280)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$TCSETAF(r2, 0x5408, 0x0) unshare(0x40000000) 12:12:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:19 executing program 4 (fault-call:6 fault-nth:4): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:19 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 516.888585] IPVS: ftp: loaded support on port[0] = 21 [ 516.897475] FAULT_INJECTION: forcing a failure. [ 516.897475] name failslab, interval 1, probability 0, space 0, times 0 [ 516.922002] CPU: 0 PID: 25525 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 516.929062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.938429] Call Trace: [ 516.941031] dump_stack+0x172/0x1f0 [ 516.944671] should_fail.cold+0xa/0x1b [ 516.948568] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 516.953680] ? lock_downgrade+0x810/0x810 [ 516.957856] __should_failslab+0x121/0x190 [ 516.962116] should_failslab+0x9/0x14 [ 516.965928] kmem_cache_alloc+0x2ae/0x700 [ 516.970074] ? creds_are_invalid+0x59/0x150 [ 516.970091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.970108] ? selinux_is_enabled+0x43/0x60 [ 516.970125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 516.970140] ? creds_are_invalid+0x59/0x150 [ 516.970156] __delayacct_tsk_init+0x20/0x80 [ 516.970168] copy_process.part.0+0x350b/0x7a30 [ 516.970184] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 516.970194] ? proc_fail_nth_write+0x9d/0x1e0 [ 516.970209] ? proc_cwd_link+0x1d0/0x1d0 [ 516.984571] ? __f_unlock_pos+0x19/0x20 [ 516.984590] ? find_held_lock+0x35/0x130 [ 516.984617] ? __cleanup_sighand+0x70/0x70 [ 516.994443] ? lock_downgrade+0x810/0x810 [ 516.994470] ? kasan_check_write+0x14/0x20 [ 516.994491] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 516.994518] _do_fork+0x257/0xfd0 [ 517.003398] ? fork_idle+0x1d0/0x1d0 [ 517.003415] ? fput+0x128/0x1a0 [ 517.003430] ? ksys_write+0x1f1/0x2d0 [ 517.003450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 517.003467] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 517.013467] ? do_syscall_64+0x26/0x620 [ 517.013484] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.013498] ? do_syscall_64+0x26/0x620 [ 517.013516] __x64_sys_clone+0xbf/0x150 [ 517.013534] do_syscall_64+0xfd/0x620 12:12:19 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:19 executing program 4 (fault-call:6 fault-nth:5): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 517.013552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.013564] RIP: 0033:0x459829 [ 517.013578] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.013589] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 [ 517.021574] ORIG_RAX: 0000000000000038 [ 517.021584] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 517.021592] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 517.021601] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 517.021610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 517.021619] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:20 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040), 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:20 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 517.261477] FAULT_INJECTION: forcing a failure. [ 517.261477] name failslab, interval 1, probability 0, space 0, times 0 [ 517.331541] CPU: 1 PID: 25541 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 517.339113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.348478] Call Trace: [ 517.351086] dump_stack+0x172/0x1f0 [ 517.354729] should_fail.cold+0xa/0x1b [ 517.358633] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 517.363748] ? lock_downgrade+0x810/0x810 [ 517.367916] __should_failslab+0x121/0x190 [ 517.372159] should_failslab+0x9/0x14 [ 517.375977] kmem_cache_alloc+0x2ae/0x700 [ 517.380135] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.385672] ? perf_event_init_task+0x19f/0x7a0 [ 517.385688] ? trace_hardirqs_on+0x67/0x220 [ 517.385706] dup_fd+0x85/0xb30 [ 517.385726] ? selinux_task_alloc+0xaf/0xd0 [ 517.385740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 517.385755] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 517.385773] copy_process.part.0+0x1e6a/0x7a30 [ 517.385794] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 517.385808] ? proc_fail_nth_write+0x9d/0x1e0 12:12:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x701}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:20 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 517.385821] ? proc_cwd_link+0x1d0/0x1d0 [ 517.385838] ? __f_unlock_pos+0x19/0x20 [ 517.402309] ? __cleanup_sighand+0x70/0x70 [ 517.402323] ? lock_downgrade+0x810/0x810 [ 517.402347] ? kasan_check_write+0x14/0x20 [ 517.402365] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 517.402383] _do_fork+0x257/0xfd0 [ 517.402400] ? fork_idle+0x1d0/0x1d0 [ 517.413434] ? fput+0x128/0x1a0 [ 517.413451] ? ksys_write+0x1f1/0x2d0 [ 517.413472] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 517.413486] ? trace_hardirqs_on_thunk+0x1a/0x1c 12:12:20 executing program 4 (fault-call:6 fault-nth:6): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 517.413500] ? do_syscall_64+0x26/0x620 [ 517.413514] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.413527] ? do_syscall_64+0x26/0x620 [ 517.413544] __x64_sys_clone+0xbf/0x150 [ 517.413562] do_syscall_64+0xfd/0x620 [ 517.413579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.413591] RIP: 0033:0x459829 [ 517.413605] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.413620] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 [ 517.423697] ORIG_RAX: 0000000000000038 [ 517.423706] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 517.423715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 517.423723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 517.423732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 517.423741] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 517.691698] FAULT_INJECTION: forcing a failure. [ 517.691698] name failslab, interval 1, probability 0, space 0, times 0 [ 517.723570] CPU: 1 PID: 25558 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 517.730627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.739989] Call Trace: [ 517.742585] dump_stack+0x172/0x1f0 [ 517.746232] should_fail.cold+0xa/0x1b [ 517.750141] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 517.755264] ? lock_downgrade+0x810/0x810 [ 517.759435] __should_failslab+0x121/0x190 [ 517.763687] should_failslab+0x9/0x14 [ 517.767499] kmem_cache_alloc_trace+0x2cc/0x760 [ 517.772176] ? lock_downgrade+0x810/0x810 [ 517.776332] ? __lock_is_held+0xb6/0x140 [ 517.780410] alloc_fdtable+0x86/0x290 [ 517.784216] dup_fd+0x743/0xb30 [ 517.787520] copy_process.part.0+0x1e6a/0x7a30 [ 517.792120] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 517.797667] ? proc_fail_nth_write+0x9d/0x1e0 [ 517.802182] ? proc_cwd_link+0x1d0/0x1d0 [ 517.806252] ? __f_unlock_pos+0x19/0x20 [ 517.810246] ? __cleanup_sighand+0x70/0x70 [ 517.814485] ? lock_downgrade+0x810/0x810 [ 517.818649] ? kasan_check_write+0x14/0x20 [ 517.822892] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 517.827755] _do_fork+0x257/0xfd0 [ 517.831223] ? fork_idle+0x1d0/0x1d0 [ 517.834947] ? fput+0x128/0x1a0 [ 517.838233] ? ksys_write+0x1f1/0x2d0 [ 517.842046] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 517.846807] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 517.851566] ? do_syscall_64+0x26/0x620 [ 517.855543] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.860912] ? do_syscall_64+0x26/0x620 [ 517.864896] __x64_sys_clone+0xbf/0x150 [ 517.868866] do_syscall_64+0xfd/0x620 [ 517.872653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.877830] RIP: 0033:0x459829 [ 517.881013] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.899897] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 517.907590] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 517.914846] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 517.922104] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 517.929358] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 12:12:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x8000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:20 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x5) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r2 = creat(&(0x7f0000000280)='./bus\x00', 0x0) write$P9_RREAD(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="dc"], 0x1) ftruncate(r2, 0x208200) 12:12:20 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:20 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 517.936615] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:20 executing program 4 (fault-call:6 fault-nth:7): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:20 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced", 0x18) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000040)=0x10001, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x20, 0x400000) 12:12:21 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 518.174882] FAULT_INJECTION: forcing a failure. [ 518.174882] name failslab, interval 1, probability 0, space 0, times 0 [ 518.188053] CPU: 0 PID: 25580 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 518.195094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.204459] Call Trace: [ 518.207063] dump_stack+0x172/0x1f0 [ 518.210703] should_fail.cold+0xa/0x1b [ 518.214632] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 518.219727] ? lock_downgrade+0x810/0x810 [ 518.223866] __should_failslab+0x121/0x190 [ 518.228089] should_failslab+0x9/0x14 [ 518.231890] kmem_cache_alloc_node_trace+0x274/0x720 [ 518.236982] ? alloc_fdtable+0x86/0x290 [ 518.240946] __kmalloc_node+0x3d/0x80 [ 518.244729] kvmalloc_node+0x68/0x100 [ 518.248526] alloc_fdtable+0xd6/0x290 [ 518.252327] dup_fd+0x743/0xb30 [ 518.255597] copy_process.part.0+0x1e6a/0x7a30 [ 518.260190] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 518.265735] ? proc_fail_nth_write+0x9d/0x1e0 [ 518.270240] ? proc_cwd_link+0x1d0/0x1d0 [ 518.274401] ? __f_unlock_pos+0x19/0x20 [ 518.278396] ? __cleanup_sighand+0x70/0x70 [ 518.282639] ? lock_downgrade+0x810/0x810 [ 518.286810] ? kasan_check_write+0x14/0x20 [ 518.291057] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 518.296090] _do_fork+0x257/0xfd0 [ 518.299557] ? fork_idle+0x1d0/0x1d0 [ 518.303280] ? fput+0x128/0x1a0 [ 518.306576] ? ksys_write+0x1f1/0x2d0 [ 518.310394] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 518.315160] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 518.319927] ? do_syscall_64+0x26/0x620 [ 518.323919] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.329293] ? do_syscall_64+0x26/0x620 [ 518.333286] __x64_sys_clone+0xbf/0x150 [ 518.338006] do_syscall_64+0xfd/0x620 [ 518.341824] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.347013] RIP: 0033:0x459829 [ 518.350190] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:12:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x6400}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 518.369073] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 518.376769] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 518.384024] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 518.391298] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 518.398570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 518.405843] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:21 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:21 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x9000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:21 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x0, 'irlan0\x00', 0x4}, 0x18) syz_extract_tcp_res(&(0x7f0000000100), 0x0, 0xfffffffffffff732) 12:12:21 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62", 0x24) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:21 executing program 4 (fault-call:6 fault-nth:8): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:21 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:21 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:21 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f00000000c0)={{0x32c, 0xf5b7}, 'port1\x00', 0x18, 0x120001, 0x6, 0x2, 0x1a3, 0x79cb, 0x4, 0x0, 0x7, 0x2}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 519.091741] FAULT_INJECTION: forcing a failure. [ 519.091741] name failslab, interval 1, probability 0, space 0, times 0 [ 519.140064] CPU: 1 PID: 25617 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 519.147125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.156482] Call Trace: [ 519.159090] dump_stack+0x172/0x1f0 [ 519.162728] should_fail.cold+0xa/0x1b [ 519.166630] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 519.171746] ? lock_downgrade+0x810/0x810 [ 519.175907] __should_failslab+0x121/0x190 [ 519.180150] should_failslab+0x9/0x14 [ 519.183954] kmem_cache_alloc_node_trace+0x274/0x720 [ 519.189057] ? alloc_fdtable+0x86/0x290 [ 519.193041] ? kasan_unpoison_shadow+0x35/0x50 [ 519.197630] __kmalloc_node+0x3d/0x80 [ 519.201437] kvmalloc_node+0x68/0x100 [ 519.205241] alloc_fdtable+0x142/0x290 [ 519.209134] dup_fd+0x743/0xb30 [ 519.212439] copy_process.part.0+0x1e6a/0x7a30 [ 519.217046] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 519.222594] ? proc_fail_nth_write+0x9d/0x1e0 [ 519.227098] ? proc_cwd_link+0x1d0/0x1d0 [ 519.231186] ? __f_unlock_pos+0x19/0x20 [ 519.235182] ? __cleanup_sighand+0x70/0x70 [ 519.239423] ? lock_downgrade+0x810/0x810 [ 519.243596] ? kasan_check_write+0x14/0x20 [ 519.247841] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 519.252704] _do_fork+0x257/0xfd0 [ 519.256174] ? fork_idle+0x1d0/0x1d0 [ 519.259899] ? fput+0x128/0x1a0 [ 519.263189] ? ksys_write+0x1f1/0x2d0 [ 519.267002] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 519.271774] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 519.276545] ? do_syscall_64+0x26/0x620 [ 519.280533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.285902] ? do_syscall_64+0x26/0x620 [ 519.289890] __x64_sys_clone+0xbf/0x150 [ 519.293878] do_syscall_64+0xfd/0x620 [ 519.297700] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.302898] RIP: 0033:0x459829 [ 519.306095] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.325011] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 519.332736] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 12:12:22 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 519.340020] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 519.347297] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 519.354572] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 519.361848] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:22 executing program 4 (fault-call:6 fault-nth:9): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:22 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x7010000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:22 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 519.595787] FAULT_INJECTION: forcing a failure. [ 519.595787] name failslab, interval 1, probability 0, space 0, times 0 [ 519.643661] CPU: 0 PID: 25639 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 519.650716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.660078] Call Trace: [ 519.662694] dump_stack+0x172/0x1f0 [ 519.666337] should_fail.cold+0xa/0x1b [ 519.670234] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 519.675345] ? lock_downgrade+0x810/0x810 [ 519.679518] __should_failslab+0x121/0x190 [ 519.683759] should_failslab+0x9/0x14 [ 519.687564] kmem_cache_alloc+0x2ae/0x700 [ 519.691711] ? dup_fd+0x5c1/0xb30 [ 519.695175] copy_fs_struct+0x43/0x2d0 [ 519.699070] copy_process.part.0+0x377d/0x7a30 [ 519.703663] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 519.709204] ? proc_fail_nth_write+0x9d/0x1e0 [ 519.713700] ? proc_cwd_link+0x1d0/0x1d0 [ 519.717762] ? __f_unlock_pos+0x19/0x20 [ 519.721752] ? __cleanup_sighand+0x70/0x70 [ 519.725984] ? lock_downgrade+0x810/0x810 [ 519.730144] ? kasan_check_write+0x14/0x20 [ 519.734385] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 519.739238] _do_fork+0x257/0xfd0 [ 519.742696] ? fork_idle+0x1d0/0x1d0 [ 519.746417] ? fput+0x128/0x1a0 [ 519.749702] ? ksys_write+0x1f1/0x2d0 [ 519.753512] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 519.758270] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 519.763030] ? do_syscall_64+0x26/0x620 [ 519.767004] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.772369] ? do_syscall_64+0x26/0x620 [ 519.776350] __x64_sys_clone+0xbf/0x150 [ 519.780332] do_syscall_64+0xfd/0x620 [ 519.784139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.789325] RIP: 0033:0x459829 [ 519.792521] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.811423] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 519.819145] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 519.826425] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 519.833709] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 519.840987] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 519.848269] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x10000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) ptrace$cont(0x9, r2, 0x5, 0x8) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000200)="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", 0xfb}], 0x1}, 0x0) 12:12:22 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000", 0x2a) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:22 executing program 4 (fault-call:6 fault-nth:10): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:22 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 519.929827] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.1'. 12:12:22 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:22 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x4002, 0x0) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000140)={'lo\x00', 0x3}) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") recvfrom$inet(r1, &(0x7f0000000080)=""/95, 0x5f, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x70e000) [ 520.073644] FAULT_INJECTION: forcing a failure. [ 520.073644] name failslab, interval 1, probability 0, space 0, times 0 12:12:23 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 520.169832] CPU: 1 PID: 25662 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 520.176925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.186288] Call Trace: [ 520.188898] dump_stack+0x172/0x1f0 [ 520.192536] should_fail.cold+0xa/0x1b [ 520.196426] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 520.196450] ? lock_downgrade+0x810/0x810 [ 520.205680] __should_failslab+0x121/0x190 [ 520.205697] should_failslab+0x9/0x14 [ 520.205710] kmem_cache_alloc+0x2ae/0x700 [ 520.205728] ? do_raw_spin_unlock+0x57/0x270 [ 520.222285] ? _raw_spin_unlock+0x2d/0x50 [ 520.226454] copy_process.part.0+0x1fd7/0x7a30 [ 520.231062] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 520.236615] ? proc_fail_nth_write+0x9d/0x1e0 [ 520.241123] ? proc_cwd_link+0x1d0/0x1d0 [ 520.245200] ? __f_unlock_pos+0x19/0x20 [ 520.249204] ? __cleanup_sighand+0x70/0x70 [ 520.253452] ? lock_downgrade+0x810/0x810 [ 520.257628] ? kasan_check_write+0x14/0x20 [ 520.261880] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 520.266737] _do_fork+0x257/0xfd0 12:12:23 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000", 0x2d) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 520.270200] ? fork_idle+0x1d0/0x1d0 [ 520.273929] ? fput+0x128/0x1a0 [ 520.277217] ? ksys_write+0x1f1/0x2d0 [ 520.281041] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 520.285803] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 520.290562] ? do_syscall_64+0x26/0x620 [ 520.294546] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.294563] ? do_syscall_64+0x26/0x620 [ 520.294584] __x64_sys_clone+0xbf/0x150 [ 520.294604] do_syscall_64+0xfd/0x620 [ 520.294622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.294633] RIP: 0033:0x459829 [ 520.294647] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.294659] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 [ 520.303967] ORIG_RAX: 0000000000000038 [ 520.303976] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 520.303985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 520.303994] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 520.304004] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 520.304013] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:23 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x5, 0x200c80) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) mq_getsetattr(r1, &(0x7f00000000c0)={0xb4, 0x2, 0x1a, 0x8, 0x6, 0x8001, 0x40, 0x9}, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000000), r2, 0x0, 0x0, 0x1}}, 0x20) 12:12:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:23 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x3f000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:23 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:23 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000000)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x22}}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e24, @local}, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x2, 0x3, 0x7f}) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000140)=0x2, 0x4) syz_emit_ethernet(0x7e, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0) 12:12:23 executing program 4 (fault-call:6 fault-nth:11): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:23 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 520.938513] FAULT_INJECTION: forcing a failure. [ 520.938513] name failslab, interval 1, probability 0, space 0, times 0 [ 520.981857] CPU: 0 PID: 25711 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 520.988935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.998308] Call Trace: [ 521.000925] dump_stack+0x172/0x1f0 [ 521.004579] should_fail.cold+0xa/0x1b [ 521.008484] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 521.013600] ? lock_downgrade+0x810/0x810 [ 521.017774] __should_failslab+0x121/0x190 [ 521.022023] should_failslab+0x9/0x14 [ 521.025837] kmem_cache_alloc+0x2ae/0x700 [ 521.029991] ? trace_hardirqs_on+0x67/0x220 [ 521.034316] ? kasan_check_read+0x11/0x20 [ 521.038470] copy_process.part.0+0x2139/0x7a30 [ 521.043072] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 521.048608] ? proc_fail_nth_write+0x9d/0x1e0 [ 521.053104] ? proc_cwd_link+0x1d0/0x1d0 [ 521.057169] ? __f_unlock_pos+0x19/0x20 [ 521.061159] ? __cleanup_sighand+0x70/0x70 [ 521.065399] ? lock_downgrade+0x810/0x810 [ 521.069557] ? kasan_check_write+0x14/0x20 [ 521.073803] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 521.078655] _do_fork+0x257/0xfd0 [ 521.082111] ? fork_idle+0x1d0/0x1d0 [ 521.085813] ? fput+0x128/0x1a0 [ 521.089083] ? ksys_write+0x1f1/0x2d0 [ 521.092872] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 521.097614] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 521.102358] ? do_syscall_64+0x26/0x620 [ 521.106317] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.111666] ? do_syscall_64+0x26/0x620 [ 521.115627] __x64_sys_clone+0xbf/0x150 [ 521.119598] do_syscall_64+0xfd/0x620 [ 521.123389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.128564] RIP: 0033:0x459829 [ 521.131755] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.150727] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 521.158433] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 521.165690] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 521.172944] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 12:12:24 executing program 1: mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8000, &(0x7f0000000200)=0x20, 0x6, 0x0) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4003, &(0x7f0000000000)=0x1009, 0x7, 0x0) 12:12:24 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 521.180199] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 521.187453] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:24 executing program 4 (fault-call:6 fault-nth:12): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000100)={0x5, 0x0, [{0x2, 0x7, 0x4, 0xfffffffffffffff9, 0x592, 0x1, 0x4}, {0x80000007, 0x100000000, 0x2, 0x0, 0x3ff, 0x4, 0x1}, {0xc0000007, 0x5, 0x6, 0x80, 0x7, 0x7, 0x4}, {0x40000000, 0x0, 0x2, 0x6, 0x7, 0xfffffffffffff348, 0x533}, {0x2, 0x4, 0x6, 0x4, 0x40, 0x100000000, 0x5}]}) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0x6) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000002240)={0x8, 0x0, 0x2080, {}, [], "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", "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"}) 12:12:24 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 521.375083] FAULT_INJECTION: forcing a failure. [ 521.375083] name failslab, interval 1, probability 0, space 0, times 0 [ 521.397980] CPU: 0 PID: 25727 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 521.405036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.414393] Call Trace: [ 521.414417] dump_stack+0x172/0x1f0 [ 521.414439] should_fail.cold+0xa/0x1b [ 521.414457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 521.414471] ? lock_downgrade+0x810/0x810 [ 521.414495] __should_failslab+0x121/0x190 [ 521.414514] should_failslab+0x9/0x14 [ 521.414527] kmem_cache_alloc+0x2ae/0x700 [ 521.414541] ? trace_hardirqs_on+0x67/0x220 [ 521.414552] ? kasan_check_read+0x11/0x20 [ 521.414575] copy_process.part.0+0x2139/0x7a30 [ 521.424655] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 521.424674] ? proc_fail_nth_write+0x9d/0x1e0 [ 521.454478] ? proc_cwd_link+0x1d0/0x1d0 [ 521.454493] ? __f_unlock_pos+0x19/0x20 [ 521.454519] ? __cleanup_sighand+0x70/0x70 [ 521.454531] ? lock_downgrade+0x810/0x810 [ 521.454554] ? kasan_check_write+0x14/0x20 [ 521.454570] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 521.454589] _do_fork+0x257/0xfd0 [ 521.454607] ? fork_idle+0x1d0/0x1d0 [ 521.454621] ? fput+0x128/0x1a0 [ 521.454636] ? ksys_write+0x1f1/0x2d0 [ 521.464730] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 521.513501] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 521.518254] ? do_syscall_64+0x26/0x620 [ 521.522211] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.527556] ? do_syscall_64+0x26/0x620 [ 521.531516] __x64_sys_clone+0xbf/0x150 [ 521.535491] do_syscall_64+0xfd/0x620 [ 521.539292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.544473] RIP: 0033:0x459829 [ 521.547658] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.566548] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 12:12:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:24 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e600", 0x2f) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 521.574249] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 521.581520] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 521.588773] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 521.596036] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 521.603303] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x64000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:24 executing program 1: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000240)={0x7ff, 0x6, 0x8a, 0x5, 0x8001}) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f0000000200)={r1, &(0x7f0000000180)=""/89}) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000280)=""/227, 0xe3}, {&(0x7f0000000380)=""/221, 0xdd}], 0x2) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000040)) 12:12:24 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:24 executing program 4 (fault-call:6 fault-nth:13): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:24 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:24 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 521.918547] FAULT_INJECTION: forcing a failure. [ 521.918547] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 521.976642] CPU: 1 PID: 25749 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 521.983708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.993077] Call Trace: [ 521.995677] dump_stack+0x172/0x1f0 [ 521.999317] should_fail.cold+0xa/0x1b [ 522.003217] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 522.008344] ? __might_sleep+0x95/0x190 [ 522.012333] __alloc_pages_nodemask+0x1ee/0x750 [ 522.017015] ? __alloc_pages_slowpath+0x2870/0x2870 [ 522.022046] ? find_held_lock+0x35/0x130 [ 522.026116] ? percpu_ref_put_many+0x94/0x190 [ 522.030616] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 522.037724] alloc_pages_current+0x107/0x210 [ 522.042123] __get_free_pages+0xc/0x40 [ 522.046009] pgd_alloc+0x8b/0x3f0 [ 522.049459] ? pgd_page_get_mm+0x40/0x40 [ 522.053517] ? __lockdep_init_map+0x10c/0x5b0 [ 522.058007] ? __lockdep_init_map+0x10c/0x5b0 [ 522.062488] mm_init+0x59e/0x9d0 [ 522.065841] copy_process.part.0+0x2b3d/0x7a30 [ 522.070426] ? proc_fail_nth_write+0x9d/0x1e0 [ 522.074931] ? __cleanup_sighand+0x70/0x70 [ 522.079148] ? lock_downgrade+0x810/0x810 [ 522.083301] ? kasan_check_write+0x14/0x20 [ 522.087524] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 522.092352] _do_fork+0x257/0xfd0 [ 522.095796] ? fork_idle+0x1d0/0x1d0 [ 522.099513] ? fput+0x128/0x1a0 [ 522.102782] ? ksys_write+0x1f1/0x2d0 [ 522.106569] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 522.111305] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 522.116048] ? do_syscall_64+0x26/0x620 [ 522.120008] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:12:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file1\x00', 0x0, 0x3e3, &(0x7f0000000040), 0x0, &(0x7f0000000080)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) r0 = geteuid() syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file1\x00', 0xffffffffffffff00, 0x5, &(0x7f0000000380)=[{&(0x7f0000000480)="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", 0x1000, 0x8000}, {&(0x7f00000001c0)="b1a168087e49db4c2694d79a97b232fb3f15e12a5679204d3a5a76280187bcbe79cba2a75f258b3c723a507c1d8e4eb940319bc197b4522d094fdb79668c8df6ca8e932e45f50bd75c1611b87b99ba4e3a84879a5d576ca19866f0ff", 0x5c, 0x9}, {&(0x7f0000000240)="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", 0xfe, 0xfa0d}, {&(0x7f0000000140)="5b86507445ce33f7ba94ca1583262690", 0x10}, {&(0x7f0000000340)="c27ef635", 0x4, 0x3}], 0x104000, &(0x7f0000001480)={[{@auto_da_alloc_val={'auto_da_alloc'}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x80000}}, {@user_xattr='user_xattr'}, {@errors_continue='errors=continue'}, {@min_batch_time={'min_batch_time', 0x3d, 0x916a}}], [{@seclabel='seclabel'}, {@subj_type={'subj_type', 0x3d, 'ext2\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r0}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 12:12:24 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 522.125354] ? do_syscall_64+0x26/0x620 [ 522.129343] __x64_sys_clone+0xbf/0x150 [ 522.133335] do_syscall_64+0xfd/0x620 [ 522.137152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.142346] RIP: 0033:0x459829 [ 522.145548] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 522.164450] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 12:12:25 executing program 4 (fault-call:6 fault-nth:14): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 522.164466] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 522.164475] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 522.164482] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 522.164490] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 522.164497] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 522.308924] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 522.330269] FAULT_INJECTION: forcing a failure. [ 522.330269] name failslab, interval 1, probability 0, space 0, times 0 12:12:25 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:25 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 522.352759] CPU: 0 PID: 25774 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 522.359807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.369167] Call Trace: [ 522.371791] dump_stack+0x172/0x1f0 [ 522.375437] should_fail.cold+0xa/0x1b [ 522.379333] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 522.384439] ? lock_downgrade+0x810/0x810 [ 522.388611] __should_failslab+0x121/0x190 [ 522.392843] should_failslab+0x9/0x14 [ 522.396745] kmem_cache_alloc+0x2ae/0x700 [ 522.400902] ? get_mm_exe_file+0x289/0x3e0 [ 522.405140] ? trace_event_raw_event_task_newtask+0x440/0x440 [ 522.411024] __khugepaged_enter+0x3b/0x390 [ 522.415271] copy_process.part.0+0x7299/0x7a30 [ 522.419869] ? proc_fail_nth_write+0x9d/0x1e0 [ 522.424390] ? __cleanup_sighand+0x70/0x70 [ 522.428622] ? lock_downgrade+0x810/0x810 [ 522.432777] ? kasan_check_write+0x14/0x20 [ 522.437000] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 522.441837] _do_fork+0x257/0xfd0 [ 522.445287] ? fork_idle+0x1d0/0x1d0 [ 522.449001] ? fput+0x128/0x1a0 [ 522.452299] ? ksys_write+0x1f1/0x2d0 [ 522.456096] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 522.460836] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 522.465586] ? do_syscall_64+0x26/0x620 [ 522.469552] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.474907] ? do_syscall_64+0x26/0x620 [ 522.478884] __x64_sys_clone+0xbf/0x150 [ 522.482841] do_syscall_64+0xfd/0x620 [ 522.486638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.491822] RIP: 0033:0x459829 [ 522.495012] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 522.513911] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 522.521618] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 522.528876] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 522.536130] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 522.543476] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 522.550738] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 522.620620] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 12:12:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xbc010000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:25 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:25 executing program 4 (fault-call:6 fault-nth:15): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:25 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:25 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x8000) fstat(r0, &(0x7f00000000c0)) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000080), 0x4) [ 522.815557] FAULT_INJECTION: forcing a failure. [ 522.815557] name failslab, interval 1, probability 0, space 0, times 0 [ 522.831749] CPU: 0 PID: 25796 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 522.838806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.848161] Call Trace: [ 522.850772] dump_stack+0x172/0x1f0 [ 522.854423] should_fail.cold+0xa/0x1b [ 522.858315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 522.863426] ? lock_downgrade+0x810/0x810 [ 522.867598] __should_failslab+0x121/0x190 [ 522.871842] should_failslab+0x9/0x14 [ 522.875651] kmem_cache_alloc+0x2ae/0x700 [ 522.879810] ? kasan_check_read+0x11/0x20 [ 522.883965] ? do_raw_spin_unlock+0x57/0x270 [ 522.888386] vm_area_dup+0x21/0x170 [ 522.892024] copy_process.part.0+0x3407/0x7a30 [ 522.896646] ? __cleanup_sighand+0x70/0x70 [ 522.900885] ? lock_downgrade+0x810/0x810 [ 522.905055] ? kasan_check_write+0x14/0x20 [ 522.909301] ? __mutex_unlock_slowpath+0xf8/0x6b0 12:12:25 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 522.914164] _do_fork+0x257/0xfd0 [ 522.917638] ? fork_idle+0x1d0/0x1d0 [ 522.921361] ? fput+0x128/0x1a0 [ 522.924652] ? ksys_write+0x1f1/0x2d0 [ 522.928469] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 522.933239] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 522.938000] ? do_syscall_64+0x26/0x620 [ 522.941983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.947353] ? do_syscall_64+0x26/0x620 [ 522.951342] __x64_sys_clone+0xbf/0x150 [ 522.955330] do_syscall_64+0xfd/0x620 [ 522.959134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.964320] RIP: 0033:0x459829 [ 522.967507] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 522.986395] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 522.994098] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 523.001358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 523.008609] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 523.015876] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 523.023146] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:25 executing program 4 (fault-call:6 fault-nth:16): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:25 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 523.198085] FAULT_INJECTION: forcing a failure. [ 523.198085] name failslab, interval 1, probability 0, space 0, times 0 12:12:26 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:26 executing program 1: socket$inet6(0xa, 0x0, 0xeb3) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="ffff0000000000000511"], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fe) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), 0x4) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) [ 523.244551] CPU: 1 PID: 25815 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 523.251624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.260994] Call Trace: [ 523.263602] dump_stack+0x172/0x1f0 [ 523.267245] should_fail.cold+0xa/0x1b [ 523.271145] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 523.276261] ? lock_downgrade+0x810/0x810 [ 523.280434] __should_failslab+0x121/0x190 [ 523.284698] should_failslab+0x9/0x14 [ 523.288503] kmem_cache_alloc+0x2ae/0x700 [ 523.292689] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 523.297716] ? __vm_enough_memory+0x324/0x5a0 [ 523.302229] vm_area_dup+0x21/0x170 [ 523.305863] copy_process.part.0+0x3407/0x7a30 [ 523.310483] ? __cleanup_sighand+0x70/0x70 [ 523.314726] ? lock_downgrade+0x810/0x810 [ 523.318892] ? kasan_check_write+0x14/0x20 [ 523.321980] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 [ 523.323135] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 523.323212] _do_fork+0x257/0xfd0 [ 523.323230] ? fork_idle+0x1d0/0x1d0 [ 523.337897] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 [ 523.340499] ? fput+0x128/0x1a0 [ 523.340517] ? ksys_write+0x1f1/0x2d0 [ 523.340538] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 523.340557] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 523.344524] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 [ 523.347722] ? do_syscall_64+0x26/0x620 [ 523.347738] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.347753] ? do_syscall_64+0x26/0x620 [ 523.347772] __x64_sys_clone+0xbf/0x150 [ 523.347788] do_syscall_64+0xfd/0x620 [ 523.347805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 523.360565] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 [ 523.363267] RIP: 0033:0x459829 [ 523.363284] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 523.363292] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 523.363309] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 523.363318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 523.363325] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 523.363334] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 523.363342] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 523.367768] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 [ 523.393546] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 [ 523.418906] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 [ 523.541414] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 [ 523.581538] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 [ 523.600564] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=25823 comm=syz-executor.1 12:12:26 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:26 executing program 4 (fault-call:6 fault-nth:17): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:26 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:26 executing program 1: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@ng={0x4, 0xc, "d90a2bce210d981744c940e775931c"}, 0x11, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) r2 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r2, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) 12:12:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xff000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x2f01, &(0x7f0000000180)="a310c0410508d233f88e1dd4dae3a64e68f4a39b88ef6cf60dc3b9aa287ffaded11c1246a8181b33327485bde502eb8cec0dc68af1bd3cb3d80c0bc9a6f5c297c14fb0fc1359da41305115c4ccbde2dd27aa9964e371be7b60335cc89a932200138646ee443a6c4ef95adfd7ca4886add1667bd056004b8a17f23035b3d88236f9beb0101732cd899e14b8c8394b292af7d22aa105ae94d9c18eb1cb20e61f658f4d4994033e7a77fe3a68ab585f97862a3c8281b5af3cd531adeb63f8") r1 = socket$netlink(0x10, 0x3, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000000)={0x0, 0x3a, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x02'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x3, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfc000000]}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x6c}}, 0x0) [ 523.955640] FAULT_INJECTION: forcing a failure. [ 523.955640] name failslab, interval 1, probability 0, space 0, times 0 [ 523.974127] CPU: 0 PID: 25845 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 523.981196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 523.990565] Call Trace: [ 523.993179] dump_stack+0x172/0x1f0 [ 523.996825] should_fail.cold+0xa/0x1b [ 524.000719] ? fault_create_debugfs_attr+0x1e0/0x1e0 12:12:26 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, 0x0, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 524.005833] ? find_held_lock+0x35/0x130 [ 524.009913] ? percpu_ref_put_many+0x94/0x190 [ 524.014419] __should_failslab+0x121/0x190 [ 524.018670] should_failslab+0x9/0x14 [ 524.022499] kmem_cache_alloc+0x47/0x700 [ 524.026582] ? __lock_is_held+0xb6/0x140 [ 524.030668] anon_vma_clone+0xde/0x480 [ 524.034571] anon_vma_fork+0x8f/0x4a0 [ 524.038387] ? dup_userfaultfd+0x15e/0x6c0 [ 524.042633] ? memcpy+0x46/0x50 [ 524.045932] copy_process.part.0+0x34e5/0x7a30 [ 524.050557] ? __cleanup_sighand+0x70/0x70 [ 524.054802] ? lock_downgrade+0x810/0x810 [ 524.058974] ? kasan_check_write+0x14/0x20 [ 524.063226] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 524.068086] _do_fork+0x257/0xfd0 [ 524.071561] ? fork_idle+0x1d0/0x1d0 [ 524.075288] ? fput+0x128/0x1a0 [ 524.078579] ? ksys_write+0x1f1/0x2d0 [ 524.082396] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 524.087167] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 524.091940] ? do_syscall_64+0x26/0x620 [ 524.095927] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.101306] ? do_syscall_64+0x26/0x620 [ 524.105295] __x64_sys_clone+0xbf/0x150 [ 524.109292] do_syscall_64+0xfd/0x620 [ 524.115125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.120335] RIP: 0033:0x459829 [ 524.123552] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.142465] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 524.150192] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 524.157469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 524.164732] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 524.171994] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 524.179248] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:27 executing program 4 (fault-call:6 fault-nth:18): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 524.279452] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. [ 524.292446] Invalid UDP bearer configuration [ 524.292481] Enabling of bearer rejected, failed to enable media 12:12:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 524.351092] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. [ 524.365981] Invalid UDP bearer configuration [ 524.366011] Enabling of bearer rejected, failed to enable media 12:12:27 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, 0x0, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 524.397335] FAULT_INJECTION: forcing a failure. [ 524.397335] name failslab, interval 1, probability 0, space 0, times 0 [ 524.412898] CPU: 0 PID: 25868 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 524.420124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.429469] Call Trace: [ 524.432053] dump_stack+0x172/0x1f0 [ 524.435676] should_fail.cold+0xa/0x1b [ 524.439583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 524.444698] ? find_held_lock+0x35/0x130 [ 524.448758] ? percpu_ref_put_many+0x94/0x190 [ 524.453243] __should_failslab+0x121/0x190 [ 524.457470] should_failslab+0x9/0x14 [ 524.461258] kmem_cache_alloc+0x47/0x700 [ 524.465312] ? __lock_is_held+0xb6/0x140 [ 524.469455] anon_vma_clone+0xde/0x480 [ 524.473340] anon_vma_fork+0x8f/0x4a0 [ 524.477131] ? dup_userfaultfd+0x15e/0x6c0 [ 524.481361] ? memcpy+0x46/0x50 [ 524.484633] copy_process.part.0+0x34e5/0x7a30 [ 524.489225] ? __cleanup_sighand+0x70/0x70 [ 524.493535] ? lock_downgrade+0x810/0x810 [ 524.497681] ? kasan_check_write+0x14/0x20 [ 524.501902] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 524.506734] _do_fork+0x257/0xfd0 [ 524.510176] ? fork_idle+0x1d0/0x1d0 [ 524.513877] ? fput+0x128/0x1a0 [ 524.517142] ? ksys_write+0x1f1/0x2d0 [ 524.520966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 524.525720] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 524.530459] ? do_syscall_64+0x26/0x620 [ 524.534434] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.539791] ? do_syscall_64+0x26/0x620 [ 524.543764] __x64_sys_clone+0xbf/0x150 [ 524.547725] do_syscall_64+0xfd/0x620 [ 524.551513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.556686] RIP: 0033:0x459829 [ 524.559866] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.578763] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 524.586482] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 524.593745] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 524.600998] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 524.608253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 524.615521] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:27 executing program 4 (fault-call:6 fault-nth:19): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:27 executing program 1: fstat(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x100, 0xa, &(0x7f0000001640)=[{&(0x7f0000000080)="33586be2ff816bb2224fa9793d83f629f879541e01878799f32ef1f667775742bf052526863dd698b92f31f14558e7c27ccae642c58152287af9f49df29b8f115d02de4454156e4920b2d94622886eb00b1593872c7309e601effea04f1247901bd92c72e7a64dc12c70c7d78d0b60ccd500f5dfc6af7bf9dcfe75ff95b3206957539e704cf004611ca383168f4a25f0919e6a58f94a0a8a1b0e8c357a35c6e9b0e12d3efc38cf0547f5793b65176fd336203db46bca8d49738692c68952ce08bb202027834f7e13a9f60324710f8c0d0450", 0xd2, 0x5}, {&(0x7f0000000180)="42ae766bb2f1405cb1531b37c12130", 0xf, 0x100000000}, {&(0x7f0000000640)="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", 0x1000, 0x2}, {&(0x7f0000000280)="d53b4faae3263bdd7f1bb947045fa8a5c7d55bc447290b0103be8529217cbce9cf4d6e1692de2950873853a3a3dd51480a0d78abce148e28eb53f4e8e4bb9197b07bfae67072be8a2f9e2d1b4da00fe985f85d5c5d761c643bc6c364ae2d2f271446bdfb8565897d50d1d9b0abbbfda68c2754d055d349873f63c32556bedc6851ad63d58b16e3b376c0e8b640063ca33b4f7f22cafa2c628f9a5f609d3dc8cbba17d607051b7a15dacc6e283e99c640a7985e97db594bea0aed8ab665df5579737192e9ec6b9c7ad7e7006f20ba4f108febc8ab4215", 0xd6, 0x4}, {&(0x7f00000001c0)="13967275137b35ef46dba2", 0xb, 0x8001}, {&(0x7f0000000380)="79a86ba5912aa5946ea1a908ce4a99e49eaa966709c1d3bbc02b4a23534dae224de8d4bc379a3dd49dc907d98e5bfc433d44b8c144a9eb590e8efff67856a7024af154fbb4f7a151a21a4cad7d70be4125cb6043d30ed7d019383a6d32e2f97417a5b0b73d5a1efbbe2bd57a41bdbd7ea0746e5a219d087034fc", 0x7a, 0x5}, {&(0x7f0000000200)="3433e16912b18037cfae5a29da7be9", 0xf, 0xffffffffffffffb5}, {&(0x7f0000000400)="ddaf6cfc068295e3784645e09200", 0xe, 0x1}, {&(0x7f0000000440)="e9d29bfa302559", 0x7, 0x7}, {&(0x7f0000000480)="1b8d77ffe53d8591257139c109a032271ec525fa963503f615852269b956011ecfaf3d8c2061eaec108a1be838e3a0bec4e035da8c63424bac3f95b54775d28902561fadae554d24b32d57bd1179fe45772d93a90ff2a10f59293fd8c27c0a2dfb1f6628443d70885f32e21c6fce06ce0fd5bf8c4c79051cf7da3bf3d0bee0d214d2e3bcc9424b427de1ff4712b67f8ce9564eb757cb6b5ca7a9b46d7ca770104af95ada6628b6a1501a6f33428e0a8709b835c3c188d7f21bd93ab506303423e68593da65bc976522a0c6f65d1efca12d3e323626c7120bb999e9", 0xdb, 0x1a3}], 0x2010000, &(0x7f0000001740)={[{@check_strict='check=strict'}, {@gid={'gid', 0x3d, r0}}], [{@seclabel='seclabel'}, {@seclabel='seclabel'}, {@pcr={'pcr', 0x3d, 0x2b}}]}) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r2, &(0x7f0000001840)={0xa, 0x4e21, 0xafa, @loopback, 0x6}, 0x1c) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001800)='/dev/loop-control\x00', 0x300, 0x0) getsockname(r2, 0x0, 0x0) write$P9_RCLUNK(r2, &(0x7f00000017c0)={0x7, 0x79, 0x2}, 0x7) 12:12:27 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, 0x0, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x300000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:27 executing program 1: setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000200)=0x800, 0x4) r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @rand_addr, 0x40000000000}, 0x1c) listen(r2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x42b) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685, 0x0) sendto$inet6(r3, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r3, &(0x7f0000000380), 0xfffffffe) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000380)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01, 0xffffffffffffffff]) fchown(r0, r4, r5) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='pids.events\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r6, 0x40047438, &(0x7f0000000240)=0x2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r7 = accept4(r2, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r7, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000080)=0x78) sendto$inet6(r7, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) ioctl(r1, 0x1001000008912, &(0x7f00000000c0)="11dca5055e0bcfe47bf070") [ 524.847205] FAULT_INJECTION: forcing a failure. [ 524.847205] name failslab, interval 1, probability 0, space 0, times 0 [ 524.893801] CPU: 1 PID: 25888 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 524.900864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.910400] Call Trace: [ 524.913100] dump_stack+0x172/0x1f0 [ 524.916759] should_fail.cold+0xa/0x1b [ 524.920760] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 524.925878] ? find_held_lock+0x35/0x130 [ 524.929956] ? percpu_ref_put_many+0x94/0x190 [ 524.934476] __should_failslab+0x121/0x190 [ 524.938739] should_failslab+0x9/0x14 [ 524.942560] kmem_cache_alloc+0x47/0x700 [ 524.946638] ? __lock_is_held+0xb6/0x140 [ 524.950721] anon_vma_clone+0xde/0x480 [ 524.954635] anon_vma_fork+0x8f/0x4a0 [ 524.958450] ? dup_userfaultfd+0x15e/0x6c0 [ 524.962703] ? memcpy+0x46/0x50 [ 524.965997] copy_process.part.0+0x34e5/0x7a30 [ 524.970621] ? __cleanup_sighand+0x70/0x70 [ 524.974868] ? lock_downgrade+0x810/0x810 [ 524.979040] ? kasan_check_write+0x14/0x20 [ 524.983288] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 524.988152] _do_fork+0x257/0xfd0 [ 524.991622] ? fork_idle+0x1d0/0x1d0 [ 524.995343] ? fput+0x128/0x1a0 [ 524.998629] ? ksys_write+0x1f1/0x2d0 [ 525.002444] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.007210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.011981] ? do_syscall_64+0x26/0x620 [ 525.015965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.021339] ? do_syscall_64+0x26/0x620 [ 525.025334] __x64_sys_clone+0xbf/0x150 [ 525.029324] do_syscall_64+0xfd/0x620 [ 525.033135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.038338] RIP: 0033:0x459829 12:12:27 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e02, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:27 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 525.041540] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.060866] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 525.068591] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 525.075874] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 525.083157] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 525.090442] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 525.097721] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 525.109604] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:12:28 executing program 4 (fault-call:6 fault-nth:20): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:28 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 525.329319] FAULT_INJECTION: forcing a failure. [ 525.329319] name failslab, interval 1, probability 0, space 0, times 0 12:12:28 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 525.381450] CPU: 1 PID: 25920 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 525.388617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.397993] Call Trace: [ 525.400604] dump_stack+0x172/0x1f0 [ 525.404250] should_fail.cold+0xa/0x1b [ 525.408157] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 525.413275] ? lock_downgrade+0x810/0x810 [ 525.417444] __should_failslab+0x121/0x190 [ 525.421698] should_failslab+0x9/0x14 [ 525.425517] kmem_cache_alloc+0x2ae/0x700 [ 525.429673] ? anon_vma_clone+0x320/0x480 [ 525.433842] anon_vma_fork+0xfc/0x4a0 [ 525.437651] ? dup_userfaultfd+0x15e/0x6c0 [ 525.441894] ? memcpy+0x46/0x50 [ 525.445198] copy_process.part.0+0x34e5/0x7a30 [ 525.449824] ? __cleanup_sighand+0x70/0x70 [ 525.454073] ? lock_downgrade+0x810/0x810 [ 525.458238] ? kasan_check_write+0x14/0x20 [ 525.462493] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 525.467354] _do_fork+0x257/0xfd0 [ 525.470822] ? fork_idle+0x1d0/0x1d0 [ 525.474550] ? fput+0x128/0x1a0 [ 525.477838] ? ksys_write+0x1f1/0x2d0 [ 525.481656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.486422] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.491186] ? do_syscall_64+0x26/0x620 [ 525.495175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.500535] ? do_syscall_64+0x26/0x620 [ 525.504509] __x64_sys_clone+0xbf/0x150 [ 525.504527] do_syscall_64+0xfd/0x620 [ 525.504546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.504557] RIP: 0033:0x459829 [ 525.504572] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.504579] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 525.504594] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 525.504601] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 525.504608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 525.504620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 525.576382] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:28 executing program 4 (fault-call:6 fault-nth:21): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:28 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 525.758657] FAULT_INJECTION: forcing a failure. [ 525.758657] name failslab, interval 1, probability 0, space 0, times 0 [ 525.771573] CPU: 1 PID: 25940 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 525.778665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.788024] Call Trace: [ 525.790629] dump_stack+0x172/0x1f0 [ 525.794278] should_fail.cold+0xa/0x1b [ 525.798177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 525.803297] ? lock_downgrade+0x810/0x810 [ 525.807473] __should_failslab+0x121/0x190 [ 525.811723] should_failslab+0x9/0x14 [ 525.815531] kmem_cache_alloc+0x2ae/0x700 [ 525.819682] ? anon_vma_clone+0x320/0x480 [ 525.823842] anon_vma_fork+0x1ea/0x4a0 [ 525.827731] ? dup_userfaultfd+0x15e/0x6c0 [ 525.827751] copy_process.part.0+0x34e5/0x7a30 [ 525.827787] ? __cleanup_sighand+0x70/0x70 [ 525.836568] ? lock_downgrade+0x810/0x810 [ 525.836592] ? kasan_check_write+0x14/0x20 [ 525.836608] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 525.836627] _do_fork+0x257/0xfd0 [ 525.836645] ? fork_idle+0x1d0/0x1d0 [ 525.836659] ? fput+0x128/0x1a0 [ 525.836674] ? ksys_write+0x1f1/0x2d0 [ 525.836694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.836708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 525.836720] ? do_syscall_64+0x26/0x620 [ 525.836733] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.836749] ? do_syscall_64+0x26/0x620 [ 525.891090] __x64_sys_clone+0xbf/0x150 [ 525.895069] do_syscall_64+0xfd/0x620 [ 525.898869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.904131] RIP: 0033:0x459829 [ 525.907307] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.926210] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 525.933912] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 525.941177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 525.948429] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 12:12:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x100000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x701000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 525.955694] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 525.962963] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 526.026354] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:12:28 executing program 1: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:28 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:28 executing program 4 (fault-call:6 fault-nth:22): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:28 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 526.156646] FAULT_INJECTION: forcing a failure. [ 526.156646] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 526.171125] CPU: 1 PID: 25957 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 526.178167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.187528] Call Trace: [ 526.190143] dump_stack+0x172/0x1f0 [ 526.193793] should_fail.cold+0xa/0x1b [ 526.197702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 526.202828] ? __might_sleep+0x95/0x190 [ 526.206820] __alloc_pages_nodemask+0x1ee/0x750 [ 526.211506] ? __alloc_pages_slowpath+0x2870/0x2870 [ 526.216534] ? kasan_slab_alloc+0xf/0x20 [ 526.220609] ? kmem_cache_alloc+0x12e/0x700 [ 526.225028] ? anon_vma_fork+0x1ea/0x4a0 [ 526.229103] ? __lock_acquire+0x6ee/0x49c0 [ 526.233352] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 526.238908] alloc_pages_current+0x107/0x210 [ 526.243334] get_zeroed_page+0x14/0x50 [ 526.247234] __pud_alloc+0x3b/0x250 [ 526.250874] pud_alloc+0xde/0x150 [ 526.254343] copy_page_range+0x37a/0x1f90 [ 526.258495] ? anon_vma_fork+0x371/0x4a0 [ 526.262569] ? find_held_lock+0x35/0x130 [ 526.266639] ? anon_vma_fork+0x371/0x4a0 [ 526.270707] ? copy_process.part.0+0x30f9/0x7a30 [ 526.275477] ? copy_process.part.0+0x30f9/0x7a30 [ 526.280251] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 526.285282] ? pmd_alloc+0x180/0x180 [ 526.289011] ? __vma_link_rb+0x279/0x370 [ 526.293090] copy_process.part.0+0x543d/0x7a30 [ 526.297711] ? __cleanup_sighand+0x70/0x70 [ 526.302068] ? lock_downgrade+0x810/0x810 [ 526.306231] ? kasan_check_write+0x14/0x20 [ 526.310473] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 526.315329] _do_fork+0x257/0xfd0 [ 526.318796] ? fork_idle+0x1d0/0x1d0 [ 526.322519] ? fput+0x128/0x1a0 [ 526.325810] ? ksys_write+0x1f1/0x2d0 [ 526.329623] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 526.334387] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 526.340653] ? do_syscall_64+0x26/0x620 [ 526.344635] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.350012] ? do_syscall_64+0x26/0x620 12:12:29 executing program 4 (fault-call:6 fault-nth:23): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:29 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 526.354006] __x64_sys_clone+0xbf/0x150 [ 526.358086] do_syscall_64+0xfd/0x620 [ 526.361915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.367121] RIP: 0033:0x459829 [ 526.367136] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.367144] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 526.367157] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 526.367164] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 526.367171] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 526.367180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 526.367187] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:29 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 526.509017] FAULT_INJECTION: forcing a failure. [ 526.509017] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 526.530609] CPU: 1 PID: 25972 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 526.537672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.547035] Call Trace: [ 526.549639] dump_stack+0x172/0x1f0 [ 526.553284] should_fail.cold+0xa/0x1b 12:12:29 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 526.557188] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 526.562305] ? __might_sleep+0x95/0x190 [ 526.566294] __alloc_pages_nodemask+0x1ee/0x750 [ 526.570978] ? __pud_alloc+0x1d3/0x250 [ 526.574881] ? __alloc_pages_slowpath+0x2870/0x2870 [ 526.579899] ? __pud_alloc+0x1d3/0x250 [ 526.583789] ? lock_downgrade+0x810/0x810 [ 526.587948] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 526.593504] alloc_pages_current+0x107/0x210 [ 526.597926] ? do_raw_spin_unlock+0x57/0x270 [ 526.602343] __pmd_alloc+0x41/0x460 [ 526.605973] ? pmd_val+0x100/0x100 12:12:29 executing program 1: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 526.609528] pmd_alloc+0x10c/0x180 [ 526.613081] copy_page_range+0x633/0x1f90 [ 526.617228] ? anon_vma_fork+0x371/0x4a0 [ 526.621295] ? find_held_lock+0x35/0x130 [ 526.625365] ? anon_vma_fork+0x371/0x4a0 [ 526.629444] ? copy_process.part.0+0x30f9/0x7a30 [ 526.634209] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 526.639237] ? pmd_alloc+0x180/0x180 [ 526.642974] ? __vma_link_rb+0x279/0x370 [ 526.647054] copy_process.part.0+0x543d/0x7a30 [ 526.651678] ? __cleanup_sighand+0x70/0x70 [ 526.655919] ? lock_downgrade+0x810/0x810 [ 526.660075] ? kasan_check_write+0x14/0x20 [ 526.664309] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 526.669163] _do_fork+0x257/0xfd0 [ 526.672633] ? fork_idle+0x1d0/0x1d0 [ 526.676357] ? fput+0x128/0x1a0 [ 526.679652] ? ksys_write+0x1f1/0x2d0 [ 526.683473] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 526.688232] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 526.692977] ? do_syscall_64+0x26/0x620 [ 526.696949] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.702318] ? do_syscall_64+0x26/0x620 12:12:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x101, 0x0) write$P9_RSETATTR(r2, &(0x7f00000005c0)={0x7, 0x1b, 0x2}, 0x7) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000400)={0x2, [0x0, 0x0]}, &(0x7f0000000440)=0xc) sendmmsg$inet_sctp(r3, &(0x7f0000000500)=[{&(0x7f0000000040)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000100)="0dcedfc0cd28cdbc533339459539734f02671877318aab195b2744e161711cccd02090462b10e3fbb15afb1db8971e2052c52b4d4d35137a4eeb7ada3b54de3ec76fc166d3ce653694b43fdd3b533cbf189a0e45deaafa0edfeac30cb5bf4114dad121b271da1057db42e15692ab572849688433f12ef6b852969d9ab74c6be348c19db2d36102e68c19de697e2250c3c10b75e080aa98e7dfeff57d23b26077b8ab90993af6c58e717c7977a0a05b8ef90303cc2e336e3b86b00526ad1e5d81d48d37f5ecd5e13aac304cef3cae1bf02696fc", 0xd3}, {&(0x7f0000000200)="0fff65d07ae88d4ea96188854c77501a341a21175566d85772051bea5b7e80bf6785319403acc16791ce198587b152b1e39101c42079074c9ee8ceefd6d8c3fdfc01b7bed548530b7c85c0b7c24946dc7826e44731915eb65a015be1356ecc4c6c845d5ed1c9bd3fe121bfcaaf07af4d66c877a649e988772ed355ad225cbb903c5beb48240717c94d03a668add3cbfd70ec4fcb36af0719d60ba3022e8258e16b0a680ceaee5ac9c53ab3d9f0d91291ef7fefe2", 0xb4}, {&(0x7f00000002c0)="40cc65d2249314f85c4761d845a1054e802a71d3c172f347e57b8f0add4b8b7f5fcab58e3d224b43698dcafe40aef1ecac7bf50c5ee45b025a398bd3047077569e95603eb44cc7141698b8cdd3318e40b75e70e57a2d4fcb853c3389864c8494978aad81117549e1042589ddf666dc52330de7fe5f10d7b7f8838fb2652648cf8d35eed1eb8ad8ffb2f857468ade2ece011515e7af164cb58d3d056994928b07e1b88e468c95f8f5fe6c14033695ebc7a6fa52c49a5e4753d401ad9d054f29295d01a317e03bbaebfa203178a423000df24a3ba2346ef084894c908e248dba408a19506a", 0xe4}], 0x3, &(0x7f0000000480)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0x8, 0x207, 0x8, 0x1, 0x7, 0x6, 0xcb7, r4}}, @authinfo={0x18, 0x84, 0x6, {0x7}}], 0x48, 0x40800}], 0x1, 0x80) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000540)=0x24b) write$binfmt_script(r1, &(0x7f00000005c0)=ANY=[], 0xffc0) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) [ 526.706305] __x64_sys_clone+0xbf/0x150 [ 526.710304] do_syscall_64+0xfd/0x620 [ 526.714123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 526.719317] RIP: 0033:0x459829 [ 526.722515] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 526.741428] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 526.749177] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 526.756458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 526.763741] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 526.771020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 526.778302] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x200000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:29 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:29 executing program 4 (fault-call:6 fault-nth:24): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x4, [@restrict={0x8, 0x0, 0x0, 0xb, 0x1}, @restrict={0x1, 0x0, 0x0, 0xb, 0x4}, @int={0xd, 0x0, 0x0, 0x1, 0x0, 0x64, 0x0, 0x7a, 0x2}, @int={0xb, 0x0, 0x0, 0x1, 0x0, 0x5d, 0x0, 0x55, 0x2}]}, {0x0, [0x30, 0x2e]}}, 0x0, 0x54}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) getrlimit(0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0xffffff84) ftruncate(0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmdt(0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'bridge_slave_1\x00', 0x1}, 0x18) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) sendfile(r3, r2, 0x0, 0x8000fffffffe) preadv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0x2aa}], 0x1, 0x0) 12:12:29 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x800000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 526.976619] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 527.004455] FAULT_INJECTION: forcing a failure. [ 527.004455] name failslab, interval 1, probability 0, space 0, times 0 [ 527.027519] CPU: 0 PID: 25998 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 527.034575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.043955] Call Trace: [ 527.046544] dump_stack+0x172/0x1f0 [ 527.050165] should_fail.cold+0xa/0x1b [ 527.054042] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 527.059220] ? lock_downgrade+0x810/0x810 [ 527.063363] __should_failslab+0x121/0x190 [ 527.067595] should_failslab+0x9/0x14 [ 527.071383] kmem_cache_alloc+0x2ae/0x700 [ 527.075519] ? alloc_pages_current+0x10f/0x210 [ 527.080085] ? do_raw_spin_unlock+0x57/0x270 [ 527.084478] __pmd_alloc+0xc9/0x460 [ 527.088090] ? pmd_val+0x100/0x100 [ 527.091618] pmd_alloc+0x10c/0x180 [ 527.095148] copy_page_range+0x633/0x1f90 [ 527.099289] ? anon_vma_fork+0x371/0x4a0 [ 527.103336] ? find_held_lock+0x35/0x130 [ 527.107380] ? anon_vma_fork+0x371/0x4a0 [ 527.111429] ? copy_process.part.0+0x30f9/0x7a30 [ 527.116183] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 527.121199] ? pmd_alloc+0x180/0x180 [ 527.124901] ? __vma_link_rb+0x279/0x370 [ 527.128952] copy_process.part.0+0x543d/0x7a30 [ 527.133535] ? __cleanup_sighand+0x70/0x70 [ 527.137753] ? lock_downgrade+0x810/0x810 [ 527.141894] ? kasan_check_write+0x14/0x20 [ 527.146114] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 527.150956] _do_fork+0x257/0xfd0 [ 527.154397] ? fork_idle+0x1d0/0x1d0 [ 527.158098] ? fput+0x128/0x1a0 [ 527.161365] ? ksys_write+0x1f1/0x2d0 [ 527.165154] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 527.170355] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 527.175096] ? do_syscall_64+0x26/0x620 [ 527.179054] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.184414] ? do_syscall_64+0x26/0x620 [ 527.188386] __x64_sys_clone+0xbf/0x150 [ 527.192348] do_syscall_64+0xfd/0x620 [ 527.196151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.201323] RIP: 0033:0x459829 [ 527.204502] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.223397] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 527.231091] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 527.238345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 527.245597] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 527.252851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 527.260106] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:30 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa0806000608000604ed0020a98e1fc212000000000180c2003a00ac1414aad5e47c1f"], 0x0) 12:12:30 executing program 4 (fault-call:6 fault-nth:25): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x759a}], 0x30}], 0x1, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x7509}, {&(0x7f0000000680)=""/120, 0xf}, {&(0x7f0000000300)=""/230, 0xffffff6f}], 0x3}}], 0x23d86, 0x0, &(0x7f0000008bc0)) open_by_handle_at(r0, &(0x7f0000000180)={0xf6, 0x5bc, "818a044f636ce1c6bc10d9082d0826bad79dfb1345250b4d7b25418861a114a5ffc03a7b352de7e2689aa9e2b0e6d68b75ee82e3b45345d93496d342f7ef46f71fb87e243a1f3aa7a68ee6acb9b6d34e0e2e4226b07df11a21cc17a7b5324875925e2876f7cef00a627f879e4f69a4677978026d4822846990275402b5f15f7b7078d66973b18b2fdb024ee2ee4ea39374f377f96e0a84cf01aa9e817a5dee19cd7190d7b4485ab3f8a3cd66cf5c2e9944b1070fb02fe272fc8d4dbec7d0f58d4599ba78b921bad33b5bd7b7d933fdf13df9172a216810b7645ec55289dce5ea38b2f6849236efa15022aa754cf7"}, 0x40000) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000004c0)={&(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0], 0x2, 0x3, 0x9, 0x3}) 12:12:30 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 527.434779] FAULT_INJECTION: forcing a failure. [ 527.434779] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 527.455243] CPU: 1 PID: 26019 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 527.462316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.471686] Call Trace: [ 527.474293] dump_stack+0x172/0x1f0 [ 527.477943] should_fail.cold+0xa/0x1b [ 527.481851] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 527.486968] ? __might_sleep+0x95/0x190 [ 527.490956] __alloc_pages_nodemask+0x1ee/0x750 [ 527.495638] ? find_held_lock+0x35/0x130 [ 527.499705] ? __alloc_pages_slowpath+0x2870/0x2870 [ 527.504738] ? lock_downgrade+0x810/0x810 [ 527.508903] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 527.514483] alloc_pages_current+0x107/0x210 [ 527.518911] pte_alloc_one+0x1b/0x1a0 [ 527.522729] __pte_alloc+0x2a/0x360 [ 527.526366] copy_page_range+0x151f/0x1f90 [ 527.530606] ? anon_vma_fork+0x371/0x4a0 [ 527.534684] ? find_held_lock+0x35/0x130 [ 527.538755] ? anon_vma_fork+0x371/0x4a0 [ 527.542841] ? copy_process.part.0+0x30f9/0x7a30 [ 527.547616] ? pmd_alloc+0x180/0x180 [ 527.551345] ? __vma_link_rb+0x279/0x370 [ 527.555426] copy_process.part.0+0x543d/0x7a30 [ 527.560058] ? __cleanup_sighand+0x70/0x70 [ 527.564310] ? lock_downgrade+0x810/0x810 [ 527.568479] ? kasan_check_write+0x14/0x20 [ 527.572722] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 527.577579] _do_fork+0x257/0xfd0 [ 527.581044] ? fork_idle+0x1d0/0x1d0 [ 527.584765] ? fput+0x128/0x1a0 [ 527.588057] ? ksys_write+0x1f1/0x2d0 [ 527.591885] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 527.596652] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 527.601419] ? do_syscall_64+0x26/0x620 [ 527.605417] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.610793] ? do_syscall_64+0x26/0x620 [ 527.614771] __x64_sys_clone+0xbf/0x150 [ 527.618732] do_syscall_64+0xfd/0x620 [ 527.622519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.627693] RIP: 0033:0x459829 [ 527.630867] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.649754] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 527.657452] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 527.664715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 527.671978] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 12:12:30 executing program 1: getpriority(0xfffffffffffffffe, 0x0) clock_gettime(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x89004aa1942559bf, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000080)=""/219) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x22b) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 12:12:30 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:30 executing program 4 (fault-call:6 fault-nth:26): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 527.679232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 527.686491] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x300000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:30 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x900000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 527.855183] FAULT_INJECTION: forcing a failure. [ 527.855183] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 527.883002] CPU: 1 PID: 26037 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 527.890060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.899496] Call Trace: [ 527.899522] dump_stack+0x172/0x1f0 [ 527.899541] should_fail.cold+0xa/0x1b [ 527.899560] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 527.899579] ? __might_sleep+0x95/0x190 [ 527.899597] __alloc_pages_nodemask+0x1ee/0x750 [ 527.899620] ? find_held_lock+0x35/0x130 [ 527.918740] ? __alloc_pages_slowpath+0x2870/0x2870 [ 527.932461] ? lock_downgrade+0x810/0x810 [ 527.936628] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 527.942185] alloc_pages_current+0x107/0x210 [ 527.946614] pte_alloc_one+0x1b/0x1a0 [ 527.950430] __pte_alloc+0x2a/0x360 [ 527.954069] copy_page_range+0x151f/0x1f90 [ 527.958309] ? anon_vma_fork+0x371/0x4a0 [ 527.962384] ? find_held_lock+0x35/0x130 [ 527.966455] ? anon_vma_fork+0x371/0x4a0 [ 527.970529] ? copy_process.part.0+0x30f9/0x7a30 [ 527.975307] ? pmd_alloc+0x180/0x180 [ 527.979030] ? __vma_link_rb+0x279/0x370 [ 527.983097] copy_process.part.0+0x543d/0x7a30 [ 527.987707] ? __cleanup_sighand+0x70/0x70 [ 527.991948] ? lock_downgrade+0x810/0x810 [ 527.996114] ? kasan_check_write+0x14/0x20 [ 528.000361] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 528.005213] _do_fork+0x257/0xfd0 [ 528.008676] ? fork_idle+0x1d0/0x1d0 [ 528.012410] ? fput+0x128/0x1a0 [ 528.015693] ? ksys_write+0x1f1/0x2d0 [ 528.019499] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.024263] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.029018] ? do_syscall_64+0x26/0x620 [ 528.032993] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.038359] ? do_syscall_64+0x26/0x620 [ 528.042338] __x64_sys_clone+0xbf/0x150 [ 528.046321] do_syscall_64+0xfd/0x620 [ 528.050136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.055323] RIP: 0033:0x459829 [ 528.058517] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.077421] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 528.085133] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 528.092400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 528.099667] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 528.106937] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 528.114212] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:31 executing program 1: getpriority(0xfffffffffffffffe, 0x0) clock_gettime(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x89004aa1942559bf, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000080)=""/219) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x22b) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 12:12:31 executing program 4 (fault-call:6 fault-nth:27): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:31 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 528.403816] FAULT_INJECTION: forcing a failure. [ 528.403816] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 528.463334] CPU: 0 PID: 26062 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 528.470396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.479752] Call Trace: [ 528.482351] dump_stack+0x172/0x1f0 [ 528.485987] should_fail.cold+0xa/0x1b [ 528.489877] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 528.494987] ? __might_sleep+0x95/0x190 [ 528.498978] __alloc_pages_nodemask+0x1ee/0x750 [ 528.503666] ? find_held_lock+0x35/0x130 [ 528.507731] ? __alloc_pages_slowpath+0x2870/0x2870 [ 528.512753] ? lock_downgrade+0x810/0x810 [ 528.516905] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 528.522451] alloc_pages_current+0x107/0x210 [ 528.526862] pte_alloc_one+0x1b/0x1a0 [ 528.530662] __pte_alloc+0x2a/0x360 [ 528.534293] copy_page_range+0x151f/0x1f90 [ 528.538525] ? anon_vma_fork+0x371/0x4a0 [ 528.542592] ? find_held_lock+0x35/0x130 [ 528.546654] ? anon_vma_fork+0x371/0x4a0 [ 528.550729] ? copy_process.part.0+0x30f9/0x7a30 [ 528.555492] ? pmd_alloc+0x180/0x180 [ 528.559210] ? __vma_link_rb+0x279/0x370 [ 528.563286] copy_process.part.0+0x543d/0x7a30 [ 528.567899] ? __cleanup_sighand+0x70/0x70 [ 528.572128] ? lock_downgrade+0x810/0x810 [ 528.576290] ? kasan_check_write+0x14/0x20 [ 528.580524] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 528.585370] _do_fork+0x257/0xfd0 [ 528.588825] ? fork_idle+0x1d0/0x1d0 [ 528.592615] ? fput+0x128/0x1a0 [ 528.595894] ? ksys_write+0x1f1/0x2d0 [ 528.599707] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.604465] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 528.609222] ? do_syscall_64+0x26/0x620 [ 528.613196] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.618562] ? do_syscall_64+0x26/0x620 [ 528.622555] __x64_sys_clone+0xbf/0x150 [ 528.626535] do_syscall_64+0xfd/0x620 [ 528.630340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.635525] RIP: 0033:0x459829 [ 528.638721] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.657615] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 528.665323] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 528.672589] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 528.679857] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 528.687124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 528.694389] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:31 executing program 4 (fault-call:6 fault-nth:28): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:31 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x1000000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x700000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:31 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 528.897110] FAULT_INJECTION: forcing a failure. [ 528.897110] name failslab, interval 1, probability 0, space 0, times 0 [ 528.974640] CPU: 0 PID: 26071 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 528.981715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.991074] Call Trace: [ 528.993682] dump_stack+0x172/0x1f0 [ 528.997321] should_fail.cold+0xa/0x1b [ 529.001213] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 529.006320] ? find_held_lock+0x35/0x130 [ 529.010398] ? percpu_ref_put_many+0x94/0x190 [ 529.014902] __should_failslab+0x121/0x190 [ 529.019140] should_failslab+0x9/0x14 [ 529.022942] kmem_cache_alloc+0x47/0x700 [ 529.027004] ? __lock_is_held+0xb6/0x140 [ 529.031073] anon_vma_clone+0xde/0x480 [ 529.034970] anon_vma_fork+0x8f/0x4a0 [ 529.038766] ? dup_userfaultfd+0x15e/0x6c0 [ 529.042998] ? memcpy+0x46/0x50 [ 529.046281] copy_process.part.0+0x34e5/0x7a30 [ 529.050892] ? __cleanup_sighand+0x70/0x70 [ 529.055121] ? lock_downgrade+0x810/0x810 [ 529.059276] ? kasan_check_write+0x14/0x20 [ 529.063514] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 529.068362] _do_fork+0x257/0xfd0 [ 529.071823] ? fork_idle+0x1d0/0x1d0 [ 529.075534] ? fput+0x128/0x1a0 [ 529.078811] ? ksys_write+0x1f1/0x2d0 [ 529.082614] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 529.087368] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 529.092123] ? do_syscall_64+0x26/0x620 [ 529.096096] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.101454] ? do_syscall_64+0x26/0x620 [ 529.105428] __x64_sys_clone+0xbf/0x150 [ 529.114787] do_syscall_64+0xfd/0x620 [ 529.118598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.123784] RIP: 0033:0x459829 [ 529.126981] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.145879] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 529.153595] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 529.160944] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 529.168706] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 529.175971] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 529.183237] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:33 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:33 executing program 4 (fault-call:6 fault-nth:29): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:33 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x6400000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:33 executing program 1: getpriority(0xfffffffffffffffe, 0x0) clock_gettime(0x1, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) connect$l2tp(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x1000, 0x89004aa1942559bf, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000080)=""/219) unshare(0x600) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x22b) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 12:12:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x800000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) [ 530.892361] FAULT_INJECTION: forcing a failure. [ 530.892361] name failslab, interval 1, probability 0, space 0, times 0 [ 530.920029] CPU: 1 PID: 26097 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 530.927089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.936452] Call Trace: [ 530.939063] dump_stack+0x172/0x1f0 [ 530.942712] should_fail.cold+0xa/0x1b [ 530.946624] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 530.951745] ? find_held_lock+0x35/0x130 [ 530.955831] ? percpu_ref_put_many+0x94/0x190 [ 530.960349] __should_failslab+0x121/0x190 [ 530.964591] should_failslab+0x9/0x14 [ 530.968393] kmem_cache_alloc+0x47/0x700 [ 530.972463] ? __lock_is_held+0xb6/0x140 [ 530.976538] anon_vma_clone+0xde/0x480 [ 530.980436] anon_vma_fork+0x8f/0x4a0 [ 530.984239] ? dup_userfaultfd+0x15e/0x6c0 [ 530.988491] ? memcpy+0x46/0x50 [ 530.991785] copy_process.part.0+0x34e5/0x7a30 [ 530.997534] ? __cleanup_sighand+0x70/0x70 [ 531.001777] ? lock_downgrade+0x810/0x810 [ 531.005940] ? kasan_check_write+0x14/0x20 [ 531.010185] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 531.015444] _do_fork+0x257/0xfd0 [ 531.018908] ? fork_idle+0x1d0/0x1d0 [ 531.022623] ? fput+0x128/0x1a0 [ 531.025905] ? ksys_write+0x1f1/0x2d0 [ 531.029716] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.034475] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.039242] ? do_syscall_64+0x26/0x620 [ 531.043219] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.048592] ? do_syscall_64+0x26/0x620 [ 531.052576] __x64_sys_clone+0xbf/0x150 [ 531.056559] do_syscall_64+0xfd/0x620 [ 531.060373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.065564] RIP: 0033:0x459829 [ 531.068760] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.087671] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 531.095386] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 531.102663] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 531.115953] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 531.123258] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 531.130537] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:34 executing program 4 (fault-call:6 fault-nth:30): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x10001) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080)=0x8) 12:12:34 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 531.340006] FAULT_INJECTION: forcing a failure. [ 531.340006] name failslab, interval 1, probability 0, space 0, times 0 [ 531.355883] CPU: 0 PID: 26115 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 531.362921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.372268] Call Trace: [ 531.374873] dump_stack+0x172/0x1f0 [ 531.378512] should_fail.cold+0xa/0x1b [ 531.382415] ? fault_create_debugfs_attr+0x1e0/0x1e0 12:12:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 531.387518] ? __lock_is_held+0xb6/0x140 [ 531.391572] __should_failslab+0x121/0x190 [ 531.395806] should_failslab+0x9/0x14 [ 531.399614] kmem_cache_alloc+0x47/0x700 [ 531.403671] ? anon_vma_chain_link+0x154/0x1c0 [ 531.408259] anon_vma_clone+0xde/0x480 [ 531.412154] anon_vma_fork+0x8f/0x4a0 [ 531.415953] ? dup_userfaultfd+0x15e/0x6c0 [ 531.420192] ? memcpy+0x46/0x50 [ 531.423486] copy_process.part.0+0x34e5/0x7a30 [ 531.428100] ? __cleanup_sighand+0x70/0x70 [ 531.432335] ? lock_downgrade+0x810/0x810 [ 531.436509] ? kasan_check_write+0x14/0x20 [ 531.440760] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 531.445711] _do_fork+0x257/0xfd0 [ 531.449164] ? fork_idle+0x1d0/0x1d0 [ 531.452875] ? fput+0x128/0x1a0 [ 531.456162] ? ksys_write+0x1f1/0x2d0 [ 531.459966] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.464723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.469491] ? do_syscall_64+0x26/0x620 [ 531.473475] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.478823] ? do_syscall_64+0x26/0x620 [ 531.482797] __x64_sys_clone+0xbf/0x150 [ 531.486779] do_syscall_64+0xfd/0x620 [ 531.490587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.495765] RIP: 0033:0x459829 [ 531.498950] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.517846] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 531.525549] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 531.532818] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 531.540082] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 531.547363] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 531.554630] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:34 executing program 4 (fault-call:6 fault-nth:31): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:34 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='(wlan0\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$getown(0xffffffffffffffff, 0x9) getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x42800, 0x0) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x768, 0x2000) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x1, 0x101000) perf_event_open(0x0, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x102) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x0) [ 531.732167] FAULT_INJECTION: forcing a failure. [ 531.732167] name failslab, interval 1, probability 0, space 0, times 0 [ 531.787432] CPU: 1 PID: 26130 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 531.794504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.803867] Call Trace: [ 531.806468] dump_stack+0x172/0x1f0 [ 531.810119] should_fail.cold+0xa/0x1b [ 531.814029] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 531.819142] ? lock_downgrade+0x810/0x810 [ 531.819168] __should_failslab+0x121/0x190 [ 531.827522] should_failslab+0x9/0x14 [ 531.827539] kmem_cache_alloc+0x2ae/0x700 [ 531.827556] ? anon_vma_clone+0x320/0x480 [ 531.839625] anon_vma_fork+0xfc/0x4a0 [ 531.843436] ? dup_userfaultfd+0x15e/0x6c0 [ 531.847688] ? memcpy+0x46/0x50 [ 531.850996] copy_process.part.0+0x34e5/0x7a30 [ 531.855620] ? __cleanup_sighand+0x70/0x70 [ 531.859861] ? lock_downgrade+0x810/0x810 [ 531.864027] ? kasan_check_write+0x14/0x20 [ 531.868277] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 531.873131] _do_fork+0x257/0xfd0 [ 531.876604] ? fork_idle+0x1d0/0x1d0 [ 531.880334] ? fput+0x128/0x1a0 [ 531.883625] ? ksys_write+0x1f1/0x2d0 [ 531.887446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.892218] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.896991] ? do_syscall_64+0x26/0x620 [ 531.900983] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.906354] ? do_syscall_64+0x26/0x620 [ 531.910345] __x64_sys_clone+0xbf/0x150 [ 531.914334] do_syscall_64+0xfd/0x620 [ 531.918149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.923340] RIP: 0033:0x459829 12:12:34 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:34 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x60) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x304, 0x4, 0x0, 0x0, 0x800000000000, @remote}, 0x10) socket$inet6(0xa, 0x800, 0x6) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000140), 0x4) 12:12:34 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x900000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:34 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 531.926543] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.945446] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 531.945463] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 531.945472] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 531.945480] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 531.945489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 12:12:34 executing program 4 (fault-call:6 fault-nth:32): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 531.945497] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:34 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x5, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x19, 0x27}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x31) r0 = syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x8, 0x40) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002a40)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000440)=0xe8) sendmsg$inet(r0, &(0x7f0000002c00)={&(0x7f0000000400)={0x2, 0x4e22, @remote}, 0x10, &(0x7f00000029c0)=[{&(0x7f0000001580)="d8d314f4748c71c90dc7f9b2a555cbc7e7bd8efa14c9f61ec3d58a77115b4de780ba8416a202ad753f5fff471e0f5c51c79d0d60a0af3d1d9a334283cb4adc661b85626a8460d3de174198ae4e9c3dc581b51aa154d6548ba1b361a0b065293235ec52e9fe0da76d964d4dad4031bddc08d02446a812a43af407af4c3cfc8eecd8dbb76a0ce6826888e1c3e032f45546d9f69f048062f87d4025b92d84cb12e8c54f6e71da343aaa31bdb9c34a08d35701c49c39f94f7456e7737bb4bb6f04e7c8adec3ac9317972c7315d63ced505de77d7a0017c4fe0e19984553a682c019d4cacd77ad78a9497b9ea8fdee9231d3802e2ec5c", 0xf4}, {&(0x7f0000001680)="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", 0x1000}, {&(0x7f0000002680)="9ad7b6f3009421d9f3b674d2e9863521cad3014dafb110b1c2792b80dc4b2da55db25e9e2c86bfc2c1d9632eefa2ac7675aecac8bab6a8f3f59255727568da85e65c8a931be6292ac54e387ae4", 0x4d}, {&(0x7f0000002700)="37b62e1e4b6a9a0c944e87344aa54312d4cbc5ff269f0080d26e67bd8142258577b30ccc4d45345034dfe60eeb89aa41c07666440cb661289f1ac4a17d6c53356e54a4e42b53b4b850a480c735ff2a743d007c14a3ddffc80aa5f542ced1b87446404d5855fed469999a6ea90d9b8303052ef5ff7b66ad8f01c74a33408a73d47a2c1ca0e7b7854fa1484454614b03ac7041367628f042f2adf068ff25dd624b5334104b92", 0xa5}, {&(0x7f00000027c0)="875c882ff571a3b81e707409f28033509d5a338e3c0c058e2b8e98c777beabb07f7bd832927b9a61de51b92cab8b49b4cdc4f57874c9759520965fad3dde0c50e0d3d527d938cf9bf587411d8f2cc8b45e43bff54a23f7a1afc032caa45231ed", 0x60}, {&(0x7f0000002840)="943e23844b20b24a85f5ceb59197444df6d2664d8ff7c6c26a3e6937a64b7387aaaed2d4689625ec31df771ec1a1629521204af7d068ab9105f1ab25ebd2243ff2146ced31b9eee8f562b8e1cb8c9f0445ac06762f7f2fc6f19de15ea37fd0f37dd693ea6fcba6e84ce5f2412381400ef622e288f25e6c6d043aa95b08508362e0a7ef828e63400590de2099fe6c1288ea3bbdabc513bbc311bf1fad6ce720b9b88d6430ab253ebc3bdc7119dc72241424", 0xb1}, {&(0x7f0000002900)="33da9dc581f8e2ff1f7d16dc1299c14e68289825c6b6771771000af74b4a90a894653858f0a48916d6fee8e7ce774948ddb4ddaa103fa64be808d01ad8cac597659ee0ca3805926fda1d5a5b89996271927865b4325ec62c25a367239b1a74454f1e21fffa37067f770bc3c42a41000cab425665eff0fe2bf980afa2774c5a49491761eda7e7886b1354f7d50b8afad0de2cf23fadeb1bd6ea390a9e241cb31224e7e70d335ffc", 0xa7}], 0x7, &(0x7f0000002b40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast2, @empty}}}, @ip_retopts={{0x9c, 0x0, 0x7, {[@rr={0x7, 0xf, 0x200, [@local, @multicast1, @remote]}, @timestamp={0x44, 0x28, 0x8f8, 0x0, 0x1, [{[@loopback], 0x4}, {[], 0x100}, {[], 0x8001}, {[@rand_addr=0x7], 0xfffffffeffffffff}, {[], 0x10000}, {[@initdev={0xac, 0x1e, 0x1, 0x0}], 0x81}]}, @rr={0x7, 0x1b, 0x3, [@dev={0xac, 0x14, 0x14, 0x25}, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @dev={0xac, 0x14, 0x14, 0x1b}, @local]}, @noop, @lsrr={0x83, 0x23, 0x4, [@multicast1, @loopback, @rand_addr=0x3, @rand_addr=0x7fff000, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @broadcast, @rand_addr=0x9]}, @ra={0x94, 0x6, 0xffffffffffffffff}, @timestamp={0x44, 0xc, 0x100, 0x0, 0x100000000, [{[@broadcast], 0x800}]}, @noop, @noop]}}}], 0xc0}, 0x4008000) 12:12:34 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:34 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, 0x0, 0x0) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 532.148793] FAULT_INJECTION: forcing a failure. [ 532.148793] name failslab, interval 1, probability 0, space 0, times 0 [ 532.193288] CPU: 1 PID: 26154 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 532.200355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.209718] Call Trace: [ 532.212325] dump_stack+0x172/0x1f0 [ 532.215975] should_fail.cold+0xa/0x1b [ 532.219883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 532.225019] ? __lock_is_held+0xb6/0x140 [ 532.229105] __should_failslab+0x121/0x190 [ 532.233360] should_failslab+0x9/0x14 [ 532.237170] kmem_cache_alloc+0x47/0x700 [ 532.241233] ? anon_vma_chain_link+0x154/0x1c0 [ 532.245828] anon_vma_clone+0xde/0x480 [ 532.249722] anon_vma_fork+0x8f/0x4a0 [ 532.253527] ? dup_userfaultfd+0x15e/0x6c0 [ 532.257771] ? memcpy+0x46/0x50 [ 532.261064] copy_process.part.0+0x34e5/0x7a30 [ 532.265685] ? __cleanup_sighand+0x70/0x70 [ 532.269924] ? lock_downgrade+0x810/0x810 [ 532.274088] ? kasan_check_write+0x14/0x20 [ 532.278327] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 532.283181] _do_fork+0x257/0xfd0 [ 532.286663] ? fork_idle+0x1d0/0x1d0 [ 532.290392] ? fput+0x128/0x1a0 [ 532.293692] ? ksys_write+0x1f1/0x2d0 [ 532.297602] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 532.302354] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 532.307116] ? do_syscall_64+0x26/0x620 [ 532.311189] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.316561] ? do_syscall_64+0x26/0x620 [ 532.320540] __x64_sys_clone+0xbf/0x150 [ 532.324518] do_syscall_64+0xfd/0x620 [ 532.328351] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.333945] RIP: 0033:0x459829 [ 532.337150] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.356074] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 532.363789] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 532.371042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 532.378299] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 532.385551] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 532.392893] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2ea4c3, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d801}) recvmmsg(r3, &(0x7f00000064c0), 0x400000000000254, 0x2, 0x0) 12:12:35 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:35 executing program 4 (fault-call:6 fault-nth:33): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:35 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x2c) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000080)={0xf, 0x0, {0x56, 0x631f1bba, 0x8, {0x1, 0x6}, {0xffffffffffffffff, 0x9}, @const={0x3f, {0x3ff, 0x6, 0xfffffffffffffffb, 0x2e1}}}, {0x57, 0x4, 0x100000000, {0x7ff, 0x471}, {0x7, 0x7fff}, @const={0x8, {0xfffffffffffff800, 0x200, 0x7}}}}) [ 532.549155] FAULT_INJECTION: forcing a failure. [ 532.549155] name failslab, interval 1, probability 0, space 0, times 0 [ 532.616073] CPU: 0 PID: 26179 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 532.623138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.632501] Call Trace: [ 532.635117] dump_stack+0x172/0x1f0 [ 532.638763] should_fail.cold+0xa/0x1b [ 532.642672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 532.647790] ? lock_downgrade+0x810/0x810 [ 532.651961] __should_failslab+0x121/0x190 [ 532.656210] should_failslab+0x9/0x14 [ 532.660020] kmem_cache_alloc+0x2ae/0x700 [ 532.664177] ? pmd_alloc+0x180/0x180 [ 532.667908] vm_area_dup+0x21/0x170 [ 532.671542] copy_process.part.0+0x3407/0x7a30 [ 532.676159] ? __cleanup_sighand+0x70/0x70 [ 532.680400] ? lock_downgrade+0x810/0x810 [ 532.684567] ? kasan_check_write+0x14/0x20 [ 532.688814] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 532.693672] _do_fork+0x257/0xfd0 [ 532.697140] ? fork_idle+0x1d0/0x1d0 [ 532.700861] ? fput+0x128/0x1a0 [ 532.704154] ? ksys_write+0x1f1/0x2d0 [ 532.707978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 532.712748] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 532.717519] ? do_syscall_64+0x26/0x620 [ 532.721504] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.726886] ? do_syscall_64+0x26/0x620 [ 532.730866] __x64_sys_clone+0xbf/0x150 [ 532.734848] do_syscall_64+0xfd/0x620 [ 532.738655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.743837] RIP: 0033:0x459829 [ 532.747027] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:12:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1000000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:35 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 532.765914] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 532.773619] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 532.780882] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 532.788136] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 532.795404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 532.802664] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:35 executing program 4 (fault-call:6 fault-nth:34): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000010000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f0000000040)="0f20e06635100000000f22e0660f20d9d18900000f01df3e360fc76b007a0cb8b6008ee80f070f0966b9bb0b000066b80000000066ba000000000f30", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000080)={0x1, 0x4, 0x101}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 12:12:35 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:35 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(0xffffffffffffffff, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 532.997066] FAULT_INJECTION: forcing a failure. [ 532.997066] name failslab, interval 1, probability 0, space 0, times 0 [ 533.024218] CPU: 1 PID: 26205 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 533.031288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.040654] Call Trace: [ 533.043255] dump_stack+0x172/0x1f0 [ 533.046898] should_fail.cold+0xa/0x1b [ 533.050796] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 533.050821] ? lock_downgrade+0x810/0x810 [ 533.060057] __should_failslab+0x121/0x190 [ 533.060076] should_failslab+0x9/0x14 [ 533.068127] kmem_cache_alloc+0x2ae/0x700 [ 533.072279] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 533.077303] ? __vm_enough_memory+0x324/0x5a0 [ 533.081819] vm_area_dup+0x21/0x170 [ 533.085454] copy_process.part.0+0x3407/0x7a30 [ 533.085495] ? __cleanup_sighand+0x70/0x70 [ 533.085508] ? lock_downgrade+0x810/0x810 [ 533.085531] ? kasan_check_write+0x14/0x20 [ 533.094318] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 533.094337] _do_fork+0x257/0xfd0 [ 533.094355] ? fork_idle+0x1d0/0x1d0 [ 533.094374] ? fput+0x128/0x1a0 [ 533.117379] ? ksys_write+0x1f1/0x2d0 [ 533.128086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 533.132863] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 533.132880] ? do_syscall_64+0x26/0x620 [ 533.132895] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.132912] ? do_syscall_64+0x26/0x620 [ 533.150956] __x64_sys_clone+0xbf/0x150 [ 533.154953] do_syscall_64+0xfd/0x620 [ 533.158773] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.163976] RIP: 0033:0x459829 [ 533.167182] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.186181] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 12:12:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x9}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:36 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6(0xa, 0x80000, 0xffff) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = dup(r1) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000180)=ANY=[], 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000038) fcntl$setstatus(r1, 0x4, 0x80000000002c00) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r4) fcntl$getown(r0, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', 0x0, 0x100000000000e002, 0x0, &(0x7f0000000040), 0x0, 0x0) r5 = socket$inet6(0xa, 0x7, 0x3) ioctl(r5, 0x57, &(0x7f0000000280)="025cc80700145f8f764070") perf_event_open(&(0x7f0000940000)={0x2, 0xfffffffffffffdcd, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x110, r4, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfd, 0xfd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff00000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e}, 0x0, 0x0, r6, 0x0) 12:12:36 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:36 executing program 4 (fault-call:6 fault-nth:35): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 533.193897] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 533.201151] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 533.208404] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 533.215652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 533.222904] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:36 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e020000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 533.370353] FAULT_INJECTION: forcing a failure. [ 533.370353] name failslab, interval 1, probability 0, space 0, times 0 [ 533.389322] CPU: 1 PID: 26229 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 533.396376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.405740] Call Trace: [ 533.408349] dump_stack+0x172/0x1f0 [ 533.411984] should_fail.cold+0xa/0x1b [ 533.415880] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 533.420989] ? find_held_lock+0x35/0x130 [ 533.425062] ? percpu_ref_put_many+0x94/0x190 [ 533.429568] __should_failslab+0x121/0x190 [ 533.433809] should_failslab+0x9/0x14 [ 533.437610] kmem_cache_alloc+0x47/0x700 [ 533.441672] ? __lock_is_held+0xb6/0x140 [ 533.445742] anon_vma_clone+0xde/0x480 [ 533.449643] anon_vma_fork+0x8f/0x4a0 [ 533.453442] ? dup_userfaultfd+0x15e/0x6c0 [ 533.457682] ? memcpy+0x46/0x50 [ 533.460973] copy_process.part.0+0x34e5/0x7a30 [ 533.465584] ? __cleanup_sighand+0x70/0x70 [ 533.469826] ? lock_downgrade+0x810/0x810 [ 533.473984] ? kasan_check_write+0x14/0x20 [ 533.478221] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 533.483084] _do_fork+0x257/0xfd0 [ 533.486539] ? fork_idle+0x1d0/0x1d0 [ 533.490253] ? fput+0x128/0x1a0 [ 533.493534] ? ksys_write+0x1f1/0x2d0 [ 533.497332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 533.502076] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 533.506826] ? do_syscall_64+0x26/0x620 [ 533.510794] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.516150] ? do_syscall_64+0x26/0x620 [ 533.520111] __x64_sys_clone+0xbf/0x150 [ 533.524070] do_syscall_64+0xfd/0x620 [ 533.527853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.533023] RIP: 0033:0x459829 [ 533.536228] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.555136] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 533.562834] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 12:12:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-aesni\x00'}, 0xfffffffffffffe28) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f00000001c0)={0x1, 0x8, 0x1000, 0xb5, &(0x7f0000000080)="befccbc1afbe8622ec5e5f14c7ecff5c83af3b78795cf71d75ddac90f64878120aa97f754f157a1a3535d7d97d910c529547f1d7c4438056be2893db84ca4a9073bc3fd0d5a929f5eb320f7e022ecbbaab0500dd21a4001a00482bd9e0a3009c2d884566414708a9bb4a52712e71df3ab68a563859c57a777dd19d0429efdd7d8710ba3f286c2fff8ff0ad9c5f6e52541e6ac134bd14f05e3284d620d60b78a9d9b1601e1f1d307b8c18d8a61032293c2850eb2be8", 0x77, 0x0, &(0x7f0000000140)="0ebffd57a708584bbcf350c0a90e4a3324743d3425127e822421d7e329c9169c6f26b18ff4a181b225c5d0c89a5cb785033cef24646b1b7b9dba8e8f1a33c2c1fa8bd0aed590f38ca216e41c44c8ced2950696f4293a19a8d2c6c407ac4e9bcdc3eb90364634f00270110cf5e08302ad56f4eebe4ea5b6"}) r1 = open(&(0x7f0000000240)='./file0\x00', 0x88100, 0x2) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000280)=""/137) [ 533.570087] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 533.577338] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 533.584595] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 533.591862] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x3f00000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:36 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:36 executing program 4 (fault-call:6 fault-nth:36): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:36 executing program 1: r0 = socket$inet6(0xa, 0x80f, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e00, 0x0, @ipv4}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) poll(&(0x7f0000000080)=[{r1}, {r1}], 0x21ff3646c2332a09, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x10400, 0x4) prctl$PR_SET_TSC(0x1a, 0x1) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000100)) r3 = gettid() process_vm_writev(r3, &(0x7f0000000180)=[{&(0x7f0000000140)}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/245, 0xf5}], 0x3, &(0x7f00000001c0)=[{&(0x7f0000001440)=""/140, 0x8c}, {&(0x7f0000001500)=""/173, 0xad}], 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in=@broadcast, @in6=@mcast1}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) 12:12:36 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000180)='mime_type\x00', 0xfffffffffffffffc) r2 = add_key(&(0x7f00000001c0)='big_key\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="55c4d31573f4673307ec5ab208e40c73d9fa85fcaa2d7472cfa96f39b65535fb4523509e13b56c21bee6548b16f7d5a278bed5c7a0077813621cdc232833be7f032a6c3dbd101db8ffcfd48f2bdadb495b3964bb82e4e67c719fa22726ef8cdd741af16a0440e3e7b6b65af64b6c015241822ba763ac8d408575a753cc16801e8e3a850006a7e8b1c7486f2daaece602f031846b36bf317707ae4ecc20b54dba20a6a27c93578ca7e94eecaa830223534bee62362321a7fe165938", 0xbb, 0x0) r3 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="c8ede1cd50138c4bd357a16b4fe0e131da371801656e68af9a9e231de59b529a3d972c3a52d7b57faffb4a6ebfe2c305d3c7f7a3b3d1f61fee1a171a1672c5b0de3f8ec73d7ae6aaf89cbe7ed076120b42fc868e26febf55c545892bf8d2e55e5e1ac05176e3dedf2d2de92fe2b972243aeb88c92f1ad5b9e3e4cf46e6f8227217526ed827d5f131446a5eb886c2ba65c5720fcb4ccb4b71b06267e929c89391e5749443ab5068498f142134aa65503f5635f3e50d44f25771d3fa400653d25cdda365ed8e", 0xc5, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000480)={r1, r2, r3}, &(0x7f00000004c0)=""/39, 0x27, &(0x7f0000001540)={&(0x7f0000002580)={'md4\x00'}, &(0x7f0000001580)="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", 0x1000}) r4 = socket$netlink(0x10, 0x3, 0x8000000004) setuid(0xee01) writev(r4, &(0x7f0000000000)=[{&(0x7f00000000c0)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac71082300000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 533.815485] FAULT_INJECTION: forcing a failure. [ 533.815485] name failslab, interval 1, probability 0, space 0, times 0 [ 533.878559] CPU: 0 PID: 26248 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 533.885625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.894982] Call Trace: [ 533.897587] dump_stack+0x172/0x1f0 [ 533.901247] should_fail.cold+0xa/0x1b [ 533.905154] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 533.910287] ? __lock_is_held+0xb6/0x140 [ 533.914363] ? __lock_is_held+0xb6/0x140 [ 533.918452] __should_failslab+0x121/0x190 [ 533.922702] should_failslab+0x9/0x14 [ 533.926515] kmem_cache_alloc+0x47/0x700 [ 533.930580] ? anon_vma_chain_link+0x154/0x1c0 [ 533.935148] anon_vma_clone+0xde/0x480 [ 533.939028] anon_vma_fork+0x8f/0x4a0 [ 533.942830] ? dup_userfaultfd+0x15e/0x6c0 [ 533.947065] ? memcpy+0x46/0x50 [ 533.950339] copy_process.part.0+0x34e5/0x7a30 [ 533.954922] ? __cleanup_sighand+0x70/0x70 [ 533.959176] ? lock_downgrade+0x810/0x810 [ 533.963331] ? kasan_check_write+0x14/0x20 [ 533.967560] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 533.972397] _do_fork+0x257/0xfd0 [ 533.975842] ? fork_idle+0x1d0/0x1d0 [ 533.979540] ? fput+0x128/0x1a0 [ 533.982801] ? ksys_write+0x1f1/0x2d0 [ 533.986600] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 533.991349] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 533.996100] ? do_syscall_64+0x26/0x620 [ 534.000078] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.005443] ? do_syscall_64+0x26/0x620 [ 534.009412] __x64_sys_clone+0xbf/0x150 [ 534.013390] do_syscall_64+0xfd/0x620 [ 534.017190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.022372] RIP: 0033:0x459829 [ 534.025583] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.044574] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 534.052285] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 534.059538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 534.066810] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 534.074067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 534.081319] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x10}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:37 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:37 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='logbufs=`0000000000000000011,\x00']) 12:12:37 executing program 4 (fault-call:6 fault-nth:37): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:37 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580), 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 534.306217] XFS (loop1): unknown mount option [logbufs=`0000000000000000011]. [ 534.342193] FAULT_INJECTION: forcing a failure. [ 534.342193] name failslab, interval 1, probability 0, space 0, times 0 [ 534.354594] CPU: 1 PID: 26280 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 534.361632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.370985] Call Trace: [ 534.373592] dump_stack+0x172/0x1f0 [ 534.377240] should_fail.cold+0xa/0x1b [ 534.381146] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 534.386265] ? __lock_is_held+0xb6/0x140 [ 534.390327] ? __lock_is_held+0xb6/0x140 [ 534.394390] __should_failslab+0x121/0x190 [ 534.394408] should_failslab+0x9/0x14 [ 534.394420] kmem_cache_alloc+0x47/0x700 [ 534.394439] ? anon_vma_chain_link+0x154/0x1c0 [ 534.411073] anon_vma_clone+0xde/0x480 [ 534.414976] anon_vma_fork+0x8f/0x4a0 [ 534.418793] ? dup_userfaultfd+0x15e/0x6c0 [ 534.423080] ? memcpy+0x46/0x50 [ 534.426369] copy_process.part.0+0x34e5/0x7a30 [ 534.430975] ? __cleanup_sighand+0x70/0x70 [ 534.435199] ? lock_downgrade+0x810/0x810 [ 534.439336] ? kasan_check_write+0x14/0x20 [ 534.443558] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 534.448387] _do_fork+0x257/0xfd0 [ 534.451842] ? fork_idle+0x1d0/0x1d0 [ 534.455538] ? fput+0x128/0x1a0 [ 534.458802] ? ksys_write+0x1f1/0x2d0 [ 534.462588] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 534.467345] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 534.472095] ? do_syscall_64+0x26/0x620 [ 534.476054] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.481407] ? do_syscall_64+0x26/0x620 [ 534.485394] __x64_sys_clone+0xbf/0x150 [ 534.489384] do_syscall_64+0xfd/0x620 [ 534.493195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.498389] RIP: 0033:0x459829 [ 534.501580] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.520482] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 534.528193] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 534.535448] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 534.542703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 534.549966] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 534.557229] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 534.572845] XFS (loop1): unknown mount option [logbufs=`0000000000000000011]. 12:12:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6400000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:37 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580), 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:37 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:37 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000001c0)="3ac26ee30e45075976d7c3c9d28c3c9ad04f4364f62d36fce6f72fdcb4711ce065e70713568c3f69e3d8814cafc74b6f33e0b058c02a1aae9a9dfdbeca07946cd8779f9c71910868895df9210368198283820d22984b6ba1687e7d38b981bd55ecc14c48256fa734fd22bf7ab3d03b4d333684f36699737cc2f8fb9bc74e10a4590de61996496ef4da3f9d9dd236a76e5f4f878f123e5ff68b2a30c1b8dbe340ae777d33988a5ce8a0947a8f70354f27a91ec8bd25e4949eed8c10edc26186f65f7355c922b02eb1d76451dd96d4f2072109", 0xd2, 0x0) keyctl$invalidate(0x15, r0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x3ff, 0x0) write$P9_RREMOVE(r1, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3800000, 0x41) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000380)={'caif0\x00', &(0x7f0000000340)=ANY=[]}) 12:12:37 executing program 4 (fault-call:6 fault-nth:38): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x64}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 535.037882] FAULT_INJECTION: forcing a failure. [ 535.037882] name failslab, interval 1, probability 0, space 0, times 0 [ 535.053944] CPU: 1 PID: 26300 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 535.061001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.070364] Call Trace: [ 535.072970] dump_stack+0x172/0x1f0 [ 535.076624] should_fail.cold+0xa/0x1b [ 535.080528] ? fault_create_debugfs_attr+0x1e0/0x1e0 12:12:37 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580), 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 535.085628] ? __lock_is_held+0xb6/0x140 [ 535.089687] ? __lock_is_held+0xb6/0x140 [ 535.093741] __should_failslab+0x121/0x190 [ 535.097976] should_failslab+0x9/0x14 [ 535.101791] kmem_cache_alloc+0x47/0x700 [ 535.105859] ? anon_vma_chain_link+0x154/0x1c0 [ 535.110449] anon_vma_clone+0xde/0x480 [ 535.114355] anon_vma_fork+0x8f/0x4a0 [ 535.118604] ? dup_userfaultfd+0x15e/0x6c0 [ 535.122855] ? memcpy+0x46/0x50 [ 535.130142] copy_process.part.0+0x34e5/0x7a30 [ 535.134769] ? __cleanup_sighand+0x70/0x70 [ 535.139004] ? lock_downgrade+0x810/0x810 [ 535.139030] ? kasan_check_write+0x14/0x20 [ 535.139046] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 535.139064] _do_fork+0x257/0xfd0 [ 535.152258] ? fork_idle+0x1d0/0x1d0 [ 535.152275] ? fput+0x128/0x1a0 [ 535.152293] ? ksys_write+0x1f1/0x2d0 [ 535.166522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 535.171302] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 535.176073] ? do_syscall_64+0x26/0x620 [ 535.180061] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.185440] ? do_syscall_64+0x26/0x620 [ 535.189437] __x64_sys_clone+0xbf/0x150 [ 535.193428] do_syscall_64+0xfd/0x620 [ 535.197249] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.202444] RIP: 0033:0x459829 [ 535.205651] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 535.224566] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 12:12:38 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0xfffffffffffffffc) connect$caif(r0, &(0x7f0000000000), 0x1) 12:12:38 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 535.232292] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 535.239569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 535.246852] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 535.254138] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 535.261423] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000180)={'broute\x00', 0x0, 0x4, 0x72, [], 0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=""/114}, &(0x7f0000000200)=0x78) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x101000, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000340)={0x100000001, 0x6, 0x0, 0x8e18000, 0x3, 0xfffffffffffffffc, 0x58a, 0x3, 0x100000001, 0x10000, 0x7fffffff}, 0xb) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x800, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendto$inet(r0, 0x0, 0x0, 0x8800, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xc) process_vm_readv(r3, &(0x7f0000001400)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1, &(0x7f0000001ac0)=[{&(0x7f0000001440)=""/54, 0x36}, {&(0x7f0000001480)=""/140, 0x8c}, {&(0x7f0000001540)=""/247, 0xf7}, {&(0x7f0000001640)=""/89, 0x59}, {&(0x7f00000016c0)=""/41, 0x29}, {&(0x7f0000001700)=""/215, 0xd7}, {&(0x7f0000001800)=""/5, 0x5}, {&(0x7f0000001840)=""/189, 0xbd}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f00000019c0)=""/222, 0xde}], 0xa, 0x0) 12:12:38 executing program 4 (fault-call:6 fault-nth:39): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 535.558806] FAULT_INJECTION: forcing a failure. [ 535.558806] name failslab, interval 1, probability 0, space 0, times 0 [ 535.575715] CPU: 0 PID: 26338 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 535.582851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.592213] Call Trace: [ 535.594824] dump_stack+0x172/0x1f0 [ 535.598471] should_fail.cold+0xa/0x1b [ 535.602373] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 535.607490] ? lock_downgrade+0x810/0x810 [ 535.611644] __should_failslab+0x121/0x190 [ 535.615871] should_failslab+0x9/0x14 [ 535.619656] kmem_cache_alloc+0x2ae/0x700 [ 535.623788] ? anon_vma_clone+0x320/0x480 [ 535.627936] anon_vma_fork+0x1ea/0x4a0 [ 535.631907] ? dup_userfaultfd+0x15e/0x6c0 [ 535.636128] copy_process.part.0+0x34e5/0x7a30 [ 535.640706] ? __cleanup_sighand+0x70/0x70 [ 535.644946] ? lock_downgrade+0x810/0x810 [ 535.649091] ? kasan_check_write+0x14/0x20 [ 535.653314] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 535.658150] _do_fork+0x257/0xfd0 [ 535.661585] ? fork_idle+0x1d0/0x1d0 [ 535.665283] ? fput+0x128/0x1a0 [ 535.668550] ? ksys_write+0x1f1/0x2d0 [ 535.672336] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 535.677075] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 535.681815] ? do_syscall_64+0x26/0x620 [ 535.685771] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.691132] ? do_syscall_64+0x26/0x620 [ 535.695109] __x64_sys_clone+0xbf/0x150 [ 535.699081] do_syscall_64+0xfd/0x620 [ 535.702881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.708062] RIP: 0033:0x459829 [ 535.711258] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 535.730147] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 535.737854] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 535.745107] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 535.752371] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 535.759635] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 535.766896] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000000000000600000001000000000000000000813a66477ab205637a000000000000000000000000000000000000000000000000000000000000000000000600"/113]) 12:12:38 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xbc01000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:38 executing program 4 (fault-call:6 fault-nth:40): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:38 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:38 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x107}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 536.008790] FAULT_INJECTION: forcing a failure. [ 536.008790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 536.049397] CPU: 0 PID: 26353 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 536.056462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.065819] Call Trace: [ 536.068432] dump_stack+0x172/0x1f0 [ 536.072088] should_fail.cold+0xa/0x1b [ 536.075995] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 536.081120] ? __might_sleep+0x95/0x190 [ 536.085114] __alloc_pages_nodemask+0x1ee/0x750 [ 536.089798] ? save_stack+0xa9/0xd0 [ 536.093441] ? __alloc_pages_slowpath+0x2870/0x2870 [ 536.098471] ? copy_process.part.0+0x34e5/0x7a30 [ 536.103247] ? mark_held_locks+0x100/0x100 [ 536.107495] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 536.113054] alloc_pages_current+0x107/0x210 [ 536.117481] pte_alloc_one+0x1b/0x1a0 [ 536.121297] __pte_alloc+0x2a/0x360 [ 536.124948] copy_page_range+0x151f/0x1f90 [ 536.129197] ? anon_vma_fork+0x371/0x4a0 [ 536.133308] ? find_held_lock+0x35/0x130 [ 536.137381] ? anon_vma_fork+0x371/0x4a0 [ 536.141462] ? vma_compute_subtree_gap+0x158/0x230 12:12:38 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:38 executing program 1: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000680)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, {0xa, 0x0, 0x0, @mcast2}}}, 0x48) [ 536.146408] ? vma_gap_callbacks_rotate+0x62/0x80 [ 536.151274] ? pmd_alloc+0x180/0x180 [ 536.155004] ? __vma_link_rb+0x279/0x370 [ 536.159111] copy_process.part.0+0x543d/0x7a30 [ 536.163734] ? __cleanup_sighand+0x70/0x70 [ 536.169482] ? lock_downgrade+0x810/0x810 [ 536.173653] ? kasan_check_write+0x14/0x20 [ 536.177909] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 536.182772] _do_fork+0x257/0xfd0 [ 536.186246] ? fork_idle+0x1d0/0x1d0 [ 536.189975] ? fput+0x128/0x1a0 [ 536.193271] ? ksys_write+0x1f1/0x2d0 [ 536.197093] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 536.201863] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 536.206639] ? do_syscall_64+0x26/0x620 [ 536.210630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.216009] ? do_syscall_64+0x26/0x620 [ 536.220018] __x64_sys_clone+0xbf/0x150 [ 536.223986] do_syscall_64+0xfd/0x620 [ 536.227774] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.232949] RIP: 0033:0x459829 [ 536.236125] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 536.255012] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 536.262708] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 536.269966] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 536.277218] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 536.284469] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 536.291720] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:39 executing program 4 (fault-call:6 fault-nth:41): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:39 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_PIT2(0xffffffffffffffff, 0x4070aea0, &(0x7f00000004c0)={[{}, {0x0, 0xffffffffd927d9bc, 0x0, 0x0, 0x0, 0x0, 0x62c, 0x0, 0x0, 0x0, 0xffffffff}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[]}}, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000008c0)={{{@in6=@dev, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000580)={[0x0, 0x8969]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x2, 0x4, 0x4, 0x7}, {0x0, 0x10001, 0xfffffffffffffff8, 0x9}, {0x401, 0x1, 0x7fffffff, 0x4}]}, 0x10) [ 536.481288] FAULT_INJECTION: forcing a failure. [ 536.481288] name failslab, interval 1, probability 0, space 0, times 0 [ 536.503285] CPU: 1 PID: 26380 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 536.510345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.519703] Call Trace: [ 536.519729] dump_stack+0x172/0x1f0 [ 536.519753] should_fail.cold+0xa/0x1b [ 536.525949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 536.525965] ? lock_downgrade+0x810/0x810 [ 536.525993] __should_failslab+0x121/0x190 [ 536.526011] should_failslab+0x9/0x14 [ 536.526022] kmem_cache_alloc+0x2ae/0x700 [ 536.526040] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 536.535011] ptlock_alloc+0x20/0x70 [ 536.543355] pte_alloc_one+0x6d/0x1a0 [ 536.543369] __pte_alloc+0x2a/0x360 [ 536.543386] copy_page_range+0x151f/0x1f90 [ 536.543398] ? anon_vma_fork+0x371/0x4a0 [ 536.543417] ? find_held_lock+0x35/0x130 12:12:39 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}], 0x1}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:39 executing program 1: lstat(0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x180, 0x0) ioctl$VT_RELDISP(r0, 0x5605) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) r2 = shmat(r1, &(0x7f0000fea000/0x3000)=nil, 0x7000) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffa000/0x1000)=nil) shmdt(r2) [ 536.556883] ? anon_vma_fork+0x371/0x4a0 [ 536.556907] ? vma_compute_subtree_gap+0x158/0x230 [ 536.556925] ? vma_gap_callbacks_rotate+0x62/0x80 [ 536.556945] ? pmd_alloc+0x180/0x180 [ 536.556964] ? __vma_link_rb+0x279/0x370 [ 536.564371] copy_process.part.0+0x543d/0x7a30 [ 536.564410] ? __cleanup_sighand+0x70/0x70 [ 536.564421] ? lock_downgrade+0x810/0x810 [ 536.564445] ? kasan_check_write+0x14/0x20 [ 536.564461] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 536.564480] _do_fork+0x257/0xfd0 [ 536.610763] ? fork_idle+0x1d0/0x1d0 [ 536.610778] ? fput+0x128/0x1a0 [ 536.610795] ? ksys_write+0x1f1/0x2d0 [ 536.619164] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 536.619177] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 536.619194] ? do_syscall_64+0x26/0x620 [ 536.651636] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.657002] ? do_syscall_64+0x26/0x620 [ 536.661012] __x64_sys_clone+0xbf/0x150 [ 536.664984] do_syscall_64+0xfd/0x620 [ 536.668779] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.673952] RIP: 0033:0x459829 [ 536.677128] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 536.696013] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 536.703705] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 536.710957] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 536.718218] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 536.725480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 536.732736] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xff00000000000000}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:39 executing program 4 (fault-call:6 fault-nth:42): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:39 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}], 0x1}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:39 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x300}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:39 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x10, 0x20000003}, 0x3c) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x75, "cee36b1a56315983abcdd01742d693a5e1d25fdcca606762da9d28fc5697653435953038d766f4f1e3b6cfc18da929854fde8d8e37101c003b90efcffc21751a96717c508f8b44d2b66194d6f399d93349c86f4f7f0ed59233d4a773274f156ed93a5112174549bdf287d0ec0efef9f8cb79797282"}, &(0x7f0000000180)=0x7d) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r1, 0x1000}, 0x8) [ 537.057448] FAULT_INJECTION: forcing a failure. [ 537.057448] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 537.089389] CPU: 1 PID: 26409 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 537.096460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.105828] Call Trace: [ 537.108428] dump_stack+0x172/0x1f0 [ 537.112070] should_fail.cold+0xa/0x1b [ 537.115979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 537.121124] ? __might_sleep+0x95/0x190 [ 537.125108] __alloc_pages_nodemask+0x1ee/0x750 [ 537.129784] ? __lock_is_held+0xb6/0x140 [ 537.133853] ? __alloc_pages_slowpath+0x2870/0x2870 [ 537.138869] ? find_held_lock+0x35/0x130 [ 537.142917] ? find_held_lock+0x35/0x130 [ 537.146983] ? copy_page_range+0x124f/0x1f90 [ 537.151396] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 12:12:39 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x5, 0x8}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r2 = getegid() fchown(r0, r1, r2) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x800, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000180)=[@in6={0xa, 0x4e23, 0x2f2f, @mcast1, 0x1f}], 0x1c) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@fat=@errors_continue='errors=continue'}]}) r4 = open(&(0x7f0000000080)='./file0\x00', 0x10040, 0x100) openat$cgroup_type(r4, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) [ 537.156948] alloc_pages_current+0x107/0x210 [ 537.161368] pte_alloc_one+0x1b/0x1a0 [ 537.165182] __pte_alloc+0x2a/0x360 [ 537.168818] copy_page_range+0x151f/0x1f90 [ 537.168833] ? anon_vma_fork+0x371/0x4a0 [ 537.168875] ? pmd_alloc+0x180/0x180 [ 537.177156] ? __vma_link_rb+0x279/0x370 [ 537.177179] copy_process.part.0+0x543d/0x7a30 [ 537.177216] ? __cleanup_sighand+0x70/0x70 [ 537.177228] ? lock_downgrade+0x810/0x810 [ 537.177250] ? kasan_check_write+0x14/0x20 [ 537.177267] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 537.177285] _do_fork+0x257/0xfd0 [ 537.177301] ? fork_idle+0x1d0/0x1d0 [ 537.177318] ? fput+0x128/0x1a0 [ 537.210514] ? ksys_write+0x1f1/0x2d0 [ 537.210533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.210551] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.210563] ? do_syscall_64+0x26/0x620 [ 537.210574] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.210585] ? do_syscall_64+0x26/0x620 [ 537.210600] __x64_sys_clone+0xbf/0x150 [ 537.217781] do_syscall_64+0xfd/0x620 [ 537.217803] entry_SYSCALL_64_after_hwframe+0x49/0xbe 12:12:40 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}], 0x1}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 537.217814] RIP: 0033:0x459829 [ 537.217830] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.229087] FAT-fs (loop1): bogus number of reserved sectors [ 537.231099] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 537.231118] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 12:12:40 executing program 4 (fault-call:6 fault-nth:43): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 537.231126] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 537.231135] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 537.231144] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 537.231152] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 537.292700] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:40 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 537.377490] FAT-fs (loop1): bogus number of reserved sectors [ 537.392446] FAT-fs (loop1): Can't find a valid FAT filesystem 12:12:40 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:40 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="441f080300000000c94ee06491ee54be0e1c20749727c1c6fe76cef3e2", 0x30) sendto$inet(r0, &(0x7f00000001c0)="12b77e937e3eaa88e3aeccf320c1392fbb7d492e42447924891732cf73cd990bfdf8735cdf008caf6709f7ecd682aff75e43bf1288db8ba099e1cfe381440d003fdb0f98a9d978fda0d61b1f0822a7c4a1d5a64ed4b62e488b324996275eee749de7e9110ac0c6582bae3aa69159f7273f0f2388ea6d90c65ea21225a8a95daa4b7020ac9e", 0x85, 0x40, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast1}, &(0x7f0000000080)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000180)={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, r1}, 0xc) [ 537.551482] FAULT_INJECTION: forcing a failure. [ 537.551482] name failslab, interval 1, probability 0, space 0, times 0 [ 537.568289] CPU: 0 PID: 26444 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 537.575345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.584703] Call Trace: [ 537.587305] dump_stack+0x172/0x1f0 [ 537.590940] should_fail.cold+0xa/0x1b [ 537.594828] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 537.599937] ? lock_downgrade+0x810/0x810 [ 537.604097] __should_failslab+0x121/0x190 [ 537.608353] should_failslab+0x9/0x14 [ 537.612162] kmem_cache_alloc+0x2ae/0x700 [ 537.616321] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 537.621872] ptlock_alloc+0x20/0x70 [ 537.625509] pte_alloc_one+0x6d/0x1a0 [ 537.629323] __pte_alloc+0x2a/0x360 [ 537.632966] copy_page_range+0x151f/0x1f90 [ 537.637205] ? anon_vma_fork+0x371/0x4a0 [ 537.641299] ? pmd_alloc+0x180/0x180 [ 537.645107] ? __vma_link_rb+0x279/0x370 [ 537.649259] copy_process.part.0+0x543d/0x7a30 [ 537.653848] ? __cleanup_sighand+0x70/0x70 [ 537.658067] ? lock_downgrade+0x810/0x810 [ 537.662205] ? kasan_check_write+0x14/0x20 [ 537.666431] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 537.671265] _do_fork+0x257/0xfd0 [ 537.674707] ? fork_idle+0x1d0/0x1d0 [ 537.678409] ? fput+0x128/0x1a0 [ 537.681693] ? ksys_write+0x1f1/0x2d0 [ 537.685484] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.690225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 537.694966] ? do_syscall_64+0x26/0x620 [ 537.698928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.704274] ? do_syscall_64+0x26/0x620 [ 537.708234] __x64_sys_clone+0xbf/0x150 [ 537.712195] do_syscall_64+0xfd/0x620 [ 537.715996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.721180] RIP: 0033:0x459829 [ 537.724359] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.743244] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 537.750936] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 537.758192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 537.765447] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 537.772701] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 537.779956] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x2}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:40 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:40 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x701}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:40 executing program 4 (fault-call:6 fault-nth:44): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:40 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) clone(0x2a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) 12:12:40 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 538.034761] FAULT_INJECTION: forcing a failure. [ 538.034761] name failslab, interval 1, probability 0, space 0, times 0 [ 538.048429] CPU: 0 PID: 26470 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 538.055475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.064838] Call Trace: [ 538.067452] dump_stack+0x172/0x1f0 [ 538.071106] should_fail.cold+0xa/0x1b [ 538.075029] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.080148] ? lock_downgrade+0x810/0x810 [ 538.084323] __should_failslab+0x121/0x190 [ 538.088572] should_failslab+0x9/0x14 [ 538.092386] kmem_cache_alloc+0x2ae/0x700 [ 538.096543] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 538.101570] ? __vm_enough_memory+0x324/0x5a0 [ 538.106078] vm_area_dup+0x21/0x170 [ 538.109715] copy_process.part.0+0x3407/0x7a30 [ 538.114335] ? __cleanup_sighand+0x70/0x70 [ 538.118577] ? lock_downgrade+0x810/0x810 [ 538.122729] ? kasan_check_write+0x14/0x20 [ 538.126956] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 538.131787] _do_fork+0x257/0xfd0 [ 538.135230] ? fork_idle+0x1d0/0x1d0 [ 538.138927] ? fput+0x128/0x1a0 [ 538.142191] ? ksys_write+0x1f1/0x2d0 [ 538.145978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.150716] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.155457] ? do_syscall_64+0x26/0x620 [ 538.159413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.164757] ? do_syscall_64+0x26/0x620 [ 538.168715] __x64_sys_clone+0xbf/0x150 [ 538.172675] do_syscall_64+0xfd/0x620 [ 538.176459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.181637] RIP: 0033:0x459829 [ 538.184823] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.203770] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 538.211464] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 538.218716] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 538.225970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 12:12:41 executing program 4 (fault-call:6 fault-nth:45): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 538.233220] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 538.240470] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:41 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd, 0x80001) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000280)={0x102, 0x1}) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x1d, r1}, 0x10, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="0700000001000000ff03000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r2, @ANYRES64=r3/1000+10000, @ANYBLOB="0200000001000000000000fe1291adbd628f81a00d01000076f976d6e5c0799590488d728652300db76ad4f2be385b2e6a0c42f460f1ed777555dd7727ed01a1d480c4a3bf978e8e325d7da1656ed1c9"], 0x80}, 0x1, 0x0, 0x0, 0x4008841}, 0x4000800) 12:12:41 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b6b6b00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 538.368339] FAULT_INJECTION: forcing a failure. [ 538.368339] name failslab, interval 1, probability 0, space 0, times 0 [ 538.388848] usb usb3: check_ctrlrecip: process 26486 (syz-executor.1) requesting ep 01 but needs 81 [ 538.393389] CPU: 1 PID: 26483 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 538.405203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.414565] Call Trace: [ 538.417165] dump_stack+0x172/0x1f0 [ 538.419108] usb usb3: usbfs: process 26486 (syz-executor.1) did not claim interface 0 before use [ 538.420806] should_fail.cold+0xa/0x1b [ 538.420822] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.420834] ? lock_downgrade+0x810/0x810 [ 538.420857] __should_failslab+0x121/0x190 [ 538.420873] should_failslab+0x9/0x14 [ 538.420885] kmem_cache_alloc+0x2ae/0x700 [ 538.420898] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 538.420916] ? __vm_enough_memory+0x324/0x5a0 [ 538.440815] usb usb3: check_ctrlrecip: process 26486 (syz-executor.1) requesting ep 01 but needs 81 [ 538.442956] vm_area_dup+0x21/0x170 [ 538.442975] copy_process.part.0+0x3407/0x7a30 [ 538.443019] ? __cleanup_sighand+0x70/0x70 [ 538.443030] ? lock_downgrade+0x810/0x810 [ 538.443061] ? kasan_check_write+0x14/0x20 [ 538.448741] usb usb3: usbfs: process 26486 (syz-executor.1) did not claim interface 0 before use [ 538.451172] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 538.451195] _do_fork+0x257/0xfd0 [ 538.512054] ? fork_idle+0x1d0/0x1d0 [ 538.515768] ? fput+0x128/0x1a0 [ 538.519051] ? ksys_write+0x1f1/0x2d0 [ 538.522852] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.527595] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.532347] ? do_syscall_64+0x26/0x620 [ 538.536317] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.541664] ? do_syscall_64+0x26/0x620 [ 538.545633] __x64_sys_clone+0xbf/0x150 [ 538.549609] do_syscall_64+0xfd/0x620 [ 538.553412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.558598] RIP: 0033:0x459829 [ 538.561773] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.580675] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 538.588385] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 538.595652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 538.602929] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 538.610189] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 12:12:41 executing program 1: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/policy\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000640)={0x1, 0x0, {0x1a5, 0x20, 0x4, 0x4}}) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x3, 0x41323151, 0x2, @stepwise={0x401, 0x0, 0x80000001, 0x1f, 0x2000000000, 0x401}}) accept$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000005c0)=0x14) sendto(r0, &(0x7f0000000780)="47f7879c932d4f431f9efab0aa875fe369ddfd8ad6de0612e4388101d57ad791d9032df5e3fc4b11389dcbaf8e30c131014f8125ba4f324da3d46b3f472f9c59a705ac66e19f21fe38f28345771762f6fdfa8e0cd4eb11def3f1b58dcb36b885c0467bc76c1144febd4c900e1358096d0a9d5aa788348f3da9c77a4e37b293b963f2ed134bdcd8847c9a0acc5221ea50a10d3bad45f7455936", 0x99, 0x40000, &(0x7f0000000840)=@can={0x1d, r1}, 0x80) ioctl$PPPIOCGIDLE(r0, 0x8010743f, 0x0) r2 = socket$netlink(0x10, 0x3, 0xa) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) r4 = getuid() syz_mount_image$xfs(&(0x7f0000000180)='xfs\x00', &(0x7f0000000200)='./file0/file0\x00', 0x5, 0x3, &(0x7f0000000380)=[{&(0x7f0000000240)="99a1b20d3fe3b5ffc4f202", 0xb, 0x9}, {&(0x7f0000000280)="c01f546208aeae5f7b4a7ae39d16e630de1236651e6efa04de5dbe71ce352bec99f7fd5306315ab49a2297fc6d5420a2b890405f75da3f25d19bb5f229dbe92240345b5dcb05d80acf9189836dced2646f85949fc7c02bfba4343cb083f7589ac99b75067f08073f3b19d1fc0f3b8c5aaf0b32b437239fdd9855848682bd2e049c5e50fbe4f87bd56a2ba237a54ef258644a5675e28ddf31e4ee", 0x9a, 0x29}, {&(0x7f0000000340)="0ee91d3a463db54aa64817c2730bf6303e6e585adcda53", 0x17, 0x40}], 0x2000000, &(0x7f0000000680)=ANY=[@ANYBLOB='inode64,nodiscard,pqnoenforce,filestreams,bsdgroups,gqnoenforce,audit,func=BPRM_CHECK,uid<', @ANYRESDEC=r3, @ANYBLOB=',dont_hash,dont_appraise,pcr=00000000000000000045,uid=', @ANYRESDEC=r4, @ANYBLOB="8a701f163eb6fc5e43513edd00"]) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x83416b23f0aedc5d, &(0x7f0000000580)={&(0x7f00000005c0)=ANY=[], 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1010442}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x68}, 0x20004013) 12:12:41 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 538.617534] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x3}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:41 executing program 4 (fault-call:6 fault-nth:46): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:41 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 538.812531] audit: type=1400 audit(1566475961.616:119): avc: denied { create } for pid=26494 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 538.892804] audit: type=1400 audit(1566475961.696:120): avc: denied { write } for pid=26494 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 12:12:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x900}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:41 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 539.027486] FAULT_INJECTION: forcing a failure. [ 539.027486] name failslab, interval 1, probability 0, space 0, times 0 12:12:41 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000280)=""/24, 0x18}], 0x1}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 539.087009] CPU: 1 PID: 26509 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 539.094066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.103440] Call Trace: [ 539.106035] dump_stack+0x172/0x1f0 [ 539.109682] should_fail.cold+0xa/0x1b [ 539.113937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 539.119044] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 539.125367] __should_failslab+0x121/0x190 [ 539.129596] should_failslab+0x9/0x14 [ 539.133379] kmem_cache_alloc+0x47/0x700 [ 539.137427] ? anon_vma_chain_link+0x154/0x1c0 [ 539.142002] anon_vma_clone+0xde/0x480 [ 539.145892] anon_vma_fork+0x8f/0x4a0 [ 539.149673] ? dup_userfaultfd+0x15e/0x6c0 [ 539.153891] ? memcpy+0x46/0x50 [ 539.157157] copy_process.part.0+0x34e5/0x7a30 [ 539.161841] ? __cleanup_sighand+0x70/0x70 [ 539.166057] ? lock_downgrade+0x810/0x810 [ 539.170192] ? kasan_check_write+0x14/0x20 [ 539.174422] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 539.179251] _do_fork+0x257/0xfd0 [ 539.182689] ? fork_idle+0x1d0/0x1d0 [ 539.186384] ? fput+0x128/0x1a0 [ 539.189645] ? ksys_write+0x1f1/0x2d0 [ 539.193430] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 539.198178] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 539.202918] ? do_syscall_64+0x26/0x620 [ 539.206877] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.212238] ? do_syscall_64+0x26/0x620 [ 539.216202] __x64_sys_clone+0xbf/0x150 [ 539.220160] do_syscall_64+0xfd/0x620 [ 539.223943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.229230] RIP: 0033:0x459829 [ 539.232405] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.251329] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 539.259034] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 539.266299] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 539.273552] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 539.280818] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 539.288088] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:42 executing program 4 (fault-call:6 fault-nth:47): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:42 executing program 1: r0 = socket(0x10, 0x2, 0xc) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write(r0, 0x0, 0x0) socket(0x0, 0x0, 0x0) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) 12:12:42 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 539.492541] FAULT_INJECTION: forcing a failure. [ 539.492541] name failslab, interval 1, probability 0, space 0, times 0 [ 539.504526] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 539.523522] CPU: 0 PID: 26537 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 539.530565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.539922] Call Trace: 12:12:42 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{0x0}, {&(0x7f0000000280)=""/24, 0x18}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 539.542525] dump_stack+0x172/0x1f0 [ 539.546158] should_fail.cold+0xa/0x1b [ 539.550059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 539.555175] ? __lock_is_held+0xb6/0x140 [ 539.559256] __should_failslab+0x121/0x190 [ 539.563507] should_failslab+0x9/0x14 [ 539.567313] kmem_cache_alloc+0x47/0x700 [ 539.571382] ? anon_vma_chain_link+0x154/0x1c0 [ 539.575977] anon_vma_clone+0xde/0x480 [ 539.579885] anon_vma_fork+0x8f/0x4a0 [ 539.583693] ? dup_userfaultfd+0x15e/0x6c0 [ 539.587935] ? memcpy+0x46/0x50 [ 539.591223] copy_process.part.0+0x34e5/0x7a30 [ 539.595840] ? __cleanup_sighand+0x70/0x70 [ 539.600082] ? lock_downgrade+0x810/0x810 [ 539.604251] ? kasan_check_write+0x14/0x20 [ 539.608488] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 539.613336] _do_fork+0x257/0xfd0 [ 539.616795] ? fork_idle+0x1d0/0x1d0 [ 539.620502] ? fput+0x128/0x1a0 [ 539.623766] ? ksys_write+0x1f1/0x2d0 [ 539.627553] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 539.632303] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 539.637061] ? do_syscall_64+0x26/0x620 [ 539.641036] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.646399] ? do_syscall_64+0x26/0x620 [ 539.650358] __x64_sys_clone+0xbf/0x150 [ 539.654335] do_syscall_64+0xfd/0x620 [ 539.658142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.663323] RIP: 0033:0x459829 [ 539.666500] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.685387] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 12:12:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, 0x0, 0x0, 0x0) [ 539.693078] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 539.700331] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 539.707580] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 539.714837] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 539.722104] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x6400}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x7}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:42 executing program 4 (fault-call:6 fault-nth:48): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:42 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:42 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{0x0}, {&(0x7f0000000280)=""/24, 0x18}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:42 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000280)='.\x00', 0x1a6) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) splice(r1, 0x0, r0, 0x0, 0x39, 0x0) [ 539.995242] FAULT_INJECTION: forcing a failure. [ 539.995242] name failslab, interval 1, probability 0, space 0, times 0 [ 540.034457] CPU: 0 PID: 26561 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 540.041522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.050877] Call Trace: [ 540.053480] dump_stack+0x172/0x1f0 [ 540.057128] should_fail.cold+0xa/0x1b [ 540.061036] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 540.066152] ? lock_downgrade+0x810/0x810 [ 540.071717] __should_failslab+0x121/0x190 [ 540.075970] should_failslab+0x9/0x14 [ 540.079783] kmem_cache_alloc+0x2ae/0x700 [ 540.083940] ? anon_vma_clone+0x320/0x480 [ 540.088101] anon_vma_fork+0xfc/0x4a0 [ 540.091914] ? dup_userfaultfd+0x15e/0x6c0 [ 540.096161] ? memcpy+0x46/0x50 [ 540.099457] copy_process.part.0+0x34e5/0x7a30 [ 540.104073] ? __cleanup_sighand+0x70/0x70 [ 540.108314] ? lock_downgrade+0x810/0x810 [ 540.112480] ? kasan_check_write+0x14/0x20 [ 540.118463] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 540.123319] _do_fork+0x257/0xfd0 [ 540.126782] ? fork_idle+0x1d0/0x1d0 [ 540.130501] ? fput+0x128/0x1a0 [ 540.133789] ? ksys_write+0x1f1/0x2d0 [ 540.137604] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 540.142367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 540.147137] ? do_syscall_64+0x26/0x620 [ 540.151109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.156457] ? do_syscall_64+0x26/0x620 [ 540.160418] __x64_sys_clone+0xbf/0x150 [ 540.164391] do_syscall_64+0xfd/0x620 [ 540.168748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.173931] RIP: 0033:0x459829 [ 540.177120] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 540.196010] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 540.203719] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 540.211012] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 540.218280] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 540.225544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 540.232816] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:43 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{0x0}, {&(0x7f0000000280)=""/24, 0x18}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:43 executing program 4 (fault-call:6 fault-nth:49): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:43 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 540.401524] FAULT_INJECTION: forcing a failure. [ 540.401524] name failslab, interval 1, probability 0, space 0, times 0 [ 540.413577] CPU: 0 PID: 26580 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 540.420619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.429983] Call Trace: [ 540.432580] dump_stack+0x172/0x1f0 [ 540.436212] should_fail.cold+0xa/0x1b [ 540.440099] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 540.445221] ? lock_downgrade+0x810/0x810 [ 540.449458] __should_failslab+0x121/0x190 [ 540.453696] should_failslab+0x9/0x14 [ 540.457489] kmem_cache_alloc+0x2ae/0x700 [ 540.461629] ? anon_vma_clone+0x320/0x480 [ 540.465789] anon_vma_fork+0x1ea/0x4a0 [ 540.469685] ? dup_userfaultfd+0x15e/0x6c0 [ 540.473918] copy_process.part.0+0x34e5/0x7a30 [ 540.478508] ? __cleanup_sighand+0x70/0x70 [ 540.482745] ? lock_downgrade+0x810/0x810 [ 540.486909] ? kasan_check_write+0x14/0x20 [ 540.491145] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 540.495982] _do_fork+0x257/0xfd0 [ 540.499425] ? fork_idle+0x1d0/0x1d0 [ 540.503135] ? fput+0x128/0x1a0 [ 540.506425] ? ksys_write+0x1f1/0x2d0 [ 540.510226] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 540.514972] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 540.519721] ? do_syscall_64+0x26/0x620 [ 540.523702] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.529072] ? do_syscall_64+0x26/0x620 [ 540.533121] __x64_sys_clone+0xbf/0x150 [ 540.537185] do_syscall_64+0xfd/0x620 [ 540.540981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.546165] RIP: 0033:0x459829 [ 540.549358] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 540.568257] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 540.575970] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 540.583236] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 540.590510] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 12:12:43 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 540.597769] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 540.605038] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:43 executing program 4 (fault-call:6 fault-nth:50): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000500)="11dca50d5e0bcfe47bf070") clone(0x1fffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:12:43 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 540.757669] FAULT_INJECTION: forcing a failure. [ 540.757669] name fail_page_alloc, interval 1, probability 0, space 0, times 0 12:12:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x8}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:43 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 540.799283] CPU: 0 PID: 26596 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 540.806350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.815714] Call Trace: [ 540.818329] dump_stack+0x172/0x1f0 [ 540.821980] should_fail.cold+0xa/0x1b [ 540.825884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 540.831009] ? __might_sleep+0x95/0x190 [ 540.835003] __alloc_pages_nodemask+0x1ee/0x750 [ 540.839684] ? save_stack+0xa9/0xd0 [ 540.843329] ? __alloc_pages_slowpath+0x2870/0x2870 [ 540.848351] ? copy_process.part.0+0x34e5/0x7a30 [ 540.853102] ? mark_held_locks+0x100/0x100 [ 540.857337] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 540.862866] alloc_pages_current+0x107/0x210 [ 540.867267] pte_alloc_one+0x1b/0x1a0 [ 540.871071] __pte_alloc+0x2a/0x360 [ 540.874711] copy_page_range+0x151f/0x1f90 [ 540.878942] ? anon_vma_fork+0x371/0x4a0 [ 540.882993] ? find_held_lock+0x35/0x130 [ 540.887048] ? anon_vma_fork+0x371/0x4a0 [ 540.891114] ? lock_downgrade+0x810/0x810 [ 540.895265] ? pmd_alloc+0x180/0x180 [ 540.898973] ? __vma_link_rb+0x279/0x370 [ 540.903026] copy_process.part.0+0x543d/0x7a30 [ 540.907661] ? __cleanup_sighand+0x70/0x70 [ 540.911885] ? lock_downgrade+0x810/0x810 [ 540.916030] ? kasan_check_write+0x14/0x20 [ 540.920258] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 540.925109] _do_fork+0x257/0xfd0 [ 540.928566] ? fork_idle+0x1d0/0x1d0 [ 540.932270] ? fput+0x128/0x1a0 [ 540.935539] ? ksys_write+0x1f1/0x2d0 [ 540.939331] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 540.944086] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 540.948841] ? do_syscall_64+0x26/0x620 [ 540.952806] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.958156] ? do_syscall_64+0x26/0x620 [ 540.962121] __x64_sys_clone+0xbf/0x150 [ 540.966103] do_syscall_64+0xfd/0x620 [ 540.969948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.975132] RIP: 0033:0x459829 [ 540.978319] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:12:43 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) [ 540.997215] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 541.004928] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 541.012241] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 541.019506] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 541.026769] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 541.034035] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:43 executing program 4 (fault-call:6 fault-nth:51): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:43 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 541.234354] FAULT_INJECTION: forcing a failure. [ 541.234354] name failslab, interval 1, probability 0, space 0, times 0 [ 541.255112] CPU: 0 PID: 26618 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 541.262165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.271531] Call Trace: [ 541.274140] dump_stack+0x172/0x1f0 [ 541.277872] should_fail.cold+0xa/0x1b [ 541.281783] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 541.286911] ? lock_downgrade+0x810/0x810 [ 541.291087] __should_failslab+0x121/0x190 [ 541.295341] should_failslab+0x9/0x14 [ 541.299150] kmem_cache_alloc+0x2ae/0x700 [ 541.303320] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 541.308877] ptlock_alloc+0x20/0x70 [ 541.312529] pte_alloc_one+0x6d/0x1a0 [ 541.316347] __pte_alloc+0x2a/0x360 [ 541.320076] copy_page_range+0x151f/0x1f90 [ 541.324321] ? anon_vma_fork+0x371/0x4a0 [ 541.328403] ? find_held_lock+0x35/0x130 12:12:44 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 541.332480] ? anon_vma_fork+0x371/0x4a0 [ 541.336558] ? lock_downgrade+0x810/0x810 [ 541.340816] ? pmd_alloc+0x180/0x180 [ 541.344545] ? __vma_link_rb+0x279/0x370 [ 541.348629] copy_process.part.0+0x543d/0x7a30 [ 541.353247] ? __cleanup_sighand+0x70/0x70 [ 541.357492] ? lock_downgrade+0x810/0x810 [ 541.361660] ? kasan_check_write+0x14/0x20 [ 541.365913] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 541.370761] _do_fork+0x257/0xfd0 [ 541.374219] ? fork_idle+0x1d0/0x1d0 [ 541.377936] ? fput+0x128/0x1a0 [ 541.381216] ? ksys_write+0x1f1/0x2d0 [ 541.385009] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 541.389752] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 541.394509] ? do_syscall_64+0x26/0x620 [ 541.398479] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.403830] ? do_syscall_64+0x26/0x620 [ 541.407792] __x64_sys_clone+0xbf/0x150 [ 541.411753] do_syscall_64+0xfd/0x620 [ 541.415552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.420787] RIP: 0033:0x459829 [ 541.423972] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 541.442865] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 541.450567] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 541.457835] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 541.465105] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 541.472364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 12:12:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x12fa88) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000), 0x4) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000600), 0x4) tkill(0x0, 0x1b) [ 541.479620] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:44 executing program 4 (fault-call:6 fault-nth:52): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:44 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 541.655621] FAULT_INJECTION: forcing a failure. [ 541.655621] name failslab, interval 1, probability 0, space 0, times 0 [ 541.675899] CPU: 0 PID: 26635 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 541.682947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.692399] Call Trace: [ 541.695008] dump_stack+0x172/0x1f0 [ 541.698661] should_fail.cold+0xa/0x1b [ 541.702592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 541.707711] ? lock_downgrade+0x810/0x810 [ 541.711878] __should_failslab+0x121/0x190 [ 541.716123] should_failslab+0x9/0x14 [ 541.719927] kmem_cache_alloc+0x2ae/0x700 [ 541.724084] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 541.729641] ptlock_alloc+0x20/0x70 [ 541.733275] pte_alloc_one+0x6d/0x1a0 [ 541.737083] __pte_alloc+0x2a/0x360 [ 541.740719] copy_page_range+0x151f/0x1f90 [ 541.744956] ? anon_vma_fork+0x371/0x4a0 [ 541.749027] ? find_held_lock+0x35/0x130 12:12:44 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) [ 541.753092] ? anon_vma_fork+0x371/0x4a0 [ 541.757167] ? lock_downgrade+0x810/0x810 [ 541.761325] ? pmd_alloc+0x180/0x180 [ 541.765043] ? __vma_link_rb+0x279/0x370 [ 541.769105] copy_process.part.0+0x543d/0x7a30 [ 541.773716] ? __cleanup_sighand+0x70/0x70 [ 541.778062] ? lock_downgrade+0x810/0x810 [ 541.782211] ? kasan_check_write+0x14/0x20 [ 541.786474] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 541.791309] _do_fork+0x257/0xfd0 [ 541.794809] ? fork_idle+0x1d0/0x1d0 [ 541.798525] ? fput+0x128/0x1a0 [ 541.801812] ? ksys_write+0x1f1/0x2d0 [ 541.805621] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 541.810375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 541.815219] ? do_syscall_64+0x26/0x620 [ 541.819194] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.824563] ? do_syscall_64+0x26/0x620 [ 541.828537] __x64_sys_clone+0xbf/0x150 [ 541.832503] do_syscall_64+0xfd/0x620 [ 541.836296] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.841471] RIP: 0033:0x459829 [ 541.844664] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 541.863576] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 541.871288] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 541.878631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 541.885887] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 541.893150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 12:12:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x10, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) dup(r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000005) r3 = dup3(r2, r1, 0x0) write$UHID_INPUT(r3, &(0x7f00000015c0)={0x8, "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", 0x1000}, 0x1006) fsetxattr(r2, &(0x7f0000000000)=@random={'user.', '/dev/ptmx\x00'}, &(0x7f0000000040)='/dev/ptmx\x00', 0xa, 0x2) [ 541.900456] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:44 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x7010000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x9}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:44 executing program 4 (fault-call:6 fault-nth:53): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:44 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:44 executing program 1: [ 542.135962] FAULT_INJECTION: forcing a failure. [ 542.135962] name failslab, interval 1, probability 0, space 0, times 0 [ 542.164181] CPU: 0 PID: 26659 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 542.171707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.181071] Call Trace: [ 542.183681] dump_stack+0x172/0x1f0 [ 542.187331] should_fail.cold+0xa/0x1b [ 542.191242] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 542.196366] ? find_held_lock+0x35/0x130 [ 542.200446] ? percpu_ref_put_many+0x94/0x190 [ 542.204963] __should_failslab+0x121/0x190 [ 542.209213] should_failslab+0x9/0x14 [ 542.213026] kmem_cache_alloc+0x47/0x700 [ 542.217098] ? __lock_is_held+0xb6/0x140 [ 542.221265] anon_vma_clone+0xde/0x480 [ 542.225173] anon_vma_fork+0x8f/0x4a0 [ 542.228991] ? dup_userfaultfd+0x15e/0x6c0 [ 542.233239] ? memcpy+0x46/0x50 [ 542.236541] copy_process.part.0+0x34e5/0x7a30 [ 542.241161] ? __cleanup_sighand+0x70/0x70 [ 542.245409] ? lock_downgrade+0x810/0x810 [ 542.249588] ? kasan_check_write+0x14/0x20 [ 542.253839] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 542.258699] _do_fork+0x257/0xfd0 [ 542.262166] ? fork_idle+0x1d0/0x1d0 [ 542.265890] ? fput+0x128/0x1a0 [ 542.269186] ? ksys_write+0x1f1/0x2d0 [ 542.273002] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 542.277767] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 542.282536] ? do_syscall_64+0x26/0x620 [ 542.286527] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.291906] ? do_syscall_64+0x26/0x620 [ 542.295896] __x64_sys_clone+0xbf/0x150 [ 542.299885] do_syscall_64+0xfd/0x620 [ 542.303707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.308906] RIP: 0033:0x459829 [ 542.312109] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 542.331029] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 542.339353] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 542.346727] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 542.354408] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 542.361687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 542.368966] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:45 executing program 1: 12:12:45 executing program 4 (fault-call:6 fault-nth:54): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:45 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:45 executing program 1: [ 542.586366] FAULT_INJECTION: forcing a failure. [ 542.586366] name failslab, interval 1, probability 0, space 0, times 0 [ 542.605573] CPU: 0 PID: 26674 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 542.612713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.622073] Call Trace: [ 542.624685] dump_stack+0x172/0x1f0 [ 542.628332] should_fail.cold+0xa/0x1b [ 542.632235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 542.637360] ? find_held_lock+0x35/0x130 [ 542.641441] ? percpu_ref_put_many+0x94/0x190 [ 542.645954] __should_failslab+0x121/0x190 [ 542.650206] should_failslab+0x9/0x14 [ 542.654022] kmem_cache_alloc+0x47/0x700 [ 542.658099] ? __lock_is_held+0xb6/0x140 [ 542.662183] anon_vma_clone+0xde/0x480 [ 542.666089] anon_vma_fork+0x8f/0x4a0 [ 542.669893] ? dup_userfaultfd+0x15e/0x6c0 [ 542.674132] ? memcpy+0x46/0x50 [ 542.677434] copy_process.part.0+0x34e5/0x7a30 [ 542.682054] ? __cleanup_sighand+0x70/0x70 12:12:45 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x8000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 542.686295] ? lock_downgrade+0x810/0x810 [ 542.690460] ? kasan_check_write+0x14/0x20 [ 542.694705] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 542.699560] _do_fork+0x257/0xfd0 [ 542.703017] ? fork_idle+0x1d0/0x1d0 [ 542.706723] ? fput+0x128/0x1a0 [ 542.709993] ? ksys_write+0x1f1/0x2d0 [ 542.713799] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 542.718562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 542.723325] ? do_syscall_64+0x26/0x620 [ 542.727297] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.732654] ? do_syscall_64+0x26/0x620 [ 542.736624] __x64_sys_clone+0xbf/0x150 [ 542.740595] do_syscall_64+0xfd/0x620 [ 542.744402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.749586] RIP: 0033:0x459829 [ 542.752766] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 542.771657] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 542.779356] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 542.786617] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 542.793890] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 542.801157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 542.808445] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:47 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:47 executing program 4 (fault-call:6 fault-nth:55): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:47 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x9000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:47 executing program 1: [ 545.026155] FAULT_INJECTION: forcing a failure. [ 545.026155] name failslab, interval 1, probability 0, space 0, times 0 [ 545.045429] CPU: 0 PID: 26690 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 545.052480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.061835] Call Trace: [ 545.061861] dump_stack+0x172/0x1f0 [ 545.061881] should_fail.cold+0xa/0x1b 12:12:47 executing program 1: [ 545.061900] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 545.061915] ? lock_downgrade+0x810/0x810 [ 545.061940] __should_failslab+0x121/0x190 [ 545.061956] should_failslab+0x9/0x14 [ 545.061969] kmem_cache_alloc+0x2ae/0x700 [ 545.061978] ? anon_vma_clone+0x320/0x480 [ 545.061999] anon_vma_fork+0x1ea/0x4a0 [ 545.062012] ? dup_userfaultfd+0x15e/0x6c0 [ 545.062031] copy_process.part.0+0x34e5/0x7a30 [ 545.062074] ? __cleanup_sighand+0x70/0x70 [ 545.062087] ? lock_downgrade+0x810/0x810 [ 545.062111] ? kasan_check_write+0x14/0x20 [ 545.062126] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 545.062146] _do_fork+0x257/0xfd0 [ 545.062164] ? fork_idle+0x1d0/0x1d0 [ 545.062178] ? fput+0x128/0x1a0 [ 545.062192] ? ksys_write+0x1f1/0x2d0 [ 545.062210] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 545.062224] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 545.062238] ? do_syscall_64+0x26/0x620 [ 545.062255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.164398] ? do_syscall_64+0x26/0x620 [ 545.168398] __x64_sys_clone+0xbf/0x150 [ 545.172399] do_syscall_64+0xfd/0x620 [ 545.176221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.181511] RIP: 0033:0x459829 [ 545.184717] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.203624] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 545.211345] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 545.218627] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 545.225908] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 545.233184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 545.240468] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:48 executing program 4 (fault-call:6 fault-nth:56): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:48 executing program 1: 12:12:48 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x200, 0x0) close(r0) [ 545.409900] FAULT_INJECTION: forcing a failure. [ 545.409900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 545.425796] CPU: 0 PID: 26712 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 545.432839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.442194] Call Trace: [ 545.444790] dump_stack+0x172/0x1f0 [ 545.448433] should_fail.cold+0xa/0x1b [ 545.452318] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 545.457428] ? __might_sleep+0x95/0x190 [ 545.461416] __alloc_pages_nodemask+0x1ee/0x750 [ 545.466103] ? __alloc_pages_slowpath+0x2870/0x2870 [ 545.471125] ? save_stack+0x45/0xd0 [ 545.474738] ? kasan_kmalloc+0xce/0xf0 [ 545.478622] ? kasan_slab_alloc+0xf/0x20 [ 545.482698] ? __lock_acquire+0x6ee/0x49c0 [ 545.486936] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 545.492492] alloc_pages_current+0x107/0x210 [ 545.496887] pte_alloc_one+0x1b/0x1a0 [ 545.500674] copy_huge_pmd+0x7d/0x670 [ 545.504472] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.510000] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.515522] copy_page_range+0x7a1/0x1f90 [ 545.519667] ? anon_vma_fork+0x371/0x4a0 [ 545.523731] ? find_held_lock+0x35/0x130 [ 545.527791] ? anon_vma_fork+0x371/0x4a0 [ 545.531862] ? vma_compute_subtree_gap+0x158/0x230 [ 545.536788] ? vma_gap_callbacks_rotate+0x62/0x80 [ 545.541614] ? pmd_alloc+0x180/0x180 [ 545.545321] ? __vma_link_rb+0x279/0x370 [ 545.549380] copy_process.part.0+0x543d/0x7a30 [ 545.554075] ? __cleanup_sighand+0x70/0x70 [ 545.558305] ? lock_downgrade+0x810/0x810 [ 545.562442] ? kasan_check_write+0x14/0x20 [ 545.566671] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 545.571508] _do_fork+0x257/0xfd0 [ 545.574947] ? fork_idle+0x1d0/0x1d0 [ 545.578653] ? fput+0x128/0x1a0 [ 545.581929] ? ksys_write+0x1f1/0x2d0 [ 545.585740] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 545.590490] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 545.595246] ? do_syscall_64+0x26/0x620 [ 545.599210] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.604566] ? do_syscall_64+0x26/0x620 [ 545.608537] __x64_sys_clone+0xbf/0x150 [ 545.612497] do_syscall_64+0xfd/0x620 [ 545.616287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.621460] RIP: 0033:0x459829 [ 545.624664] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.643566] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 545.651291] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 12:12:48 executing program 4 (fault-call:6 fault-nth:57): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 545.658609] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 545.665878] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 545.673151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 545.680427] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 545.794986] FAULT_INJECTION: forcing a failure. [ 545.794986] name failslab, interval 1, probability 0, space 0, times 0 [ 545.814762] CPU: 0 PID: 26721 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 545.821808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.831159] Call Trace: [ 545.833763] dump_stack+0x172/0x1f0 [ 545.837411] should_fail.cold+0xa/0x1b [ 545.841319] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 545.846434] ? lock_downgrade+0x810/0x810 [ 545.850598] __should_failslab+0x121/0x190 [ 545.854837] should_failslab+0x9/0x14 [ 545.858639] kmem_cache_alloc+0x2ae/0x700 [ 545.862799] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 545.868347] ptlock_alloc+0x20/0x70 [ 545.871978] pte_alloc_one+0x6d/0x1a0 [ 545.875787] copy_huge_pmd+0x7d/0x670 [ 545.879596] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.885140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 545.890693] copy_page_range+0x7a1/0x1f90 [ 545.894852] ? anon_vma_fork+0x371/0x4a0 [ 545.898918] ? find_held_lock+0x35/0x130 [ 545.902972] ? anon_vma_fork+0x371/0x4a0 [ 545.907036] ? vma_compute_subtree_gap+0x158/0x230 [ 545.911975] ? vma_gap_callbacks_rotate+0x62/0x80 [ 545.916825] ? pmd_alloc+0x180/0x180 [ 545.920550] ? __vma_link_rb+0x279/0x370 [ 545.924620] copy_process.part.0+0x543d/0x7a30 [ 545.929301] ? __cleanup_sighand+0x70/0x70 [ 545.933523] ? lock_downgrade+0x810/0x810 [ 545.937657] ? kasan_check_write+0x14/0x20 [ 545.941879] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 545.946715] _do_fork+0x257/0xfd0 [ 545.950158] ? fork_idle+0x1d0/0x1d0 [ 545.953855] ? fput+0x128/0x1a0 [ 545.957122] ? ksys_write+0x1f1/0x2d0 [ 545.960906] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 545.965644] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 545.970396] ? do_syscall_64+0x26/0x620 [ 545.974360] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.979720] ? do_syscall_64+0x26/0x620 [ 545.983678] __x64_sys_clone+0xbf/0x150 [ 545.987656] do_syscall_64+0xfd/0x620 [ 545.991445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.996624] RIP: 0033:0x459829 [ 545.999813] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 546.018696] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 546.026388] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 546.033642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 546.040908] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 546.048160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 546.055415] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:50 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:50 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x400401) fadvise64(r0, 0x0, 0x20fd, 0x2) r1 = memfd_create(&(0x7f00000001c0)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x3) mincore(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) fcntl$addseals(r1, 0x409, 0x5) r2 = fcntl$dupfd(r1, 0x0, r1) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) write$P9_RCREATE(r2, &(0x7f0000000000)={0x18, 0x73, 0x2, {{0x4, 0x0, 0x1}, 0x3}}, 0x18) 12:12:50 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x10000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:50 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:50 executing program 4 (fault-call:6 fault-nth:58): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x64}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x800000002, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x1000000050000}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, 0x0}, 0x0) fsync(r0) [ 548.147980] FAULT_INJECTION: forcing a failure. [ 548.147980] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 548.169491] CPU: 1 PID: 26735 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 548.176555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.185912] Call Trace: [ 548.185937] dump_stack+0x172/0x1f0 [ 548.185958] should_fail.cold+0xa/0x1b [ 548.185976] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 548.185994] ? __might_sleep+0x95/0x190 [ 548.192187] __alloc_pages_nodemask+0x1ee/0x750 [ 548.209775] ? copy_huge_pmd+0x449/0x670 [ 548.213852] ? __alloc_pages_slowpath+0x2870/0x2870 [ 548.218887] ? lock_downgrade+0x810/0x810 [ 548.223040] ? pmd_pfn+0x12e/0x1d0 [ 548.226593] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 548.232222] alloc_pages_current+0x107/0x210 [ 548.236639] pte_alloc_one+0x1b/0x1a0 [ 548.240469] __pte_alloc+0x2a/0x360 [ 548.244110] copy_page_range+0x151f/0x1f90 [ 548.248332] ? anon_vma_fork+0x371/0x4a0 [ 548.252378] ? find_held_lock+0x35/0x130 [ 548.256427] ? anon_vma_fork+0x371/0x4a0 [ 548.260505] ? vma_compute_subtree_gap+0x158/0x230 [ 548.265454] ? vma_gap_callbacks_rotate+0x62/0x80 [ 548.270312] ? pmd_alloc+0x180/0x180 [ 548.274048] ? __vma_link_rb+0x279/0x370 [ 548.278126] copy_process.part.0+0x543d/0x7a30 [ 548.282745] ? __cleanup_sighand+0x70/0x70 [ 548.286993] ? lock_downgrade+0x810/0x810 [ 548.291160] ? kasan_check_write+0x14/0x20 [ 548.295409] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 548.300265] _do_fork+0x257/0xfd0 [ 548.303734] ? fork_idle+0x1d0/0x1d0 [ 548.307457] ? fput+0x128/0x1a0 [ 548.310755] ? ksys_write+0x1f1/0x2d0 [ 548.314575] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 548.319344] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 548.324204] ? do_syscall_64+0x26/0x620 [ 548.328187] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.334048] ? do_syscall_64+0x26/0x620 [ 548.338037] __x64_sys_clone+0xbf/0x150 [ 548.342015] do_syscall_64+0xfd/0x620 [ 548.345821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.351008] RIP: 0033:0x459829 [ 548.354187] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.373070] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 548.380767] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 548.388028] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 12:12:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000280)=[{0x0, 0x8, 0x1800}], 0x1) 12:12:51 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x64000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:12:51 executing program 4 (fault-call:6 fault-nth:59): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 548.395307] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 548.402586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 548.409864] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:51 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 548.537572] FAULT_INJECTION: forcing a failure. [ 548.537572] name failslab, interval 1, probability 0, space 0, times 0 [ 548.549306] CPU: 1 PID: 26760 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 548.556336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.565712] Call Trace: [ 548.568332] dump_stack+0x172/0x1f0 [ 548.571973] should_fail.cold+0xa/0x1b [ 548.575864] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 548.580966] ? lock_downgrade+0x810/0x810 [ 548.585137] __should_failslab+0x121/0x190 [ 548.589376] should_failslab+0x9/0x14 [ 548.593161] kmem_cache_alloc+0x2ae/0x700 [ 548.597291] ? pmd_pfn+0x12e/0x1d0 [ 548.600819] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 548.606341] ptlock_alloc+0x20/0x70 [ 548.609962] pte_alloc_one+0x6d/0x1a0 [ 548.613757] __pte_alloc+0x2a/0x360 [ 548.617367] copy_page_range+0x151f/0x1f90 [ 548.621583] ? anon_vma_fork+0x371/0x4a0 [ 548.625636] ? find_held_lock+0x35/0x130 [ 548.629678] ? anon_vma_fork+0x371/0x4a0 [ 548.633727] ? vma_compute_subtree_gap+0x158/0x230 [ 548.638640] ? vma_gap_callbacks_rotate+0x62/0x80 [ 548.643471] ? pmd_alloc+0x180/0x180 [ 548.647183] ? __vma_link_rb+0x279/0x370 [ 548.651241] copy_process.part.0+0x543d/0x7a30 [ 548.655832] ? __cleanup_sighand+0x70/0x70 [ 548.660060] ? lock_downgrade+0x810/0x810 [ 548.664201] ? kasan_check_write+0x14/0x20 [ 548.668420] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 548.673260] _do_fork+0x257/0xfd0 [ 548.676718] ? fork_idle+0x1d0/0x1d0 [ 548.680419] ? fput+0x128/0x1a0 [ 548.683681] ? ksys_write+0x1f1/0x2d0 [ 548.687473] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 548.692223] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 548.696969] ? do_syscall_64+0x26/0x620 [ 548.700928] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.706272] ? do_syscall_64+0x26/0x620 [ 548.710233] __x64_sys_clone+0xbf/0x150 [ 548.714192] do_syscall_64+0xfd/0x620 [ 548.717980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.723166] RIP: 0033:0x459829 [ 548.726345] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.745444] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 548.753147] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 548.760410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 548.767659] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 548.774995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 12:12:51 executing program 4 (fault-call:6 fault-nth:60): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 548.782258] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 548.907525] FAULT_INJECTION: forcing a failure. [ 548.907525] name failslab, interval 1, probability 0, space 0, times 0 [ 548.925792] CPU: 0 PID: 26769 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 548.932846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.942203] Call Trace: [ 548.944806] dump_stack+0x172/0x1f0 [ 548.948454] should_fail.cold+0xa/0x1b [ 548.952355] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 548.957473] ? lock_downgrade+0x810/0x810 [ 548.961643] __should_failslab+0x121/0x190 [ 548.965891] should_failslab+0x9/0x14 [ 548.969705] kmem_cache_alloc+0x2ae/0x700 [ 548.973870] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 548.979426] ptlock_alloc+0x20/0x70 [ 548.983069] pte_alloc_one+0x6d/0x1a0 [ 548.986895] copy_huge_pmd+0x7d/0x670 [ 548.990706] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 548.996233] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 549.001766] copy_page_range+0x7a1/0x1f90 [ 549.005990] ? anon_vma_fork+0x371/0x4a0 [ 549.010039] ? find_held_lock+0x35/0x130 [ 549.014089] ? anon_vma_fork+0x371/0x4a0 [ 549.018141] ? vma_compute_subtree_gap+0x158/0x230 [ 549.023058] ? vma_gap_callbacks_rotate+0x62/0x80 [ 549.027888] ? pmd_alloc+0x180/0x180 [ 549.031586] ? __vma_link_rb+0x279/0x370 [ 549.035639] copy_process.part.0+0x543d/0x7a30 [ 549.040225] ? __cleanup_sighand+0x70/0x70 [ 549.044451] ? lock_downgrade+0x810/0x810 [ 549.048590] ? kasan_check_write+0x14/0x20 [ 549.052811] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 549.057641] _do_fork+0x257/0xfd0 [ 549.061086] ? fork_idle+0x1d0/0x1d0 [ 549.064789] ? fput+0x128/0x1a0 [ 549.068056] ? ksys_write+0x1f1/0x2d0 [ 549.071847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 549.076588] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 549.081329] ? do_syscall_64+0x26/0x620 [ 549.085288] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.090649] ? do_syscall_64+0x26/0x620 [ 549.094612] __x64_sys_clone+0xbf/0x150 [ 549.098574] do_syscall_64+0xfd/0x620 [ 549.102359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.107720] RIP: 0033:0x459829 [ 549.113157] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.132044] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 549.139740] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 549.146993] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 549.154248] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 549.161509] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 549.168762] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:53 executing program 3: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}, {&(0x7f0000000280)=""/24, 0x20000298}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lremovexattr(0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) recvfrom$rose(r2, &(0x7f00000002c0)=""/148, 0x94, 0x40000102, &(0x7f0000000180)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}, 0x1c) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, &(0x7f0000000000)) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x4, 0x0, {0xa, 0x0, 0x1ff, @empty, 0x1}}}, 0x3a) write(r3, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x1bc}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000480)) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f00000004c0)={0x0, 0x1, 0x6, @random="2ece1febe177"}, 0x10) 12:12:53 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000240)='./file0\x00') 12:12:53 executing program 4 (fault-call:6 fault-nth:61): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 12:12:53 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4e02000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 12:12:53 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000180)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 551.215379] FAULT_INJECTION: forcing a failure. [ 551.215379] name failslab, interval 1, probability 0, space 0, times 0 [ 551.231220] CPU: 0 PID: 26780 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 551.238374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.247723] Call Trace: [ 551.250305] dump_stack+0x172/0x1f0 [ 551.253923] should_fail.cold+0xa/0x1b [ 551.257810] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 551.262906] ? lock_downgrade+0x810/0x810 [ 551.267041] __should_failslab+0x121/0x190 [ 551.271259] should_failslab+0x9/0x14 [ 551.275044] kmem_cache_alloc+0x2ae/0x700 [ 551.279177] ? pmd_alloc+0x180/0x180 [ 551.282896] vm_area_dup+0x21/0x170 [ 551.286518] copy_process.part.0+0x3407/0x7a30 [ 551.291098] ? __cleanup_sighand+0x70/0x70 [ 551.295312] ? lock_downgrade+0x810/0x810 [ 551.299454] ? kasan_check_write+0x14/0x20 [ 551.303698] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 551.308524] _do_fork+0x257/0xfd0 [ 551.311963] ? fork_idle+0x1d0/0x1d0 [ 551.315659] ? fput+0x128/0x1a0 [ 551.318922] ? ksys_write+0x1f1/0x2d0 [ 551.322723] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 551.327477] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 551.332215] ? do_syscall_64+0x26/0x620 [ 551.336171] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.341520] ? do_syscall_64+0x26/0x620 [ 551.345489] __x64_sys_clone+0xbf/0x150 [ 551.349447] do_syscall_64+0xfd/0x620 [ 551.353234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.358403] RIP: 0033:0x459829 [ 551.361579] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 551.380461] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 551.388153] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 551.395402] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 551.402649] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 12:12:54 executing program 1: r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) r2 = accept$alg(r1, 0x0, 0x0) r3 = dup(r2) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x404c001) write$UHID_DESTROY(r3, &(0x7f0000000200), 0xffffff77) recvmmsg(r2, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{0x0}, {&(0x7f0000000280)=""/24, 0x18}], 0x2}}], 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000013) 12:12:54 executing program 4 (fault-call:6 fault-nth:62): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 551.409898] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 551.417150] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 12:12:54 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0x12) write$P9_RREAD(r0, &(0x7f0000000200)={0x69, 0x75, 0x0, {0x5e, "402a0eb0db7b2085e778f405d664e2a3dc7d2b56afd0234b0060453a8027b8ea471646b4dff3eb6c7f0000000000ba003b57fe0a30dc2456e2f1060f3bf93fe426978247e964b2e1854d5cbf9060f8aa91cfa886baeda6514d4fb70d99a5"}}, 0x69) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 551.570112] FAULT_INJECTION: forcing a failure. [ 551.570112] name failslab, interval 1, probability 0, space 0, times 0 [ 551.591467] CPU: 0 PID: 26799 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 551.598529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.607896] Call Trace: [ 551.610507] dump_stack+0x172/0x1f0 [ 551.614163] should_fail.cold+0xa/0x1b [ 551.618079] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 551.623196] ? lock_downgrade+0x810/0x810 [ 551.627373] __should_failslab+0x121/0x190 [ 551.631608] should_failslab+0x9/0x14 [ 551.635397] kmem_cache_alloc_trace+0x2cc/0x760 [ 551.640069] ? __init_cache_modes+0x260/0x260 [ 551.644558] ? follow_phys+0x276/0x360 [ 551.648429] reserve_memtype+0x1e1/0x880 [ 551.652475] ? lock_downgrade+0x810/0x810 [ 551.656615] ? pat_init+0x4b0/0x4b0 [ 551.660234] ? __init_cache_modes+0x260/0x260 [ 551.664719] ? do_raw_spin_unlock+0x57/0x270 [ 551.669116] reserve_pfn_range+0x1b3/0x500 [ 551.673371] ? arch_io_reserve_memtype_wc+0xa0/0xa0 [ 551.678377] ? save_stack+0x45/0xd0 [ 551.681984] ? kasan_slab_alloc+0xf/0x20 [ 551.686025] ? kmem_cache_alloc+0x12e/0x700 [ 551.690335] ? vm_area_dup+0x21/0x170 [ 551.694120] ? copy_process.part.0+0x3407/0x7a30 [ 551.698865] ? _do_fork+0x257/0xfd0 [ 551.702478] ? __x64_sys_clone+0xbf/0x150 [ 551.706629] track_pfn_copy+0x196/0x1e0 [ 551.710600] ? reserve_pfn_range+0x500/0x500 [ 551.714996] ? get_mem_cgroup_from_mm+0x139/0x320 [ 551.719840] copy_page_range+0x15f6/0x1f90 [ 551.724073] ? copy_process.part.0+0x30f9/0x7a30 [ 551.728823] ? find_held_lock+0x35/0x130 [ 551.732876] ? vma_compute_subtree_gap+0x158/0x230 [ 551.737791] ? vma_gap_callbacks_rotate+0x62/0x80 [ 551.742620] ? pmd_alloc+0x180/0x180 [ 551.746315] ? __vma_link_rb+0x279/0x370 [ 551.750363] copy_process.part.0+0x543d/0x7a30 [ 551.754944] ? __cleanup_sighand+0x70/0x70 [ 551.759159] ? lock_downgrade+0x810/0x810 [ 551.763308] ? kasan_check_write+0x14/0x20 [ 551.767533] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 551.772469] _do_fork+0x257/0xfd0 [ 551.775907] ? fork_idle+0x1d0/0x1d0 [ 551.779611] ? fput+0x128/0x1a0 [ 551.782883] ? ksys_write+0x1f1/0x2d0 [ 551.786674] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 551.791418] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 551.796156] ? do_syscall_64+0x26/0x620 [ 551.800113] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.805465] ? do_syscall_64+0x26/0x620 [ 551.809423] __x64_sys_clone+0xbf/0x150 [ 551.813381] do_syscall_64+0xfd/0x620 [ 551.817164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.822337] RIP: 0033:0x459829 [ 551.825512] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 551.844395] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 551.852085] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 551.859344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 551.866605] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 551.873863] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 551.881113] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 551.892889] WARNING: CPU: 1 PID: 26799 at arch/x86/mm/pat.c:1064 untrack_pfn+0x25c/0x2a0 [ 551.901150] Kernel panic - not syncing: panic_on_warn set ... [ 551.901150] [ 551.908530] CPU: 1 PID: 26799 Comm: syz-executor.4 Not tainted 4.19.67 #41 [ 551.915538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.924892] Call Trace: [ 551.927468] dump_stack+0x172/0x1f0 [ 551.931087] panic+0x263/0x507 [ 551.934263] ? __warn_printk+0xf3/0xf3 [ 551.938143] ? untrack_pfn+0x25c/0x2a0 [ 551.942015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 551.947536] ? __warn.cold+0x5/0x4a [ 551.951150] ? untrack_pfn+0x25c/0x2a0 [ 551.955051] __warn.cold+0x20/0x4a [ 551.958578] ? untrack_pfn+0x25c/0x2a0 [ 551.962450] report_bug+0x263/0x2b0 [ 551.966066] do_error_trap+0x204/0x360 [ 551.969940] ? math_error+0x340/0x340 [ 551.973729] ? kasan_check_read+0x11/0x20 [ 551.977862] ? do_raw_spin_unlock+0x57/0x270 [ 551.982256] ? error_entry+0x7c/0xe0 [ 551.985956] ? trace_hardirqs_off_caller+0x65/0x220 [ 551.990962] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 551.995794] do_invalid_op+0x1b/0x20 [ 551.999494] invalid_op+0x14/0x20 [ 552.002931] RIP: 0010:untrack_pfn+0x25c/0x2a0 [ 552.007414] Code: 00 00 00 00 48 8b 45 d0 65 48 33 04 25 28 00 00 00 75 28 48 81 c4 88 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 74 a5 3a 00 <0f> 0b eb b3 48 89 df e8 c8 38 71 00 e9 b0 fe ff ff e8 5e 20 0e 00 [ 552.026305] RSP: 0018:ffff8880969678a0 EFLAGS: 00010246 [ 552.031658] RAX: 0000000000040000 RBX: ffff888091cfb108 RCX: ffffc9000e8e7000 [ 552.038912] RDX: 0000000000040000 RSI: ffffffff8130b9bc RDI: 0000000000000005 [ 552.046167] RBP: ffff888096967950 R08: ffff88805cdf4280 R09: ffffed101323c0f3 [ 552.053433] R10: ffffed101323c0f2 R11: ffff8880991e0793 R12: 1ffff11012d2cf15 [ 552.060689] R13: 00000000ffffffea R14: 0000000000000000 R15: ffff888096967928 [ 552.067965] ? untrack_pfn+0x25c/0x2a0 [ 552.071842] ? track_pfn_insert+0x180/0x180 [ 552.076151] ? vm_normal_page_pmd+0x400/0x400 [ 552.080646] ? kasan_check_read+0x11/0x20 [ 552.084783] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 552.090304] ? uprobe_munmap+0xad/0x2b0 [ 552.094266] unmap_single_vma+0x1c2/0x300 [ 552.098406] unmap_vmas+0xae/0x180 [ 552.101933] exit_mmap+0x2c2/0x530 [ 552.105458] ? __ia32_sys_munmap+0x80/0x80 [ 552.109689] ? __khugepaged_exit+0x2da/0x400 [ 552.114085] ? rcu_read_lock_sched_held+0x110/0x130 [ 552.119089] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 552.124612] ? __khugepaged_exit+0xcf/0x400 [ 552.128922] mmput+0x15f/0x4c0 [ 552.132105] copy_process.part.0+0x5aaf/0x7a30 [ 552.136690] ? __cleanup_sighand+0x70/0x70 [ 552.140909] ? lock_downgrade+0x810/0x810 [ 552.145050] ? kasan_check_write+0x14/0x20 [ 552.149274] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 552.154112] _do_fork+0x257/0xfd0 [ 552.157556] ? fork_idle+0x1d0/0x1d0 [ 552.161255] ? fput+0x128/0x1a0 [ 552.165088] ? ksys_write+0x1f1/0x2d0 [ 552.168880] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 552.173620] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 552.178364] ? do_syscall_64+0x26/0x620 [ 552.182325] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.187675] ? do_syscall_64+0x26/0x620 [ 552.191637] __x64_sys_clone+0xbf/0x150 [ 552.195602] do_syscall_64+0xfd/0x620 [ 552.199393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.204567] RIP: 0033:0x459829 [ 552.207747] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 552.226631] RSP: 002b:00007f067ac03c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 552.234328] RAX: ffffffffffffffda RBX: 00007f067ac03c90 RCX: 0000000000459829 [ 552.241579] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 552.248831] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 552.256086] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f067ac046d4 [ 552.263359] R13: 00000000004bfce6 R14: 00000000004d1a58 R15: 0000000000000004 [ 552.271852] Kernel Offset: disabled [ 552.275480] Rebooting in 86400 seconds..