f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x0, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:53:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x800, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000080)={0x7, 0xecd}) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f0000000140)={r4, 0x7fff, 0x0, 0xfffffffeffffffff, 0x100000001}, &(0x7f0000000180)=0x18) bind$ax25(r2, &(0x7f0000000200)={{0x3, @bcast, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @null, @default]}, 0x48) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000001c0)={0x3, r2}) 16:53:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dri(&(0x7f0000000300)='/dev/dri/card#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$VIDIOC_G_FBUF(r2, 0x8030560a, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000080)) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000000)={[{0x3, 0x6, 0x9, 0x7, 0x1000, 0x7, 0x1, 0x4, 0x1, 0x6, 0x8, 0x214}, {0x10001, 0x0, 0x1df8e4b0, 0x8000, 0x7c6, 0x8c, 0x0, 0x400, 0x2, 0x5, 0x10000, 0xffff, 0x8001}, {0xc5, 0x95d, 0x7, 0x8, 0x8, 0x7, 0x7, 0x3ff, 0x6, 0x9, 0x8, 0x80000001, 0x8000}], 0x5cd}) [ 255.177954] x86/PAT: syz-executor.2:11628 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:53:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x88d) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f00000001c0)) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) 16:53:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ffd3"]}, 0x18}}, 0x0) [ 255.229333] FAULT_INJECTION: forcing a failure. [ 255.229333] name failslab, interval 1, probability 0, space 0, times 0 [ 255.260557] CPU: 1 PID: 11628 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 255.267796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.277200] Call Trace: [ 255.279940] dump_stack+0x138/0x19c [ 255.283588] should_fail.cold+0x10f/0x159 [ 255.287784] should_failslab+0xdb/0x130 [ 255.291782] kmem_cache_alloc+0x2d7/0x780 [ 255.295937] ? _raw_spin_unlock+0x2d/0x50 [ 255.300183] copy_process.part.0+0x3987/0x6a00 [ 255.304815] ? save_trace+0x290/0x290 [ 255.308622] ? proc_fail_nth_write+0x7d/0x180 [ 255.313248] ? proc_cwd_link+0x1b0/0x1b0 [ 255.317420] ? __cleanup_sighand+0x50/0x50 [ 255.321662] ? lock_downgrade+0x6e0/0x6e0 [ 255.325866] _do_fork+0x19e/0xce0 [ 255.329420] ? fork_idle+0x280/0x280 [ 255.333143] ? fput+0xd4/0x150 [ 255.334544] openvswitch: netlink: Flow key attr not present in new flow. [ 255.336359] ? SyS_write+0x15e/0x230 [ 255.336378] SyS_clone+0x37/0x50 [ 255.336387] ? sys_vfork+0x30/0x30 [ 255.336403] do_syscall_64+0x1e8/0x640 [ 255.336411] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.336430] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 255.367808] RIP: 0033:0x459879 [ 255.370998] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 16:53:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x0, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:53:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic]}, 0x14}}, 0x0) [ 255.379065] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 255.386341] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 255.393700] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 255.401063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 255.408345] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:53:58 executing program 2 (fault-call:8 fault-nth:11): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:53:58 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) write$selinux_create(r0, &(0x7f0000000280)=@objname={'system_u:object_r:fonts_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x7, 0x20, './bus\x00'}, 0x47) mknod(&(0x7f0000000080)='./bus\x00', 0xa88, 0x1) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) 16:53:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x10000) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000080)={0x1d, 0x4, 0x2859}) 16:53:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @remote}, 0x8) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000040)={0xff, 0x1, 0x6}) 16:53:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic]}, 0x14}}, 0x0) 16:53:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 255.508764] x86/PAT: syz-executor.2:11628 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 255.535468] x86/PAT: syz-executor.2:11628 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:53:58 executing program 0: syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setpipe(r1, 0x407, 0x800) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x31, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) 16:53:58 executing program 3: r0 = socket$inet6(0xa, 0x20000000e, 0x800) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) r2 = fcntl$getown(r0, 0x9) r3 = getpgid(r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f00000003c0)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0) r4 = socket$inet6(0xa, 0x7, 0x3) ioctl(r4, 0x5a, &(0x7f0000000280)="025cc80700145f8f764070") syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000640)='./file0\x00', 0xe005, 0x1, &(0x7f0000000380)=[{&(0x7f00000006c0)="eb906d6b66732e64617400020000004000000000000000", 0x17, 0x1fffffffff}], 0x1010802, 0x0) r5 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x400, 0x1) mkdirat(0xffffffffffffffff, &(0x7f0000000440)='./file0/file0\x00', 0x10000) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYPTR64=&(0x7f0000000840)=ANY=[@ANYBLOB="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"], @ANYRES64=r2]) perf_event_open(&(0x7f0000940000)={0x2, 0xfffffffffffffdcd, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x110, r1, 0x8000000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r5, 0x8004e500, &(0x7f0000001140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x109) r6 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x400000000002, r2) capset(&(0x7f00000002c0)={0x399f1737, r2}, &(0x7f0000000180)={0xc, 0x2, 0x8, 0x3, 0xcc, 0xca2c}) r7 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfd, 0x8, 0xffff, 0x0, 0x0, 0x0, 0x0, 0xfffff00000000000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp, 0x1e, 0x0, 0x0, 0x4}, r3, 0x0, r6, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f00000000c0)={0x0, 0x1, 0x2080000000, 0xfffffffffefffc01, 0x9}, 0xfffffffffffffe5f) openat$null(0xffffffffffffff9c, &(0x7f0000000700)='/dev/null\x00', 0xa2087, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000540)='threaded\x00', 0x9) mkdirat(r5, &(0x7f00000004c0)='./file1\x00', 0x100000000) creat(&(0x7f0000000400)='./file0/file0\x00', 0x20000000048) fchdir(r7) seccomp(0x4000000000000007, 0x0, &(0x7f0000000480)={0x0, &(0x7f0000000300)=[{0xbe, 0x2, 0x100000000007f, 0x1}]}) 16:53:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x5) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r3 = open(&(0x7f0000000180)='./file0\x00', 0x1, 0x8) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0x9) r4 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x9, 0x20000) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000001c0)=0x0) waitid(0x0, r5, 0x0, 0x8, &(0x7f00000000c0)) 16:53:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:53:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic]}, 0x14}}, 0x0) [ 255.719711] x86/PAT: syz-executor.2:11679 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 255.780645] FAULT_INJECTION: forcing a failure. [ 255.780645] name failslab, interval 1, probability 0, space 0, times 0 [ 255.798369] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 255.833827] CPU: 1 PID: 11691 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 255.840967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.850327] Call Trace: [ 255.852930] dump_stack+0x138/0x19c [ 255.857118] should_fail.cold+0x10f/0x159 [ 255.861280] should_failslab+0xdb/0x130 [ 255.865278] kmem_cache_alloc+0x2d7/0x780 [ 255.869439] ? _raw_spin_unlock+0x2d/0x50 [ 255.873633] copy_process.part.0+0x3987/0x6a00 [ 255.878230] ? save_trace+0x290/0x290 [ 255.882041] ? proc_fail_nth_write+0x7d/0x180 [ 255.886542] ? proc_cwd_link+0x1b0/0x1b0 [ 255.890782] ? __cleanup_sighand+0x50/0x50 [ 255.895123] ? lock_downgrade+0x6e0/0x6e0 [ 255.899374] _do_fork+0x19e/0xce0 [ 255.902922] ? fork_idle+0x280/0x280 [ 255.906996] ? fput+0xd4/0x150 [ 255.910188] ? SyS_write+0x15e/0x230 [ 255.913377] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 255.913928] SyS_clone+0x37/0x50 [ 255.925588] ? sys_vfork+0x30/0x30 [ 255.929234] do_syscall_64+0x1e8/0x640 [ 255.933210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.938072] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 255.943350] RIP: 0033:0x459879 [ 255.946538] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 255.954580] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 255.961852] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 255.969130] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 255.976409] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 16:53:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x20003, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x80000001, 0x4000) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80001000, 0xc000) r4 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$NBD_SET_SOCK(r4, 0xab00, r3) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x6, 0xffffffffffffffff, 0x2}) ioctl$TIOCLINUX5(r4, 0x541c, &(0x7f00000000c0)={0x5, 0x0, 0xbdbb, 0x2, 0x9bda}) ioctl$KVM_SET_DEVICE_ATTR(r5, 0x4018aee2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r3, 0xc0305602, &(0x7f0000000100)={0x0, 0xff, 0x1003}) [ 255.983684] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 256.040988] x86/PAT: syz-executor.2:11691 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:53:58 executing program 2 (fault-call:8 fault-nth:12): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:53:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:53:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:53:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x80800) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000080)={@loopback, @multicast2}, &(0x7f00000000c0)=0xc) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)=@hci, 0x80, &(0x7f0000000800)=[{&(0x7f0000000200)=""/84, 0x54}, {&(0x7f00000002c0)=""/84, 0x54}, {&(0x7f0000000340)=""/59, 0x3b}, {&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/208, 0xd0}, {&(0x7f0000000540)=""/169, 0xa9}, {&(0x7f0000000600)=""/212, 0xd4}, {&(0x7f0000000700)=""/120, 0x78}, {&(0x7f0000000780)=""/11, 0xb}, {&(0x7f00000007c0)=""/44, 0x2c}], 0xa}, 0x40) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000000940)={@multicast1}, &(0x7f0000000980)=0xc) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000a80)={@dev, @loopback}, &(0x7f0000000ac0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000b40)={'vcan0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002140)={{{@in=@broadcast, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f0000002240)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x771712c9f9ef8bfc, &(0x7f0000007b40)={@empty, @remote, 0x0}, &(0x7f0000007b80)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000b00)={'bpq0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00', r3}) r5 = socket$netlink(0x10, 0x3, 0x4) write(r5, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000002a40)={r4, 0x1, 0x6, @dev}, 0x10) recvmmsg(r5, &(0x7f0000006500), 0x1ce, 0x40010000, &(0x7f0000006700)={0x0, 0x1c9c380}) [ 256.102177] x86/PAT: syz-executor.2:11691 freeing invalid memtype [mem 0x00002000-0x00002fff] [ 256.121492] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 256.139821] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:53:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x800, 0x0) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000fff000/0x1000)=nil, 0x1000}, 0x1}) [ 256.221379] audit: type=1804 audit(1566665638.737:87): pid=11732 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="file0" dev="sda1" ino=17361 res=1 [ 256.244380] openvswitch: netlink: Flow key attr not present in new flow. 16:53:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) r1 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x5) fallocate(r1, 0x0, 0x2000421, 0x1) write(r1, &(0x7f0000002000)='/', 0x1) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x2}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffe9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x2, 0x3, 0x0, 0x20, 0x0, 0x3, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xcd8, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xb, r2, 0x0) sendfile(r1, r1, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, &(0x7f00000000c0)) 16:53:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic]}, 0x14}}, 0x0) 16:53:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 256.289988] x86/PAT: syz-executor.2:11740 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 256.388413] FAULT_INJECTION: forcing a failure. [ 256.388413] name failslab, interval 1, probability 0, space 0, times 0 [ 256.390458] Unknown ioctl -1071601148 [ 256.438522] CPU: 0 PID: 11749 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 256.445753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.455143] Call Trace: [ 256.457747] dump_stack+0x138/0x19c [ 256.461398] should_fail.cold+0x10f/0x159 [ 256.465844] should_failslab+0xdb/0x130 [ 256.469864] kmem_cache_alloc+0x2d7/0x780 [ 256.474111] ? lockdep_init_map+0x9/0x10 [ 256.478276] ? debug_mutex_init+0x2d/0x5a [ 256.482447] copy_process.part.0+0x3c75/0x6a00 [ 256.487214] ? proc_fail_nth_write+0x7d/0x180 [ 256.491703] ? proc_cwd_link+0x1b0/0x1b0 [ 256.495894] ? __cleanup_sighand+0x50/0x50 [ 256.500119] ? lock_downgrade+0x6e0/0x6e0 [ 256.504349] _do_fork+0x19e/0xce0 [ 256.507791] ? fork_idle+0x280/0x280 [ 256.511600] ? fput+0xd4/0x150 [ 256.514781] ? SyS_write+0x15e/0x230 [ 256.518693] SyS_clone+0x37/0x50 [ 256.522065] ? sys_vfork+0x30/0x30 [ 256.525715] do_syscall_64+0x1e8/0x640 [ 256.529701] ? trace_hardirqs_off_thunk+0x1a/0x1c 16:53:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff, 0x1}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 16:53:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r3}, 0x14) syz_emit_ethernet(0x3e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60b7e72000032c00fe800000000000000000000000000000aa800090780000000000000000000000000000001716bbd358d303c95000000000e01391d8f3f1efeb9df8ce8738db7dce2522026e6de11158ea1e6c5b2edbb1e531c56a89d5"], 0x0) 16:53:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic]}, 0x14}}, 0x0) [ 256.534561] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 256.539741] RIP: 0033:0x459879 [ 256.542914] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 256.550716] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 256.558145] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 256.565782] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 256.573155] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 256.580413] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:53:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/capi/capi20\x00', 0x200000, 0x0) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x200) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x80, 0x204000) syz_open_dev$dspn(&(0x7f0000000400)='/dev/dsp#\x00', 0x0, 0x400600) r0 = syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0x1, 0x2) syz_open_dev$swradio(&(0x7f0000000480)='/dev/swradio#\x00', 0x1, 0x2) r1 = getpgrp(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000700)={{0x9, 0x3, 0x380000000, 0x40, 'syz0\x00', 0x401}, 0x1, 0x0, 0x9, r1, 0x3, 0x3, 'syz1\x00', &(0x7f0000000580)=['/proc/capi/capi20\x00', '\x00', 'posix_acl_access)cgroup\x00'], 0x2b, [], [0x4, 0xeef, 0x198a, 0x1]}) openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x4800, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0xa0001, 0x0) openat$cgroup(r2, 0x0, 0x200002, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x800, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = gettid() close(0xffffffffffffffff) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000540)={r2, &(0x7f0000000040)="2ff7d4b09245ea0f9c67404ec604a8cbaea1984f1cd6eaf645a856f468792458a80274ed93e4280cc58dffe933bae2581aa9e3f6", &(0x7f0000000600)=""/237}, 0x18) waitid(0x3, r3, 0x0, 0x1, &(0x7f0000000280)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000f03000000feffff7a0a00000000ffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000040400000100fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f086dd01000005a4004000ffa377fbac141414e9", 0x0, 0x100}, 0x28) [ 256.628164] x86/PAT: syz-executor.2:11738 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 256.666919] x86/PAT: syz-executor.2:11738 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:53:59 executing program 2 (fault-call:8 fault-nth:13): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:53:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:53:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic]}, 0x14}}, 0x0) 16:53:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x1, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x10001, 0xa7fce92dcd0bfcd7) setsockopt$llc_int(r1, 0x10c, 0x3, &(0x7f0000000040)=0xf9, 0x4) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xcc) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee2, 0x0) 16:53:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 256.860141] x86/PAT: syz-executor.2:11788 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:53:59 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRES32=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000780), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1}, 0x50) truncate(&(0x7f0000000000)='./file0/file0\x00', 0x0) symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') write$FUSE_ENTRY(r0, &(0x7f0000000540)={0x90, 0x0, 0x3, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85eb}}}, 0x90) lstat(&(0x7f00000000c0)='./file0/file0\x00', 0x0) 16:53:59 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:53:59 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee2, 0x0) [ 256.934715] FAULT_INJECTION: forcing a failure. [ 256.934715] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 256.971577] CPU: 1 PID: 11794 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 256.978818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.988227] Call Trace: [ 256.990837] dump_stack+0x138/0x19c [ 256.994491] should_fail.cold+0x10f/0x159 [ 256.998658] ? __might_sleep+0x93/0xb0 [ 257.002590] __alloc_pages_nodemask+0x1d6/0x7a0 [ 257.007278] ? fs_reclaim_acquire+0x20/0x20 [ 257.011699] ? __alloc_pages_slowpath+0x2930/0x2930 [ 257.016892] ? check_preemption_disabled+0x3c/0x250 [ 257.021921] alloc_pages_current+0xec/0x1e0 [ 257.026350] __get_free_pages+0xf/0x40 [ 257.030242] pgd_alloc+0x25/0x2b0 [ 257.033764] ? lockdep_init_map+0x9/0x10 [ 257.037840] mm_init+0x578/0x970 [ 257.041216] copy_process.part.0+0x3ccd/0x6a00 [ 257.045815] ? proc_fail_nth_write+0x7d/0x180 [ 257.050337] ? proc_cwd_link+0x1b0/0x1b0 [ 257.052652] FAULT_INJECTION: forcing a failure. [ 257.052652] name failslab, interval 1, probability 0, space 0, times 0 [ 257.054416] ? __cleanup_sighand+0x50/0x50 [ 257.054429] ? lock_downgrade+0x6e0/0x6e0 [ 257.054445] _do_fork+0x19e/0xce0 [ 257.077494] ? fork_idle+0x280/0x280 [ 257.081365] ? fput+0xd4/0x150 16:53:59 executing program 3: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x500000000}) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x0, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x13, &(0x7f0000000180)) sendto$rxrpc(r0, &(0x7f0000000040)="205dfb9443d6fa3975598fa2b0da9367223bdf503ff62fa862d5ef455ed5dd5d83b3080bd9ff2e28291e6ce4f68c447da833824a21eb42e2e4b65f1a331d19da2f09d4a838b8fe90c6f9d4eeed17f9e583dbeda891f27149a98aa30287c2", 0x5e, 0x44011, 0x0, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/cgroup\x00') ptrace(0x8, r1) ptrace$poke(0xffffffffffffffff, r1, &(0x7f0000000140), 0x2) [ 257.084650] ? SyS_write+0x15e/0x230 [ 257.088374] SyS_clone+0x37/0x50 [ 257.091735] ? sys_vfork+0x30/0x30 [ 257.095280] do_syscall_64+0x1e8/0x640 [ 257.099160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.104187] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.109399] RIP: 0033:0x459879 [ 257.112638] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 257.120356] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 257.127642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 16:53:59 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001280)='/dev/snapshot\x00', 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCSTI(r0, 0x5412, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") dup2(r1, r0) [ 257.135041] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 257.142314] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 257.149687] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 257.157238] CPU: 0 PID: 11803 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 257.164347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.173703] Call Trace: [ 257.176476] dump_stack+0x138/0x19c [ 257.180114] should_fail.cold+0x10f/0x159 [ 257.184257] should_failslab+0xdb/0x130 [ 257.188356] kmem_cache_alloc_node+0x287/0x780 [ 257.192942] __alloc_skb+0x9c/0x500 [ 257.196752] ? skb_scrub_packet+0x4b0/0x4b0 [ 257.201075] ? netlink_autobind.isra.0+0x1c9/0x290 [ 257.205994] netlink_sendmsg+0x874/0xc60 [ 257.210082] ? netlink_unicast+0x640/0x640 [ 257.214329] ? security_socket_sendmsg+0x89/0xb0 [ 257.219078] ? netlink_unicast+0x640/0x640 [ 257.223551] sock_sendmsg+0xce/0x110 [ 257.227262] ___sys_sendmsg+0x70a/0x840 [ 257.231237] ? copy_msghdr_from_user+0x3f0/0x3f0 16:53:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 257.235993] ? __fget+0x210/0x370 [ 257.239455] ? find_held_lock+0x35/0x130 [ 257.243597] ? __fget+0x210/0x370 [ 257.247155] ? lock_downgrade+0x6e0/0x6e0 [ 257.251290] ? __fget+0x237/0x370 [ 257.254856] ? __fget_light+0x172/0x1f0 [ 257.258822] ? __fdget+0x1b/0x20 [ 257.262171] ? sockfd_lookup_light+0xb4/0x160 [ 257.266655] __sys_sendmsg+0xb9/0x140 [ 257.270451] ? SyS_shutdown+0x170/0x170 [ 257.274426] SyS_sendmsg+0x2d/0x50 [ 257.278055] ? __sys_sendmsg+0x140/0x140 [ 257.282101] do_syscall_64+0x1e8/0x640 [ 257.285996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.291106] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.296392] RIP: 0033:0x459879 [ 257.299571] RSP: 002b:00007f2bd4e8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 257.307364] RAX: ffffffffffffffda RBX: 00007f2bd4e8ec90 RCX: 0000000000459879 [ 257.314790] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 257.322051] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:53:59 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 257.329454] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bd4e8f6d4 [ 257.336721] R13: 00000000004c7789 R14: 00000000004dcfd0 R15: 0000000000000005 [ 257.349311] x86/PAT: syz-executor.2:11788 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 257.358294] x86/PAT: syz-executor.2:11788 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:53:59 executing program 2 (fault-call:8 fault-nth:14): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:53:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) msgget(0x1, 0x100) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) sendmsg$nl_generic(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b80)=ANY=[@ANYBLOB="140000001300bdff200008000000000001000000a242f0e2d7d8ff8e680f0def34"], 0x14}}, 0x0) 16:54:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000080)=0x100000000) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 16:54:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/fuse\x00', 0x2, 0x0) r1 = dup2(r0, r0) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[]) read$FUSE(r0, 0x0, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 16:54:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 257.525052] FAULT_INJECTION: forcing a failure. [ 257.525052] name failslab, interval 1, probability 0, space 0, times 0 [ 257.585515] x86/PAT: syz-executor.2:11837 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 257.603731] CPU: 1 PID: 11834 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 257.610962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.620327] Call Trace: [ 257.620623] FAULT_INJECTION: forcing a failure. [ 257.620623] name failslab, interval 1, probability 0, space 0, times 0 [ 257.622923] dump_stack+0x138/0x19c [ 257.622947] should_fail.cold+0x10f/0x159 [ 257.622964] should_failslab+0xdb/0x130 [ 257.622979] kmem_cache_alloc_node_trace+0x280/0x770 [ 257.622997] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 257.623011] __kmalloc_node_track_caller+0x3d/0x80 [ 257.661773] __kmalloc_reserve.isra.0+0x40/0xe0 [ 257.666454] __alloc_skb+0xcf/0x500 [ 257.670074] ? skb_scrub_packet+0x4b0/0x4b0 [ 257.674406] ? netlink_autobind.isra.0+0x1c9/0x290 [ 257.679440] netlink_sendmsg+0x874/0xc60 [ 257.683521] ? netlink_unicast+0x640/0x640 [ 257.687775] ? security_socket_sendmsg+0x89/0xb0 [ 257.692745] ? netlink_unicast+0x640/0x640 [ 257.696984] sock_sendmsg+0xce/0x110 [ 257.700704] ___sys_sendmsg+0x70a/0x840 [ 257.704703] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 257.709459] ? __fget+0x210/0x370 [ 257.712918] ? find_held_lock+0x35/0x130 [ 257.716982] ? __fget+0x210/0x370 [ 257.720450] ? lock_downgrade+0x6e0/0x6e0 [ 257.724766] ? __fget+0x237/0x370 [ 257.728216] ? __fget_light+0x172/0x1f0 [ 257.732184] ? __fdget+0x1b/0x20 16:54:00 executing program 3: r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2711, @hyper}, 0x10, 0x80000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x6, 0x8) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x10440, 0x0) ioctl(r0, 0xa7, &(0x7f00000008c0)="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") getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000007c0), &(0x7f0000000800)=0x1) lookup_dcookie(0x8, &(0x7f0000000640)=""/100, 0x64) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000740)={'gretap0\x00', {0x2, 0x6273, @multicast2}}) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000180)={{0x6, 0x6}, 0x1, 0x4, 0x7, {0x8, 0x35}, 0x9, 0x4}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000840)={r2, 0x4}, &(0x7f0000000880)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000540)={0x0, r1, 0x8, 0x5, 0x8, 0x20000000000080}) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000f40)={0x2b, 0x6, 0x7207, "0e92189a31dd52462d9b81f6f03d403792dbd722d02630ced0cac01e8230727bdb633c6e11c747433a65ae"}) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000006c0)={r1, r1, 0x3, 0x3}, 0x10) r4 = syz_open_dev$sndctrl(&(0x7f0000000300)='/dev/snd/controlC#\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r4}], 0x1, &(0x7f0000000140), 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000a80)={0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000000f00)={&(0x7f0000000780)=@proc={0x10, 0x0, 0x25dfdbff, 0x80000}, 0xc, &(0x7f0000000ec0)=[{&(0x7f00000009c0)={0xb4, 0x33, 0x510, 0x70bd27, 0x2, "", [@generic="f39b606cfdd14b1ae23dcf36e48400206f3b212845921a7540cc62c3a41dd1e71e5df0073ef05366e3d89b5d807a463f62be0020500ccb8eb9f019657c105abd6a414647bd4cae7f6cff9b9453d9843ce4b2ad922bea9e576388763b19b4e2228488585f8a1adc63e224955fce577f75b8addd64ec9b45e0361d8864ea6f482d99740abc52e442c62a6f09b23a", @generic="bc80f2595526884d8009649d974bd8ba6728104997fe"]}, 0xb4}, {&(0x7f0000000ac0)=ANY=[@ANYBLOB="b4030000180002002dbd7000fcdbdf25f0005a00f58c9c86954fa839a57b12796348e857a6206f31473d83882ea9a943b47c0cda72a59d74985753e2a8416a58241aa624f63118c5dfa138ed366d650c348416646aa503f6194b64186f519fff7c930f5656b7db1d4d1bd0d1532fb11572c3c3d37833f1e7bd5c6c0c643c9cd5ddf5efdbc4919b6583f8243899ede98d270abf8b30ec9b30b9978b4a5130cd80e977fcb2eaeff5781d6ef64acf82a99cbc8e7d377c080095003f0000009e4abec9a89a45ea646aaca7db6d14072c335386667f5708205630552d093314809c13f36e6658cc0ee6bbaf1b2a1d67943663f60172f6720a8c08006e00ac1414aa00d00070000f32311107565607e9f3dda9ce0cf295a9e8e697e508bb49130b9aefeb35a84b1c1f9ea1dd928ee2c0cc4b81c9cf159829f74e139713124f7e55fcc1a112e1e9cca61b391970b29cbd4642fa4b7f473bee01f8cd80fa284dec1d329662d102e73bed29e203a13475e130f43739caea2d4a7f1c46e3601bc1db79aca316515ebb7384cd329cc34afa24dc0ba5122a6b666bc06befa92e0a16272abb583bc18bc831eedf99a4fa7ed19d5fd2afdb641ed57ffdcc42f5a4cc1ded202ab7b03bda0257af2caab26af40000e4005f000c00810003000000000000000c0070006264657626250000c0c71c3bc63be11fc9f33c97ec31819038202241bc44ce0541b748cd8849b05c0f7b2a2ad7708f2cf418a1ff0d1904e112ea937b9856fe9a4aaa4dbaf3f58ec88fb7416f7ba722d4eccb1a350cd73cf1b9bec8586a14c458ac8c9df185eaa8295accd74af3b8ecb6017a5c156952ce6e5b4e79d4e55a3190e430dd5e107ca71a7fa48c8e8cac926eb4d74061898412f3f43f8b454e3f9529d89001b6b227b4a028d324f17642dbb83d1b08fed0c245600a276443fa8dab6a73a13af4b1b312d8eb668ef9cc00000008007400", @ANYRES32=r5, @ANYBLOB="247787b0c05f53f1b11a89bca445e40d2abb550fb965ce7777d2327911f4c37d46f1a27e6fcd2471e98e2a8474a843242701bb8685058ab90edea00199d85dfd4c284f750fcb348599c06824b89edd65438fabc6eb64fe934d8dafe5c9c8200b305228b1fb4c000d411d5846cc1a10059460f5ecb001cde2ea4441f94a2a1b4cd00b03743423f689be94f3488cd39b06039ae33c8961d49d985f65d1b266da084b3aaf7c3176502f860e70ecf23c7366016d5ca425d68abcc86f5373d90368f0b5e09e26380b3c4512aa71684fe5fae2231ea438b131dcb00b9b02271eae6393a1893645e1c8989455a5dc29279442cc229f59e4f9290000"], 0x3b4}, {&(0x7f0000000e80)={0x14, 0x2d, 0x200, 0x70bd28, 0x25dfdbfe, "", [@generic, @typed={0x4, 0x7a}]}, 0x14}], 0x3, 0x0, 0x0, 0x800}, 0x40000) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000580)=@assoc_value={0x0}, &(0x7f00000005c0)=0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000700)=0xffff) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000600)={r6, 0x6}, 0x8) 16:54:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 257.735546] ? sockfd_lookup_light+0xb4/0x160 [ 257.740041] __sys_sendmsg+0xb9/0x140 [ 257.743843] ? SyS_shutdown+0x170/0x170 [ 257.747839] SyS_sendmsg+0x2d/0x50 [ 257.751383] ? __sys_sendmsg+0x140/0x140 [ 257.755447] do_syscall_64+0x1e8/0x640 [ 257.759331] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.764189] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.769374] RIP: 0033:0x459879 [ 257.772919] RSP: 002b:00007f2bd4e8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 16:54:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:00 executing program 1 (fault-call:3 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 257.772929] RAX: ffffffffffffffda RBX: 00007f2bd4e8ec90 RCX: 0000000000459879 [ 257.772934] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 257.772939] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 257.772943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bd4e8f6d4 [ 257.772949] R13: 00000000004c7789 R14: 00000000004dcfd0 R15: 0000000000000005 [ 257.819486] CPU: 0 PID: 11837 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 257.826615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.835966] Call Trace: [ 257.838549] dump_stack+0x138/0x19c [ 257.842199] should_fail.cold+0x10f/0x159 [ 257.846644] should_failslab+0xdb/0x130 [ 257.850628] kmem_cache_alloc+0x2d7/0x780 [ 257.854786] ? lock_downgrade+0x6e0/0x6e0 [ 257.859089] __khugepaged_enter+0x37/0x340 [ 257.863336] copy_process.part.0+0x5557/0x6a00 [ 257.867964] ? proc_fail_nth_write+0x7d/0x180 [ 257.872482] ? __cleanup_sighand+0x50/0x50 [ 257.876839] ? lock_downgrade+0x6e0/0x6e0 [ 257.881000] _do_fork+0x19e/0xce0 16:54:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x5, 0x0, 0x1, 0x544, 0x6}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x8, 0x7, 0x0, r2}, &(0x7f0000000200)=0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x20, 0x111f, 0x3f, 0xffffffff, 0x54dcdcea}, 0x14) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 257.884454] ? fork_idle+0x280/0x280 [ 257.884473] ? fput+0xd4/0x150 [ 257.884484] ? SyS_write+0x15e/0x230 [ 257.884496] SyS_clone+0x37/0x50 [ 257.891695] ? sys_vfork+0x30/0x30 [ 257.891712] do_syscall_64+0x1e8/0x640 [ 257.891720] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.891737] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.891744] RIP: 0033:0x459879 [ 257.891749] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 257.891758] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 16:54:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x220000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) r3 = socket(0xa, 0x80004, 0x40) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 257.891765] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 257.898811] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 257.898817] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 257.898822] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 257.907054] x86/PAT: syz-executor.2:11837 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 257.968651] x86/PAT: syz-executor.2:11837 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:00 executing program 2 (fault-call:8 fault-nth:15): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 258.053633] FAULT_INJECTION: forcing a failure. [ 258.053633] name failslab, interval 1, probability 0, space 0, times 0 [ 258.080784] CPU: 1 PID: 11861 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 258.088014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.097382] Call Trace: [ 258.099981] dump_stack+0x138/0x19c [ 258.103632] should_fail.cold+0x10f/0x159 [ 258.107967] should_failslab+0xdb/0x130 [ 258.112006] kmem_cache_alloc+0x47/0x780 [ 258.116082] ? lock_acquire+0x16f/0x430 [ 258.120063] ? check_preemption_disabled+0x3c/0x250 [ 258.125169] skb_clone+0x129/0x320 [ 258.128716] netlink_deliver_tap+0x681/0x8f0 [ 258.133230] netlink_unicast+0x4b2/0x640 [ 258.137470] ? netlink_attachskb+0x6a0/0x6a0 [ 258.141972] ? security_netlink_send+0x81/0xb0 [ 258.147015] netlink_sendmsg+0x7c4/0xc60 [ 258.151084] ? netlink_unicast+0x640/0x640 [ 258.155455] ? security_socket_sendmsg+0x89/0xb0 [ 258.160216] ? netlink_unicast+0x640/0x640 [ 258.164455] sock_sendmsg+0xce/0x110 [ 258.168170] ___sys_sendmsg+0x70a/0x840 [ 258.172178] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 258.177468] ? __fget+0x210/0x370 [ 258.180932] ? find_held_lock+0x35/0x130 [ 258.184998] ? __fget+0x210/0x370 [ 258.188464] ? lock_downgrade+0x6e0/0x6e0 [ 258.192625] ? __fget+0x237/0x370 [ 258.196118] ? __fget_light+0x172/0x1f0 [ 258.200359] ? __fdget+0x1b/0x20 [ 258.203904] ? sockfd_lookup_light+0xb4/0x160 [ 258.208541] __sys_sendmsg+0xb9/0x140 [ 258.212481] ? SyS_shutdown+0x170/0x170 [ 258.216574] SyS_sendmsg+0x2d/0x50 [ 258.220204] ? __sys_sendmsg+0x140/0x140 [ 258.224457] do_syscall_64+0x1e8/0x640 [ 258.228346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.228368] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 258.228377] RIP: 0033:0x459879 [ 258.228382] RSP: 002b:00007f2bd4e8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 16:54:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x5, 0x0, 0x1, 0x544, 0x6}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x8, 0x7, 0x0, r2}, &(0x7f0000000200)=0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x20, 0x111f, 0x3f, 0xffffffff, 0x54dcdcea}, 0x14) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 16:54:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:00 executing program 3: r0 = eventfd2(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r2 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x1, 0x5}, 0x0, 0x0, &(0x7f0000000280)={0x4, 0x2, 0x5, 0x7f}, &(0x7f00000002c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x6}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r1, r2, 0x0, 0x2, &(0x7f00000001c0)='\xc0\x00', r3}, 0x30) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="e04a4f74b80de1fa", 0x8}], 0x1) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdb}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) read(r0, &(0x7f0000000100)=""/144, 0x90) [ 258.228393] RAX: ffffffffffffffda RBX: 00007f2bd4e8ec90 RCX: 0000000000459879 [ 258.228398] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 258.228402] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 258.228410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bd4e8f6d4 [ 258.249683] R13: 00000000004c7789 R14: 00000000004dcfd0 R15: 0000000000000005 [ 258.283600] openvswitch: netlink: Flow key attr not present in new flow. 16:54:00 executing program 1 (fault-call:3 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x400245, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) nanosleep(&(0x7f0000000000)={0x0, 0x989680}, &(0x7f0000000080)) syz_init_net_socket$llc(0x1a, 0x7, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x40000, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000140)=0x2, 0x4) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000100)={0x9, 0x10000, 0xe9}) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff, 0x1}) setns(r1, 0xc000000) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 16:54:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x5, 0x0, 0x1, 0x544, 0x6}, &(0x7f00000000c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x8, 0x8, 0x7, 0x0, r2}, &(0x7f0000000200)=0xffffffffffffff9c) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000140)={0x20, 0x111f, 0x3f, 0xffffffff, 0x54dcdcea}, 0x14) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 16:54:00 executing program 3: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x200000000038) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x40, 0x200000) write$P9_ROPEN(r2, &(0x7f0000000080)={0x18, 0x71, 0x2, {{0x20, 0x1, 0x3}}}, 0x18) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x20000000, 0x20000000, 0xf9}) request_key(&(0x7f0000000000)='id_resolver\x00', 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 258.465980] x86/PAT: syz-executor.2:11890 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 258.500093] FAULT_INJECTION: forcing a failure. [ 258.500093] name failslab, interval 1, probability 0, space 0, times 0 [ 258.517997] FAULT_INJECTION: forcing a failure. [ 258.517997] name failslab, interval 1, probability 0, space 0, times 0 [ 258.531263] CPU: 1 PID: 11897 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 258.538396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.547756] Call Trace: [ 258.550358] dump_stack+0x138/0x19c [ 258.554008] should_fail.cold+0x10f/0x159 [ 258.558179] should_failslab+0xdb/0x130 [ 258.562258] __kmalloc+0x2f0/0x7a0 [ 258.565810] ? ns_capable+0x23/0x30 [ 258.569442] ? __netlink_ns_capable+0xe2/0x130 [ 258.574032] ? genl_family_rcv_msg+0x758/0xc30 [ 258.578628] genl_family_rcv_msg+0x758/0xc30 [ 258.578644] ? genl_rcv+0x40/0x40 [ 258.578658] ? __dev_queue_xmit+0xd33/0x25e0 [ 258.578672] ? trace_hardirqs_on+0xd/0x10 [ 258.595210] ? __local_bh_enable_ip+0x99/0x1a0 [ 258.595228] ? __radix_tree_lookup+0x1b3/0x2f0 [ 258.595250] genl_rcv_msg+0xb4/0x150 [ 258.608404] netlink_rcv_skb+0x14f/0x3c0 [ 258.612481] ? genl_family_rcv_msg+0xc30/0xc30 [ 258.617074] ? netlink_ack+0x9a0/0x9a0 [ 258.621327] ? genl_rcv+0x1a/0x40 [ 258.631136] genl_rcv+0x29/0x40 [ 258.631147] netlink_unicast+0x45d/0x640 [ 258.631160] ? netlink_attachskb+0x6a0/0x6a0 [ 258.631175] ? security_netlink_send+0x81/0xb0 [ 258.631183] netlink_sendmsg+0x7c4/0xc60 [ 258.631195] ? netlink_unicast+0x640/0x640 [ 258.631206] ? security_socket_sendmsg+0x89/0xb0 16:54:01 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x2, 0x666ba5da}, 0xf) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x200000) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) setsockopt(r0, 0xff, 0x1, &(0x7f0000000040), 0x1b9) setsockopt(r0, 0x20, 0x81, &(0x7f00000000c0)="185a60987319b79b8d6f4f13e9e19e0b245b307b99e3a209e5252c71a310ac4324917fffda8313cfa30dfd49e7e6e5a9273d9a84cb6b3140fe3d8739db4b6bfc9678318c1cce4a659a335dedde700d6fa6a9d2e02c6cc0b92b3686f973910b0d7ea3b41b3379a0c556f43b34fa8af4399b02eef4a1930eee0c4c6d93c012c39e1ab2512a51d06ec8b190c5bc9884b53d51e2ca06055a0b9309039831b00a11aac472e6d53cbb1bd5333020a6365032c418699213891d90d54abd239ec6701567efa26f0cf19c6ec7ed7a8a9b9333a72dd42011f3a64e73b76b31ead43c18314f070e7f83e29c6e661ec0", 0xea) 16:54:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 258.631213] ? netlink_unicast+0x640/0x640 [ 258.631223] sock_sendmsg+0xce/0x110 [ 258.631233] ___sys_sendmsg+0x70a/0x840 [ 258.631244] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 258.631256] ? __fget+0x210/0x370 [ 258.677796] ? find_held_lock+0x35/0x130 [ 258.677810] ? __fget+0x210/0x370 [ 258.677828] ? lock_downgrade+0x6e0/0x6e0 [ 258.677840] ? __fget+0x237/0x370 [ 258.701659] ? __fget_light+0x172/0x1f0 [ 258.705731] ? __fdget+0x1b/0x20 [ 258.709103] ? sockfd_lookup_light+0xb4/0x160 [ 258.713617] __sys_sendmsg+0xb9/0x140 16:54:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 258.717424] ? SyS_shutdown+0x170/0x170 [ 258.721424] SyS_sendmsg+0x2d/0x50 [ 258.724965] ? __sys_sendmsg+0x140/0x140 [ 258.729033] do_syscall_64+0x1e8/0x640 [ 258.732922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.737781] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 258.743057] RIP: 0033:0x459879 [ 258.746499] RSP: 002b:00007f2bd4e8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 258.754395] RAX: ffffffffffffffda RBX: 00007f2bd4e8ec90 RCX: 0000000000459879 [ 258.761847] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 258.769637] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 258.769643] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bd4e8f6d4 [ 258.769648] R13: 00000000004c7789 R14: 00000000004dcfd0 R15: 0000000000000005 [ 258.804471] CPU: 0 PID: 11896 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 258.811789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.821161] Call Trace: [ 258.823757] dump_stack+0x138/0x19c [ 258.827487] should_fail.cold+0x10f/0x159 [ 258.831642] should_failslab+0xdb/0x130 [ 258.835624] kmem_cache_alloc+0x2d7/0x780 [ 258.839772] ? _raw_spin_unlock+0x2d/0x50 [ 258.843925] ? __khugepaged_enter+0x26c/0x340 [ 258.848425] copy_process.part.0+0x444f/0x6a00 [ 258.848458] ? __cleanup_sighand+0x50/0x50 [ 258.848472] ? lock_downgrade+0x6e0/0x6e0 [ 258.857260] _do_fork+0x19e/0xce0 [ 258.857276] ? fork_idle+0x280/0x280 [ 258.857292] ? fput+0xd4/0x150 [ 258.857303] ? SyS_write+0x15e/0x230 [ 258.875714] SyS_clone+0x37/0x50 [ 258.879080] ? sys_vfork+0x30/0x30 [ 258.882628] do_syscall_64+0x1e8/0x640 [ 258.886519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.891370] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 258.896558] RIP: 0033:0x459879 [ 258.899742] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 258.907610] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 16:54:01 executing program 2 (fault-call:8 fault-nth:16): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) 16:54:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.mem_exclusive\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100080102) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x6000, 0x0) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f00000000c0)) 16:54:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000440)="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", 0xfc) r1 = accept4$inet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x10, 0x80000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000240)={0x0, 0x4}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000540)={r2, 0x1000, "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"}, &(0x7f00000002c0)=0x1008) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x46000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x40}}, 0x3, 0x1, 0x101, 0x7, 0x28}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000140)={r4, 0x1000, 0x1f, 0x5, 0x4, 0x12}, &(0x7f0000000180)=0x14) 16:54:01 executing program 1 (fault-call:3 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 258.914897] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 258.922283] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 258.929553] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 258.936908] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 258.950784] x86/PAT: syz-executor.2:11896 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 258.959682] x86/PAT: syz-executor.2:11896 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 259.071753] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. [ 259.107281] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.0'. 16:54:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="000100090e00f2b108a35eb7000422000600000021000a00009c5533ca2ac53f81f5e37252ee42d3d2f07631d769b3b2468bb66af16e528c49"], 0x39}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x203, 0xffffffffffffffff, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x6, 0x2) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) 16:54:01 executing program 3: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/sco\x00') io_submit(0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) rmdir(0x0) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, [@bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000000a00)) fcntl$getown(0xffffffffffffffff, 0x9) 16:54:01 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x6, 0x8000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x400000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) [ 259.107492] openvswitch: netlink: Flow key attr not present in new flow. 16:54:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x0, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 259.190673] x86/PAT: syz-executor.2:11947 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 259.197845] FAULT_INJECTION: forcing a failure. [ 259.197845] name failslab, interval 1, probability 0, space 0, times 0 [ 259.221568] CPU: 0 PID: 11939 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 259.228706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.231992] FAULT_INJECTION: forcing a failure. [ 259.231992] name failslab, interval 1, probability 0, space 0, times 0 [ 259.238321] Call Trace: [ 259.238342] dump_stack+0x138/0x19c [ 259.238362] should_fail.cold+0x10f/0x159 [ 259.238376] should_failslab+0xdb/0x130 [ 259.238396] kmem_cache_alloc_node+0x287/0x780 [ 259.268588] ? genl_family_rcv_msg+0x6b9/0xc30 [ 259.273270] __alloc_skb+0x9c/0x500 [ 259.276975] ? skb_scrub_packet+0x4b0/0x4b0 [ 259.281294] netlink_ack+0x21c/0x9a0 [ 259.284999] ? netlink_sendmsg+0xc60/0xc60 [ 259.289223] ? genl_rcv_msg+0xe5/0x150 [ 259.293117] netlink_rcv_skb+0x2fc/0x3c0 [ 259.297350] ? genl_family_rcv_msg+0xc30/0xc30 [ 259.301927] ? netlink_ack+0x9a0/0x9a0 [ 259.305802] ? genl_rcv+0x1a/0x40 [ 259.309254] genl_rcv+0x29/0x40 [ 259.312525] netlink_unicast+0x45d/0x640 [ 259.316577] ? netlink_attachskb+0x6a0/0x6a0 [ 259.321096] ? security_netlink_send+0x81/0xb0 [ 259.325919] netlink_sendmsg+0x7c4/0xc60 [ 259.329981] ? netlink_unicast+0x640/0x640 [ 259.334211] ? security_socket_sendmsg+0x89/0xb0 [ 259.338956] ? netlink_unicast+0x640/0x640 [ 259.343273] sock_sendmsg+0xce/0x110 [ 259.346977] ___sys_sendmsg+0x70a/0x840 [ 259.350955] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 259.355705] ? __fget+0x210/0x370 [ 259.359335] ? find_held_lock+0x35/0x130 [ 259.363386] ? __fget+0x210/0x370 [ 259.366840] ? lock_downgrade+0x6e0/0x6e0 [ 259.371158] ? __fget+0x237/0x370 [ 259.374614] ? __fget_light+0x172/0x1f0 [ 259.378580] ? __fdget+0x1b/0x20 [ 259.381947] ? sockfd_lookup_light+0xb4/0x160 [ 259.386610] __sys_sendmsg+0xb9/0x140 [ 259.390536] ? SyS_shutdown+0x170/0x170 [ 259.394514] SyS_sendmsg+0x2d/0x50 [ 259.398049] ? __sys_sendmsg+0x140/0x140 [ 259.402138] do_syscall_64+0x1e8/0x640 [ 259.406033] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.410898] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 259.416087] RIP: 0033:0x459879 [ 259.419287] RSP: 002b:00007f2bd4e8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 259.426989] RAX: ffffffffffffffda RBX: 00007f2bd4e8ec90 RCX: 0000000000459879 [ 259.434422] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 259.441683] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 259.449047] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bd4e8f6d4 [ 259.456423] R13: 00000000004c7789 R14: 00000000004dcfd0 R15: 0000000000000005 [ 259.463706] CPU: 1 PID: 11947 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 259.471001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.480358] Call Trace: [ 259.482956] dump_stack+0x138/0x19c [ 259.486836] should_fail.cold+0x10f/0x159 [ 259.486852] should_failslab+0xdb/0x130 [ 259.486867] kmem_cache_alloc+0x2d7/0x780 [ 259.494975] copy_process.part.0+0x444f/0x6a00 [ 259.495002] ? __cleanup_sighand+0x50/0x50 [ 259.495014] ? lock_downgrade+0x6e0/0x6e0 [ 259.495029] _do_fork+0x19e/0xce0 [ 259.495040] ? fork_idle+0x280/0x280 [ 259.495071] ? fput+0xd4/0x150 [ 259.522819] ? SyS_write+0x15e/0x230 [ 259.522837] SyS_clone+0x37/0x50 [ 259.522846] ? sys_vfork+0x30/0x30 [ 259.533523] do_syscall_64+0x1e8/0x640 [ 259.537421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.542282] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 259.547469] RIP: 0033:0x459879 [ 259.547478] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 259.558365] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 259.565638] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 259.565645] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 259.565651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 16:54:02 executing program 1 (fault-call:3 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x0, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 259.565657] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 259.591470] audit: type=1400 audit(1566665642.097:88): avc: denied { map } for pid=11953 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=32 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 16:54:02 executing program 2 (fault-call:8 fault-nth:17): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="eb3c00006b6e732e3c957400020401ed01000270fff8bb", 0x17}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x4, &(0x7f0000000240)=0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000340)=""/132) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 259.646604] x86/PAT: syz-executor.2:11947 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 259.680564] x86/PAT: syz-executor.2:11947 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:02 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x9, 0x400000) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000140)={0x0, 0x0, 0x81, &(0x7f0000000100)=0x8}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f00000000c0)=[0x5, 0xffffffffffffffff]) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r4, 0x4018aee2, 0x0) 16:54:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x0, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 259.728900] openvswitch: netlink: Flow key attr not present in new flow. [ 259.785303] FAULT_INJECTION: forcing a failure. [ 259.785303] name failslab, interval 1, probability 0, space 0, times 0 [ 259.819916] CPU: 0 PID: 11973 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 259.827143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.836494] Call Trace: [ 259.839101] dump_stack+0x138/0x19c [ 259.842876] should_fail.cold+0x10f/0x159 [ 259.847045] should_failslab+0xdb/0x130 [ 259.851026] kmem_cache_alloc_node_trace+0x280/0x770 [ 259.856147] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 259.861602] __kmalloc_node_track_caller+0x3d/0x80 [ 259.866524] __kmalloc_reserve.isra.0+0x40/0xe0 [ 259.871182] __alloc_skb+0xcf/0x500 [ 259.874791] ? skb_scrub_packet+0x4b0/0x4b0 [ 259.879098] netlink_ack+0x21c/0x9a0 16:54:02 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x0, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 259.882984] ? netlink_sendmsg+0xc60/0xc60 [ 259.887217] ? genl_rcv_msg+0xe5/0x150 [ 259.891135] netlink_rcv_skb+0x2fc/0x3c0 [ 259.895198] ? genl_family_rcv_msg+0xc30/0xc30 [ 259.899771] ? netlink_ack+0x9a0/0x9a0 [ 259.903857] ? genl_rcv+0x1a/0x40 [ 259.907309] genl_rcv+0x29/0x40 [ 259.910588] netlink_unicast+0x45d/0x640 [ 259.914654] ? netlink_attachskb+0x6a0/0x6a0 [ 259.919059] ? security_netlink_send+0x81/0xb0 [ 259.923627] netlink_sendmsg+0x7c4/0xc60 [ 259.927761] ? netlink_unicast+0x640/0x640 [ 259.931983] ? security_socket_sendmsg+0x89/0xb0 [ 259.936731] ? netlink_unicast+0x640/0x640 [ 259.941057] sock_sendmsg+0xce/0x110 [ 259.944844] ___sys_sendmsg+0x70a/0x840 [ 259.948800] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 259.953537] ? __fget+0x210/0x370 [ 259.956970] ? find_held_lock+0x35/0x130 [ 259.961114] ? __fget+0x210/0x370 [ 259.964559] ? lock_downgrade+0x6e0/0x6e0 [ 259.968692] ? __fget+0x237/0x370 [ 259.972225] ? __fget_light+0x172/0x1f0 [ 259.976360] ? __fdget+0x1b/0x20 [ 259.979724] ? sockfd_lookup_light+0xb4/0x160 [ 259.984335] __sys_sendmsg+0xb9/0x140 [ 259.988115] ? SyS_shutdown+0x170/0x170 [ 259.992194] SyS_sendmsg+0x2d/0x50 [ 259.995715] ? __sys_sendmsg+0x140/0x140 [ 259.999765] do_syscall_64+0x1e8/0x640 [ 260.003631] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.008475] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 260.013739] RIP: 0033:0x459879 [ 260.017012] RSP: 002b:00007f2bd4e8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 260.024930] RAX: ffffffffffffffda RBX: 00007f2bd4e8ec90 RCX: 0000000000459879 [ 260.032292] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 260.039554] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 260.047263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bd4e8f6d4 [ 260.054519] R13: 00000000004c7789 R14: 00000000004dcfd0 R15: 0000000000000005 16:54:02 executing program 1 (fault-call:3 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 260.092676] x86/PAT: syz-executor.2:11989 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 260.133852] FAULT_INJECTION: forcing a failure. [ 260.133852] name failslab, interval 1, probability 0, space 0, times 0 [ 260.154799] CPU: 1 PID: 11989 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 260.162075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.162080] Call Trace: [ 260.162102] dump_stack+0x138/0x19c [ 260.162123] should_fail.cold+0x10f/0x159 [ 260.162139] should_failslab+0xdb/0x130 [ 260.162151] kmem_cache_alloc+0x47/0x780 [ 260.162167] ? __lock_is_held+0xb6/0x140 [ 260.162181] ? check_preemption_disabled+0x3c/0x250 [ 260.195340] anon_vma_clone+0xde/0x470 [ 260.195355] anon_vma_fork+0x87/0x4d0 [ 260.208428] copy_process.part.0+0x45e2/0x6a00 [ 260.213306] ? __cleanup_sighand+0x50/0x50 [ 260.217535] ? lock_downgrade+0x6e0/0x6e0 [ 260.221701] _do_fork+0x19e/0xce0 [ 260.225214] ? fork_idle+0x280/0x280 [ 260.228942] ? fput+0xd4/0x150 [ 260.232163] ? SyS_write+0x15e/0x230 [ 260.235978] SyS_clone+0x37/0x50 [ 260.239539] ? sys_vfork+0x30/0x30 [ 260.243183] do_syscall_64+0x1e8/0x640 [ 260.247094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.251199] openvswitch: netlink: Flow key attr not present in new flow. [ 260.252296] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 260.252309] RIP: 0033:0x459879 [ 260.267596] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 260.275313] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 260.279335] FAULT_INJECTION: forcing a failure. [ 260.279335] name failslab, interval 1, probability 0, space 0, times 0 [ 260.282602] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 260.282608] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 260.282613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 260.282617] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 260.304015] CPU: 0 PID: 11999 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 260.317550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.317555] Call Trace: [ 260.317572] dump_stack+0x138/0x19c [ 260.317591] should_fail.cold+0x10f/0x159 [ 260.317607] should_failslab+0xdb/0x130 [ 260.317620] kmem_cache_alloc+0x47/0x780 [ 260.317634] ? lock_acquire+0x16f/0x430 [ 260.317647] ? check_preemption_disabled+0x3c/0x250 [ 260.317661] skb_clone+0x129/0x320 [ 260.317674] netlink_deliver_tap+0x681/0x8f0 [ 260.317684] ? sk_skb_prologue+0xa50/0xa50 [ 260.317698] __netlink_sendskb+0x49/0xa0 [ 260.317708] netlink_unicast+0x525/0x640 [ 260.317719] ? netlink_attachskb+0x6a0/0x6a0 [ 260.317731] netlink_ack+0x51d/0x9a0 [ 260.397841] ? netlink_sendmsg+0xc60/0xc60 [ 260.402061] ? genl_rcv_msg+0xe5/0x150 [ 260.406016] netlink_rcv_skb+0x2fc/0x3c0 [ 260.410060] ? genl_family_rcv_msg+0xc30/0xc30 [ 260.414884] ? netlink_ack+0x9a0/0x9a0 [ 260.418757] ? genl_rcv+0x1a/0x40 [ 260.422299] genl_rcv+0x29/0x40 [ 260.425645] netlink_unicast+0x45d/0x640 [ 260.429690] ? netlink_attachskb+0x6a0/0x6a0 [ 260.434080] ? security_netlink_send+0x81/0xb0 [ 260.438643] netlink_sendmsg+0x7c4/0xc60 [ 260.442688] ? netlink_unicast+0x640/0x640 [ 260.446912] ? security_socket_sendmsg+0x89/0xb0 [ 260.451646] ? netlink_unicast+0x640/0x640 [ 260.455863] sock_sendmsg+0xce/0x110 [ 260.459557] ___sys_sendmsg+0x70a/0x840 [ 260.463512] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 260.468421] ? __fget+0x210/0x370 [ 260.471857] ? find_held_lock+0x35/0x130 [ 260.475901] ? __fget+0x210/0x370 [ 260.479438] ? lock_downgrade+0x6e0/0x6e0 [ 260.483661] ? __fget+0x237/0x370 [ 260.487291] ? __fget_light+0x172/0x1f0 [ 260.491256] ? __fdget+0x1b/0x20 [ 260.494624] ? sockfd_lookup_light+0xb4/0x160 [ 260.499105] __sys_sendmsg+0xb9/0x140 [ 260.502977] ? SyS_shutdown+0x170/0x170 [ 260.506955] SyS_sendmsg+0x2d/0x50 [ 260.510474] ? __sys_sendmsg+0x140/0x140 [ 260.514520] do_syscall_64+0x1e8/0x640 [ 260.518388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.523224] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 260.528395] RIP: 0033:0x459879 [ 260.531569] RSP: 002b:00007f2bd4e8ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 260.539260] RAX: ffffffffffffffda RBX: 00007f2bd4e8ec90 RCX: 0000000000459879 [ 260.546788] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 260.554310] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 260.561821] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bd4e8f6d4 [ 260.569079] R13: 00000000004c7789 R14: 00000000004dcfd0 R15: 0000000000000005 [ 260.670806] x86/PAT: syz-executor.2:12005 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 260.689028] x86/PAT: syz-executor.2:12005 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x0, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x3a9601, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) 16:54:04 executing program 1 (fault-call:3 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:04 executing program 2 (fault-call:8 fault-nth:18): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:04 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05605, &(0x7f0000001200)={0xb, @win={{0x38305543}, 0x0, 0x0, 0x0, 0x0, 0x0}}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000440)={@local, 0x2, 0x2, 0x3, 0x2, 0x2, 0x3f}, 0x20) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000480)={{0x3ff, 0x101}, 'port0\x00', 0x100000013, 0xc1017, 0xc2, 0x1d, 0x9de, 0x9, 0x71, 0x0, 0x1, 0x105}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000003c0)='dctcp\x00', 0x6) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') rt_sigpending(&(0x7f0000000400), 0x8) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x90000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x1a0, r1, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA={0x54, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x124, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1f, @ipv4={[], [], @remote}, 0xfffffffffffffff8}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffffff5d}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x8000, @loopback, 0x1f}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7, @mcast1, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffff0}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bond0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x80000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x140000000000000, @dev={0xfe, 0x80, [], 0x10}, 0x7fff}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @mcast1, 0x1ff}}}}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x40}, 0x4) 16:54:04 executing program 3: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x8081, 0x102) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="b400000000000000711117000000000000400000"], &(0x7f0000000080)='GPL\x00', 0x4, 0x3f7, &(0x7f000000cf3d)=""/195}, 0x48) 16:54:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x4, 0x8800) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000280)=0xe8) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000840)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) getgroups(0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0xee00, 0x0]) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000880)={'nat\x00'}, &(0x7f0000000900)=0x78) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="02000000010002000000000002000400", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=r4, @ANYBLOB="efff0400f8b7bb5fe199eef16c4f444fa053334741b097a3c6f4c0d74d606dcb8bd6922a5f7cc70b275baca945af0c9d2d52950ea202e6b5c36abe9411b2a9ce17daaa228040c6aea2", @ANYRES32=r5, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB="040001000000000008000300", @ANYRES32=r7, @ANYBLOB="08000200", @ANYRES32=r8, @ANYBLOB="100001040000000020000500ebffffff"], 0x5c, 0x2) ioctl$SG_GET_SG_TABLESIZE(r1, 0x227f, &(0x7f00000000c0)) r9 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000b00)={{0x3000, 0x1000, 0xf, 0x1, 0x100000001, 0x80000000, 0x9, 0xbb5000000000, 0xfffffffffffffffe, 0x100, 0xd5, 0x2}, {0x2, 0x3000, 0xf, 0x9, 0x3, 0x0, 0x394, 0x1, 0xfffffffffffffffa, 0x4f, 0x8, 0x4}, {0x1000, 0x6000, 0x1b, 0x1, 0x800, 0x7ff, 0x0, 0x3, 0x2, 0xffffffffffffff00, 0x0, 0x6}, {0x1000, 0xd000, 0xf, 0xbb, 0x1, 0xfff, 0x80000000, 0x8, 0x7fff, 0xe58d, 0x1000, 0x6}, {0x100000, 0x1000, 0xf, 0xa0, 0x4, 0x3, 0x1, 0x4, 0x7fffffff, 0x87, 0x400, 0xa4}, {0x10000, 0x7004, 0xc, 0x7fffffff, 0x5, 0x7f, 0x1, 0x2ba2, 0x4, 0xffffffff, 0xdc26}, {0x1f000, 0x10000, 0xd, 0x8412, 0x1ff, 0xd5e, 0x8, 0x640, 0x1, 0x6, 0x800, 0x2}, {0x7c065bbe03b860c6, 0x6004, 0xd, 0xffff, 0xcb, 0x1f0, 0x100, 0x80000000, 0x8, 0x8, 0x4, 0x40}, {0xc92a3fc00ea6f8e4, 0x6000}, {0x3001, 0xf000}, 0x20000010, 0x0, 0x10000, 0x210000, 0x6, 0x6000, 0x3000, [0xffffffffffffffff, 0x9, 0x2, 0x9]}) ioctl$KVM_CREATE_DEVICE(r9, 0xc00caee0, &(0x7f0000000100)={0x4, r1, 0x1}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r10, 0x4018aee2, 0x0) r11 = add_key(&(0x7f00000007c0)='cifs.spnego\x00', &(0x7f0000000800)={'syz', 0x2}, &(0x7f0000000a00)="9b629f4730d011d577777ddc01567bac6a8ef898b0796d00b20b17b625b91d346d18907a222647cf62b253cf81bd6f9efc2cddd0453eafdb67cd32c98af4872a9c40b1794b674348ebfd6ccbbb004788fb24e30d82fc609b804a33bf4b433749fbdab65d4d00226186c7bae1cb6f45b154d1ced20ef627fa4cea030bfe0663c66854ab0e4019605875bb8887a07e840a346cca02da99b9f65f0eddad2ebf713a668d812557bd55e731f7104406ffa5333daf5201bf2587fa9dd326e121dd26f9425e399149f22623e9db4acb99fea1f4f9011fe5a5a482a73db97911169a8530fd7a", 0xe2, 0xffffffffffffffff) keyctl$revoke(0x3, r11) socket$inet_udplite(0x2, 0x2, 0x88) 16:54:04 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x80, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000540)={0x8, 0x7, 0x2}) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x40) r1 = syz_open_dev$vbi(&(0x7f00000005c0)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$netlink(r1, 0x10e, 0x2, &(0x7f0000000180)=""/49, &(0x7f00000001c0)=0x31) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000500)=0x1) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000300)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000000)=0x80) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x9, 0xf0602) ioctl$KDADDIO(r3, 0x4b34, 0x7) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000200)=""/148, 0x94}, {&(0x7f0000000380)=""/188, 0xbc}, {&(0x7f00000002c0)=""/6, 0x6}, {&(0x7f0000000440)=""/52, 0x34}], 0x4, 0x0) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000040)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) 16:54:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) pwritev(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)="dd853a8955935a1a5692f452fefbea42deea560e58320a00381d49c3c1e054e528bea045ba2ecc824d9b8e13c76cea622323b7ac747265436ddfc8ad9563d781b5d1b5c4701dd86590b9560f08c27a8f14d6820c64978475659a900fe8b2e1fb0fc39724d838fff59a58c1152f24930132951a81d7d26e1ea933b46944f188d4278a0be0cb16352d0a7ca136fde2d544b86f500df312b78a19a1c06f5c509afca6873c726f3068b6961d9736231b32584abfb90aad0b8e5d19ea07800fc4ceb5fd99ca0d14b7196bff472f33537e5996a9000f087fb0dfdd8b30ae1121bcc2da", 0xe0}, {&(0x7f00000001c0)="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", 0xfb}, {&(0x7f00000002c0)="2a139cc7cb0422bb10aa6acd6f5ef26233a2d36ccdc585c37d1c3c25a5ab89b926e6b1d4959396f9263dac6ee7763949aecb6776e2fdd07326955624275262cfbd7bda219152160f50fdc86a5340a46a5068d909f88eeed4703ffd9e44d7e08dee970a7f2bc2dedda54ed1a1db734e85d9b50631afc0182adaaeef89afdbe2dfb94fe6605b0717a7540f3ca96fb5b8f0f6484b715a4ca236b5d876eebd3e3e04542231c98603561a379c78da", 0xac}], 0x3, 0x0) pipe2(&(0x7f00000003c0), 0x80000) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000f7320019010000000000080000ff0000007cd03fab879af71601293afc89cd6bc295dc4136cdb210818d8c36ad4e93a7f1"], 0x18}}, 0x0) [ 262.252557] x86/PAT: syz-executor.2:12018 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 262.269466] openvswitch: netlink: Flow key attr not present in new flow. [ 262.288052] FAULT_INJECTION: forcing a failure. [ 262.288052] name failslab, interval 1, probability 0, space 0, times 0 [ 262.322936] CPU: 1 PID: 12018 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 262.330080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.339545] Call Trace: [ 262.342147] dump_stack+0x138/0x19c [ 262.345785] should_fail.cold+0x10f/0x159 [ 262.349948] should_failslab+0xdb/0x130 [ 262.353928] kmem_cache_alloc+0x47/0x780 [ 262.357990] ? anon_vma_chain_link+0x142/0x1a0 [ 262.362696] anon_vma_clone+0xde/0x470 [ 262.366590] anon_vma_fork+0x87/0x4d0 16:54:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/llc\x00') ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000080)={0xb, {0x6f7, 0x8, 0xfffffffffffff48d, 0x7}, {0x200, 0xfffffffffffffffc, 0x3, 0x1000}, {0x9, 0x8000}}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000000)={0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffff7}) ioctl$TCSETSF(r2, 0x5412, &(0x7f00000000c0)={0x1a}) [ 262.366610] copy_process.part.0+0x45e2/0x6a00 [ 262.366639] ? __cleanup_sighand+0x50/0x50 [ 262.379240] ? lock_downgrade+0x6e0/0x6e0 [ 262.383408] _do_fork+0x19e/0xce0 [ 262.386873] ? fork_idle+0x280/0x280 [ 262.390594] ? fput+0xd4/0x150 [ 262.394055] ? SyS_write+0x15e/0x230 [ 262.397772] SyS_clone+0x37/0x50 [ 262.401304] ? sys_vfork+0x30/0x30 [ 262.404848] do_syscall_64+0x1e8/0x640 [ 262.404858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.404878] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 262.404886] RIP: 0033:0x459879 [ 262.404890] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 262.404903] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 262.413686] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 262.413692] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 262.413697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 262.413702] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x80000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000140)=[@in6={0xa, 0x4e23, 0x1, @rand_addr="6d1b39b625e770cc99503989da8ade78", 0x1000}, @in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}, @in={0x2, 0x4e24, @local}], 0x4c) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x0, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 262.434829] x86/PAT: syz-executor.2:12018 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 262.503845] bond0: Releasing backup interface bond_slave_1 16:54:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000280)='./bus\x00', 0x0, 0x18}, 0x10) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x50d, 0x0, 0x0, 0x6, 0x0, 0x2328, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4100, 0x0, 0x2, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ftruncate(r0, 0x208200) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xcde54) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000240)) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000200)={0xa10000, 0xffff, 0x4, [], &(0x7f00000001c0)={0x9f0b91, 0x0, [], @value=0x7ff}}) mkdirat(0xffffffffffffffff, 0x0, 0x10) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000340)={0x9, 0x3ff}) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000000c0)={0x9, 0x6}) mmap(&(0x7f0000000000/0x600000)=nil, 0x602209, 0x5, 0x4002011, r2, 0x0) [ 262.566577] x86/PAT: syz-executor.2:12018 freeing invalid memtype [mem 0x00002000-0x00002fff] [ 262.584324] openvswitch: netlink: Flow key attr not present in new flow. 16:54:05 executing program 2 (fault-call:8 fault-nth:19): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000080)=0x5, 0x4) 16:54:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 262.628855] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 262.731826] audit: type=1804 audit(1566665645.237:89): pid=12059 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir187553792/syzkaller.zugFVD/159/file0/bus" dev="ramfs" ino=53641 res=1 16:54:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x141000) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000080)={0x4000001, 0x3, 0x1c}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 262.825429] openvswitch: netlink: Flow key attr not present in new flow. [ 262.844207] openvswitch: netlink: Flow key attr not present in new flow. 16:54:05 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x3fd, 0x3}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000100)={0x1, 0x0, 0x2012, 0x9, 0x3ff, {0x2, 0x4}, 0x1}) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000080)={0x2, 0x1000, "70044fc144f7f4caed575edbc93461fa0237ead41ac2fe7e", {0x1, 0x8000}, 0x7fff}) [ 262.863016] audit: type=1804 audit(1566665645.247:90): pid=12053 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir187553792/syzkaller.zugFVD/159/file0/bus" dev="ramfs" ino=53641 res=1 [ 262.886237] x86/PAT: syz-executor.2:12064 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_FPEMU(0xa, 0x1) [ 262.922587] FAULT_INJECTION: forcing a failure. [ 262.922587] name failslab, interval 1, probability 0, space 0, times 0 [ 263.002987] CPU: 0 PID: 12064 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 263.003401] audit: type=1804 audit(1566665645.247:91): pid=12053 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir187553792/syzkaller.zugFVD/159/file0/bus" dev="ramfs" ino=53641 res=1 [ 263.010124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.010129] Call Trace: [ 263.010149] dump_stack+0x138/0x19c [ 263.010169] should_fail.cold+0x10f/0x159 [ 263.010181] ? anon_vma_clone+0xde/0x470 [ 263.010193] should_failslab+0xdb/0x130 [ 263.010206] kmem_cache_alloc+0x47/0x780 [ 263.010218] ? anon_vma_chain_link+0x142/0x1a0 [ 263.010231] anon_vma_clone+0xde/0x470 [ 263.010247] anon_vma_fork+0x87/0x4d0 [ 263.010262] copy_process.part.0+0x45e2/0x6a00 [ 263.010288] ? __cleanup_sighand+0x50/0x50 [ 263.010302] ? lock_downgrade+0x6e0/0x6e0 [ 263.010318] _do_fork+0x19e/0xce0 [ 263.010334] ? fork_idle+0x280/0x280 [ 263.010347] ? fput+0xd4/0x150 [ 263.010358] ? SyS_write+0x15e/0x230 [ 263.010372] SyS_clone+0x37/0x50 [ 263.010380] ? sys_vfork+0x30/0x30 [ 263.010392] do_syscall_64+0x1e8/0x640 [ 263.010400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.010414] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.010422] RIP: 0033:0x459879 [ 263.010428] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 263.010442] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 16:54:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x80000, 0x0) dup2(r3, r2) 16:54:05 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000100)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) delete_module(&(0x7f00000003c0)='/dev/vsock\x00', 0x200) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x8, 0x1, 0x80000001, 0x1, 0x5, 0x1b, 0x3ff, {0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x2, 0x7, 0x200, 0xff, 0x10001}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000240)={r3, 0x401}, 0x8) bind$rose(r1, &(0x7f0000000340)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}}, 0x1c) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="1a5fba0000080000000000d5bbc0a40190fa7d07ab3016352f05eb0000accb5fc73e05c70973b2ee0f4c81f4885ab580170bd2b04c874c0e13fd3556d52c1952b1eecfb2e88a4865987d40961479abd447194584b3694d42fcda1dca03da495c96adc0fbc9043a84ca1498cc5ecd09ca84bb8e7e353430b282970464bd34fa454da63f726e92d46a26757b8cc78f232aedf0282f8fe41f8fcd5839c25c830eab35b264a292707c3f4d2bde"], 0x1}, 0x1, 0x0, 0x0, 0x80}, 0x0) pipe2(&(0x7f0000000080), 0x80000) [ 263.148680] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 263.156029] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 263.163282] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 263.170783] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:05 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="21d9783b9900201602e9a782556c097a905718cae39464ffed5cb6ed2796d0809bd531700e7100000000fcff40855bcf164533fa29d9c481b3"], 0x1}}, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 16:54:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) fcntl$setflags(r0, 0x2, 0x1) [ 263.328437] audit: type=1400 audit(1566665645.837:92): avc: denied { bind } for pid=12084 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:54:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$rxrpc(0xffffffffffffffff, &(0x7f00000000c0)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0x5}}, 0x24) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='\x99\xabW.\xb4/>_') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$caif_stream(0x25, 0x1, 0x5) unlink(&(0x7f0000000180)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x13}}, 0x10) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x400, 0x2, 0x4, 0x0, 0xb3d, 0x0, 0x133}, 0x10) inotify_add_watch(r0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x8) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000400)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x13}}, 0x3) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) 16:54:05 executing program 2 (fault-call:8 fault-nth:20): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 263.458573] x86/PAT: syz-executor.2:12099 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 263.486470] openvswitch: netlink: Flow key attr not present in new flow. [ 263.499132] openvswitch: netlink: Flow key attr not present in new flow. 16:54:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x4, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) socket$netlink(0x10, 0x3, 0x13) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee2, 0x0) [ 263.502497] x86/PAT: syz-executor.2:12099 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18000000320019010000e1ff0000009000090000e33a0dddf100fff00000280a42c8547c290b1dace7a76df7e496fbe9982e726a3d98e1e0b106e9f3bcfa9166c4b37ebf9bec8a723f48cadcb0eaea219e74831e24575771cbda05532b5f672cbb2edbd8b50a862815a25748012247bdd7cff7f0b6a96eaf1fd9418832895620af5536eaf3d1604dc5a26c932768bf56f36e69bbfb47521707458e6b706dd61813"], 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4003100}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0xa0, r2, 0x4, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x28, 0x2}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xce86}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x10}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5c}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7ff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0xa0}, 0x1, 0x0, 0x0, 0xc30bb34b7a5580a9}, 0x4000000) socket$nl_netfilter(0x10, 0x3, 0xc) [ 263.632287] x86/PAT: syz-executor.2:12113 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 263.667613] FAULT_INJECTION: forcing a failure. [ 263.667613] name failslab, interval 1, probability 0, space 0, times 0 [ 263.697248] CPU: 0 PID: 12113 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 263.704391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.713828] Call Trace: [ 263.713858] dump_stack+0x138/0x19c [ 263.713878] should_fail.cold+0x10f/0x159 [ 263.720070] should_failslab+0xdb/0x130 [ 263.720087] kmem_cache_alloc+0x2d7/0x780 [ 263.720099] ? anon_vma_clone+0x310/0x470 [ 263.720114] anon_vma_fork+0xe9/0x4d0 [ 263.720129] copy_process.part.0+0x45e2/0x6a00 16:54:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x10000, 0x0) setns(r1, 0x12000000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000ff01000092f5000000000001000000ff0000000000"], 0x1}}, 0x0) shutdown(r2, 0x1) [ 263.720158] ? __cleanup_sighand+0x50/0x50 [ 263.720179] ? lock_downgrade+0x6e0/0x6e0 [ 263.720194] _do_fork+0x19e/0xce0 [ 263.720209] ? fork_idle+0x280/0x280 [ 263.753682] ? fput+0xd4/0x150 [ 263.753694] ? SyS_write+0x15e/0x230 [ 263.760929] SyS_clone+0x37/0x50 [ 263.760937] ? sys_vfork+0x30/0x30 [ 263.760951] do_syscall_64+0x1e8/0x640 [ 263.760959] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.760976] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.760983] RIP: 0033:0x459879 [ 263.760988] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 263.771309] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 263.771313] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 263.771318] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 263.771322] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 263.771326] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 263.783530] x86/PAT: syz-executor.2:12113 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:06 executing program 2 (fault-call:8 fault-nth:21): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = dup3(r0, r0, 0x80000) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000080)={0x2000000000000000, 0x3000, 0x2, 0x2, 0x1}) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000000c0)=0x2) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1800000032001901000000000000000001000000ff00000072f47d95dfa47803e4a62fbcecf09b8e2036b364e6ead6ae310fbd21a4e3a50cac20b247a92e0ce50d81c124c8697f6889498f822aa4ae337dac5243dd89de83a025be4be0947c0cf214cba9c0c0a37d21da3415329a705e7e196a0b59d075e0f0f4212068afc36f294c2bd67557ae5d0774daedfd87212d5964f7345e4610ba0fa3e8395191db2166f1daaa"], 0x18}}, 0x0) [ 263.826464] x86/PAT: syz-executor.2:12113 freeing invalid memtype [mem 0x00002000-0x00002fff] [ 263.861560] audit: type=1400 audit(1566665646.367:93): avc: denied { shutdown } for pid=12129 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 264.008223] openvswitch: netlink: Flow key attr not present in new flow. [ 264.024222] x86/PAT: syz-executor.2:12144 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 264.065386] FAULT_INJECTION: forcing a failure. [ 264.065386] name failslab, interval 1, probability 0, space 0, times 0 [ 264.086666] CPU: 1 PID: 12144 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 264.093890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.103429] Call Trace: [ 264.106027] dump_stack+0x138/0x19c [ 264.109666] should_fail.cold+0x10f/0x159 [ 264.113908] should_failslab+0xdb/0x130 [ 264.117893] kmem_cache_alloc+0x2d7/0x780 [ 264.122047] ? anon_vma_clone+0x310/0x470 [ 264.126246] anon_vma_fork+0x1ce/0x4d0 [ 264.130309] copy_process.part.0+0x45e2/0x6a00 [ 264.134959] ? __cleanup_sighand+0x50/0x50 [ 264.139200] ? lock_downgrade+0x6e0/0x6e0 [ 264.143365] _do_fork+0x19e/0xce0 [ 264.146828] ? fork_idle+0x280/0x280 [ 264.150552] ? fput+0xd4/0x150 [ 264.153749] ? SyS_write+0x15e/0x230 [ 264.157462] SyS_clone+0x37/0x50 [ 264.160804] ? sys_vfork+0x30/0x30 [ 264.164561] do_syscall_64+0x1e8/0x640 [ 264.168424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.173415] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.178885] RIP: 0033:0x459879 [ 264.182053] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 264.190002] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 264.197441] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 264.204808] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 264.212159] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 264.219670] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 264.231238] x86/PAT: syz-executor.2:12144 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 264.240481] x86/PAT: syz-executor.2:12144 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:08 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) recvfrom(r0, &(0x7f0000000100)=""/185, 0xb9, 0x1, &(0x7f00000001c0)=@caif=@rfm={0x25, 0x100, "148f436323f1c84b3596301cbfc26e6d"}, 0x80) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'user.', 'em0(^em1^!trusted\\\x00'}, 0x0, 0x0, 0x0) 16:54:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) symlink(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='\x99\xabW.\xb4/>_') r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$caif_stream(0x25, 0x1, 0x5) unlink(&(0x7f0000000180)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, &(0x7f0000000300)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x13}}, 0x10) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x400, 0x2, 0x4, 0x0, 0xb3d, 0x0, 0x133}, 0x10) inotify_add_watch(r0, &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x8) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000400)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x13}}, 0x3) openat$vhci(0xffffffffffffff9c, 0x0, 0x0) 16:54:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) socketpair(0xd7cf9d7205b1f384, 0x1, 0x7fff, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r4, 0xb101, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) accept4(r1, &(0x7f0000000080)=@in={0x2, 0x0, @loopback}, &(0x7f0000000000)=0x80, 0x80800) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) 16:54:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1800000032001901000000000000000001000000ff000000d29e0cac1de96b4e4cada491c339995c1528ab19541bd50a532d308aff0b92adf3fb5907751a106038f19b1f4ad7b80a7d17ead08a68886beb1d32c7479b351a7136c55abd02ec357d542f9f64553a14c0940033be0d221456d668d60259055684f2d6e46dee6dfc55bf7a113f6d87022b8b60deec5fc427f7d5149f7abb259464f17abda563b00f75c64c53cff88aa38d001f67ca49096eaa48d3540de750f7bdfeafaf23e5b23a1cd7984501f5c136f0a4ea57b6c1d5aa8b31f05d70c55196e7df66d1c6ac2f90cad17eba7a5002367677de5eb986"], 0x18}}, 0x0) 16:54:08 executing program 2 (fault-call:8 fault-nth:22): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 266.334132] net_ratelimit: 1 callbacks suppressed [ 266.334137] openvswitch: netlink: Flow key attr not present in new flow. [ 266.353835] x86/PAT: syz-executor.2:12158 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 266.366501] FAULT_INJECTION: forcing a failure. [ 266.366501] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 266.387283] CPU: 1 PID: 12158 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 266.394428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.403881] Call Trace: [ 266.406487] dump_stack+0x138/0x19c [ 266.410217] should_fail.cold+0x10f/0x159 [ 266.410231] ? __might_sleep+0x93/0xb0 [ 266.410249] __alloc_pages_nodemask+0x1d6/0x7a0 [ 266.410261] ? save_stack+0xa9/0xd0 [ 266.410276] ? __alloc_pages_slowpath+0x2930/0x2930 [ 266.410286] ? anon_vma_fork+0x1ce/0x4d0 [ 266.410299] ? copy_process.part.0+0x45e2/0x6a00 [ 266.436647] ? _do_fork+0x19e/0xce0 [ 266.436665] ? __lock_acquire+0x5f7/0x4620 [ 266.449533] alloc_pages_current+0xec/0x1e0 [ 266.453961] __get_free_pages+0xf/0x40 [ 266.457859] get_zeroed_page+0x11/0x20 [ 266.457870] __pud_alloc+0x3b/0x200 [ 266.457882] pud_alloc+0xc9/0x130 [ 266.457892] copy_page_range+0x2de/0x1bd0 [ 266.457911] ? find_held_lock+0x35/0x130 [ 266.477041] ? find_held_lock+0x35/0x130 [ 266.481139] ? __pmd_alloc+0x410/0x410 [ 266.485040] ? __vma_link_rb+0x247/0x340 [ 266.489214] copy_process.part.0+0x4764/0x6a00 [ 266.493836] ? __cleanup_sighand+0x50/0x50 [ 266.498263] ? lock_downgrade+0x6e0/0x6e0 [ 266.498283] _do_fork+0x19e/0xce0 [ 266.498297] ? fork_idle+0x280/0x280 [ 266.505874] ? fput+0xd4/0x150 [ 266.505886] ? SyS_write+0x15e/0x230 [ 266.505901] SyS_clone+0x37/0x50 [ 266.505909] ? sys_vfork+0x30/0x30 [ 266.505922] do_syscall_64+0x1e8/0x640 [ 266.527277] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.532132] entry_SYSCALL_64_after_hwframe+0x42/0xb7 16:54:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x18}}, 0x0) 16:54:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:09 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d24000)=[@in6={0xa, 0x0, 0x0, @loopback}, @in={0x2, 0x0, @multicast1}], 0x2c) socket$inet6(0xa, 0x5, 0x5) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x0, @local}], 0x10) 16:54:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 266.537354] RIP: 0033:0x459879 [ 266.540536] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 266.548243] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 266.555521] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 266.563027] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 266.570392] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 266.577665] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) connect$pptp(r1, &(0x7f00000000c0)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}}}, 0x1e) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x461534a2498cf89c, 0x0, 0x25dfdbfc, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000140)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x20000, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee1, &(0x7f00000000c0)={0x0, 0x1f, 0xff, &(0x7f0000000080)=0xfffffffffffffc01}) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000040)={0x4, 0xffffffffffffffff}) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000100)={0x7ff, 0x80}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee2, 0x0) 16:54:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x88400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x802, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xf79, 0x210002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40402, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x8000, 0x0) socket(0x8, 0x6, 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x101400, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x100, 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x400, 0xe66e7d493e2c425b) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x400, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x64416095b24347b8, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x5, 0xd48357999bf04dc7) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x8000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0x10000026f) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) [ 266.663498] x86/PAT: syz-executor.2:12158 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:09 executing program 2 (fault-call:8 fault-nth:23): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 266.704193] x86/PAT: syz-executor.2:12158 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:09 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) wait4(r0, 0x0, 0x1000000, 0x0) clone(0x1fffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pipe(&(0x7f0000000400)={0xffffffffffffffff}) write(r2, &(0x7f0000000080), 0x0) ptrace(0x4206, r1) wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x9) 16:54:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f00000001c0)=0x4) accept4$nfc_llcp(r2, &(0x7f0000000140), &(0x7f00000000c0)=0x60, 0x80000) 16:54:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 266.904810] x86/PAT: syz-executor.2:12209 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 266.919879] FAULT_INJECTION: forcing a failure. [ 266.919879] name failslab, interval 1, probability 0, space 0, times 0 [ 266.933007] openvswitch: netlink: Flow key attr not present in new flow. [ 266.956677] CPU: 0 PID: 12209 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 266.963815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.973261] Call Trace: [ 266.975858] dump_stack+0x138/0x19c [ 266.979613] should_fail.cold+0x10f/0x159 [ 266.983772] should_failslab+0xdb/0x130 [ 266.987755] kmem_cache_alloc+0x2d7/0x780 [ 266.991914] ? anon_vma_clone+0x310/0x470 [ 266.996174] anon_vma_fork+0x1ce/0x4d0 [ 267.000076] copy_process.part.0+0x45e2/0x6a00 [ 267.004683] ? __cleanup_sighand+0x50/0x50 [ 267.008930] ? lock_downgrade+0x6e0/0x6e0 [ 267.013087] _do_fork+0x19e/0xce0 [ 267.016552] ? fork_idle+0x280/0x280 [ 267.020332] ? fput+0xd4/0x150 [ 267.023527] ? SyS_write+0x15e/0x230 [ 267.027246] SyS_clone+0x37/0x50 [ 267.030611] ? sys_vfork+0x30/0x30 [ 267.034157] do_syscall_64+0x1e8/0x640 [ 267.038043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.043080] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.048264] RIP: 0033:0x459879 16:54:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:09 executing program 3: socketpair$unix(0x1, 0x10f6321af876ae7f, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x200001a1, &(0x7f0000000100)=[{0x28, 0xfffffffffffffffd, 0x0, 0xfffff000}, {0xfffffffffffffffa, 0x80000, 0x0, 0x400}]}, 0x13a) 16:54:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000000c0)=0x8000, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 267.051445] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 267.059155] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 267.066614] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 267.073888] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 267.081280] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 267.088564] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000bc0), 0x4000000000006ca, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004e00)=[{0x0, 0x36b, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000009000000000100af6d68dcf801", @ANYRES32=r0, @ANYRES32=r0], 0x18}], 0x492492492492556, 0x0) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000080), 0x4) 16:54:09 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc100) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x5, 0x200382) sendmsg$kcm(r1, &(0x7f00000024c0)={&(0x7f00000000c0)=@nfc={0x27, 0x1, 0x1, 0x1}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000000140)="b4d63a08f7e7a3950bd2dbc3fbbc859a66576f266ef7414393c2b46747ad4dfce74a11f4d0fe2062eadd63da157f9e1eba3b6c4ae7cb4e7fce84dd4d25b8994ba5987a4b8f1f716053e4e0179dec443c9197fa901aaf224ea7684d0c884c355d0bd749a1a2f798ebe9c930dab031cf132c0f673caff8a96ecf038160659172e060649c", 0x83}, {&(0x7f0000001240)="b967ab857f8dd5d861eebaa0d0b7036f4cb37525dfb0bccd826b4a8b1db64ad4222c71afe0e4f7b93bef0ccf0d43f9b49e10381758", 0x35}, {&(0x7f0000001280)="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", 0x1000}, {&(0x7f0000002280)="7813fa75ac0fbb1207a86f3d9379233543b4043fbcff4c06e4ae8c10b60b7a137f0c755ae32292f03f3c2e56e882bf7e8e", 0x31}], 0x5, &(0x7f0000002340)=[{0x30, 0x10a, 0x8000, "25742ea5b57b95e823c6f6a9f01f84071e996e218299a9d569"}, {0x48, 0x117, 0x3, "428fa267b502ecbc53b766d6c6f58d63a3667f1c4caf8116890bc0f8199879041879263fd2e08a11b07caabd9310c2aca19f389041a86e68"}, {0xd0, 0x1, 0x4, "11bc8410b4eb5f0b37df9c57744814d6685f0cdc471f4077fb888e8c3e8fa160891ded61dfbf319d24251f8a79ed878d4ef5e6fe961b9611767907cc4a4009215fd6756479a9af20d600e1663597e7bb8366ff8d846931e764dd28d384c8d385b72896f2d0a6a5d87faf08348c9c95b623e9190d5ef49dba6c83dd2a48f7835d7f503062c64f32988961599d15b6233539db8d4edbc58b4e2829ff12856e87d3919f0a7ed0d6f0b15ac2338353cfa824007198cbfa3b69836589"}], 0x148}, 0x4000) write$binfmt_aout(r0, &(0x7f0000002500)={{0x0, 0x0, 0x0, 0x0, 0x10000000}, "825f438a45ed6ccdf37cf2e7c7a3"}, 0xff63) [ 267.208659] x86/PAT: syz-executor.2:12209 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 267.243616] x86/PAT: syz-executor.2:12209 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:09 executing program 2 (fault-call:8 fault-nth:24): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 267.254750] openvswitch: netlink: Flow key attr not present in new flow. [ 267.276549] openvswitch: netlink: Flow key attr not present in new flow. [ 267.428597] x86/PAT: syz-executor.2:12242 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 267.439061] FAULT_INJECTION: forcing a failure. [ 267.439061] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 267.451634] CPU: 1 PID: 12242 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 267.458890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.468247] Call Trace: [ 267.470851] dump_stack+0x138/0x19c [ 267.474508] should_fail.cold+0x10f/0x159 [ 267.478660] ? __might_sleep+0x93/0xb0 [ 267.482557] __alloc_pages_nodemask+0x1d6/0x7a0 [ 267.487339] ? __alloc_pages_slowpath+0x2930/0x2930 [ 267.492366] alloc_pages_current+0xec/0x1e0 [ 267.496691] __pmd_alloc+0x41/0x410 [ 267.500439] copy_page_range+0x12b7/0x1bd0 [ 267.504848] ? find_held_lock+0x35/0x130 [ 267.508923] ? __pmd_alloc+0x410/0x410 [ 267.512832] ? __vma_link_rb+0x247/0x340 [ 267.517160] copy_process.part.0+0x4764/0x6a00 [ 267.521974] ? __cleanup_sighand+0x50/0x50 [ 267.526215] ? lock_downgrade+0x6e0/0x6e0 [ 267.530369] _do_fork+0x19e/0xce0 [ 267.533823] ? fork_idle+0x280/0x280 [ 267.537538] ? fput+0xd4/0x150 [ 267.540730] ? SyS_write+0x15e/0x230 [ 267.544474] SyS_clone+0x37/0x50 [ 267.547878] ? sys_vfork+0x30/0x30 [ 267.551416] do_syscall_64+0x1e8/0x640 [ 267.555406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.560270] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.565559] RIP: 0033:0x459879 [ 267.568742] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 267.576457] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 267.583904] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 267.591172] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 267.598441] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 267.606050] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 267.617731] x86/PAT: syz-executor.2:12242 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 267.627894] x86/PAT: syz-executor.2:12242 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:10 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x88400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x802, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xf79, 0x210002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40402, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x8000, 0x0) socket(0x8, 0x6, 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x101400, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x100, 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x400, 0xe66e7d493e2c425b) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x400, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x64416095b24347b8, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x5, 0xd48357999bf04dc7) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x8000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0x10000026f) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 16:54:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="9800000096442c3b5c317e1b000000ff000000"], 0x18}}, 0xdcf71e79ea0c5c28) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x20102, 0x0) 16:54:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:10 executing program 2 (fault-call:8 fault-nth:25): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 267.748790] x86/PAT: syz-executor.2:12249 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 267.774329] FAULT_INJECTION: forcing a failure. [ 267.774329] name failslab, interval 1, probability 0, space 0, times 0 [ 267.788047] CPU: 1 PID: 12249 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 267.795180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.804689] Call Trace: [ 267.807275] dump_stack+0x138/0x19c [ 267.810896] should_fail.cold+0x10f/0x159 [ 267.815036] should_failslab+0xdb/0x130 [ 267.818995] kmem_cache_alloc+0x2d7/0x780 [ 267.823253] ? alloc_pages_current+0xf4/0x1e0 [ 267.827735] __pmd_alloc+0xbd/0x410 [ 267.831348] copy_page_range+0x12b7/0x1bd0 [ 267.835587] ? find_held_lock+0x35/0x130 [ 267.839641] ? __pmd_alloc+0x410/0x410 [ 267.843515] ? __vma_link_rb+0x247/0x340 [ 267.847582] copy_process.part.0+0x4764/0x6a00 [ 267.852162] ? __cleanup_sighand+0x50/0x50 [ 267.856825] ? lock_downgrade+0x6e0/0x6e0 [ 267.860982] _do_fork+0x19e/0xce0 [ 267.864422] ? fork_idle+0x280/0x280 [ 267.868254] ? fput+0xd4/0x150 [ 267.871431] ? SyS_write+0x15e/0x230 [ 267.875130] SyS_clone+0x37/0x50 [ 267.878480] ? sys_vfork+0x30/0x30 [ 267.882008] do_syscall_64+0x1e8/0x640 [ 267.885967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.890795] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.895973] RIP: 0033:0x459879 16:54:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 267.900099] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 267.907792] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 267.915042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 267.922295] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 267.929575] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 267.936992] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:10 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000140)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1200000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x30, r1, 0x200, 0x70bd2c, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x6, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0xa67b2fa3a6759571) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x4, &(0x7f00000001c0)=0xde, 0xfffffffffffffeb5) r3 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$bt_hidp(0x1f, 0x3, 0x6) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000280)=0x6dce, 0x4) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000500)={&(0x7f00000003c0), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x50, r5, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x24, 0x7, [{0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}, {0x8, 0x1, r2}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x126}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x80) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e20, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='bcsh0\x00', 0x2d7) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000240)='lo\x00\x00\x00\x00\xdf\xff\xff\xff\x00', 0x10) getsockname$packet(r4, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0xf) ioctl$int_in(r4, 0x5473, &(0x7f0000000200)=0x7fff) sendto$inet(r4, 0x0, 0xff1b, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r4, &(0x7f0000000380)="06", 0xfffffdb3, 0xfffffffffffffffe, 0x0, 0x25f) close(r4) 16:54:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$radio(&(0x7f0000000540)='/dev/radio#\x00', 0x2, 0x2) getsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000580)=0x7f, &(0x7f00000005c0)=0x4) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 267.985733] x86/PAT: syz-executor.2:12249 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 268.019654] x86/PAT: syz-executor.2:12249 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000640)) r4 = inotify_init() r5 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0xca) inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0x4000082) write$binfmt_elf64(r5, &(0x7f0000000500)=ANY=[], 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000080)={0x3, 'netdevsim0\x00'}, 0x18) r6 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000002c0)="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", 0xfb, 0xfffffffffffffffb) keyctl$invalidate(0x15, r6) ioctl$sock_SIOCBRDELBR(r5, 0x89a1, &(0x7f00000000c0)='sit0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r5, &(0x7f0000000200)={0x2a, 0x29, 0x2, {0x9ec, [{{0x60, 0x0, 0x5}, 0x5, 0xd0, 0x7, './file0'}]}}, 0x2a) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r7, 0xb, "739864", "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"}}, 0x110) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000003c0)) close(r2) r8 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f00000009c0)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x6c35042955010216}, 0xc, &(0x7f0000000980)={&(0x7f0000000700)={0x244, r9, 0x24, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x12c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7fff, @local, 0x9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x100000000, @local, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @local, 0x2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x2465, @empty, 0x401}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x10000, @mcast2, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'lapb0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x27d8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8d}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x8, @loopback, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3984, @ipv4={[], [], @broadcast}}}}}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2aa7a264}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x81}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffff116ff89}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x2, @empty, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x20000000}, 0x20048000) mount$9p_fd(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB]) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000240)={0x2, 0xb, 0x4, 0x24200000, {0x77359400}, {0x4, 0xc, 0x2, 0x7, 0x8001, 0x6, "73b939ae"}, 0x9, 0x2, @fd=0xffffffffffffff9c, 0x4}) poll(&(0x7f0000000040)=[{r0, 0x80}, {r1, 0x8030}, {r0, 0x2}, {r8}, {r1}, {r0, 0x2109}, {r2, 0x200}, {r8, 0x1140}, {r0, 0x40}], 0x9, 0x8) 16:54:10 executing program 2 (fault-call:8 fault-nth:26): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 268.129653] openvswitch: netlink: Flow key attr not present in new flow. 16:54:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x73) sendmmsg$inet6(r1, &(0x7f00000007c0)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c, 0x0}}], 0x1, 0x0) r2 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x7ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r3, 0x7fff}, &(0x7f0000000140)=0x8) [ 268.245754] x86/PAT: syz-executor.2:12278 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 268.257999] FAULT_INJECTION: forcing a failure. [ 268.257999] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 268.272019] CPU: 0 PID: 12278 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 268.279148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.288509] Call Trace: [ 268.291152] dump_stack+0x138/0x19c [ 268.294797] should_fail.cold+0x10f/0x159 [ 268.298954] ? __might_sleep+0x93/0xb0 [ 268.302939] __alloc_pages_nodemask+0x1d6/0x7a0 [ 268.307618] ? __alloc_pages_slowpath+0x2930/0x2930 [ 268.312829] alloc_pages_current+0xec/0x1e0 [ 268.317163] pte_alloc_one+0x1a/0x100 [ 268.320963] __pte_alloc+0x2a/0x2d0 [ 268.324675] copy_page_range+0x11ba/0x1bd0 [ 268.328929] ? __pmd_alloc+0x410/0x410 [ 268.332912] copy_process.part.0+0x4764/0x6a00 [ 268.337516] ? __cleanup_sighand+0x50/0x50 [ 268.341759] _do_fork+0x19e/0xce0 [ 268.345220] ? fork_idle+0x280/0x280 [ 268.348945] ? retint_kernel+0x2d/0x2d [ 268.352915] SyS_clone+0x37/0x50 [ 268.356366] ? sys_vfork+0x30/0x30 [ 268.359948] do_syscall_64+0x1e8/0x640 [ 268.363838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.368689] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.373899] RIP: 0033:0x459879 [ 268.377284] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 268.384997] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 268.392265] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 268.399534] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 268.406893] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 268.414253] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 268.459203] x86/PAT: syz-executor.2:12278 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 268.500248] x86/PAT: syz-executor.2:12278 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:11 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x88400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x802, 0x0) syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xf79, 0x210002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40402, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x8000, 0x0) socket(0x8, 0x6, 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x101400, 0x18) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x100, 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x400, 0xe66e7d493e2c425b) openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x400, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x64416095b24347b8, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x5, 0xd48357999bf04dc7) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800, 0x8000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0x10000026f) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 16:54:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18a6d6bb6dd590120c06a400000b0d530c6bf3dec40a6da8a9f6620000001f0001000000ffa5422f04dbe925e74423ed3cfaa8f0c97ce43d0e3262079150ae95bd61b0a7d7c44b2ef6d593a9d8b44b03000000668a1086839011ab2a8ad2b048067ebc5fac098e527000aa0685c701e43dbbec13892a6ef65840a380c1bc0aaeeeae914c8df6b1b1519464ad0200000000000000f13901d674eaed9f9dde44f566f811178879b286e6419a14e227b0e1000f61b87fd4511b7e13d3a11b386cfbd14fe6d9806a4a991ccc9cb9e0cf7eac91462226bcdaf9c5d2d4071eb996b6bf2a4c98d3bc43185897da50da5af4e0ad1b60b195d85e"], 0x18}}, 0x0) 16:54:11 executing program 2 (fault-call:8 fault-nth:27): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000500)="c3", 0x1, 0x2004c000, 0x0, 0x0) recvfrom(r0, &(0x7f0000002100)=""/4096, 0xffffffffffffffa2, 0x0, 0x0, 0x0) sysfs$1(0x1, &(0x7f0000000040)='\x00') timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000040)}}], 0x174, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000001c0)={0x9, 0x2fb, "dee62c3fa2bbc2cddbfe63ec6b6199a2f2a6c1073272feeae59de243f5839d7a08dbf2e7efe83928018fa0fc66ead796b0e19553d48fbb87174ce7ab4c5f5418341a71ce00106d392d4430612d7229d135b95df8fee2e7714cd0fe3b240c0d2ceff975a4d27939bb2147be47ae33303e0e745efda7f0f6"}) tkill(r1, 0x14) 16:54:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) keyctl$join(0x1, &(0x7f0000000580)={'.yz'}) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f00000000c0)={0x0, 0x2, 0x1, 0x0, 'syz0\x00', 0x9}) 16:54:11 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="203217d8c481b3a038cbc1646c6021ee9778494fe6b83a6badf072f87c72e0e15841bd6273dcc0ba45e71e120efe2c117aa8373d23464f0799"], 0x1}}, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x20) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0x4010ae94, &(0x7f0000000080)={0x5, 0x6, 0x9a}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 268.844239] x86/PAT: syz-executor.2:12303 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:11 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "3206a3286468c22c", "5d5083c05eea284eca669d62bac8c3c4dcf713dc8430dcec046501fd7b8737ad"}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x242000, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000080)=""/17, &(0x7f00000000c0)=0x11) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x40605346, &(0x7f0000000100)={0x0, 0x0, 0x4, 'queue0\x00'}) [ 268.964126] FAULT_INJECTION: forcing a failure. [ 268.964126] name failslab, interval 1, probability 0, space 0, times 0 [ 269.000720] openvswitch: netlink: Flow key attr not present in new flow. [ 269.045754] openvswitch: netlink: Flow key attr not present in new flow. [ 269.061494] CPU: 1 PID: 12313 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 269.068630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.077985] Call Trace: [ 269.080579] dump_stack+0x138/0x19c [ 269.080599] should_fail.cold+0x10f/0x159 [ 269.080617] should_failslab+0xdb/0x130 16:54:11 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2400, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfec7be070") ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="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") write(r0, &(0x7f0000000000)="2400000052001f00c0f9f407002c04000a00071008000100ffffffff0800000000000000", 0x24) 16:54:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FICLONE(r1, 0x40049409, r1) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="180000003280ffffff0000000000000001000000ff000000"], 0x18}}, 0x0) [ 269.080632] kmem_cache_alloc+0x2d7/0x780 [ 269.096644] ptlock_alloc+0x20/0x70 [ 269.100292] pte_alloc_one+0x60/0x100 [ 269.104098] __pte_alloc+0x2a/0x2d0 [ 269.107730] copy_page_range+0x11ba/0x1bd0 [ 269.112076] ? __pmd_alloc+0x410/0x410 [ 269.115979] copy_process.part.0+0x4764/0x6a00 [ 269.120735] ? __cleanup_sighand+0x50/0x50 [ 269.125252] ? lock_downgrade+0x6e0/0x6e0 [ 269.129422] _do_fork+0x19e/0xce0 [ 269.132890] ? fork_idle+0x280/0x280 [ 269.136612] ? fput+0xd4/0x150 [ 269.139952] ? SyS_write+0x15e/0x230 [ 269.143676] SyS_clone+0x37/0x50 [ 269.147380] ? sys_vfork+0x30/0x30 [ 269.147397] do_syscall_64+0x1e8/0x640 [ 269.147406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.159638] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.159648] RIP: 0033:0x459879 [ 269.159654] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 269.159666] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 269.159671] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 16:54:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x7, 0x8000}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$bt_rfcomm(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, {0xe2c6, 0x4, 0x80000000, 0x3, 0x4, 0xa02f}, 0x9}, 0xa) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000100)={0x3, 0x3ff, [0x6, 0x1, 0x2, 0xfffffffffffffe00, 0x7], 0x401}) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000001740)={0x11, 0x0, 0x0}, &(0x7f0000001780)=0x2ca, 0x80000) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000017c0)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000018c0)=0xe8) recvmmsg(r3, &(0x7f00000009c0)=[{{&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000300)=""/19, 0x13}, {&(0x7f0000000340)=""/187, 0xbb}], 0x2, &(0x7f0000000440)=""/142, 0x8e}, 0x6}, {{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000500)=""/115, 0x73}, {&(0x7f0000000580)=""/215, 0xd7}, {&(0x7f0000000680)=""/131, 0x83}, {&(0x7f0000000740)=""/157, 0x9d}, {&(0x7f0000000800)=""/43, 0x2b}, {&(0x7f0000000840)=""/168, 0xa8}, {&(0x7f0000000900)=""/45, 0x2d}], 0x7, &(0x7f0000001a80)=""/4096, 0x1000}, 0x5}], 0x2, 0x1, 0x0) personality(0x8) sendmsg$nl_xfrm(r6, &(0x7f0000001a40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001a00)={&(0x7f0000001900)=@delsa={0xd4, 0x11, 0x4, 0x70bd2d, 0x25dfdbff, {@in6=@local, 0x4d4, 0x2, 0x2b}, [@policy={0xac, 0x7, {{@in=@broadcast, @in=@multicast2, 0x4e20, 0x2, 0x4e24, 0x7, 0xa, 0x72d1c4b2256f8906, 0x0, 0x0, r4, r5}, {0x2, 0x1, 0xffff, 0x9, 0x0, 0x9, 0x0, 0x200}, {0x2, 0x1, 0x9, 0x3}, 0x1, 0x6e6bb1, 0x1, 0x1, 0x3, 0x3}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x20000884}, 0x1) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="180008f3a448d293b356c9d0c47bd40032172101000000000000000002000000ff00000031155b07c3be778c9a05e81aecf360733c19c872664a8f60d0dae1372c37de94e2b6db86f48ec538e06c34ac2b634f35bcaa5f5bd485353f92bafc043e08b450adad3553b1c954cd14312ebd9e83309ed43dab259294b6732fd4f1c306c8eaf833a161e731f5b8b15e000fc84f65370e68e71932ed82e7cc2306df82ed2e66dcd8cfb23b09e2a383c892f8342c0b5d8f94e6c0b58c12afad341b93e608c19d23aa"], 0x18}}, 0x0) [ 269.159676] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 269.159683] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 269.205041] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 269.235945] x86/PAT: syz-executor.2:12313 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 269.245937] x86/PAT: syz-executor.2:12313 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000340)=0x1950, 0x4) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000240)) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000200)={0x3, r2}) socket$nl_generic(0x10, 0x3, 0x10) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000100)={0x2e, 0xc, 0xe, 0x4, 0x8, 0x40100000, 0x1, 0x121, 0x1}) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x20000000) ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000500)={0x80000004, "8a0db4525f9a554e24bced4b732ecdac9f69e622200cdfb3e298675c44101b43", 0x3, 0x40, 0x5, 0x9, 0x2, 0x4, 0xfffffffffffff801, 0x100000001}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) read$alg(r2, &(0x7f0000000140)=""/177, 0xb1) pwrite64(r2, &(0x7f0000000400), 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000000)="cc", 0x1, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000280)=""/147, 0xfffffff1, 0x22, &(0x7f0000000480)=@xdp={0x2c, 0x4, 0x0, 0x16}, 0x717000) 16:54:12 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r0, &(0x7f00000000c0)={{0x6, @rose}, [@null, @rose, @null, @netrom, @netrom, @bcast, @rose]}, 0xffffffffffffffd2) listen(r0, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000080)=0x1, 0x4) accept4(r0, &(0x7f00000050c0)=@ipx, 0x0, 0x0) 16:54:12 executing program 2 (fault-call:8 fault-nth:28): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x4e20, 0x3, @loopback, 0x2}, @in6={0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10001}, @in6={0xa, 0x4e24, 0x7, @ipv4={[], [], @remote}, 0xd9000000000000}], 0x54) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x15, 0x8000032, 0x119, 0x0, 0x1000000000000000, {0x800000001}, [@generic="ff"]}, 0x18}, 0x1, 0x0, 0x0, 0x840}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) [ 269.648887] audit: type=1400 audit(1566665652.157:94): avc: denied { setopt } for pid=12348 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:54:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = dup3(r0, r0, 0x80000) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@bcast, @null, 0x8, [@default, @bcast, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="180000003200190100000000000000006d01000000ff0000"], 0x18}}, 0x0) [ 269.692634] x86/PAT: syz-executor.2:12354 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 269.716848] FAULT_INJECTION: forcing a failure. [ 269.716848] name failslab, interval 1, probability 0, space 0, times 0 16:54:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 269.743410] CPU: 0 PID: 12354 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 269.750554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.760233] Call Trace: [ 269.762865] dump_stack+0x138/0x19c [ 269.766523] should_fail.cold+0x10f/0x159 [ 269.770685] should_failslab+0xdb/0x130 [ 269.774671] kmem_cache_alloc+0x2d7/0x780 [ 269.778834] ptlock_alloc+0x20/0x70 [ 269.782820] pte_alloc_one+0x60/0x100 [ 269.786707] __pte_alloc+0x2a/0x2d0 [ 269.790394] copy_page_range+0x11ba/0x1bd0 [ 269.794797] ? __pmd_alloc+0x410/0x410 [ 269.798680] copy_process.part.0+0x4764/0x6a00 [ 269.803372] ? __cleanup_sighand+0x50/0x50 [ 269.807723] ? lock_downgrade+0x6e0/0x6e0 [ 269.811986] _do_fork+0x19e/0xce0 [ 269.815424] ? fork_idle+0x280/0x280 [ 269.819249] ? fput+0xd4/0x150 [ 269.822438] ? SyS_write+0x15e/0x230 [ 269.826168] SyS_clone+0x37/0x50 [ 269.829663] ? sys_vfork+0x30/0x30 [ 269.833187] do_syscall_64+0x1e8/0x640 [ 269.837419] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.842260] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.847441] RIP: 0033:0x459879 [ 269.850626] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 269.858430] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 269.866011] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 269.873399] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 269.880768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 269.888031] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 269.915632] x86/PAT: syz-executor.2:12354 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 269.937295] x86/PAT: syz-executor.2:12354 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:14 executing program 2 (fault-call:8 fault-nth:29): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = accept(r0, &(0x7f0000000100)=@tipc=@id, &(0x7f0000000040)=0x80) setsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f00000001c0)={0x1ff, 0x401, 0x3, 0xd2, 0x5, 0x200, 0x401, 0x5, 0xa00, 0x3, 0x200}, 0xb) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x10, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r5, 0x110, 0x2, &(0x7f0000000280)='/dev/kvm\x00', 0x2) 16:54:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="b9d1290a7f1c38d6ef95e80ea5055eb0fd5c52e070") r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r1, 0x2000) setresgid(0x0, 0xee00, 0x0) r2 = getegid() setgroups(0x6, &(0x7f0000000100)=[r2, r2, r2, r2, r2, r2]) setresuid(0x0, 0xfffe, 0xffffffffffffffff) keyctl$revoke(0x3, r1) 16:54:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000080)="11dca50d5e93f070000000") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000680)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') accept4$unix(r0, 0x0, &(0x7f0000000000), 0x80800) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='oom_score\x00') sendfile(r0, r1, &(0x7f0000000140)=0x2, 0x4) 16:54:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, 0x0, 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:14 executing program 0: gettid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'vxcan1\x00', {0x2, 0x4e21, @local}}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[@cred={{0x1c}}], 0x20}, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r2 = syz_open_dev$mice(0x0, 0x0, 0x0) socket$inet(0x2, 0x0, 0x800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000700), &(0x7f0000000740)=0xc) sendmsg$nl_route_sched(r2, &(0x7f00000006c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x1000010}, 0xc, &(0x7f0000000680)={&(0x7f0000000780)=@gettaction={0xec, 0x32, 0x0, 0x70bd27, 0x25dfdbff, {}, [@action_gd=@TCA_ACT_TAB={0x54, 0x1, [{0x10, 0x10, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffffffffff8}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x38}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x10, 0x10, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_gd=@TCA_ACT_TAB={0x78, 0x1, [{0x10, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x80000001}}, {0x10, 0x12, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x80000001}}, {0x14, 0x20, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x10001}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x9e133b715d9d323d}, 0x10) r3 = syz_open_dev$amidi(0x0, 0x8, 0x181040) write$FUSE_NOTIFY_POLL(r3, &(0x7f00000005c0)={0x18, 0x1, 0x0, {0xb2fc}}, 0x18) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x4003) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r4, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000880)={@loopback, @multicast2, 0x0, 0x7, [@empty, @remote, @broadcast, @remote, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, 0x2c) ioctl$sock_ifreq(r4, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) write$uinput_user_dev(r3, &(0x7f0000000100)={'syz0\x00', {0x8}, 0x22, [0x1, 0x20, 0x0, 0x3, 0x0, 0x40, 0x7f, 0x9, 0x57d, 0x4, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x8, 0x7fff, 0x0, 0xc2b0, 0x40, 0x8, 0x0, 0x0, 0x5, 0x0, 0x0, 0x5, 0x8000, 0x8, 0x3, 0x5, 0x8, 0x8, 0x9, 0xffffffffffff0001, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, 0x6, 0x0, 0x100000001, 0x0, 0x5, 0x7, 0x80000001, 0x3a1, 0x0, 0x0, 0x200, 0x1ff, 0x0, 0x447, 0x0, 0x6, 0x20, 0x100, 0x101, 0x0, 0xfffffffffffffffd], [0xf26, 0xfff, 0x0, 0x200, 0x401, 0x0, 0x0, 0x3, 0x0, 0x1, 0x80000000, 0x1, 0x0, 0x5, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x6, 0x8800000000000, 0xffff, 0x4, 0x0, 0xfff, 0x5, 0x9, 0x29, 0x200, 0x7, 0x6, 0x516ac56b, 0x571, 0x5e, 0x0, 0x5, 0x1f, 0x6, 0x37c, 0x6, 0x4, 0x4, 0x7fff, 0x2, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x1000, 0x10001, 0xfffffffffffffffd, 0x4, 0x3, 0x0, 0x3f], [0x9, 0x0, 0x6, 0x2cbceb06, 0x6, 0x5, 0x0, 0xfffffffffffffffb, 0xc0, 0x5, 0xfffffffffffffff9, 0x100000000, 0x0, 0x7, 0x0, 0x0, 0x1, 0x9, 0x7fffffff, 0x6, 0x1, 0x1, 0x0, 0x100, 0x717b, 0x0, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x2, 0x8000, 0x10001, 0x6, 0x0, 0x0, 0x5, 0x1e7d, 0xa4b, 0x200, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0xc8, 0x4, 0x0, 0x80000001, 0x1, 0xffffffffffff0253, 0x0, 0x6f8ca089, 0x0, 0x73, 0x10000, 0x7], [0xfffffffeffffffff, 0x0, 0x0, 0x8, 0xfffffffffffffffa, 0xffffffff, 0xfffffffffffff830, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x4, 0x20, 0x0, 0x0, 0x0, 0x8, 0x8, 0x0, 0x0, 0xffffffffffffff8d, 0x0, 0x3, 0x7, 0xffffffffffffff80, 0x0, 0x3f, 0x1, 0x1ff, 0x3, 0x0, 0x1, 0x3, 0xffffffffffff8000, 0x0, 0x0, 0x9, 0x0, 0x5, 0xffffffffffff0001, 0x0, 0x5, 0x0, 0x0, 0x3f, 0x9, 0x80000001, 0x8001, 0xbad, 0x0, 0x8, 0xff, 0x8, 0xa210, 0x5, 0x1, 0x0, 0xa70, 0x3f, 0x5, 0x2, 0x7fffffff, 0x0, 0x10000]}, 0x45c) ioctl$BLKRRPART(r3, 0x125f, 0x0) unshare(0x200) sendmsg$can_raw(r3, 0x0, 0x80) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000600)={0xe, 0x7, 0xfffffffeffffffff, 0x0, 0xc, "c6549d59fffacd152371b46e"}, 0x18) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000580)={@multicast2, @multicast1, 0x1, 0x7, [@empty, @multicast2, @rand_addr, @multicast1, @dev={0xac, 0x14, 0x14, 0x22}, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, 0x2c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) openat$kvm(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/kvm\x00', 0x100, 0x0) 16:54:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, 0x0, 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 271.995240] openvswitch: netlink: Flow key attr not present in new flow. [ 272.011230] x86/PAT: syz-executor.2:12386 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 272.029666] FAULT_INJECTION: forcing a failure. [ 272.029666] name failslab, interval 1, probability 0, space 0, times 0 16:54:14 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040), 0x1000000000000041}, 0x0) r0 = socket$inet(0x10, 0x40000000000002, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00\x00\x00\x00)\x00', @ifru_flags}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x78, &(0x7f0000000000)=[@in6={0xa, 0x4e22, 0x5, @loopback, 0xb55e}, @in={0x2, 0x4e24}, @in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e24, 0x200, @dev={0xfe, 0x80, [], 0x16}, 0x9}, @in={0x2, 0x4e24, @rand_addr=0x7}]}, &(0x7f00000001c0)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r1, 0x7fffffff, 0x3}, 0x10) [ 272.046962] CPU: 0 PID: 12386 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 272.054093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.063452] Call Trace: [ 272.066048] dump_stack+0x138/0x19c [ 272.069775] should_fail.cold+0x10f/0x159 [ 272.073940] should_failslab+0xdb/0x130 [ 272.078006] kmem_cache_alloc+0x47/0x780 [ 272.082055] ? __lock_is_held+0xb6/0x140 [ 272.086568] ? check_preemption_disabled+0x3c/0x250 [ 272.091664] anon_vma_clone+0xde/0x470 [ 272.095713] anon_vma_fork+0x87/0x4d0 [ 272.099648] copy_process.part.0+0x45e2/0x6a00 [ 272.104481] ? __cleanup_sighand+0x50/0x50 [ 272.108701] ? lock_downgrade+0x6e0/0x6e0 [ 272.112925] _do_fork+0x19e/0xce0 [ 272.116361] ? fork_idle+0x280/0x280 [ 272.120076] ? fput+0xd4/0x150 [ 272.123258] ? SyS_write+0x15e/0x230 [ 272.126981] SyS_clone+0x37/0x50 [ 272.130330] ? sys_vfork+0x30/0x30 [ 272.133946] do_syscall_64+0x1e8/0x640 [ 272.137832] ? trace_hardirqs_off_thunk+0x1a/0x1c 16:54:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$P9_RLINK(r2, &(0x7f00000000c0)={0x7, 0x47, 0x2}, 0x7) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="180000003200190100000000000000000100760ca86473803c0000ff000000dad1455bc1b7c7e09abec5aa186e0d865979475c0fb51fe150badf4fcb7c4d635a22f3e05b41471cb16c4315dd9ac814d80c7c5bdda259fb50e20482e8d2b1a26d8846a90a1affb6c4c2e9e1df081fc201b2c5c0f19e6674d51fb8f71084ffa353442a94beffef7b2d0885dcb5b7e6e286524b0ef6f1a34eb996e2fdcc87d62205679848b195b0dabb70889453a2b38d76e94800000000a5c3f6572ba5cdc4"], 0x18}}, 0x0) tee(r2, r0, 0x1, 0x2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x80000001, 0x3, 0x9, 0x1, 0x15, 0x10000, 0x10000, 0x4, 0x6, 0x3a2d0fc4, 0xb95, 0x1}) [ 272.142675] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 272.147863] RIP: 0033:0x459879 [ 272.151037] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 272.158832] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 272.166110] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 272.173576] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 272.180840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 272.188297] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:14 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000000c0)="875d522d39ffd9163753ba75e9b7bc5f76d03b3b8b807ce1003efa29c4de21e6d976251425801586e16a85b6bf5720f04dad59c88a2eb369b77544a7afd8c2385459233a4b18b47bf073f67b0bbb7eb23283c969b0f8c0d8880d2d0cacf594e7660a5e01142f48cf38600cbc8992a9bfb1266192fcaef04ae67ccb9be4c3118918e45ed54f31da24fe537675df0a600ca117a1c7e91e55464d5871a696203c50847be2bccdcf7ca685a3b951d768b8de7064c13a5697210ecd9c6d9f8ebf03c1231f6090535e797aa3f38a8f29b852e3d6658e8ef100faf4519c4aea39b50e74b0fe6dd09702cbcafd302c59c1a7dad584af", 0xf2) write$P9_RLCREATE(r0, &(0x7f0000000280)={0x18, 0xf, 0x2, {{0x20, 0x0, 0x1}, 0x3}}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ion(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ion\x00', 0x0, 0x0) exit_group(0x800) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x59493305b497e5d8, 0x0) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="24000000240007251dfffd940101830020200a000900000000000100ffffffff0d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000340)) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000300)) r3 = msgget$private(0x0, 0x100000042) msgsnd(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="03000ad9277d026737100000000000001d8f327ecf7fd5262213cceb3da3c930fc01bf72c573af2036a72b3a1184377108647effff16b7008be82596faccc10c2000"/81], 0x51, 0x800) 16:54:14 executing program 2 (fault-call:8 fault-nth:30): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 272.265720] bond0: Releasing backup interface bond_slave_1 [ 272.295704] x86/PAT: syz-executor.2:12401 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 272.305504] x86/PAT: syz-executor.2:12401 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:14 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback, 0x8}, 0x1c, 0x0}}], 0x1, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x1, 0x40000) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000080)=""/118) 16:54:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, 0x0, 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 272.340315] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 272.357985] openvswitch: netlink: Flow key attr not present in new flow. 16:54:14 executing program 5: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802106001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0xe) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x8, 0x0, 0x11b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x42000, 0x41) ioctl$SIOCAX25DELFWD(r2, 0x89eb, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast}) [ 272.398436] bond0: Releasing backup interface bond_slave_1 16:54:15 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$nfc_llcp(r0, &(0x7f00000000c0)={0x27, 0x0, 0x800000000, 0x6, 0x0, 0x0, "ac41d1c45d71d3ed2a4182b9a6fdfebbf3550b2209895f348f8fc6716e08d1364ad5526c6e898cbb38c310d32b6a3217fa0cb9e4cafe0569942f46cde7188b", 0x2}, 0x13) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000001200)=0x1) r2 = gettid() wait4(r2, 0x0, 0x40000000, 0x0) r3 = request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0xfffffffffffffffd) keyctl$read(0xb, r3, &(0x7f0000000200)=""/4096, 0x1000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x2, 0x2, 0x5, 0x1, 0x3}}) r4 = dup2(r1, r1) epoll_ctl$EPOLL_CTL_DEL(r4, 0x2, r4) ioctl$KDDISABIO(r0, 0x4b37) 16:54:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x180, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) lstat(&(0x7f0000000f00)='./file0\x00', 0x0) fstat(r2, &(0x7f0000000ac0)) stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000c00), &(0x7f0000000c40)=0xc) fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0200000001000100", @ANYRES32, @ANYBLOB="040002000000000008", @ANYRES32, @ANYBLOB="08000400", @ANYRES32=r3, @ANYBLOB, @ANYRES32, @ANYBLOB='\b', @ANYBLOB='\b\x00\a\x00', @ANYRES32=0x0, @ANYBLOB="100004000000000020020200e0ff0000867036896e93d05e887d0d9ad01e940676da2ba0"], 0xc, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000003c0)={'broute\x00', 0x0, 0x0, 0x71, [], 0x0, 0x0, &(0x7f0000000240)=""/113}, &(0x7f00000002c0)=0x78) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2000, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000340)={0x5, &(0x7f0000000300)=[{}, {0xfffffffffffffffe, 0x0, 0x7, 0xfffffffffffffe3b}, {0xaf58000000000000, 0x0, 0x0, 0xdf}, {0x1, 0x0, 0x80000001, 0x8}, {0x4}]}, 0x10) r4 = fcntl$dupfd(r1, 0x407, r0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000000)={0x100000000, 0xf000}) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) sendfile(r1, r5, 0x0, 0x102000002) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000440)={0x0, 0xd7, "ee0065b909836882ab2f2038bafb45b6be25b2a8a7424663be105cfc9c9110de70314faa79ac1256ca9edbbfb76a3173b5d996a28a43a74f51323f52d006b991d87de2d172e135e6d4fb01be872713581ad4995912c4a6bc4f8a748539da12b4848bdc03b051e1bc568a48abffce1032a63460573606f0c3518b1d35e78aa23a19355fdc12d6303ef6f8b79fbcc9f4a028094a4fffdf22e2a04920febc2edd48a77fdc759e578115e96c33653475619b93acf07ada7ab96a6aa26dd92371ba8fbdff59ea6d93f8637f1d0e366166f33ca01f31047ad8c5"}, &(0x7f0000000180)=0xdf) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000380)={r7, 0x7f}, 0x8) 16:54:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001340)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x3}, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x80, 0x40000) write$input_event(r2, &(0x7f0000000080)={{0x0, 0x7530}, 0x5, 0x0, 0xa}, 0x18) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:54:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940), 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 272.478692] x86/PAT: syz-executor.2:12417 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 272.511163] FAULT_INJECTION: forcing a failure. [ 272.511163] name failslab, interval 1, probability 0, space 0, times 0 [ 272.596309] CPU: 1 PID: 12417 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 272.603653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.613094] Call Trace: [ 272.615688] dump_stack+0x138/0x19c [ 272.619325] should_fail.cold+0x10f/0x159 [ 272.623480] should_failslab+0xdb/0x130 [ 272.627466] kmem_cache_alloc+0x47/0x780 [ 272.631582] ? anon_vma_chain_link+0x142/0x1a0 [ 272.636177] anon_vma_clone+0xde/0x470 [ 272.640084] anon_vma_fork+0x87/0x4d0 16:54:15 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffc70) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-generic\x00'}, 0x58) connect$ax25(r0, &(0x7f0000000000)={{0x3, @null}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @default]}, 0x48) r3 = accept4(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) splice(r0, 0x0, r3, 0x0, 0x20000000002, 0x0) [ 272.644024] copy_process.part.0+0x45e2/0x6a00 [ 272.648632] ? __cleanup_sighand+0x50/0x50 [ 272.652874] ? lock_downgrade+0x6e0/0x6e0 [ 272.657037] _do_fork+0x19e/0xce0 [ 272.660706] ? fork_idle+0x280/0x280 [ 272.664431] ? fput+0xd4/0x150 [ 272.667643] ? SyS_write+0x15e/0x230 [ 272.671364] SyS_clone+0x37/0x50 [ 272.674737] ? sys_vfork+0x30/0x30 [ 272.678289] do_syscall_64+0x1e8/0x640 [ 272.682183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.687029] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 272.687040] RIP: 0033:0x459879 16:54:15 executing program 2 (fault-call:8 fault-nth:31): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 272.695489] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 272.695500] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 272.695506] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 272.695511] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 272.695517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 272.695522] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 272.717327] x86/PAT: syz-executor.2:12451 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 272.731092] print_req_error: I/O error, dev loop0, sector 0 [ 272.743962] x86/PAT: syz-executor.2:12451 freeing invalid memtype [mem 0x00002000-0x00002fff] [ 272.891528] x86/PAT: syz-executor.2:12464 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 272.901819] FAULT_INJECTION: forcing a failure. [ 272.901819] name failslab, interval 1, probability 0, space 0, times 0 [ 272.934897] CPU: 1 PID: 12464 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 272.942050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.951412] Call Trace: [ 272.954017] dump_stack+0x138/0x19c [ 272.957807] should_fail.cold+0x10f/0x159 [ 272.961962] ? cache_grow_end.part.0+0x92/0x160 [ 272.966647] should_failslab+0xdb/0x130 [ 272.970624] kmem_cache_alloc+0x47/0x780 [ 272.974684] ? __lock_is_held+0xb6/0x140 [ 272.978838] ? check_preemption_disabled+0x3c/0x250 [ 272.983871] anon_vma_clone+0xde/0x470 [ 272.987762] anon_vma_fork+0x87/0x4d0 [ 272.991568] copy_process.part.0+0x45e2/0x6a00 [ 272.996263] ? __cleanup_sighand+0x50/0x50 [ 273.000685] ? lock_downgrade+0x6e0/0x6e0 [ 273.004862] _do_fork+0x19e/0xce0 [ 273.008315] ? fork_idle+0x280/0x280 [ 273.012029] ? fput+0xd4/0x150 [ 273.015218] ? SyS_write+0x15e/0x230 [ 273.018934] SyS_clone+0x37/0x50 [ 273.022294] ? sys_vfork+0x30/0x30 [ 273.025837] do_syscall_64+0x1e8/0x640 [ 273.029808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.034681] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 273.039864] RIP: 0033:0x459879 [ 273.043050] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 273.050922] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 273.058362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 273.065629] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 273.072980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 273.080247] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 273.091716] openvswitch: netlink: Flow key attr not present in new flow. [ 273.111681] x86/PAT: syz-executor.2:12466 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 273.123250] x86/PAT: syz-executor.2:12466 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x111000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0xbc49, @mcast1, 0x270f}, r2}}, 0x30) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x14, 0x8000032, 0x119, 0x3, 0x0, {0x800000001}}, 0x14}}, 0x0) 16:54:16 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) msgget(0x1, 0x40) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x2, 0x20, 0x6, 0x10000}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r2, 0x100, 0x101}, &(0x7f00000002c0)=0xcfafec17ce67552e) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd3a) r3 = semget$private(0x0, 0x7, 0x1a) semctl$SETALL(r3, 0x0, 0x11, &(0x7f00000001c0)) unshare(0x40000000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000200)={0x0, 0xfffffffffffffffe, 0x7e, 0x3}) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0x1b, 0x4) write$apparmor_current(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) gettid() 16:54:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940), 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:16 executing program 2 (fault-call:8 fault-nth:32): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940), 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x101000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14, 0x80000) bind$bt_hci(r2, &(0x7f0000000100)={0x1f, r3, 0x2}, 0xc) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000440)=""/24) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0xffffffffffffff1d, r1, 0x12bb64bb6d8f7c71, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x80000001}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x4, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r4 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)="7446b09b6a5fe33fab84b5439e8ea115dfe918d9348f1d7de94d58334433234f4ecb2d4e28881ae9274a21b7c358ddbaebf934c8404495be29ff", 0x3a, 0xfffffffffffffffb) r5 = request_key(&(0x7f0000000540)='syzkaller\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)='/selinux/enforce\x00', 0xfffffffffffffffc) keyctl$unlink(0x9, r4, r5) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x538, 0x70bd26, 0x44800, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000300)={0x101, 0x8000, 0x8001, 0x7}, 0x14) 16:54:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KDMKTONE(r1, 0x4b30, 0x8000) r2 = getuid() r3 = getegid() stat(&(0x7f0000000140)='./file2\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file2\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file2\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f0000000080)='./file2\x00', &(0x7f0000000100)='fuseblk\x00', 0x20, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@subj_role={'subj_role', 0x3d, 'gfs2\x00'}}, {@seclabel='seclabel'}, {@uid_eq={'uid', 0x3d, r4}}, {@uid_eq={'uid', 0x3d, r5}}, {@uid_lt={'uid<', r6}}, {@fowner_lt={'fowner<', r7}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@smackfshat={'smackfshat', 0x3d, 'gfs2\x00'}}, {@subj_type={'subj_type', 0x3d, 'cpuset(selfGPLeth1'}}, {@obj_type={'obj_type', 0x3d, 'vmnet1posix_acl_access\''}}]}}) syz_mount_image$gfs2(&(0x7f0000000800)='gfs2\x00', &(0x7f0000000840)='./file2\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6e2f63984f4c01ad20208be8954d8715f7fd64c55270c1de416229465330a7608398c69e778005e4b9cb6f609d2e4183606b6f0110d328"]) ioctl(r0, 0x8, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") [ 273.665274] x86/PAT: syz-executor.2:12477 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 273.698973] FAULT_INJECTION: forcing a failure. [ 273.698973] name failslab, interval 1, probability 0, space 0, times 0 [ 273.710985] CPU: 1 PID: 12477 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 273.718108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.727558] Call Trace: [ 273.730163] dump_stack+0x138/0x19c [ 273.733811] should_fail.cold+0x10f/0x159 [ 273.738143] should_failslab+0xdb/0x130 [ 273.742129] kmem_cache_alloc+0x47/0x780 [ 273.746196] ? anon_vma_chain_link+0x142/0x1a0 [ 273.746210] anon_vma_clone+0xde/0x470 [ 273.754749] anon_vma_fork+0x87/0x4d0 [ 273.754768] copy_process.part.0+0x45e2/0x6a00 [ 273.763149] ? __cleanup_sighand+0x50/0x50 [ 273.767393] ? lock_downgrade+0x6e0/0x6e0 [ 273.768669] gfs2: invalid mount option: n/c˜OL­ ‹è•M‡÷ýdÅRpÁÞAb)FS0§`ƒ˜Æžw€ä¹Ëo`.Aƒ`koÓ( [ 273.771565] _do_fork+0x19e/0xce0 [ 273.771579] ? fork_idle+0x280/0x280 [ 273.771594] ? fput+0xd4/0x150 [ 273.771604] ? SyS_write+0x15e/0x230 [ 273.771618] SyS_clone+0x37/0x50 [ 273.771626] ? sys_vfork+0x30/0x30 [ 273.771640] do_syscall_64+0x1e8/0x640 [ 273.771648] ? trace_hardirqs_off_thunk+0x1a/0x1c 16:54:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940), 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1800000032001901fdef7326e815cc1fc0529e56cd492700"], 0x18}}, 0x0) 16:54:16 executing program 0: r0 = socket$kcm(0x2, 0x20000000002, 0x73) recvmsg(r0, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x0) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x9) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x40000, 0x8000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r1, 0x0, 0xf, &(0x7f0000000100)='}eth0mime_type\x00', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r2, &(0x7f0000000240)=r3, 0x12) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000400)=r1, 0x4) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000600)=ANY=[@ANYBLOB="51c880468d1dfd8580feb0818202a38b627a2ab693fa9326fc390a2bd9f50a43b9cc50c82288ecda9cb3be39747d90d2a384ba1c4ef0f3175c38779c7cc8f17acb1fb6847be88a459547b5e4f086552bcf15ca07c6d21c275034d3e9fbe0abfb40b9"], 0x62) write$cgroup_pid(r5, &(0x7f0000000280), 0x12) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0xfc28) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)=0x1000) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) [ 273.771663] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 273.771675] RIP: 0033:0x459879 [ 273.793836] gfs2: can't parse mount arguments [ 273.794872] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 273.794885] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 273.794891] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 273.794895] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 273.794901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 16:54:16 executing program 2 (fault-call:8 fault-nth:33): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 273.794906] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 273.824208] x86/PAT: syz-executor.2:12477 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 273.865229] x86/PAT: syz-executor.2:12477 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 273.948077] gfs2: invalid mount option: n/c˜OL­ ‹è•M‡÷ýdÅRpÁÞAb)FS0§`ƒ˜Æžw€ä¹Ëo`.Aƒ`koÓ( [ 273.979636] gfs2: can't parse mount arguments 16:54:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 274.032370] x86/PAT: syz-executor.2:12514 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 274.035178] IPVS: ftp: loaded support on port[0] = 21 [ 274.049374] FAULT_INJECTION: forcing a failure. [ 274.049374] name failslab, interval 1, probability 0, space 0, times 0 [ 274.077132] CPU: 0 PID: 12514 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 274.084276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.093717] Call Trace: [ 274.096608] dump_stack+0x138/0x19c [ 274.100231] should_fail.cold+0x10f/0x159 [ 274.104586] should_failslab+0xdb/0x130 [ 274.108561] kmem_cache_alloc+0x2d7/0x780 [ 274.112708] ? anon_vma_clone+0x310/0x470 [ 274.116841] anon_vma_fork+0x1ce/0x4d0 [ 274.120719] copy_process.part.0+0x45e2/0x6a00 [ 274.125386] ? __cleanup_sighand+0x50/0x50 [ 274.129689] ? lock_downgrade+0x6e0/0x6e0 [ 274.133922] _do_fork+0x19e/0xce0 [ 274.137368] ? fork_idle+0x280/0x280 [ 274.141158] ? fput+0xd4/0x150 [ 274.144363] ? SyS_write+0x15e/0x230 [ 274.148215] SyS_clone+0x37/0x50 [ 274.151571] ? sys_vfork+0x30/0x30 [ 274.155100] do_syscall_64+0x1e8/0x640 [ 274.159096] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.164082] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.169349] RIP: 0033:0x459879 [ 274.172534] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 274.180321] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 274.187786] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 274.195049] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 274.202305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 274.209561] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 274.221164] x86/PAT: syz-executor.2:12514 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 274.231375] x86/PAT: syz-executor.2:12514 freeing invalid memtype [mem 0x00002000-0x00002fff] [ 274.306686] openvswitch: netlink: Flow key attr not present in new flow. [ 274.316704] openvswitch: netlink: Flow key attr not present in new flow. 16:54:17 executing program 5: 16:54:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d6c0bcfe47bf070") r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x2000000000000148, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0x2, 0x0, 0x3}, 0xf03eeb18d8d07d36}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x0, 0xe, 0x0, &(0x7f00000000c0)="cc7915a9dcbd9581997ad6734305", 0x0, 0x4}, 0x28) 16:54:17 executing program 2 (fault-call:8 fault-nth:34): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1800000032001921000000000000000001000000ff000000"], 0x18}}, 0x0) 16:54:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040), 0x4) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x100000001, 0x2, 0x80, 0x7fffffff, 0x4}) close(r5) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x4) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r5, 0x0, 0x19404, 0x0) 16:54:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x1ff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x100000001, 0x8000) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x8, 0x2, 0x3f, 0x1d, 0x15, 0x40, 0xffff, 0x1f, 0x800, 0x5, 0x5, 0x9}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) close(r0) 16:54:17 executing program 5: r0 = socket(0x3000200000001b, 0x80000, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) write(r0, &(0x7f0000000000)="fc00000048000703ab0925000900170c0aab07ff010000000000769321000100ff0100000005d0000000000009039815fa2c1ec28656aaa79bb94b59fe100000bc00020000036c6c256f1a272f2e117c22ebc21121400000006000c821a4a6f9607668bf0478aa2a7c8b911ea7cc3f8a2fcb5d7bd5afaa8934d0730700000020d7d5bbc91a3e2e80772c05defd5a32e280fc83ab1afad60ce9c0bfb8fe082038f4f8b29d3ef3d92c83170e5bba4a463ae4f5566f44660da80b76b6825bbd5b95dbcc037816460e63941591cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2e87abd43cd16b17e583df150c3b880f411f46a6b567b4d5", 0x16d) [ 274.995626] x86/PAT: syz-executor.2:12539 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 275.012509] openvswitch: netlink: Flow key attr not present in new flow. [ 275.031801] FAULT_INJECTION: forcing a failure. [ 275.031801] name failslab, interval 1, probability 0, space 0, times 0 [ 275.072920] CPU: 1 PID: 12539 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 275.080066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.089437] Call Trace: [ 275.092028] dump_stack+0x138/0x19c [ 275.095658] should_fail.cold+0x10f/0x159 [ 275.099809] should_failslab+0xdb/0x130 [ 275.103787] kmem_cache_alloc+0x2d7/0x780 [ 275.108016] ? anon_vma_clone+0x310/0x470 [ 275.112164] anon_vma_fork+0xe9/0x4d0 [ 275.115963] copy_process.part.0+0x45e2/0x6a00 [ 275.120559] ? __cleanup_sighand+0x50/0x50 [ 275.124787] ? lock_downgrade+0x6e0/0x6e0 [ 275.128939] _do_fork+0x19e/0xce0 [ 275.132387] ? fork_idle+0x280/0x280 [ 275.136096] ? fput+0xd4/0x150 [ 275.139285] ? SyS_write+0x15e/0x230 [ 275.142997] SyS_clone+0x37/0x50 [ 275.146359] ? sys_vfork+0x30/0x30 [ 275.149915] do_syscall_64+0x1e8/0x640 [ 275.153810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.158657] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.163837] RIP: 0033:0x459879 [ 275.167020] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 275.174720] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 275.182091] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 275.189558] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 275.196920] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 275.204187] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 275.211770] protocol 88fb is buggy, dev hsr_slave_0 [ 275.216864] protocol 88fb is buggy, dev hsr_slave_1 16:54:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = open(&(0x7f0000000640)='./file0\x00', 0x10004, 0x28) syz_extract_tcp_res$synack(&(0x7f00000000c0)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000140)={0x41424344}, 0x401, 0x7f) write$tun(r2, &(0x7f0000000b00)=ANY=[@ANYBLOB="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", @ANYRESHEX=r3, @ANYRES32=r4, @ANYBLOB="9120000790781000220424f9080a14b39d820000ffff0000790bcac328f8d1aa04534854"], 0x4) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 275.220178] protocol 88fb is buggy, dev hsr_slave_0 [ 275.226943] protocol 88fb is buggy, dev hsr_slave_1 16:54:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) r3 = getpgid(0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') r5 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000240)='nodevselfnodevvmnet1#systemsystemvmnet0security\x00'}, 0x30) sendmsg$nl_route(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@RTM_NEWNSID={0x5c, 0x58, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@NETNSA_FD={0x8, 0x3, r2}, @NETNSA_PID={0x8, 0x2, r3}, @NETNSA_FD={0x8, 0x3, r4}, @NETNSA_NSID={0x8, 0x1, 0x1}, @NETNSA_PID={0x8, 0x2, r5}, @NETNSA_FD={0x8, 0x3, r0}, @NETNSA_PID={0x8, 0x2, r6}, @NETNSA_NSID={0x8}, @NETNSA_PID={0x8, 0x2, r7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x10) ioctl(r8, 0x1000008912, &(0x7f00000003c0)="11dcdcfd149f33f23e6a02e82c814ea5045e0bcfe47bf077") r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 275.268716] x86/PAT: syz-executor.2:12539 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 275.303474] x86/PAT: syz-executor.2:12539 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:17 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000140)={{0x80}, 'post0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf1#>\x8a\xa2TV\xb5vO\x00\x00\x00\x00!\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\x00', 0xffffffffffdfffff, 0x2}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x44000, 0x0) r1 = gettid() wait4(r1, &(0x7f0000000040), 0x2, &(0x7f0000000080)) 16:54:17 executing program 2 (fault-call:8 fault-nth:35): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:17 executing program 5: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000080)={0x0, 0x3432564e, 0x3, @discrete={0x5}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={r0, @in={{0x2, 0x0, @multicast2}}}, 0x84) r1 = gettid() sched_setaffinity(r1, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x159) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x1) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xffff) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f00000000c0)={0x66, &(0x7f0000000340)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @local}, {}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}]}) r3 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x692, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[0x0, &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) ioctl$PPPIOCSDEBUG(r3, 0x40047440, &(0x7f00000001c0)=0x1) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000140)={0xec, 0x0, 0x0, 0x0}) syz_emit_ethernet(0x3e, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x8, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000100)={0x79e, 0x5487, 0x200, 0x0, 0x1d}, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000240)={0x3, 0x0, 0x3, 0xd8f}) r4 = shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x2000)=nil, 0x1000) shmdt(r4) 16:54:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x94d2747681d3a1ce) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18425b61c369a3b2ee1812587b4de54300000032001901000000000000000001000000ff000000"], 0x18}}, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') 16:54:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 275.490918] x86/PAT: syz-executor.2:12579 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:18 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x10001) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in={0x2, 0x4e24, @local}], 0xfffffffffffffe89) [ 275.576862] FAULT_INJECTION: forcing a failure. [ 275.576862] name failslab, interval 1, probability 0, space 0, times 0 [ 275.588715] CPU: 1 PID: 12587 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 275.596018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.605521] Call Trace: [ 275.608127] dump_stack+0x138/0x19c [ 275.611780] should_fail.cold+0x10f/0x159 [ 275.616118] should_failslab+0xdb/0x130 [ 275.620108] kmem_cache_alloc+0x47/0x780 [ 275.624179] ? __lock_is_held+0xb6/0x140 [ 275.628248] ? check_preemption_disabled+0x3c/0x250 [ 275.633284] anon_vma_clone+0xde/0x470 [ 275.637187] anon_vma_fork+0x87/0x4d0 [ 275.641007] copy_process.part.0+0x45e2/0x6a00 [ 275.645623] ? __cleanup_sighand+0x50/0x50 [ 275.649871] ? lock_downgrade+0x6e0/0x6e0 [ 275.654035] _do_fork+0x19e/0xce0 [ 275.657500] ? fork_idle+0x280/0x280 [ 275.661226] ? fput+0xd4/0x150 [ 275.664431] ? SyS_write+0x15e/0x230 [ 275.668159] SyS_clone+0x37/0x50 [ 275.671528] ? sys_vfork+0x30/0x30 [ 275.675309] do_syscall_64+0x1e8/0x640 [ 275.679194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.684055] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.689247] RIP: 0033:0x459879 [ 275.692430] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 275.692439] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 275.692444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 275.692448] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 275.692453] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 275.692457] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 275.721301] x86/PAT: syz-executor.2:12600 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 275.734251] x86/PAT: syz-executor.2:12600 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:18 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x806, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xc) write$uinput_user_dev(r1, &(0x7f0000000c80)={'syz1\x00'}, 0x45c) 16:54:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) kexec_load(0xffffffffffffffff, 0x4, &(0x7f00000001c0)=[{&(0x7f0000000040)="d9970ec0c525aaa3c12dfd4c1bfeb1bbfb78efbd5b7ce051a858498816060107058ce306d9c42baaa4", 0x29, 0x4, 0x8}, {&(0x7f0000000080)="5287f7a52952929c8002bdcf0e20be0dec96aded44b38853692fd84c923b3b1babc13bc3f5e24293333b428aadc4b673ce7d99d22eaf12058c0c86f15b9966a9afd58a5731aa0c49b0ceba43329d0b12eb2e52ad24e53f847d278164826c199dc4a8186f91e2b1376ab13b694fa2136666a28487698a6261a55d1c172d5e4fe06b9460228cc1718086438be3308e11487a", 0x91, 0x2, 0x6}, {&(0x7f0000000140)="30c159eeea93a511899211e12b3b204ed9c8fb0acc1b1dd84dbce84300121c5f3d8fbc4b3d6696ca78cb4260bd0ebf17766d5248de1436c160493381e56e509b39851744599a895dc06644172c0af7e0d371021ca05a", 0x56, 0x6, 0x3ff}, {&(0x7f00000002c0)="0f944363d68923c4591ed06df9c629638ae44d66f666443658c7e8985fceb215ee1df51e112bc151f25b95c46928ee0c05e419e7a665a89bc37ec6688c11af2d22d54f1018f3bf8a1c9147c9e14a4b8c3a903f4155480e901ee52bd5e8ff26df72c2898a601c6b6d6fc44f04439d2ced9a1c91734be71c9a53f6de012f243c581248aca366cb1c3a33ae2f78e5536f2bc667211b635420d2e6144325b8a004ad64290fab2090666b436952341a1eb02b43c500e27bf39f105d8e244adaea0e06a0245efb6d1a0c237d7fb7e30dcfc836eb1f953133d30614c30a9336f398e4392a4ca99ab7e978c99c6765", 0xeb, 0x2, 0x5}], 0x3e0000) setxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="020000000400ea00000000000400000000000000100000000000000000"], 0x24, 0x0) rmdir(&(0x7f00000003c0)='./file0\x00') r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x1b1daf44232cb08f, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000440)={&(0x7f0000ffc000/0x3000)=nil, 0x0, 0x1, 0x10, &(0x7f0000ffd000/0x3000)=nil, 0x9}) 16:54:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80000001, &(0x7f0000000080)="11dca50d5e2880db66ea4a4df1636b806a573c9a7c") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={0x0, @remote, @broadcast}, &(0x7f0000000340)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', r3}) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000208}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="286c97c4", @ANYRES16=r2, @ANYBLOB="080029bd7000ffdbdf2501000000000000000c410000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0xc000) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x84) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000280)={0x6, 0x3ff}) 16:54:18 executing program 2 (fault-call:8 fault-nth:36): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 275.933738] x86/PAT: syz-executor.2:12615 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 275.964680] FAULT_INJECTION: forcing a failure. [ 275.964680] name failslab, interval 1, probability 0, space 0, times 0 [ 275.986764] CPU: 0 PID: 12615 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 275.994038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.994045] Call Trace: [ 275.994064] dump_stack+0x138/0x19c [ 275.994086] should_fail.cold+0x10f/0x159 [ 275.994103] should_failslab+0xdb/0x130 [ 275.994116] kmem_cache_alloc+0x47/0x780 [ 275.994130] ? __lock_is_held+0xb6/0x140 [ 275.994140] ? check_preemption_disabled+0x3c/0x250 [ 275.994154] anon_vma_clone+0xde/0x470 [ 275.994168] anon_vma_fork+0x87/0x4d0 [ 275.994184] copy_process.part.0+0x45e2/0x6a00 [ 275.994213] ? __cleanup_sighand+0x50/0x50 [ 276.031175] ? lock_downgrade+0x6e0/0x6e0 [ 276.031192] _do_fork+0x19e/0xce0 [ 276.031205] ? fork_idle+0x280/0x280 [ 276.031220] ? fput+0xd4/0x150 [ 276.031229] ? SyS_write+0x15e/0x230 [ 276.031241] SyS_clone+0x37/0x50 [ 276.031250] ? sys_vfork+0x30/0x30 [ 276.038921] do_syscall_64+0x1e8/0x640 [ 276.038931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.038948] entry_SYSCALL_64_after_hwframe+0x42/0xb7 16:54:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) r2 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000080)={0x20080522, r2}, &(0x7f00000000c0)={0x10001, 0x1ff, 0x1, 0x200, 0x7fff, 0x2}) 16:54:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = open(&(0x7f0000000380)='./bus\x00', 0x400143642, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000000), &(0x7f0000000040)=0x4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000c80)=ANY=[@ANYBLOB="7f"], 0x1) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x930xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:18 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x498002, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r1, 0x400, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xfffffffffffffff7, @link='broadcast-link\x00'}}}, ["", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x735258a9ac738386}, 0x4000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) setsockopt$sock_int(r3, 0x1, 0x2f, &(0x7f0000000040), 0x4) r4 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000380)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010003080800418e00000004fcff", 0x58}], 0x1) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x4, 0x85) [ 276.103808] x86/PAT: syz-executor.2:12624 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 276.130342] x86/PAT: syz-executor.2:12624 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:18 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf78293525081", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 276.279280] x86/PAT: syz-executor.2:12640 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 276.332496] FAULT_INJECTION: forcing a failure. [ 276.332496] name failslab, interval 1, probability 0, space 0, times 0 [ 276.348704] CPU: 0 PID: 12640 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 276.355937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.355943] Call Trace: [ 276.355960] dump_stack+0x138/0x19c [ 276.355979] should_fail.cold+0x10f/0x159 [ 276.355992] ? anon_vma_clone+0xde/0x470 [ 276.356004] should_failslab+0xdb/0x130 [ 276.356018] kmem_cache_alloc+0x47/0x780 [ 276.356030] ? anon_vma_chain_link+0x142/0x1a0 [ 276.356040] anon_vma_clone+0xde/0x470 [ 276.356054] anon_vma_fork+0x87/0x4d0 [ 276.356071] copy_process.part.0+0x45e2/0x6a00 [ 276.356101] ? __cleanup_sighand+0x50/0x50 [ 276.356113] ? lock_downgrade+0x6e0/0x6e0 [ 276.356130] _do_fork+0x19e/0xce0 [ 276.356143] ? fork_idle+0x280/0x280 [ 276.356156] ? fput+0xd4/0x150 [ 276.400478] ? SyS_write+0x15e/0x230 [ 276.400495] SyS_clone+0x37/0x50 [ 276.400502] ? sys_vfork+0x30/0x30 [ 276.400517] do_syscall_64+0x1e8/0x640 [ 276.400525] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.400542] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.400550] RIP: 0033:0x459879 [ 276.400555] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 276.400566] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 276.400571] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 276.400576] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:54:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/unix\x00') ioctl$LOOP_CLR_FD(r1, 0x4c01) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @dev}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) sendto$isdn(r2, &(0x7f00000000c0)={0xfffffffffffff801, 0x40, "cb264c517fd7e4f4bf62a103b65f927760caf0354e5e7078d55eb8631fcab2ec5300e8fe612b9333ef721022d7f56a2d79aa35721c"}, 0x3d, 0x10, &(0x7f0000000100)={0x22, 0x0, 0x8}, 0x6) write$P9_RLCREATE(r2, &(0x7f0000000180)={0x18, 0xf, 0x2, {{0xa21e60507fdc7a2a, 0x2, 0x4}}}, 0x18) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) 16:54:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x7, 0x401, 0x1}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") fcntl$notify(r1, 0x402, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) 16:54:19 executing program 5: syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) 16:54:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0xc000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1000000000400202) mkdir(&(0x7f0000000380)='./file1\x00', 0x0) syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 16:54:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf78293525081", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:19 executing program 2 (fault-call:8 fault-nth:38): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 276.400581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 276.400587] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 276.507085] x86/PAT: syz-executor.2:12652 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:19 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000480), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)={0x7, 0x0, 0x80000000, {}, {0x0, 0x7530}, {}, 0x1, @canfd={{0x2, 0x80000001, 0x4, 0x6}, 0x13, 0x2, 0x0, 0x0, "745ea5d67a0eca8e9a7cfd756d43a9e665f87c6ec8db9bce116c1ea9a28080b7bef444869b0696766682a92db40cc755b084dcfff584b2bc747c7a8616db0730"}}, 0x80}}, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) prctl$PR_GET_NAME(0x10, &(0x7f00000001c0)=""/63) recvmmsg(r0, &(0x7f0000002040), 0x4000000000000ea, 0x1001c, &(0x7f0000002200)={0x0, r1+10000000}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) [ 276.548565] x86/PAT: syz-executor.2:12652 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf78293525081", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000320019010000000000000000dc000000ff000000"], 0x18}}, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x40, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000200)) ioctl$DRM_IOCTL_CONTROL(r2, 0x40086414, &(0x7f00000001c0)={0x3, 0x8000}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0) epoll_pwait(r3, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x4, 0x2, &(0x7f0000000140)={0x3405}, 0x8) 16:54:19 executing program 3: openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000980)=ANY=[@ANYRES64=r0], 0x1) add_key$user(&(0x7f0000000340)='user\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000200)="debe11676b90ed62fa44d75d4c00b53808793bb3235fe37bacbc3c4cb077a8de1e596893592085c1751745aee0af6fd060922c436afac97635b41f55a3ffd358f8e9c22657239505d9d79a1667bc4a8a07662c4b31db7779542eee32d5f9c5d3a214a35182e26867a1b0c0d377cab5ff30ecee7ed68f891feb7ad56c03e7224c9916941856b019ac811f6dc3107dfe5981522e7ca733f819796a7c7907dd349a8a1021f1f9a489e2a41d3ad64981a217b2fa9f6f58f7c7645c5392f63f8f0f053950202e3f9c4534ca7191a7636f02ea1d108db0ec3defa11658837dd793db19", 0xe0, 0xfffffffffffffffd) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000080)={0x2, 0xa, 0x81, 0x1, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)) r3 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x44000) fallocate(r3, 0x0, 0x0, 0xa6ba0) io_setup(0x5, &(0x7f0000000140)=0x0) io_submit(r4, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) close(0xffffffffffffffff) msgget$private(0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='numa_maps\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040), 0x10) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000005b40)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) stat(&(0x7f0000000180)='./bus\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f0000000480)={0xa0, 0x19, 0x3, {0x0, {0x12}, 0x0, 0x0, r5, 0x0, 0x0, 0x4000}}, 0xa0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) writev(r0, &(0x7f0000000300), 0x0) [ 276.713208] overlayfs: failed to resolve './file1/G ˆê„êYBüFBÓŸÌí²‹': -2 [ 276.713798] x86/PAT: syz-executor.2:12670 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 276.760233] FAULT_INJECTION: forcing a failure. [ 276.760233] name failslab, interval 1, probability 0, space 0, times 0 [ 276.809750] CPU: 1 PID: 12670 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 276.818991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.828538] Call Trace: [ 276.831146] dump_stack+0x138/0x19c [ 276.834802] should_fail.cold+0x10f/0x159 [ 276.838991] should_failslab+0xdb/0x130 [ 276.843059] kmem_cache_alloc+0x2d7/0x780 [ 276.847403] ? anon_vma_clone+0x310/0x470 [ 276.851849] anon_vma_fork+0xe9/0x4d0 [ 276.856572] copy_process.part.0+0x45e2/0x6a00 [ 276.861189] ? __cleanup_sighand+0x50/0x50 [ 276.865441] ? lock_downgrade+0x6e0/0x6e0 [ 276.869611] _do_fork+0x19e/0xce0 [ 276.873080] ? fork_idle+0x280/0x280 [ 276.876801] ? fput+0xd4/0x150 [ 276.880077] ? SyS_write+0x15e/0x230 [ 276.883913] SyS_clone+0x37/0x50 [ 276.887275] ? sys_vfork+0x30/0x30 [ 276.890823] do_syscall_64+0x1e8/0x640 [ 276.894714] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.899748] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.904942] RIP: 0033:0x459879 16:54:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)=0x7) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) sysfs$2(0x2, 0x1, &(0x7f0000000080)=""/87) r1 = fcntl$dupfd(r0, 0x406, r0) write$FUSE_STATFS(r1, &(0x7f0000000200)={0x60, 0x0, 0x3, {{0x200, 0x400000000000, 0xff, 0x100, 0x9, 0x2, 0x80000000, 0x2}}}, 0x60) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x42, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0xffffffff, 0x30}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000001c0)={r3, 0xff}, 0x8) [ 276.908138] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 276.915849] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 276.923296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 276.930651] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 276.937914] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 276.945186] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r2, 0xc008551c, &(0x7f0000000380)={0x4, 0x1c, [0x1, 0x4, 0x36c1, 0xb62e, 0x5, 0x5, 0x1000]}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r3, 0x4, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xab}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xbe41}]}]}, 0x58}}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="1800000032001901000000000000000001000000ff0000007f997f0e271e8b121cf01467ddd1040ef575f739673b524c8012803965265859a296281073f046572bfbc855d153289a26684f7793cdbb14f684dfa74ced54556a766e062b152e10d2d8b945109b27013f9d3003d27c7222ce61848544b1aa6e3fa90d886d78ba3bbc25f705d53f2d5e8b93a7e07231b2167620138097545c740f3f2732810356537627d1c27a72956ee4b521bba912f23e3f66933a7fab41dba2343d99ca61692d71061aee2ae2a2e99e81291940ba50a2576c3c496b6cb4b79a89dddd0ced9fb155a5fd26a1ae2fc23434ff67b39e4602b7b863762e57155b3aa7a50ee77a220b637440584bcf8fe8fed1"], 0x18}}, 0x0) 16:54:19 executing program 0: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) r0 = inotify_init() r1 = open(&(0x7f0000028000)='./control\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./control\x00', 0x100) symlinkat(&(0x7f0000000300)='./control\x00', r1, &(0x7f0000000340)='./file0\x00') mknodat(r1, &(0x7f00000002c0)='./control\x00', 0x0, 0x0) inotify_init1(0x80800) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x400001000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") r3 = socket$inet(0x2, 0x100000000805, 0x0) setsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000000)={0x0, 0x80000000}, 0x8) listen(r3, 0x200000003d) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000100)=0x8042d0, 0x1a7) r4 = dup3(r2, r3, 0x0) write$FUSE_POLL(r4, &(0x7f0000000040)={0x18, 0x0, 0x8, {0xb}}, 0x18) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) inotify_add_watch(r0, &(0x7f0000000080)='./control\x00', 0x1000000) renameat2(r1, &(0x7f0000000040)='./control\x00', r1, &(0x7f0000036000)='./file0\x00', 0x2) 16:54:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:19 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r1}) r2 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x5) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000c659ca800537f40000001b000000170800000000000000200000000000000000bfbbb18016410f67f8ed2fbda6599591076756fcb9ff7daf0bdd7cfa3d4ade61ccb14424af8c63ab6fd1845b0c90c78bf8059655", 0x58}], 0x2) [ 277.013975] x86/PAT: syz-executor.2:12670 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 277.048765] x86/PAT: syz-executor.2:12670 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:19 executing program 2 (fault-call:8 fault-nth:39): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:19 executing program 3: read(0xffffffffffffffff, 0x0, 0x10000021f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000540)) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x0) syncfs(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 16:54:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 277.106998] net_ratelimit: 12 callbacks suppressed [ 277.107003] openvswitch: netlink: Flow key attr not present in new flow. [ 277.273908] x86/PAT: syz-executor.2:12723 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 277.308699] FAULT_INJECTION: forcing a failure. [ 277.308699] name failslab, interval 1, probability 0, space 0, times 0 [ 277.337850] CPU: 0 PID: 12723 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 277.345298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.345303] Call Trace: [ 277.345324] dump_stack+0x138/0x19c [ 277.345343] should_fail.cold+0x10f/0x159 [ 277.345360] should_failslab+0xdb/0x130 [ 277.345373] kmem_cache_alloc+0x2d7/0x780 [ 277.345386] ? anon_vma_clone+0x310/0x470 [ 277.345401] anon_vma_fork+0x1ce/0x4d0 [ 277.357637] copy_process.part.0+0x45e2/0x6a00 [ 277.357671] ? __cleanup_sighand+0x50/0x50 [ 277.390578] ? lock_downgrade+0x6e0/0x6e0 [ 277.394740] _do_fork+0x19e/0xce0 [ 277.398207] ? fork_idle+0x280/0x280 [ 277.402016] ? fput+0xd4/0x150 [ 277.405202] ? SyS_write+0x15e/0x230 [ 277.408912] SyS_clone+0x37/0x50 [ 277.412274] ? sys_vfork+0x30/0x30 [ 277.415945] do_syscall_64+0x1e8/0x640 [ 277.419828] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.424675] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.429862] RIP: 0033:0x459879 [ 277.433053] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 277.440976] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 277.448346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 277.455619] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 277.462893] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 277.470200] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 277.484188] x86/PAT: syz-executor.2:12723 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 277.493914] x86/PAT: syz-executor.2:12723 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:20 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000180)={0x4000000000000000, 0xffff, 0x0, 0x4, 0x4, 0x10001}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='configfs\x00\x7f\xcb', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x4) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r1, 0xfffffffffffffffd, 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2, 0x0) 16:54:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x20000, 0x0) ioctl$LOOP_CLR_FD(r2, 0x4c01) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:20 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x400000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000040)={0x132ce292, 0x33ca, 0x8, 0x9, 0x0, 0xf807}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x6, 0x2, @raw_data=[0x8001, 0x5, 0x8, 0x3ec, 0x7fffffff, 0x9, 0x7fffffff, 0x800, 0xf6, 0x400, 0x3, 0xfffffffffffffffe, 0x0, 0xab, 0x8, 0x371a]}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr="84629127012e1bf681913593e6a2cff9"}}}, 0x0) ioctl$sock_ifreq(r1, 0x890b, &(0x7f0000000140)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_map}) 16:54:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:20 executing program 2 (fault-call:8 fault-nth:40): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1400, 0x30}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55b0621ba286bc01abc8464d4f8a906151", 0x437) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000140)=ANY=[@ANYRES16=r0, @ANYRES64=r1, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESOCT=r1], @ANYRESOCT=r2, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRES16=0x0]], 0x31) r3 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0xfffffffffffffffb, 0x75, 0x9, 0x1, 0x0, 0x6, 0x1000, 0x8, 0x94, 0x4, 0x6, 0x0, 0x1f, 0xfffffffffffffff7, 0x0, 0x7ff, 0x7ff, 0x8, 0x7, 0x8, 0x5, 0x9, 0x1ff, 0x40, 0x800000000000, 0x6, 0x400, 0x9, 0xa90, 0x400, 0x7ff, 0x5, 0x76, 0xfff, 0x8, 0x10000, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x983b908b3332c801, 0x6, 0x4accf5d9, 0x7, 0xb4, 0x4d, 0x2}, r3, 0x1, r0, 0x1) recvmmsg(r2, &(0x7f0000001240)=[{{&(0x7f0000000440)=@generic, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001580)=""/4096, 0x1000}, {0x0}, {&(0x7f0000000580)=""/105, 0x69}], 0x3, &(0x7f0000000700)=""/150, 0x96}, 0x953}, {{0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000003980)=""/4096, 0x1000}, {&(0x7f0000000a80)=""/45, 0x2d}, {&(0x7f0000000ac0)=""/36, 0x24}, {&(0x7f0000000b00)=""/122, 0x7a}], 0x5}}, {{&(0x7f0000000c00), 0x80, &(0x7f0000000d40)}, 0x8b2}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000e80)=""/12, 0xc}, {&(0x7f0000000ec0)=""/120, 0x78}, {&(0x7f0000000f80)=""/76, 0x4c}], 0x3, &(0x7f0000001040)=""/26, 0x1a}}, {{&(0x7f0000001080)=@nfc_llcp, 0x80, &(0x7f0000001200)=[{&(0x7f0000001100)=""/249, 0xf9}], 0x1, &(0x7f0000004980)=""/4096, 0x1000}}], 0x5, 0x40, 0x0) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) r5 = syz_open_dev$radio(&(0x7f00000002c0)='/dev/radio#\x00', 0x0, 0x2) sendto$unix(r5, &(0x7f0000000300)="ddef5dc6c5622f9b9e8740bb0d798ff3a70eb43c483f85d634128b7e10abeadcc28a1e18e25348d1f6d6cc01f6c9368f762ac5ae7ab7c3b6cc8157f0c422f88cfb0791f61bf753cf7702fecfe8ddc49439e93572d52a7d6af25836f1302094f3c44dd98d49d6c36d2efb1243fe209ebae80bbedb747dbcb277c64c15b62a3d2d48bd87bb1ab657a2a2fac295f591164064ccfd3f367c66861714c284e3bd377c50e23de863eb4f0ea1009f", 0xab, 0x814, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e) ioctl$VIDIOC_SUBDEV_S_CROP(r4, 0xc038563c, &(0x7f0000000280)={0x1, 0x0, {0x6, 0x400, 0x3, 0x85}}) [ 277.657076] openvswitch: netlink: Flow key attr not present in new flow. [ 277.660909] x86/PAT: syz-executor.2:12738 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) close(r1) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) pipe(&(0x7f0000000000)) tee(r1, r2, 0x4001401, 0x0) 16:54:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x4, 0x40) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+30000}}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="1800000032001901000000000000000001000000ff000000ff502eb340f014fb48409c9a6327080cd81474347a96976361b3e371096c3af5bbeb340d860db250fddb441b7b6ed04da24f58122ed5028f104623f5a048f68317ddd770d00fa5a80e70ea4019cd3b902a8fca1b551c733b2e8ce1d92232da70723dda4076a513f7c1cedf9cdbc5da6a0d726c2db066ccca053c6c0692528bdc644c476896cb0eb305893b8ad746060d35d811a0370569e3e8896d4c718f91000000000000003fed15ec060fc703c2066107454a4be57330c124a2cd5d4e49b52e176f5986c74fe9f7d149ce7b7ed9ed207191f085bdab28c0cdd1"], 0x18}}, 0x0) 16:54:20 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000000e00)=[{{&(0x7f0000000040)=@ipx, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)=""/105, 0x69}, 0x3971}, {{&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)=""/220, 0xdc}, {&(0x7f0000000300)=""/61, 0x3d}], 0x2}, 0x7fffffff}, {{&(0x7f0000000380)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000400)=""/234, 0xea}, {&(0x7f0000000500)=""/143, 0x8f}, {&(0x7f00000005c0)=""/241, 0xf1}, {&(0x7f00000006c0)=""/177, 0xb1}, {&(0x7f0000000780)=""/236, 0xec}, {&(0x7f0000000880)=""/170, 0xaa}], 0x6}, 0x3}, {{&(0x7f00000009c0)=@nfc_llcp, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000a40)=""/138, 0x8a}, {&(0x7f0000000b00)=""/115, 0x73}, {&(0x7f0000000b80)=""/19, 0x13}, {&(0x7f0000000bc0)=""/171, 0xab}, {&(0x7f0000000c80)=""/119, 0x77}], 0x5, &(0x7f0000000d80)=""/120, 0x78}, 0x7d}], 0x4, 0x10000, &(0x7f0000000f00)={0x0, 0x1c9c380}) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000f40), &(0x7f0000000f80)=0x14) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x101400, 0x0) [ 277.702819] FAULT_INJECTION: forcing a failure. [ 277.702819] name failslab, interval 1, probability 0, space 0, times 0 16:54:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f01", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:20 executing program 5: r0 = semget(0x0, 0x1, 0x250) semctl$IPC_RMID(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x8) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$can_raw(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) 16:54:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x2}]}, &(0x7f0000000000)='GPL\x00'}, 0x48) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x240) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000080)={0x8, {{0x2, 0x4e21, @multicast2}}}, 0x88) ioctl$VFIO_IOMMU_GET_INFO(r0, 0x3b70, &(0x7f0000000140)={0x10}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) [ 277.798556] CPU: 0 PID: 12738 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 277.805702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.815073] Call Trace: [ 277.817769] dump_stack+0x138/0x19c [ 277.821501] should_fail.cold+0x10f/0x159 [ 277.825668] should_failslab+0xdb/0x130 [ 277.829752] kmem_cache_alloc+0x2d7/0x780 [ 277.833910] ? anon_vma_clone+0x310/0x470 [ 277.838072] anon_vma_fork+0x1ce/0x4d0 [ 277.841970] copy_process.part.0+0x45e2/0x6a00 [ 277.846573] ? __cleanup_sighand+0x50/0x50 [ 277.850826] ? lock_downgrade+0x6e0/0x6e0 [ 277.855228] _do_fork+0x19e/0xce0 [ 277.858683] ? fork_idle+0x280/0x280 [ 277.862397] ? fput+0xd4/0x150 [ 277.865607] ? SyS_write+0x15e/0x230 [ 277.869406] SyS_clone+0x37/0x50 [ 277.872776] ? sys_vfork+0x30/0x30 [ 277.876318] do_syscall_64+0x1e8/0x640 [ 277.880289] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.885141] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.890329] RIP: 0033:0x459879 [ 277.893511] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 277.901217] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 277.908751] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 277.916018] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 277.923281] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 277.930856] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 277.954465] x86/PAT: syz-executor.2:12738 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 277.972034] openvswitch: netlink: Flow key attr not present in new flow. [ 277.989216] x86/PAT: syz-executor.2:12738 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:20 executing program 3: r0 = socket(0x1000000010, 0x4008000000803, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 16:54:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f01", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 278.005310] openvswitch: netlink: Flow key attr not present in new flow. 16:54:20 executing program 2 (fault-call:8 fault-nth:41): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, 0x0) r3 = getpid() recvfrom$packet(r1, &(0x7f0000000280)=""/189, 0xbd, 0x10043, 0x0, 0x0) tkill(r3, 0x1e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 16:54:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x408}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r2, 0x10, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xac1d}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x92a}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x804}, 0x840) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x200, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x2000c000) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:20 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x70}}, 0x0) 16:54:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x70}}, 0x0) 16:54:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f01", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 278.226788] openvswitch: netlink: Flow key attr not present in new flow. [ 278.262958] x86/PAT: syz-executor.2:12795 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000891a, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x406, r1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x8004, 0x7, 0x3, 0x0}, &(0x7f0000002680)=0x10) get_thread_area(&(0x7f0000002740)={0xc330, 0x1000, 0xffffffffffffffff, 0x8, 0x4, 0x7, 0x7, 0x3ff, 0x0, 0x8}) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000026c0)={r3, 0x7, 0x0, 0x100000000}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000002600)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002640)={0x14, 0x8000032, 0x319, 0x0, 0x0, {0x800000001}}, 0x14}}, 0x0) r4 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x20, 0x8001) bind$isdn(r4, &(0x7f0000002700)={0x22, 0x80, 0x10001, 0x1, 0x401}, 0x6) sendmmsg$alg(r4, &(0x7f0000002500)=[{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000140)="457fe6ddb405c54ca751e6026b171cb990d7cd277844b0179bba2ed4a581cbdf1168c414c26ba795adce0496520cfbe6d612acddec87b77bde86908e97eddedab8e8d2229b20452daff7b2422e107de67c7892c9ae0e3a1e35223a977f88cd56270bc07ee616816f8226c491451cf16711e366959995b579899ef693f43603eb585ad8e1f1518ba32e058e9e900d2d29c73bacf2ca65c10e243dd156fec20357688c0a1b0a3baa250b76d3545c3fe3168298ce6f4297646c3ddc66c1aef41f5807202701a33c949560ccde777e0f8b4d35bb54029f95a678c0dcdcb273bc9e905fa53e8188ad6d", 0xe7}, {&(0x7f00000000c0)="c39ccc1d23d9d8bc8b40a51923b6640d609feb69e35b53c586ff52c47fbe793161a3bd0d429a832144c048c178327a57b7b3cc705389c022295904dc90f78032", 0x40}, {&(0x7f0000000240)="aa0b0669e9aeca21f744b835e4d46e7a3a95693247a13ecfab0f8fdb22e3f97badd9e4e97feb9529fd288b77fadd2572ef3520b3dac7db7edd25a977bce98a8176591725a28a9a6b0688125f07e46fba06e9c3fa90de218894d72a8e7e7462e22d2e1310a3a4c4ba8dfbad7c6873b916d82f29ee4edd731f129a61ab7d34c88393f6feb6b38e6b", 0x87}, {&(0x7f0000000300)="e97da159ad07d8b13df3d74c99d0bbacc34bde0bb4f39b33b04966c945913ef4a66a1c82ae5e040bce45ef7dc68aa59b6cff2a200defaa72f39bcf6791da", 0x3e}, {&(0x7f0000000340)="cc0da0bb404604598040f249909d2284858e58f20b60fff9161a7207a8b317c5903e5e7453c6288380b5743717696f25392a3c630b3adb597f4b27bfea173a00ab775593f17743adc46dfe9d5e0d41fbfc61940fc5f4b537bc5729f380b2e4c94c6be82f6d36941f64cf5da09bef4ad0dc5efd483d8fa9c6f781023f1f2ef4c163a6908e0c4c556b7fe9b74c05139b35e1649d377bb5ecc0d5a76dcba93f10b6b01e0c", 0xa3}, {&(0x7f0000000400)="07e6fce2c63fe500baaaa52faaa1ca93beaca281178c815931cf83e515b35051ea1d0976327482b1f0c01042339ecaf940c220596ce62f853535614272ffebf6868b0a2147ba961ce223abf8ba12bb8c2dd30af2e2482c4bb4c0a9d1811ed0f201db7fa5eb72cd84a41019a062fcfb245c87f24faf35e0f5095f61eb4f07e72ab806193e1b15433c4878926eb6dd83de135e3ed5b714cdbee1300116dcaf1fa9ca3bfebdccb06c580108406f1422b015511c6a50aea3b781c3a6085c008079a850", 0xc1}, {&(0x7f0000000500)="577bb8ff715dfaad0fa63db0d01841a98fa6611322c4289412cab9911869e821db061cb02674f3e9e318391753be542eb4d8444accd119b5d21872111f1f0777e53c77", 0x43}, {&(0x7f0000000580)="d8931887b928a5f166e878ef3d0e8b32a582551d9000b37286695d9669a702a88c6c709629a9690fc094109e7b0ac44fc7f5b2eda5b3bd3a53ff7af47b07afc4b3d6a4542d190a962eafe6014791ca5f8b1fb2d0ebeab61c21e865015bc6ac5f3ddd9904b1c6f0b88f0e111cf30b6e22b2734e6ad5ad614f5e3fe980f08db8553d6ca043a21adb026ce284ad5437e2b294141d14e18fac594dbc9b42b9682ae15b2123cb5a929c650b664fa72f72fbcd16e02a5568b56ed25c5c9a3e41d9064935614f0be078a167236e4aff2ecfc5019c5921626c663351cdb5e1a70fd1385bef64f71d0494ea97b510e0c5", 0xec}], 0x8, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x170, 0x20008000}, {0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000880)="722685c9ae66f1013a71cb1417c6ced0e85582c04d1d1e5ef140016c2eeae09a2f68daf68394a92c4e24332e3d405d31441eceab236561b97cc9676701368f6689b3506aea27004c07fba36c8523c4a4afcbcf8fc52eead25c5033353493363e6917ae5025617de9585a867d9f3fc2b07b09c6fd41dc047895f3fb479c1cbc2666eef1e32bd98d34e1f2e353517d171d1dc2fbcfde8f5d35229cb5e9bb94bfaca48e4060fe9d9233927316d3b7cc2150c38024bfa01fb5ea76ef3c0599a443c0d3950ab6", 0xc4}, {&(0x7f0000000980)="95e7ad5e2013c3572c849fb1315f8d3bce66b24ce1f2baaf14fd2a1c12cb279af73588bce4b2d3da159ba00b8c8308eba176d4d5c80a50119bec9d2aebd8c51e29dc6c8d671934edd9122ec2c7831791d25d5c95976ea96234db4ea429f0bf18ec75d16b56d4e458b2f68c0319385c9af261af733f0fb6e1c454b369cedaf22b6255d6ebc9d4676ae0333f94f879bb605c3b6bf3", 0x94}], 0x2, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"/264], 0x108, 0x80}, {0x0, 0x0, &(0x7f0000002140)=[{&(0x7f0000000bc0)="8955f2406585399c8955ca177f40d226c156c5422e5aeeaf92cf9a21b9d4031e7e4c83950227e718a975a8359c6a9338f70a", 0x32}, {&(0x7f0000000c00)="d3a80d900a542cdc07b808435e6abd9ace06800a873feaf6b2db81fab2cb7bd0fdc012fdf2a54c89b745b36654dfd7f56a4f355d5fe8f8ccbcf65798924e56dbe938beb9b99550ee793895612cc3ffbff168f04399c42ff38ee13531a67f0f5414b874ccc5037812c0546c94b78fff35926d753f8339fabbbef8828d25f8a57209c97e", 0x83}, {&(0x7f0000000cc0)="f40a382bacafae451acbf70771bf599cda7772c58df228e9204607c9a4fecbf73b4439831fac4d72e1868c72ef52a16a1806dde2266643489441f5762cda0545f4c98cc9561ff24aa4075a334ca72960541b44d773911790c0a717d21b8e4304df15a95ce4f2e8f0bc78b617d26265a9b0bd59df90a18738250cd6fcaf23fa8744223a947f10bc287a17ef601026c5f72d3e0bc9808c5af03d1af6639eefb4ea74c545560571b9cbb7f0a26916e7e24b584316ba5febc3efd239a5dd8f441340ac4c7f26c4328bbdb1abb1d40192212375842d0e300e1c", 0xd7}, {&(0x7f0000000dc0)="2be428615da62189b33a76e24e853ccefbe3c1397e1e52e3cea314a23f5ed51b3cb28c00060bd7226733256f2a841776c8c04b8458b29ddb35b0", 0x3a}, {&(0x7f0000000e00)="663ae04fb67d714b9d5eec1dde3d212e20aea5859ffb713974a0e160a9da31c32aaac87e2cb7669be11e4a8b282b1a92205d6278c7a647a9a98e2e91109f0f06db4fc825c80fd06483101ed95870ff7d3bfbd4615b09521de3af23d4570dc5a0dc0918", 0x63}, {&(0x7f0000000e80)="1b2ba9066e231f03224b523d5e33175db157f07f04c375da351fddd5504384c6184f5c9c53803d53d57e9a55c25393edf3bacc69b4976c175b37fcf912df51fbe58104052d463439ab6f59f1f920bd8705ed49dd17e0b71dce83c5418454bf650be74d007c3c36518f79d927ee41abeeafa0479dd465343528adc955398e0de1b4decba80929810a69821754406b720febe8ffd79418becbb8be806000ae867a041aa9a11713ca115e3262262c483ff916367b91ecce5310e4a13e75c25efa6cc074b2876135cc3d92c1c2603d35f36c3ba0959cdc420db650123892672bf735f41e9db4c7593ec04d5421a6", 0xec}, {&(0x7f0000000f80)="88686c3ffb83e3664b99e99d82039d055ad54a5827e8a6f4045a388262968b84a38d8543b0e3514985476be09433d460f263f64bb90bcd1a94cc7fc4e53083902bf078a377e02af4cf6a663e416d946e2231f899e112117c5e004cf375af29b1b4608f31c15e0cd6d6c1e49465c8f6cfe0818c326c18ac5fc8daf7fedd30e564e52a03158b0b45bdc2ac7fb7f31e52df9ba399150de2", 0x96}, {&(0x7f0000001040)="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", 0x1000}, {&(0x7f0000002040)="946d4a75bae1bae1c8dedb4b99452c49e5fea45022eadd5ed98f981964630ce2e952a566b74853bd1e2a7df79d6ba7546738301eebfcee1a69700dfe7e9f444e59284fe185aa84261bcced7be4dc36ed7027281625e4a1f4f598bbd6c067db76d8c41014068bb7c358bc2c77ae7488dbf006a875a81c", 0x76}, {&(0x7f00000020c0)="0e3bbbc72c822f3e04930626227ed440961a5a9a34b0d5c4d3edb94087e96962c16af53926a9151e75e820d65d3e7172f9c4b3d0f7d687ae31d28b775564b547a275b1563c5f8ba44a5ff5eafed9da6fcbe91c3cbcd0e7bec9b8147fabac183a49940961718e7a80cb8401b44d0fd49082b0ca9ddcb9dc8eb6ed", 0x7a}], 0xa, &(0x7f0000002900)=ANY=[@ANYBLOB="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"], 0x120, 0x4000000}, {0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000002340)="2325f9c59159d449c49e96fd725902469a7d56413fe15b6b8e7902ac85fa4a595c0b80f326652468f86a78fc44c11e8479e2ebc26e6a7ce860", 0x39}, {&(0x7f0000002380)="ad9116e48a24d104247b200270de1ee828c4b4b65883b1de502794eebea8386c3b6904a05d77f554bc5d53a1509bc4f9257c426a6f264b71863bc303304ae2a8f697216cc95cd36c9439fedb3de80223029f5b1f31f469346051d2b06c59a4997e33ddf2bebbcde6b50e20e2e41e7998ab22799a2284d4c425", 0x79}], 0x2, &(0x7f0000002800)=ANY=[@ANYBLOB="180000000000000017010000040000000000b846dace0000000000009000000000000000170100000200000076000000da872404c3a5ecbb9a93ceb132d23cd6c16ba4520971cf4477c1e8c1cca651611b65e2a7c0210efe0fe2534108e882752fe731f2aa73b2eeb7ea39ba46a1befab98445a926dc28909aa5575cfb543e38fd0f170e51f4bb843e5cd593e65ca1f93a5cacb46f7d74735ad1601343cd84e7b903a9d79492378e21216d1a20b69a7df2eceb19f500000000000018000000000000001701000004000000fcffffff"], 0xc0, 0x24008045}], 0x4, 0x4841) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000002780)={r3, 0x7, 0x10, 0xab, 0x100000000}, &(0x7f00000027c0)=0x18) [ 278.304942] FAULT_INJECTION: forcing a failure. [ 278.304942] name failslab, interval 1, probability 0, space 0, times 0 16:54:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c0000001000f9ff000000000000005865000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c0002000800020000000000"], 0x3c}}, 0x0) 16:54:20 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) ioctl$int_out(r0, 0x0, 0x0) 16:54:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc4", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 278.421783] CPU: 0 PID: 12795 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 278.428930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.438611] Call Trace: [ 278.441206] dump_stack+0x138/0x19c [ 278.444869] should_fail.cold+0x10f/0x159 [ 278.449126] should_failslab+0xdb/0x130 [ 278.453119] kmem_cache_alloc+0x2d7/0x780 [ 278.457268] ptlock_alloc+0x20/0x70 [ 278.460894] pte_alloc_one+0x60/0x100 [ 278.464690] __pte_alloc+0x2a/0x2d0 [ 278.468320] copy_page_range+0x11ba/0x1bd0 [ 278.472715] ? anon_vma_fork+0x358/0x4d0 [ 278.476808] ? vma_compute_subtree_gap+0x190/0x1f0 [ 278.481813] ? __pmd_alloc+0x410/0x410 [ 278.485707] copy_process.part.0+0x4764/0x6a00 [ 278.490304] ? __cleanup_sighand+0x50/0x50 [ 278.494531] ? lock_downgrade+0x6e0/0x6e0 [ 278.498764] _do_fork+0x19e/0xce0 [ 278.502224] ? fork_idle+0x280/0x280 [ 278.505932] ? fput+0xd4/0x150 [ 278.509120] ? SyS_write+0x15e/0x230 [ 278.512839] SyS_clone+0x37/0x50 [ 278.516213] ? sys_vfork+0x30/0x30 [ 278.519759] do_syscall_64+0x1e8/0x640 [ 278.523644] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.528669] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.533852] RIP: 0033:0x459879 [ 278.537032] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 278.544738] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 278.552000] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 278.559271] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:54:21 executing program 5: rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000880)={0x0, 0x0, 0x65}) r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b0000a10000000000", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4c8}, {&(0x7f00000024c0)=""/4096, 0x1038}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x348, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) [ 278.566535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 278.573803] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc4", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 278.761385] x86/PAT: syz-executor.2:12795 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:21 executing program 2 (fault-call:8 fault-nth:42): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 278.807910] x86/PAT: syz-executor.2:12795 freeing invalid memtype [mem 0x00002000-0x00002fff] [ 278.975607] x86/PAT: syz-executor.2:12836 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 278.996595] FAULT_INJECTION: forcing a failure. [ 278.996595] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 279.020278] CPU: 0 PID: 12836 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 279.027406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.036758] Call Trace: [ 279.039349] dump_stack+0x138/0x19c [ 279.044122] should_fail.cold+0x10f/0x159 [ 279.048268] ? __might_sleep+0x93/0xb0 [ 279.052156] __alloc_pages_nodemask+0x1d6/0x7a0 [ 279.056825] ? __alloc_pages_slowpath+0x2930/0x2930 [ 279.061871] alloc_pages_current+0xec/0x1e0 [ 279.066280] pte_alloc_one+0x1a/0x100 [ 279.070071] __pte_alloc+0x2a/0x2d0 [ 279.073692] copy_page_range+0x11ba/0x1bd0 [ 279.077975] ? __pmd_alloc+0x410/0x410 [ 279.081959] copy_process.part.0+0x4764/0x6a00 [ 279.086555] ? __cleanup_sighand+0x50/0x50 [ 279.090791] ? lock_downgrade+0x6e0/0x6e0 [ 279.094935] _do_fork+0x19e/0xce0 [ 279.098387] ? fork_idle+0x280/0x280 [ 279.102188] ? fput+0xd4/0x150 [ 279.105374] ? SyS_write+0x15e/0x230 [ 279.109085] SyS_clone+0x37/0x50 [ 279.112442] ? sys_vfork+0x30/0x30 [ 279.116243] do_syscall_64+0x1e8/0x640 [ 279.120121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.124960] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.130248] RIP: 0033:0x459879 [ 279.133425] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 279.141385] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 279.148649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 279.155910] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 279.163172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 279.170432] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 279.184205] x86/PAT: syz-executor.2:12836 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 279.193415] x86/PAT: syz-executor.2:12836 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:22 executing program 0: 16:54:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="0186000000ddf73ee80b62854a5e8d000000000000000000"], 0x18}}, 0x0) 16:54:22 executing program 3: 16:54:22 executing program 5: 16:54:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc4", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:22 executing program 2 (fault-call:8 fault-nth:43): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:22 executing program 3: 16:54:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000900190140ee1ea100878b0c7d480b00000000000000"], 0x1}}, 0x0) 16:54:22 executing program 5: 16:54:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0xffffffffffffffff, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:22 executing program 0: [ 279.807351] x86/PAT: syz-executor.2:12843 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 279.825854] FAULT_INJECTION: forcing a failure. [ 279.825854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 279.907952] CPU: 1 PID: 12843 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 279.915136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.924638] Call Trace: [ 279.927245] dump_stack+0x138/0x19c [ 279.930890] should_fail.cold+0x10f/0x159 [ 279.935051] ? __might_sleep+0x93/0xb0 [ 279.938955] __alloc_pages_nodemask+0x1d6/0x7a0 [ 279.943635] ? __alloc_pages_slowpath+0x2930/0x2930 [ 279.948665] alloc_pages_current+0xec/0x1e0 [ 279.952995] pte_alloc_one+0x1a/0x100 [ 279.957070] __pte_alloc+0x2a/0x2d0 [ 279.960699] copy_page_range+0x11ba/0x1bd0 [ 279.960725] ? __pmd_alloc+0x410/0x410 [ 279.960742] copy_process.part.0+0x4764/0x6a00 [ 279.960769] ? __cleanup_sighand+0x50/0x50 [ 279.973427] ? lock_downgrade+0x6e0/0x6e0 [ 279.973448] _do_fork+0x19e/0xce0 [ 279.973460] ? fork_idle+0x280/0x280 [ 279.973474] ? fput+0xd4/0x150 [ 279.973484] ? SyS_write+0x15e/0x230 [ 279.973496] SyS_clone+0x37/0x50 [ 279.973503] ? sys_vfork+0x30/0x30 [ 279.973517] do_syscall_64+0x1e8/0x640 [ 279.973526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.011817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.016463] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 280.017006] RIP: 0033:0x459879 [ 280.028743] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 280.036471] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 280.043835] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 280.050969] openvswitch: netlink: Flow key attr not present in new flow. 16:54:22 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="2400000002070368dce3436ff20c0020201c1009000200021d8568a20400ff7e280057ff", 0x24}], 0x1}, 0x0) 16:54:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:22 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000140), 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x8) [ 280.051235] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 280.065328] openvswitch: netlink: Flow key attr not present in new flow. [ 280.065358] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 280.079493] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 280.099667] x86/PAT: syz-executor.2:12843 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x100, 0x0) write$P9_RLERROR(r1, &(0x7f0000000100)={0x15, 0x7, 0x0, {0xc, 'vboxnet1\'-%^'}}, 0x15) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='highspeed\x00', 0xa) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="1840007b2cd0799b530019010000000000000064d1053916e322618d"], 0x18}}, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000180)=0x5, 0x4) 16:54:22 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='coredump_filter\x00') setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') accept(r1, &(0x7f0000001440)=@hci, &(0x7f00000014c0)=0x80) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000140)={0x0, 'veth1_to_bond\x00'}, 0x18) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f00000015c0)) socket$inet6(0xa, 0x80001, 0x0) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000001640)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32], 0x3, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f00000017c0)=ANY=[], 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) request_key(&(0x7f0000001240)='keyring\x00', 0x0, &(0x7f0000001400)='system.posix_acl_access\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000080)='user\x00', 0x0, &(0x7f00000012c0)="6147d5da0a07b5667879663fcfc309e86f6f71099c8963e59fa9028dd4b0747f539006ba439c976dcc8d8afd66c2f13a53d3234396d58ec761ef4b241beec6b252d78fc5d123dfee19a55b1450fa1e81969044d50f6101306b1b8eeb54022039320fff2a2bf7ef2740435487cbf9befc6a729f2fc1ce2491ab573932ca46420ec96f730cc3adf18ed8cec244907a4ecdeef3648895196063bae0dbd1e6179b22724d9dcc55489ff150250c01716c8ae088d3d7682bdb987e82c6efa205cb", 0xbe, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000100)=""/34, 0x10000017a}], 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000000)={'nr0\x00', 0x400}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@initdev, @in=@multicast1}}, {{@in6=@loopback}, 0x0, @in6=@ipv4}}, &(0x7f00000001c0)=0xe8) 16:54:22 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x100) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0), 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = epoll_create1(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0x4000201f, 0x3f000002}) close(r2) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000001300)={0x13b, 0x7, @name="7970847c3f8d1b2156471dffbbfa6eee5f6c6f5441f844274e23cf365c64e57b"}) pread64(r0, &(0x7f0000000100)=""/102, 0x66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) keyctl$describe(0x6, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10081, 0x0) [ 280.127540] x86/PAT: syz-executor.2:12843 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:22 executing program 2 (fault-call:8 fault-nth:44): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0xffffffffffffffff, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0xffffffff) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="186600000032001901000000000000000001000000ff0000"], 0x18}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x400) 16:54:22 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0), 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000001680)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = epoll_create1(0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0x4000201f, 0x3f000002}) close(r2) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000001300)={0x13b, 0x0, @name="7970847c3f8d1b2156471dffbbfa6eee5f6c6f5441f844274e23cf365c64e57b"}) pread64(r0, &(0x7f0000000100)=""/102, 0x66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) keyctl$describe(0x6, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10081, 0x0) 16:54:22 executing program 3: r0 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @initdev}}}, 0x108) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r0) 16:54:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0xffffffffffffffff, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 280.354466] x86/PAT: syz-executor.2:12894 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000001280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x61fa6bffbb65fe74}, 0xc, &(0x7f00000000c0)={&(0x7f0000001300)=ANY=[@ANYBLOB="2c1100003f0000032cbd7000fddbdf2500000000180019001400640000000000000000000000000000000000860406ac11d7a83d1c851124174a34f5c7799905075c7361a5a4b5141ff0fe2f544974ec7e3a8e723ec3c958dda2b17ea18003cac0b3c3fbfc536357d1bb2086284fe55902c5343ed68390dd1086f90b9753a5b119b0f647e09a5d60d3406de1b70db5cd8f9b29ce04d046139697100eaf0c80b8ecefc2f7b79b57b12670705479e41f5c14c2fe528eb3f40aec0c2bdee97f80bf5369baeeaba202425b1990a32cb6998fa12d66e330aec84d177c34244c9d588452e7d479e77634339984fdd8beb60c63f4ed41b2bb572492f149d12a135727043e3a28a4021c069775cfecbe83d45a865fd442475aea4159391679198a0ed5dab7aff86f122ddfc9381f46a6c272f8bee175ef13a1f52621f1cc75c978e867768113d97c882b7f725769b0a0953107e99f945dfb8eb2502ae0d77c28eea1ac42cb31f4d309c07628eae093845359ee222f91b8fc12e076c4e4ba2d56f6def6ee92d8ee931488b556697369e53867cc406c5be14c4769c79fe6242187eac875223f51892f9916ccb229ffecdde18247b41a3f30e5778afcf44c505fa113450a44ddcffb55630d46e88e547f70d79350f98f4fdb3b9817db0e10eb42ca06c6e570dcb6a872be5db6ef40e3f213fab12465010dfee48c8cac734eea4f7228dc0dfa74b12b956010864c6716c86d96bc655459593146caf337e665e863e1dc6fba45d5245420b638fb4efd3f92397af02c360c7e1c0c1de7cd2548f6dcdfc53d1828d352fb76133879e7afe0208b2604bb5a44358a60417f90a2f9a16984917a45bc1661b2f929121af7f4e9c83f07d561c2c9f1bf7c9af00199ea768c37d942d921b0f5d5a931fee3f41c785fb45afc8a07c63b150b1826adcca19e69315ed16dd39ddfbd87f1fd7de790e55376d05eb5f35ccec3c8f2626ea955da7d8e5de44c0768dd3a2d39dae1ceb06cd688f0f89e0c09120ed1d9f4ea576e876017c47d4469aa8596bbd5f677ae4f7ecdf9d8bb93750c0685ac4205704c8751f1a11f7a691154c405b67fe43ed3e4be3ec956473821bd7203ba49541b725893f4b2ed177cb9bd1447dde9cc369200f68c8f9876ff5c733c0885cf7f8513cb3164ded7d3747e1de0f80483521a66aa46ce9a96d2a00c151504b6cd38cb6a30810b33e24e09fa946dda8c7d47160672e65fed59eb01a49158a80de46a6b540e6e02524ddcaf1972c161d2a979ba39b9311d4ea9d201ba979f08779e571fd4c09142d79cc2730b1b9fb79d3798980436513efe6266bb0c68fadb4b3941285dbe0c0e42177da1802551a1cd89698b598ae85fd1e84c077b9920d94d0daf9ec688ddc2cc66e6e631e4f8a5235a8e4a54cbd86d987e90beb0c48bd2de259d955ed27005b7c24dddd2c696351ec30eb79a4c742ed323672f835085a97c417cd98a23435f520e608c15f1b8c867c7903da9c7d804cc453d100b089950e0f4c4db467d42c092567ee7dc131caec6e2856ec6f6bd455e8ffb38768b1cc484902fc56950fab8f777a3cc15be41aa65c754843380f9eea1f048a26253c6b4a580b42e7ceed6c83c5d1431d6c8e5795e45e0b96994a0a87d427a12bb988ece7fb9779f022f9511e38cc2fbd50d92161caf173fceb5e11c69dc581cb741a5fff91dc73b92a59fd6cf78a722d26d1af4045d53391c47874c151779406a72e5cd3cbd8a0275d0171f3914c16eb7706fc90b4bf0a3bb3fe7911dc9f1eead6cf904be49075aecf23409cb6aec645b908112c3dba385264326e7d61577413aa1895f278131b80c75ca028cb7706e97618bb2e356234b89f6facb4f4bad6d9627008aa15cb1e7ac3028efc84a8aa6ba919f5526d66c722bc44a3c984de9f3f3e299c9f0cb53d2f618e85f65d9f90d8d3a91d24469ce03a9278fc30f3eafc58987c2fbf4b9e2c6ddc775acdbb86c0160779ba49d72b6462e727b6561b25c71a412d06a48decbf3849af87f7f50b7f82f9c909352d1d4dd4a49fe30a7b52dcf11ea1249e3547b82704fc014ffb7e552b0251c327c4033cdad78058d30bb7a4cb42b1628d96fc9a7478a4ada9af1c792b22cd4b777b678c4bba7ed66c90b157c055679e668636bc5644c81bf2edf3cfc094c24973b56e20c913d30336c3226f8cd566ccd4c05030144335168ff54b7f8668b4357e8900c8b43f5d49cebd8bfec08b73ad9bf92f5e9d467b9c7323632de518ecd23e42fa605b2849ec16e59083b6b46647d7ac36cca459bca01fee52bbcb98917b78cff82ed1e6a46bb83cc087d5e12e40d13c1425827ed86e2d170cbc5b741502ac284f68b8eb5cb42f219c97809fac77b98624efdc471320dbcdf993884c1c0974dcd4c91ea42df560f7b892e844c61152482963d2e4401f6a74b81428d5295771037d9af026a3e6104485a48a577d9c1b2316fafbc834042ea44ec511599a4756eb929323be832c71c1403822a41fb5370ee557bf451b8d0f28b06ea89986c969680a3397a4569eb9b86fbf33eaf4b1db4039274b2301400ac1455f866e84a702b9f3f2048cb7f67807894216b4c597f157393825b5a140db0ac47765c77814624b036b029bcf9d6902324df4b4b938b6dec8a92f7e78e692b5abe63cced5927581e49920e6b83a1177626655d43e93f39beb88f63e96dd373f33a9fdee9c5c764370ccb4f21b9d62d7edd61edb7cbf186746ba2bcb6a5948c7cbf840aa84fed5204d579c20eadcb5aa5d28d1b1e8ab162a0a042a9d2a1453008881669151ea57ef2854064be07103556100aca4f4d8930f2feb67677161a1a714abbbf401b773369779e2237e9a1f546b69163e604ec5339adadcd3467b217d40d331fbad54d2444cc9fc4f2816085205a17d59be250eb120213893a5a68a380d9ac195ae1c85ee8d13fecb8be44bb266009237c1024e0f44787ab93a51a58470a474e3f03d0358d374f2948c1de19c6284ccdd65deaa990769bfcab7b27b5cc1f2e2b6fe2cee24ff81bd0281afb9c52538bb938baa52d5c1f8dc560d382f5ce6f8df1a09ad1d04549fb84378558ac32df435719c2855a5a20e03209e8eb0d5f5d2ff0badab0212d791e275a7713ed94b72aca6f26cab1becf1a158c10acb086628c1732d616b0e58ebeadf08e24113886e6294d233266c04bac2deba0d981001cc84c1a7a100d267e8c6c41b90833e3ea53b586bcb4d982663b0f5545a5818f7f3b52247d51ba9fca98f0ad8b772da002927f80cff9cfbb82fae4c6e929ab0662e76a6a13f387f21b94facd978ec32dfaa889a87775a3c7f17ede0926836fde5ac22f5cca3489499373be8b082ba1e119b46920b0b2e53a6cf46b4cc9f0e1669616aeb1c05edd778d97d174c3aa4ce529c60ff14bb97304a9e5456c7c685945c754fa8af0dad94a20af4563c7a45699453605f3a83cbad960e736910b4a9c2ce0780e323ea87a8345489cacbf7105b5c4a36eabf8831724967ee8fa51de85982e2722d7ecc0cf00710fd46874f1a81ac301184cd865d0ef158869738c9bcde6c2ce585e61097f170c008479c83a4312d64684f267f4fc05740eb9aefb284abc20a04b541c9a59ddd6dff15ae2736b92f2bb7fb5b76ba79e264deb54fbe6b9ebd61e80bc112c37b7f443e6867b377c94e2b6d0fbb988bf3f694ffd716bbac5adcff0ef3f3adb5ba7b445b78cb7f4b7d79072973c8fe9ef5e96b7b88a2bcd1e23429ed4c338854dc88a58066d60532a3bce3997875dd9b8bf3feb7fa3b3b0630b29e5ec70fb6f36842889da8df327fbff5f209b05d13f1adc1a563d7cb3f0ed17775ffc2d40761318c40a77ac2c08f5185496452e6069185d51279794c8909a1fb160f6c137b1bbd1cac4db0887163e581b23f69165dd616ad241541e64f9292d737034f88f307f927470e28a53bfa4b6d2d02db58d52c35ac72e2dfe98f095bb25c3da3c1d326322d025cc88c810b55a68d126aee034cd2ff386c580199064f9b603f3069ce1b9cbd08c0e370129d25ac4571e9c845d47b1c7026a6413e779369c159aba4f6e0e7bf443d163ad7a0f0b52517f6f7b8c00d8f86ee58224a8a1424ebd139acf0f69bf5766733a851093074ceda536aba2f061bb121cc773de1bc79a8036600681ccd35339b9173177dd5db4b38d64e59e36280306930110630556c18f7c653a5a88ad50d9e246a754d206cce07face026b07f0c2f57419c0e6e8b2f0247058c3ee0a6f4239b5b3f1475c3e6c052417babb665b70f305770e15c06ad16ade76c3e28811a17a51cc2ba926f637864dc344a09df7aab01edd4f0eb852ee0026c5e07d509a263daed6f9da5595e946fd2bf3457faa1b9201e674da9e3828ba8126eb0353f3ec8ef3a71c1aa27facf50cc6b6cd0cf533a009ad2cf1095281cb680a5037553b24b7b339f56f94f7c210801af4c748389adf1cd8cf8372fab9ea59c0ad469d6b8eac9c7f58f3a93fdce73ca0577ad8f0c43bb6f213efb6a25cdaab763e359e4a4a19897ffef72fd7d6b7bf0e8c5c1362350ab24d1f724ad4ea3f3c73f4145eb6dba924af5c83a96c859cc0b4f29b81f6509640e13c57814a4a0a4b7322eee3ad8139db795c74a3dc4c68aa4df45fd209273c64f0ba31f9fa8d2304db0b12fdeee919d247f6be0bc27481b7f26861b42d85894590dafd209ce5fa6a4524762cde9f2572ef6c9093f1b730f63d6776427303af8a27e0abd57ba5555a7847b0621be7cc1a834a6a6c506791c0defcf1b078093e653339bef1d982ec7dffceaff453f36c553597785e26556d244d2685e3d81df49142335111f13575d2534136f44a85636bade4153a001d14c86d0d7045d5c7d6ae3585988f197f1d510acbf427e1c1a7bbc98f498c0c244692f15aa9421e60e06ac7f78260f121725ca5ef641b579f5b4599fe10277fecd136e543f193e5a523cb7f2960a8954dbf39b1ab8e91085d844e91ea7cdc5024ad64f59228fa94df4da1096b08ee4bdfb269126ab19505a4b8bf8c6e900d453363616ebe7da32e58292ad8785c1a24ba3ae56d9af336c1cba9e3baedfb59eea4e0c86ca03c76efd4033f43c6454384262799ca1b71d594bcc9538b7f4cda3180d96d1523ae0be31efd4318991ad54dbb460884c1751361f26afa90ec50a5396fc0bfc2906c97af04023994445fdb4c367c2304ca87100a15cccb9b2c98f70b3832a1d5a8b0d10fdc8749d088724d62ba9e3ba36051642264cb7dca4038183c0e7be407c7d8e95b81cb54e8ba989c1dd78c40e338afd476d6241a60279c7a3301a19d516d379cb636bc24152d711ad15a4691d43be15d229231a32462d2a0858c7a6f912c848f554404766281a11f292ad023933b307334be68cd90008ad0c5039eb0e57e7e13ca106705defeb964e7746fe765731d348ed78cd8775c21b8afb17affe8092ce987580c8b20126f45a3e8e063eb4b93d9f819af7c8bb86a119ffcd0758e19ed8afcd121ca0dbd7937676485a47838119cf4fce14539c694dd49cf733870f685a298eb37fbc58e0cfd9b33ca15e438cd4b36c486e1a634d841828d2ca98a8b1cfa23a99fe4ac36f2049c5092aae9961adcc8dbe70a943af4d2b4f47b7d38a520d97d60d9fea7794211ab288c7ba2b7cc3cdcb7e700fc5118bee17afbc977791c77f26b67664db1499dbfa8d404ee8861722219926a082a577127f622a3af4471c72509306728ccf1ec1fa2dd753b854466410cffde05ac1dad336fbdc17e4c7d4ed4252920c522618c02475044a05989d5a3156600f3ef162951c8ab553b571702d9a292fbf1e804b6f66eeb3fc007f00a515de5f6143628a945cab8e794a6b5f14265e2d03faef32fa580ae289dcabe7adad5f462f5db4fe51e27c9bd85e0c99774b4e0d3642d476e42cef2e9c0e7fb927bfc26c610bfbd1f39f3caa7eb886c67aa16e6b4fc50a1a6fcfd2b63e911338565cdb7ce97a1fdebc61f0f93af10328e0b0d003ebdc882dbe85b6adb082e7b716be84f1c1f5f6b30eef18b454c2c54e55d9e0083fe99269dcf370282d6a844d5e24ab9ad9f69615eb96372e28a77ba2bb631d61400b8a42be0870ab760e53dea9b86d54d047eaff81c61d8989e382b84cfb0a0fa2e20f415083f8948519c948db3e4b1b1d7f6300c6f397b2e64f9f773986a8f912cb430004007b00202b232eab23b67802a5a1761e6af15ef3e807b02749ce9f05db4af7addef0549068be482dfe76259faa"], 0x112c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) pipe(&(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSBRKP(r2, 0x5425, 0x3) restart_syscall() 16:54:23 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'team_slave_1\x00', &(0x7f0000000080)=ANY=[@ANYRES64=r0]}) [ 280.478447] FAULT_INJECTION: forcing a failure. [ 280.478447] name failslab, interval 1, probability 0, space 0, times 0 [ 280.521393] CPU: 1 PID: 12904 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 280.528535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.537880] Call Trace: [ 280.540464] dump_stack+0x138/0x19c [ 280.544080] should_fail.cold+0x10f/0x159 [ 280.548240] should_failslab+0xdb/0x130 [ 280.552197] kmem_cache_alloc+0x2d7/0x780 [ 280.556330] ptlock_alloc+0x20/0x70 [ 280.560289] pte_alloc_one+0x60/0x100 [ 280.564404] __pte_alloc+0x2a/0x2d0 [ 280.568011] copy_page_range+0x11ba/0x1bd0 [ 280.572255] ? __pmd_alloc+0x410/0x410 [ 280.576128] copy_process.part.0+0x4764/0x6a00 [ 280.580706] ? __cleanup_sighand+0x50/0x50 [ 280.584936] ? lock_downgrade+0x6e0/0x6e0 [ 280.589071] _do_fork+0x19e/0xce0 [ 280.592507] ? fork_idle+0x280/0x280 [ 280.596207] ? fput+0xd4/0x150 [ 280.599382] ? SyS_write+0x15e/0x230 [ 280.603098] SyS_clone+0x37/0x50 [ 280.606453] ? sys_vfork+0x30/0x30 [ 280.609975] do_syscall_64+0x1e8/0x640 [ 280.613840] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.618844] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.624015] RIP: 0033:0x459879 [ 280.627339] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 280.635125] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 280.642463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 280.649743] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 280.657010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 280.664263] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 280.728157] openvswitch: netlink: Flow key attr not present in new flow. [ 280.763779] openvswitch: netlink: Flow key attr not present in new flow. 16:54:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x5, @empty, 0x2}, 0x1c) [ 280.799214] vivid-000: kernel_thread() failed [ 280.919700] openvswitch: netlink: Flow key attr not present in new flow. [ 280.977518] x86/PAT: syz-executor.2:12904 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 281.013825] x86/PAT: syz-executor.2:12904 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:23 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x990, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0, &(0x7f0000000e00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000766c616e300000000000000000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b808000030090000616d6f6e670000000000000000000000000000000000000000000000000000002008000000000000140400000c000000000000000aaaaaa900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e0ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000000003f7f1c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d3d2e85100000000000000000000000000000000000000000000000000000000006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000a600a9e85725d89818472e65aba21d9bbc1b20e8331c6fd24a5aceaeefe102e42a013ac2c00eeb782c34eab997013e0506220c21a44cc58ff5bc83d5e4066c7700"/2448]}, 0xa08) 16:54:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80004e01, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) 16:54:23 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0), 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000001680)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = epoll_create1(0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0x4000201f, 0x3f000002}) close(r2) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000001300)={0x13b, 0x0, @name="7970847c3f8d1b2156471dffbbfa6eee5f6c6f5441f844274e23cf365c64e57b"}) pread64(r0, &(0x7f0000000100)=""/102, 0x66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) keyctl$describe(0x6, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10081, 0x0) 16:54:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) ioctl(r0, 0x10001, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000000c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="1800000032001901000000000000000001000000ff000000e06b460616e13d420f8e7f"], 0x18}}, 0x0) 16:54:23 executing program 2 (fault-call:8 fault-nth:45): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x440a80, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000200)=0x0) getpgid(r2) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000005c0)={0x0, 0x6, 0x30, 0x9b, 0x3ff}, &(0x7f0000000600)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x6, 0x1, 0x2, 0x1ff, r3}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYBLOB="28000000e82f40cba5de88ffaa634e71fb9b9d049ef698eaf663594c04619437bf40880ed3268d60b9882a3fd91679e14200000000"], &(0x7f00000000c0)=0x30) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0x9, 0x6, 0x8200, 0x100000001, 0xc94, 0x5, 0x5c, 0x361, r3}, 0x20) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f00000003c0)={@rand_addr="bab536e0f7d2bcb2019b51286c8eeb70", 0x12, r4}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000640)={r3, 0x5, 0xfffffffffffffffd, 0xff, 0x2, 0x1}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 281.185447] x86/PAT: syz-executor.2:12936 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 281.299544] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 281.318935] FAULT_INJECTION: forcing a failure. [ 281.318935] name failslab, interval 1, probability 0, space 0, times 0 16:54:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000140)={0x3, @sliced={0x8000, [0x7fffffff, 0x6, 0x3, 0x200, 0x7, 0x45b, 0x8, 0x9, 0x1, 0xffffffff, 0x3, 0x2f, 0xf5f, 0x5, 0x8, 0x200, 0x4, 0x9, 0x1f, 0x5, 0x80000000, 0x7, 0x0, 0x80000001, 0x1, 0x5000000, 0x9, 0x7ff, 0x1, 0x6, 0x1f67, 0x3, 0x7ff, 0x101, 0x4, 0x5, 0x8, 0x1, 0x2, 0x5a, 0xa844, 0xd924, 0x2, 0x40, 0x3, 0x1, 0x200, 0x2], 0x2c}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f00000000c0)=0x1, 0x4) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 281.348208] CPU: 0 PID: 12951 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 281.355344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.364700] Call Trace: [ 281.367299] dump_stack+0x138/0x19c [ 281.371207] should_fail.cold+0x10f/0x159 [ 281.375356] should_failslab+0xdb/0x130 [ 281.379321] kmem_cache_alloc+0x47/0x780 [ 281.383755] ? __lock_is_held+0xb6/0x140 [ 281.387816] ? check_preemption_disabled+0x3c/0x250 [ 281.392819] anon_vma_clone+0xde/0x470 [ 281.396717] anon_vma_fork+0x87/0x4d0 [ 281.400561] copy_process.part.0+0x45e2/0x6a00 [ 281.405278] ? __cleanup_sighand+0x50/0x50 [ 281.409518] ? lock_downgrade+0x6e0/0x6e0 [ 281.413664] _do_fork+0x19e/0xce0 [ 281.417110] ? fork_idle+0x280/0x280 [ 281.420817] ? fput+0xd4/0x150 [ 281.423995] ? SyS_write+0x15e/0x230 [ 281.427725] SyS_clone+0x37/0x50 [ 281.431208] ? sys_vfork+0x30/0x30 [ 281.434744] do_syscall_64+0x1e8/0x640 [ 281.438767] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.443624] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.448796] RIP: 0033:0x459879 [ 281.452155] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 281.459863] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 281.467123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 281.474491] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 281.481830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 281.489090] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000026c0)) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) lsetxattr$trusted_overlay_origin(0x0, &(0x7f0000000040)='trusted.overlay.origin\x00', 0x0, 0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x3) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x100, @remote, 0x1}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e24, 0xf5b9, @remote, 0x8000}, @in6={0xa, 0x4e20, 0x7fff, @remote, 0x6}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x9, @empty, 0x575c725e}], 0x90) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) [ 281.506834] x86/PAT: syz-executor.2:12951 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 281.545763] BFS-fs: bfs_fill_super(): loop3 is unclean, continuing [ 281.553406] x86/PAT: syz-executor.2:12951 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:24 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000014c0), 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0), 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x78) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000001680)) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = epoll_create1(0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)={0x4000201f, 0x3f000002}) close(r2) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000001300)={0x13b, 0x0, @name="7970847c3f8d1b2156471dffbbfa6eee5f6c6f5441f844274e23cf365c64e57b"}) pread64(r0, &(0x7f0000000100)=""/102, 0x66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) keyctl$describe(0x6, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10081, 0x0) 16:54:24 executing program 2 (fault-call:8 fault-nth:46): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:24 executing program 3: r0 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x2}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x5}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)="f4", 0x2468d}], 0x1}, 0x0) 16:54:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000026c0)) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:24 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x0, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x204}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r1, 0x2, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000880) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x55, 0x4000) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r3, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_SECRET={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x81}, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000200)=0x9d, &(0x7f0000000240)=0x2) [ 281.849425] x86/PAT: syz-executor.2:12985 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\xe7[}%\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0x3, 0x4) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x400000, 0x0) timerfd_gettime(r2, &(0x7f0000000180)) 16:54:24 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b7020000034000d8fdca7a00bfa3000000000000070300009d00feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b703000000000000040a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) gettid() openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x1423d24001a463fc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f00000002c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffd23}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xc66, 0x0, &(0x7f0000000040)="8ccf68605094547166f825f6c983", 0x0, 0x5d0}, 0x28) 16:54:24 executing program 0: [ 281.932753] FAULT_INJECTION: forcing a failure. [ 281.932753] name failslab, interval 1, probability 0, space 0, times 0 [ 281.957774] CPU: 0 PID: 12996 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 281.964914] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.974279] Call Trace: [ 281.976877] dump_stack+0x138/0x19c 16:54:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000026c0)) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 281.980662] should_fail.cold+0x10f/0x159 [ 281.984822] should_failslab+0xdb/0x130 [ 281.988807] kmem_cache_alloc+0x47/0x780 [ 281.992879] ? anon_vma_chain_link+0x142/0x1a0 [ 281.997700] anon_vma_clone+0xde/0x470 [ 282.001612] anon_vma_fork+0x87/0x4d0 [ 282.005502] copy_process.part.0+0x45e2/0x6a00 [ 282.010121] ? __cleanup_sighand+0x50/0x50 [ 282.014505] ? lock_downgrade+0x6e0/0x6e0 [ 282.018733] _do_fork+0x19e/0xce0 [ 282.022192] ? fork_idle+0x280/0x280 [ 282.025904] ? fput+0xd4/0x150 [ 282.029081] ? SyS_write+0x15e/0x230 [ 282.032779] SyS_clone+0x37/0x50 [ 282.036129] ? sys_vfork+0x30/0x30 [ 282.039679] do_syscall_64+0x1e8/0x640 [ 282.043559] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.048388] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.053735] RIP: 0033:0x459879 [ 282.056904] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 282.064601] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 282.071941] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 282.079189] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 282.086443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 282.093824] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 282.145577] net_ratelimit: 6 callbacks suppressed [ 282.145582] openvswitch: netlink: Flow key attr not present in new flow. [ 282.171445] x86/PAT: syz-executor.2:13004 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:24 executing program 2 (fault-call:8 fault-nth:47): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:24 executing program 0: [ 282.208409] x86/PAT: syz-executor.2:13004 freeing invalid memtype [mem 0x00002000-0x00002fff] [ 282.215632] openvswitch: netlink: Flow key attr not present in new flow. 16:54:24 executing program 5: 16:54:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, 0x0) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x1}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000140)={r2, 0x80000, r1}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x18}}, 0x0) [ 282.394369] x86/PAT: syz-executor.2:13024 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 282.417138] FAULT_INJECTION: forcing a failure. [ 282.417138] name failslab, interval 1, probability 0, space 0, times 0 [ 282.459014] CPU: 1 PID: 13024 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 282.466247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.475617] Call Trace: [ 282.478388] dump_stack+0x138/0x19c [ 282.482050] should_fail.cold+0x10f/0x159 [ 282.486208] ? anon_vma_clone+0xde/0x470 [ 282.490277] should_failslab+0xdb/0x130 [ 282.494248] kmem_cache_alloc+0x47/0x780 [ 282.498328] ? anon_vma_chain_link+0x142/0x1a0 [ 282.502906] anon_vma_clone+0xde/0x470 [ 282.502919] anon_vma_fork+0x87/0x4d0 [ 282.502935] copy_process.part.0+0x45e2/0x6a00 [ 282.502962] ? __cleanup_sighand+0x50/0x50 [ 282.502974] ? lock_downgrade+0x6e0/0x6e0 [ 282.502989] _do_fork+0x19e/0xce0 [ 282.503002] ? fork_idle+0x280/0x280 [ 282.503018] ? fput+0xd4/0x150 [ 282.503030] ? SyS_write+0x15e/0x230 [ 282.537694] SyS_clone+0x37/0x50 [ 282.541073] ? sys_vfork+0x30/0x30 [ 282.544799] do_syscall_64+0x1e8/0x640 [ 282.548864] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.553805] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.559410] RIP: 0033:0x459879 [ 282.562758] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 282.570457] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 282.577941] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 282.585499] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 282.592982] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 282.600237] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 282.614064] x86/PAT: syz-executor.2:13020 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 282.622841] x86/PAT: syz-executor.2:13020 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:25 executing program 3: 16:54:25 executing program 0: 16:54:25 executing program 5: 16:54:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, 0x0) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1800000032001901000000000000002bac1c523fb3e1a500"], 0x18}}, 0x0) 16:54:25 executing program 2 (fault-call:8 fault-nth:48): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:25 executing program 0: 16:54:25 executing program 5: [ 282.735060] x86/PAT: syz-executor.2:13041 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 282.757900] FAULT_INJECTION: forcing a failure. [ 282.757900] name failslab, interval 1, probability 0, space 0, times 0 [ 282.769596] CPU: 1 PID: 13041 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 282.776966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.786329] Call Trace: [ 282.789110] dump_stack+0x138/0x19c [ 282.792759] should_fail.cold+0x10f/0x159 [ 282.796943] should_failslab+0xdb/0x130 [ 282.800938] kmem_cache_alloc+0x2d7/0x780 [ 282.805090] ? anon_vma_clone+0x310/0x470 [ 282.809249] anon_vma_fork+0xe9/0x4d0 [ 282.809269] copy_process.part.0+0x45e2/0x6a00 [ 282.809296] ? __cleanup_sighand+0x50/0x50 [ 282.822068] ? lock_downgrade+0x6e0/0x6e0 [ 282.826322] _do_fork+0x19e/0xce0 [ 282.829788] ? fork_idle+0x280/0x280 [ 282.833514] ? fput+0xd4/0x150 [ 282.836706] ? SyS_write+0x15e/0x230 [ 282.836726] SyS_clone+0x37/0x50 [ 282.836735] ? sys_vfork+0x30/0x30 [ 282.836749] do_syscall_64+0x1e8/0x640 [ 282.851322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.856647] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.861971] RIP: 0033:0x459879 [ 282.865157] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 282.872866] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 16:54:25 executing program 0: 16:54:25 executing program 5: 16:54:25 executing program 3: 16:54:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, 0x0) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:25 executing program 1: r0 = semget$private(0x0, 0x0, 0x8) semctl$GETPID(r0, 0x1, 0xb, &(0x7f0000000080)=""/114) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 282.880507] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 282.887777] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 282.895127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 282.895133] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 282.922102] x86/PAT: syz-executor.2:13041 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:25 executing program 0: 16:54:25 executing program 5: [ 282.956985] x86/PAT: syz-executor.2:13041 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:25 executing program 2 (fault-call:8 fault-nth:49): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:25 executing program 3: 16:54:25 executing program 5: 16:54:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:25 executing program 0: 16:54:25 executing program 3: [ 283.127540] openvswitch: netlink: Flow key attr not present in new flow. 16:54:25 executing program 5: 16:54:25 executing program 0: 16:54:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4, 0x600000) ioctl$BLKROTATIONAL(r2, 0x127e, &(0x7f00000000c0)) 16:54:25 executing program 3: [ 283.198374] x86/PAT: syz-executor.2:13073 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 283.236778] FAULT_INJECTION: forcing a failure. [ 283.236778] name failslab, interval 1, probability 0, space 0, times 0 16:54:25 executing program 5: [ 283.309307] CPU: 0 PID: 13073 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 283.316460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.325816] Call Trace: [ 283.328403] dump_stack+0x138/0x19c [ 283.332023] should_fail.cold+0x10f/0x159 [ 283.336161] should_failslab+0xdb/0x130 [ 283.340426] kmem_cache_alloc+0x2d7/0x780 [ 283.344690] ? anon_vma_clone+0x310/0x470 [ 283.349128] anon_vma_fork+0x1ce/0x4d0 [ 283.353009] copy_process.part.0+0x45e2/0x6a00 [ 283.357586] ? __cleanup_sighand+0x50/0x50 [ 283.361811] ? lock_downgrade+0x6e0/0x6e0 [ 283.365971] _do_fork+0x19e/0xce0 [ 283.369526] ? fork_idle+0x280/0x280 [ 283.373230] ? fput+0xd4/0x150 [ 283.376523] ? SyS_write+0x15e/0x230 [ 283.380220] SyS_clone+0x37/0x50 [ 283.383587] ? sys_vfork+0x30/0x30 [ 283.387151] do_syscall_64+0x1e8/0x640 [ 283.391036] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.395867] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.401039] RIP: 0033:0x459879 16:54:25 executing program 0: [ 283.404463] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 283.412158] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 283.419496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 283.426751] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.434007] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 283.441259] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 283.495568] x86/PAT: syz-executor.2:13073 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 283.520653] openvswitch: netlink: Flow key attr not present in new flow. [ 283.536602] x86/PAT: syz-executor.2:13073 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:26 executing program 2 (fault-call:8 fault-nth:50): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:26 executing program 3: 16:54:26 executing program 5: 16:54:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x6, 0x400000) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000140)={'teql0\x00', @dev={[], 0x21}}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:26 executing program 0: 16:54:26 executing program 3: 16:54:26 executing program 5: 16:54:26 executing program 0: 16:54:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:26 executing program 3: 16:54:26 executing program 5: [ 283.718708] x86/PAT: syz-executor.2:13109 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 283.743829] FAULT_INJECTION: forcing a failure. [ 283.743829] name failslab, interval 1, probability 0, space 0, times 0 [ 283.751556] openvswitch: netlink: Flow key attr not present in new flow. [ 283.831289] CPU: 0 PID: 13109 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 283.838445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.847804] Call Trace: [ 283.850380] dump_stack+0x138/0x19c [ 283.854144] should_fail.cold+0x10f/0x159 [ 283.858647] should_failslab+0xdb/0x130 [ 283.862609] kmem_cache_alloc+0x2d7/0x780 [ 283.866745] ? anon_vma_clone+0x310/0x470 [ 283.870878] anon_vma_fork+0x1ce/0x4d0 [ 283.874748] copy_process.part.0+0x45e2/0x6a00 [ 283.879534] ? __cleanup_sighand+0x50/0x50 [ 283.883762] ? lock_downgrade+0x6e0/0x6e0 [ 283.887918] _do_fork+0x19e/0xce0 [ 283.891704] ? fork_idle+0x280/0x280 [ 283.895399] ? fput+0xd4/0x150 [ 283.898655] ? SyS_write+0x15e/0x230 [ 283.902351] SyS_clone+0x37/0x50 [ 283.905943] ? sys_vfork+0x30/0x30 [ 283.909498] do_syscall_64+0x1e8/0x640 [ 283.913378] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.918207] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.923376] RIP: 0033:0x459879 [ 283.926550] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 283.934450] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 283.941706] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 283.949073] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.956332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 283.963694] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:26 executing program 2 (fault-call:8 fault-nth:51): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:26 executing program 0: 16:54:26 executing program 3: 16:54:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000857347a14d37d33f997ffb0718008e1130eeefb060947784fc"], 0x1}}, 0x0) 16:54:26 executing program 5: 16:54:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 283.984931] x86/PAT: syz-executor.2:13109 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 283.994071] x86/PAT: syz-executor.2:13109 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:26 executing program 5: 16:54:26 executing program 0: 16:54:26 executing program 3: 16:54:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1800000032001901000000000000000001000000ff000000"], 0x18}}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) connect$bt_sco(r2, &(0x7f00000000c0)={0x1f, {0xffffffff80000000, 0xffffffffffffffff, 0x7, 0x4, 0x9, 0x4}}, 0x8) 16:54:26 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x9}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x70}}, 0x0) 16:54:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 284.205485] x86/PAT: syz-executor.2:13141 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 284.231627] FAULT_INJECTION: forcing a failure. [ 284.231627] name failslab, interval 1, probability 0, space 0, times 0 [ 284.287130] CPU: 1 PID: 13141 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 284.294269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.303716] Call Trace: [ 284.306322] dump_stack+0x138/0x19c [ 284.309965] should_fail.cold+0x10f/0x159 [ 284.314136] should_failslab+0xdb/0x130 [ 284.318214] kmem_cache_alloc+0x2d7/0x780 [ 284.322381] ptlock_alloc+0x20/0x70 [ 284.326138] pte_alloc_one+0x60/0x100 [ 284.329951] __pte_alloc+0x2a/0x2d0 [ 284.333772] copy_page_range+0x11ba/0x1bd0 [ 284.338025] ? anon_vma_fork+0x358/0x4d0 [ 284.342121] ? __pmd_alloc+0x410/0x410 [ 284.346028] copy_process.part.0+0x4764/0x6a00 [ 284.350656] ? __cleanup_sighand+0x50/0x50 [ 284.354905] ? lock_downgrade+0x6e0/0x6e0 [ 284.359332] _do_fork+0x19e/0xce0 [ 284.362896] ? fork_idle+0x280/0x280 [ 284.366623] ? fput+0xd4/0x150 [ 284.369824] ? SyS_write+0x15e/0x230 [ 284.373616] SyS_clone+0x37/0x50 [ 284.376990] ? sys_vfork+0x30/0x30 [ 284.380542] do_syscall_64+0x1e8/0x640 [ 284.384433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.389296] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.394582] openvswitch: netlink: Flow key attr not present in new flow. [ 284.394592] RIP: 0033:0x459879 [ 284.394600] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 284.412516] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 284.419882] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 284.427280] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:54:27 executing program 2 (fault-call:8 fault-nth:52): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x70}}, 0x0) 16:54:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c0000001000f9ff000000000009000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c00010067726574617000000c0002000800080000000000"], 0x3c}}, 0x0) 16:54:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, 0x0, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:27 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$nl_netfilter(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x150, 0xa, 0x8, 0x800, 0x70bd26, 0x25dfdbfb, {0xc, 0x0, 0x2}, [@generic="3f47018f4706ec50d5de62159cb079be3dd8423e9ffd3d610d4b7576c9b412cdb6253d5e1289a437b4670d8c772810cf5084dee76c58564426f4dffa31c0d9a8", @generic="2ac3cfd6c5d2cbf0a95c66882d112d307a76d69deef90b97da2fa67e013d41d9797d366b04f39b717131fd85ff0d8705902ad7c2495fd30b119c916cce49c9ee712f648695e0dba1cc2899e074a5dae72c2f38b1fd2c6240444f2fe5ee8661", @typed={0x14, 0x8d, @ipv6=@remote}, @generic="4b3844124e8942e958a9b68c388342c5c78ff0db939a1170d3d08786add60167b4d522514d084cf2bffa3c6963b9f02318311033f9eb06f1362fcc28c994c337c798a6af9c47dbdb3426974f5e8d5f0574585a2ef84d27b055a5eb6bd992305c610cfd3ef58e56740fed2c34a3264460790cfc46eab260dbafb2d8", @typed={0xc, 0xa, @u64=0x8000}]}, 0x150}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$kcm(0x29, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="18080000ff0000c6000000000000"], 0x18}}, 0x0) [ 284.434652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 284.441937] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 284.442814] openvswitch: netlink: Flow key attr not present in new flow. [ 284.453727] x86/PAT: syz-executor.2:13141 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 284.465687] x86/PAT: syz-executor.2:13141 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00001dcf48)={0x2, 0x400000000000003, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x70}}, 0x0) 16:54:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001300290a000000000200000007000000260399", @ANYRES32, @ANYBLOB="000000000000000008001a0004000400"], 0x28}}, 0x0) 16:54:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1800000032001901000000000000000001000000ff00000089151108631b146f12d92e3720680c7c6aed0b674c6debde0c2a60657f1ab393265272ac15fb983b047585e226b150750463562cf97f194d42d8e0acc61f81f6e17af1feecfa2fc7f2495af9dc61dfc41a5bb716162ebc975c39e80f0c631aa5994c553eed96c16a29d43c70ed"], 0x18}}, 0x0) [ 284.634487] PF_BRIDGE: RTM_SETLINK with unknown ifindex [ 284.644434] x86/PAT: syz-executor.2:13183 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 284.674946] FAULT_INJECTION: forcing a failure. [ 284.674946] name failslab, interval 1, probability 0, space 0, times 0 [ 284.708042] CPU: 1 PID: 13183 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 284.715181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.715186] Call Trace: [ 284.715208] dump_stack+0x138/0x19c [ 284.715228] should_fail.cold+0x10f/0x159 [ 284.735076] ? anon_vma_clone+0xde/0x470 [ 284.739265] should_failslab+0xdb/0x130 [ 284.743249] kmem_cache_alloc+0x47/0x780 [ 284.747421] ? anon_vma_chain_link+0x142/0x1a0 [ 284.752017] anon_vma_clone+0xde/0x470 [ 284.755921] anon_vma_fork+0x87/0x4d0 [ 284.759726] copy_process.part.0+0x45e2/0x6a00 [ 284.759762] ? __cleanup_sighand+0x50/0x50 [ 284.768576] ? lock_downgrade+0x6e0/0x6e0 16:54:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, 0x0) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000026c0)) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 284.772743] _do_fork+0x19e/0xce0 [ 284.776206] ? fork_idle+0x280/0x280 [ 284.779934] ? fput+0xd4/0x150 [ 284.783379] ? SyS_write+0x15e/0x230 [ 284.787290] SyS_clone+0x37/0x50 [ 284.790654] ? sys_vfork+0x30/0x30 [ 284.794347] do_syscall_64+0x1e8/0x640 [ 284.798245] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.799089] openvswitch: netlink: Flow key attr not present in new flow. [ 284.803115] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.803124] RIP: 0033:0x459879 [ 284.803129] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 284.803137] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 284.803142] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 284.803147] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.803151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 284.803156] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:27 executing program 2 (fault-call:8 fault-nth:53): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:27 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae01, 0x32b) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x1c, r3, 0x0, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}}, 0x40c0) fcntl$getownex(r2, 0x10, 0x0) fcntl$getownex(r1, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) close(r0) accept(r0, 0x0, &(0x7f0000000040)) 16:54:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 284.883780] x86/PAT: syz-executor.2:13200 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 284.923440] x86/PAT: syz-executor.2:13200 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x0, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001580)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000004c40)=0x0) getresuid(&(0x7f0000004c80)=0x0, &(0x7f0000004cc0), &(0x7f0000004d00)) fstat(r0, &(0x7f0000004d40)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000006200)={0x0}, &(0x7f0000006240)=0xc) lstat(&(0x7f0000006280)='./file0\x00', &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000006340)={0x0, 0x0, 0x0}, &(0x7f0000006380)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000063c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd}, 0x30) getresuid(&(0x7f0000006400)=0x0, &(0x7f0000006440), &(0x7f0000006480)) lstat(&(0x7f00000064c0)='./file0\x00', &(0x7f0000006500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f00000065c0)={0x0, 0x0, &(0x7f00000061c0)=[{&(0x7f0000000140)={0x1430, 0x36, 0x8, 0x70bd2a, 0x25dfdbfd, "", [@typed={0x78, 0x83, @binary="575aef61ed73d3de17112971bb7c994f84ea47c03956bb1778b3b14079e3e6241f66d91532d048c0b814a5ef907a053115c12554af5adbbd7e27555d5148502104fde6a91ce46c9e057c5715a071c8e876c90e66f229b2e3f4af55882a6c70e3a32190e89dc6b6c8191e75c61dd659ec2facd4d8"}, @nested={0x100c, 0x60, [@typed={0x8, 0x82, @ipv4=@broadcast}, @generic="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"]}, @typed={0x14, 0x52, @ipv6=@dev={0xfe, 0x80, [], 0x18}}, @nested={0x1c0, 0x7a, [@typed={0x8, 0x43, @pid=r2}, @typed={0xc, 0x73, @u64=0x1000}, @typed={0xdc, 0x4a, @binary="1eb57ca3d13644db4254fd8c12c310072dce58eb28f31a725ffd2d629f40eeae27592082f08b000212d92ca87d70f155db05a98420c52b29b50eb28a884e70dcc2cfa628653a23a0f95549398f2b2c51c10488f7034550a99be36a01fddbaaf9d25559c46959e58b9a8feb65aac2b860f7b5b33b47224612df0595a611435a421c04d84fb4e6f6c42ea66f04b236a9f31e31ac6dbc9ba84c29ee2aa4587b27e074455809506f5fffff72398e2a30d20b9be2379ce43df3362f6cdba32040741d82709c1364666b15a67b88e43394541905091d5bb90d"}, @generic="aba2052c5ec5b64be7739fc2e9f2c209254075b34a9d0e3181ebe6eb0015d156b8bf4bf93cfdbe24e1ec88b132f54fe0c1967d40c8827b0c305ceee2ec6c4efb506676124b0b4a1e8b048cf214a19006c42b29d1ddd2ce5880b140db5c1df23b61f04dc35ea4fabecc3115a899119876063f84698587ea2e2b08d7a5c0d810ab0e54fa1b4db32c5c31751037", @generic="2ed49ad3c2b6a6b27ce17f0a3bd4e8b8b793d66fbdc5d2047969d23005b0a118b21b035696d0e7ef36b0f9668035f7db17c4393a30e5ff04c6ca24974046a9"]}, @generic="15a1da5663a25aac7bbb1661782521fe446c74ffb154fbe52e581a0acda0285ef6f752288a0687fe1703b39d05b341ad1e64063b209c0e3b60b26572d0e8c7ce521f205d0602ce9eb71ed4f7cd9c37e9c4367e4367ecaec9996ba13e440a1a9d830c68612e71f3955c04d9356de82271ae146950985c44a5e47c099e4fec7078766989f34f14331a2d22c51f90ef91d6569515bdfff1d943a70b69192777b398cca5461c61e3ff6db604ccf216073ddb13e139915ca6a0abced90de99c1a64a99a67be2c54e1fbb51c9e045229a33d5b373913b165cd0c9d646f963bd6fa91e33c53e0ae1bae0922eef3f531d9562765a68ca406ada9bedd", @nested={0x98, 0x1f, [@generic="c1094ec128dc90f0449701f9137d844f36f8b370e514fcec12b40c64ef2f2d60a909ae20757a611cada6bd04083bac6ba60a604dcbe9aa", @generic="b1b2d19aaf2f3fcdbaa81c4d0ebff9d6f272ab9a483e7b4727a7078e34f7cd0e7177ef66504e02cfe6667ea994747477f641a44ddd7fb1e290a8c06a444b1464aa55e2a8be6a9e6561019e892fe1db98137da3c74eaa9bfca6b9"]}, @typed={0xc, 0x5d, @str='vmnet0\x00'}, @generic="930b7eeb7d3073e4c6e243db85c4ebf66736c241f6c8d35953aabb0d69d6fc9ab0c67a38976aca20ad"]}, 0x1430}, {&(0x7f00000015c0)={0x3650, 0x25, 0x0, 0x70bd27, 0x25dfdbff, "", [@generic="d97b3b37978c07ca505d66e90f112cf1dcd5c7b57d1e79b482fe865b1915198a94f27e5ff9df20d01e1932d4bcc92337cc1777beacb9fdb4a3a68a7c21b40231d912dcdf25261c79cfc8a9149ad8229ba25603c7ce01e0857af893ebe3b69ab3f609f251e863f6c355f1ec934c01feea9827c3e2be69065918cb53ddecef17a44ae7fd3e808876359cd26ded93ccd7e306affa935c5d70f88dc1820f5b1dc95a78d9c51367105918a9", @generic="9e00ce517839b3c58ee7d9541983d908cb4d479f7afb0c30cbd14f88061bb4804c2710b5ce1b20f0d09da4aa646877e8c3a4", @nested={0x284, 0x91, [@generic="34a9a002dea98d9921072e43957306befe9ac616d85801f5c94759f32ce1aa2827771c1467a847313f0389a20e072c714723a06ed29187a3a0c367ba94182b99ed19456afa85490f1d634b08c40d7a506be76d2ef143697be655e790f74686e2de5cd0cfb13bfb01d0d5570073a1346e35b8a186cc5a7f2f626872d7d1b7dbf55c5141ee5bbc45cb1a2e79533b5a56ebff11d15134e34c98a8f7bb55190e2530420c194fc0aef90873b9e1a424db59d775283f387eee67fdc57c07c0a4523e7454aa0b4d08283282e26075cf52ee9b1c96cde63f4a99a0e1bb54c2dfa6638afac9", @generic="4a6f60618bd95f45c300fc5c58cd29a6c2985ec4e05a15e8b80e0ebd5991810ee07eb20f5802d330f1febc8d84fcf84a9eda5047892dbf10ddaa4553c8de4d91484b1d2a88d5c645705d548fee0abbf79a2b943e9976c6cb99d7da85c5f2dfaed7a88e2154663d9f52ffe34b46a0e3bbdd67848b1ed00a2d372b76fe5982ceecec3f0147bbb30a16a253c8b8e191e079a92c7633985cdc2150d0071e", @generic="9262a12135ad80e2265acf3d360f726bcb824e3ba4c5fa4f4a71548c2aa8c934081d4c5a0a4462f470f9bf99a152f60f4a29d38bd82d9ad65b74ec856d714e4bdbdad5f22ecbc75d8d3a9ce629570a45bf43121a846a4557382544da2f6897cbd1d7715d82a0255a1cf772b668e7b886c0e6326c9fe1135095e2966de9ef25a40dad7192f1203ecb0d767a911e19775adc86ba44c676695cebd99be9ee2c85ca49c3d88e15d67106142a60844d1e1526ed0c43584ef55a254f4b8b11d4db161b71c5b54c850e361a702f014ec3486934f8ffe66307c4a37ba34862e017f5e7a2c1656b00a6", @generic="9fa13dea75991f99a745ed35ca8f15a637f74d", @typed={0x8, 0x6b, @pid=r3}]}, @generic="1fb6b824e944c2f8153b773f85692a5054dd6550cb5d590810021358eba5f81215f7254b87c841602cf3ecb680a177fd22c6c08625d55bae859a49fca85bbb2612d41736590454973e9f2f441592437b98f9a17b88dd35b2e49892937b2fd94039e900b52409057a5b7a732a1da2f9750008466fe03ae059c2b874703c6de3122f5d22fc156f586e28fe6f5fb4eee5c824c46204b93c2627ec39afd974b77fbc13c414e363ba4a699850ac78b55b4dbc3ab1705c6ca4e32855a0e94f48e769a105bddd0924792cdf231fd27f3ebfa754ca781576b2f5bc0998d46ca104ef6513ed32419cb5b38ad4525df14ae690b253e6b1e1f26318be9f555b17944cdc6afaebf53f74b72ff82cfdee99c20302074220cd8d61b20a992836b58d7622d1b0ca3310bbcdd5577b2a123e3a3fceeafe7ae102e4654ccf83f46a42963f7f388309de9c70edfd586eb88aa6ea1a04c6da030ca537b8578fb2d57a64f9ff814ca1b5e6637befb72da230012f0ae720a6d7a27441064c0f2e4e686fcb7432c3bff4ef844b321afbb9687a2f1d2c61f6aadf325d0a37f7ee443a20ccb5380c46de45f00ee308741f3da76b7e255ef3b4a4201787e59c8640e65a6fc4b5481e2f1d420642fb98a2c80c85f779ea827fbd31d78e46136b4f9c169a6bab31954c115cd81faea6ffd0ba786c256683ad078af31ceade37f51a2acb89fcdb678851ce34afc879d3bd244ab10e18c4a4a7a2a521b880165cbbf5c03c3d2e466e1d9a11c64b707619cc73c4bacf3ca4d9feef5639c6976df47526ce7ceac83eb2df782944841e148848d29a165e999aa13ae3bb706881ae26bf614bb38f90b876cf675c5408f9b9c4c920fc1a87c710f1a37e68ac9cf6924cb4474c1136b3321587f68c19b9ed9a9a8d8e14508e7a5b5b82f4d43bbd17b645d157ef5667ed14781ad5bdb1d0f207754091fc43dc79bffbfa4e9e8959dee9af5f915255f08c0411b9da238ee45900879ac0904560b6ea38df65c12893420f886a78dda96648b0ed5bbeeda14406eb690f80bef485c26a1a90493af725fde311abb80ce19f595f155d22bf0aaf2faff31a59d47435224c87df3dad1cf0e97aea2f2ac82eda64b8adf4ef8a0ec3be3ef366e06eed1c614e19ed5c5ab91a15e98c8f7f6980c36711107b02dfbc4db4c9af902bda58503c262ffcc609dc976acff57aabeb58b6b4f4b13586c0256a5377ee9a779044e08c7e5138d36a639629c647257c2b9542be7d9e67c64f1877cf074d19899ec83b49f16d5456e08b949af07fffd95d9845f9bdf19a012d58449bb32732ceaf5d0ff194ff931e9c97b4dd973e2d9820af1856deb8fa7c9a403f3f42659e17bff585f2bb0ef8d981fa31599b07d3aaefdeaecf815e6ba324b618178d41a3663145239565dd4f5168ccd3a2102361fec5f9155277a326d72880e834e1ec86cbf6b34c1e7ebe0811c6df2137154c7a5a402fe3f9d795a60e5bef2232e4138cf8364d26534f3a2db121619d09d1a94302f60858c792e365ffb932d8c9bce85c4af7d6a62aebbe1806f6fba72cebbfc9bbf663552ba3af81cbfab8a5113e8c19c55df9707a599c54daa779a681b032e45bb3ce7227fa9cec4a99b5d40c4293bbea36fad2e6977b8dbe0016afe5c47d74e70688917afbd1e57e9a64a9a823385199efbc31e09bf7d5557195d9f3c272887e823eeec7686467ef72a5906da1605e2ab2a8772948823663283737d28bf7aceb29f5a8b807420484f33be7ccf32895e8fa7e590a2a04533fdee1cdce5c5f9893bc9833380e80b30c0339bfda1751b45e41a172d44d72f1c561815fd1e3417ed820e640502f37992b9fab3921bfaf0c0aa0a1e5cd31b6fa6836ee3232bb4f8b6aa29c96d640aaf91a5265688872e12a01f77ccbc2e2232da0f6df30bcdb68a1692c972f063f48e1d710a62b561f06189e2f2b85a2b383ed2ee7eaa21ffb6eb6e2f4375d29284d8bdfe96b37e47516125248d02fc040e8f84603b4cbbd99d212246bf962e3f7137e6d7a4dca799555a84e4056c5b7a9f898ee5b32cf789d9de43cf2a6702692d07e957adce950e25de918c262cb6d19a037d15308ce57b5c7dd8ac0f566f4c7b048867ba0073e20a4804bb4653e9a255c99e50f87d5d84bf302f280407717fbc5068197237d80f58f2d48f1cc8ac837a19e4fa4b716561845e9d40d5af8508c48ee8c06a0c0a23782583dcda6d8fb5f27111b26d104d5289259fce94e71672c9d5a1f1e4e06c0735eb6bdafc632fcb390fc62e7260879abd3dfeffb0cce426609fa5521de1311a96133971c78b5adc44859a8b632de41a3996059cd13245d375a91481e0a1d87328867ed2f1a8aac6356ffac418674098db818095ba098c1a4a6e8b179dc7d88a6f51c0afb12244da20f1974692279b6385e109fb2958269662bc492a700430e05b76341366220cac2e6ab260e215e9983c6b89de6348ac60906ebd087271510eb70b2138592dbfe6f556e489d2b85cbbc958b87d445df3a6c0ada334ab82ff8109d8df2afb220120ed11a7717711640f37e0daf87df94f22c9e9010f43525b8b7776f9c7c858340d2c3ab16c43d724b99e46e8232765ee03e63ab04560e9df8fdbe7b547a43589c6b7fdc3801eb1d631f0cf17355e3fe407c679c009ca60020ca603121906de01cb557ce5bd681b0f652273a547e5dc9e4e55e74f953f0549df0afa401fab3e1561331c2c737503cd8d7bef2098ac5f0cb575d705112a90fe6ebb7ba108526637ae4d147de90a99859f0475e48a12a18639584e72a1b957899bc51fd40ca383736ec535aab7d49203e7cbc995779938b49174ec695914605d3af9618006e15f5cbaf024cee8452e5aee3fd951e0de776d311edc2e99667a41b2165e3ccde99fd893204f935661a31cd96f4da7f9820d8b2e38d66955400c2f89edd96cf12524cad936370e418c38cda8094022f91e27a4bf01a4a27b7cb7c93f01a2f22e77010833cd749bb8b2ce6e8ec00b1fb94f25a54617101745b7e6c13f24d55e23fe0ab36e21ab641b7b3fd1965b4343f7c88bd6c64a3e4d4fc9723e778ab6408fa5758290bf6799aca58c57d2f4aac8e4f6b1a0df36e50e1153e10b0368d7ba1cfbcc1a45c54bf58771b22bbbacba7b51c5469c983df2769bda3bb41ba24de7bc156d7ddacef2c9e5df9d61b331caaca53ef956e907d9c78b69ad153c6e4a9c9720440ef9f16fb071b0550938bc89f73a106d79a7297b3c6cb02db8ba3ff079030313519e32b622b0b0f1ddd7931049661600364b4f696a036a9283684fa3510e2b9ea9b988fb375b6b29a45bf567b7d049d1956b47e34f70c2dd4784a33a787c26de0e9a05e63e7533d9738287ba10368c6ab7d8e160b9373bb24f68679f260aeb40569257ce918e672be6091fffcdcc2d3d3d7d5722bab76dd6bb491d551b1c4ffc8903010baa8126fe2bccce62d967e5937968cb7fbcfa96850c23bab9f26d1a807868dd0a651cd33a12fbd2800d185cefd3e0bf9545bfe783ced1becec3722fc701e21523bfeea6e9a0d69f5795dd88b3bbd3b20e9808eb196c7cbd71da57d3446a9a05345d4c8f372a811b9ed338f63cf974d10680db02bec3b4a46d825990480bc6cb976446f645cccd20248a9ba4994cb9dca567ec184a9d92f7671cecf9996efb80ea214ea56e8a5f31d52aea46e0202ea5f2444bcbb854adbd857e993fa68c858006db94af1dcb776e051b46f3941f2d76348f94ef758b89d0c487f9d654fde81874c71ada588bbeb60f98a808767e8f68c113e19a86b5c3e28ce0f2f0f81673b4557436f03b7ec499304e2933e4bb9ab7a3771748e02d2d6fb0914078fdd746ed67287fb8f503cc3eca733192bfd69f88e4502d03946947c120b3fb23004df58c23a0b0efb91a1a14f2b69c0e069d4c1062737950d5613b9cdfe74b431b447b3b4bab4d8532fc61177656d1198413a17f1345b13d8a3a9358d5bbdf051072bec0c69e029d3e6a706f2fbf57a03ce049b932333e82ba516f1b17e0aff922740bbca68b37897a0dcf6da41c4be6408276d558758aebba9af899ce7c4b2e45ea219e566404a0c4f11127b4bf9ef6a94db600cc739bc257d80b77e7082e6a452241d3a8f54096cd5d2e9a1a2a9dfa0ca04d41828821bd6dc0db62170dc436a220078a902c8f0b3ed2ab3b9a5d3ad486535e66f3d6371437b0220f11ac7507428eb180e618aae0bc62a4e77ff71dbb20c6b8a7a69e6422086d7b6b54d55e81e9422e5e1a62b748f9ad79379efce138508d951836eb0e97ab02277f201f069897199e57bae39a678ca22f9e6647dceecc841feae83641d28166a71b09e3716181ece0abe43028eb50861d2365ee08bed8f13254068675865c00193f3291ef1ea21f057d7920da182380e0c6a0e57953b4f6261a54af7650e5e6bb3147fbff9040ea87bb2294f4b2163bb6877d07627827cabb381f3176b37479958eba1e5fe70270095d650379d18f25082ff272bcc7b6fefef73b950d8b24605495b70724376908213772c12d9037bcf2b08d0154b466c0c5f9ceebe8476fdc9020ba338cd1611be36542888544dfbf1e272a589009166004f6008b08207c3643796f79cd62a908ef3d7ec178bcadb7137b03fcddc50078baff71fbfd3dfecd8ff62891edd95ec431ea8c7ddb3a067f9b57cd5942fb4421c131dec23c7a94aa01d03fb6b0dab60361771367ff36d65d95719e4b7631382165d50c0133bd4498574dd7610108fcce8d65f4c7763ea076251bf5ceaff5bbfe2f67f0e271bf796f2dc0adfc3884a8203171c5a224a94d570e3198190573a3e2599af0d3d28efca9948c334c0c82fae68b81c621ceb51df4e8b54e01be8cc75c394b80a3962432fe301010a27bdf3bc2bba572731e7788f3cdf8a202ed64b9efdd79acfdacd82b2056c12cd83faa9e885f2c5dc39cad38810454e0493a361f172cafd8de4add2cdb26f53f48c2d53b6843bdeb5121c58d9ad05d940d63da12f65a61b5a07ee68d79293a88d8338ff507f34b1bf1073c109a092a535366743cad2b25c0c39212fa387ead043260958a05a2b75a89b2e8ed499181c74d61e1916ebb18158789f7a451c8ea46ecdd6f83567f8037b34a3d6acddff63ab899618681e6b450f35f1140d7e5553b0c57370f5a45da5b8b59fe5198fd84088adaf508c81b29b80774b61ff4721825097a9760949e4dcb19cf231519ccfa6a3c0ae5743d3a92183bb81ac537241b572d2060abccd9a26c5abbc9b523b4d1058a0620d561dd0044f8d3f46e442505f491932e5f319b001e91bfc313d1a7c3d89f50676559b07e5dd4870126de1fce7340204ca6286481b342afca02250b2967ec1079d42a5f8f42e8dc5625d2208754c834dcd2342ddd22e330b6a37039b63bdd8c9a50caf1c236f4387718b0bab36dd034c79010126dbe460861c2086f9905944b87058efbb34252ba2f1f20b300fb84b01afa80ac29d99e4437bec7cccce724a1edd83e55e18c34f138fafab408882891e825b87c73223c3d5590dc3fa2be7df7ab68d09c24ac8805eea863792d4ac95580f87a3f3e81a74e5b03a57600639b3ab2b8d6699a4f0ed703cb6c57a45b7b44f7a3f1a33f598e7a5880ea5329ea0722ec5ecb34ca84ee1a3528d2e462dd3e0eae4106d392a27992115b6c85cd2f0a154710b8cc9bd3e120bc6cb85deb0fd5125b4df0db86a01c89a4f60f935dc031ccf798ef73f5255966d2c832451bcbd3cb5c3c8fdfd20251606549f3dac29a422ceebcafbdcacadfbb5be6fa4", @generic="b781b22bfe75f95c3a171082d15aafc981643eebccffb3bf923354ce8fdaee1c87976ef494cd704641847c9ff8e570e6f6ec30154e251ca4884c1b0d7f245952aa4a6e5db8961e2937111d2f425076bfeacce9550ee3d36c44f279e1f8933e51f1371a11b97e6ae6f60f33849f5307abcbaf6ffa38254b60baee2accc9fcced30fabe093856a14d893c41c19b62926cf4dccb899ab60422a8afbb30664f8e26414e3236a4a58045eedc7bde2666eceda83317666c208baa172fa215cd74aad6a99175ebaef697b5931435c639b2c8170aca96988882e3c258274eec2a2afa7af09278b47281d", @generic="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", @typed={0x8, 0x10, @u32=0x5}, @nested={0x11f0, 0x37, [@typed={0x8, 0x83, @str='\x00'}, @generic="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", @typed={0xc, 0x11, @u64=0x5c33}, @generic="caaec30ad9c8fe891cf9bd3c44a8438435417807c304bdc6275b1cf94920ae08f716f7fd179c24436de1408af4d924cc2295b68b447cb85c196d79ab9b5bbf95", @typed={0x8, 0xd, @ipv4=@multicast1}, @generic="d6ceae7ccdff7cfe88b4ab485e8f50a83fa6400779eb65de5fbd1a2b302a43544fdbb648e07a2fe2187ad035808faad2a72761e0fa0ee4fceff283bc6d0407a050f4e872cedcfa9a8a0780d18b36c92f8a8480496e06efdbc53d3da327b5b8fbf2f43621bdf85a1c635eb3e2e2d9ec7414dffce03326781a617d3cb90d8da2eb388687f5814592cd4dfc5399936c908b1a508b5010d4048bd89a55bbd295512cf612a98ce33f069891cbecf49102d07f20a1f8bd0999e9c781de300e9d498d0103c474", @typed={0xb8, 0x94, @binary="f9a496b1451ffcb95e4e314a9f75a60e18f2b9b755abdd605534c54ab4f05d4eec7ce3d566200117cdc8cafc51a2938cbd2a4cc49ec845340634ff419a68fe6bd755d4d7c02e7b150131b6d79b2c7edaf8050e668f1ff026efa3144613a7fa8f9733460f92578046350f126aefd7b549d5ea294b664c6944ac628a4a0bab25e91c348de7cd1a6b1851c3390029d3d1ccf2aeef541d7b9544ce63295b011e423f269716cf1ae4760a89a1f71d0285df7f85e0"}, @typed={0x14, 0x45, @ipv6=@empty}]}]}, 0x3650}, {&(0x7f0000004dc0)={0x13dc, 0x1e, 0x7d80fceb90449820, 0x70bd29, 0x25dfdbfc, "", [@nested={0x14, 0x4b, [@typed={0xc, 0x100000000, @u64=0x1fe0}, @typed={0x4, 0x3f}]}, @nested={0x107c, 0x80, [@typed={0x14, 0x23, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="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", @generic="fe4585fa099de0ebf269cdfd87210d5ce15a29ca19b379533c609b5ccc4c203e9e5cb0c32a748c82053ec033998c643baa02d55fcf6f8794ec9020e9fb08d93f", @typed={0x8, 0x5e, @u32=0x7}, @typed={0x14, 0x8a, @ipv6=@mcast2}, @typed={0x8, 0x37, @pid=r4}]}, @typed={0x8, 0x79, @uid=r5}, @nested={0x334, 0xc, [@typed={0x4, 0x2e}, @typed={0x8, 0x3f, @uid=r6}, @generic="70ae402d", @typed={0xd0, 0x5c, @binary="3cd8ec8688511584ad31e2278c389168eeb478000b6b89b790e2570d9256ab1adb4de176381138370f94d5ec03e6a67189650a17064353856eb93258f479b04092986017d956262610651cd66f90f381541785c04c9452b56de3c442e0bfa6518fd1cbba3bd645acf2f179b34b7dfd212ee5b164fe68788551dd89368f0a14efb0a6848e84d223a41c7543b2e2c6e536758522148ed0c20631de90f2a6acd35ea64d54b49eec40af2517099443cbc7e63c969d168f5310f429f04f807d1b7675eef93f58f25656373255af"}, @typed={0x8, 0x25, @u32=0xff}, @generic="12c10e3665a7afa94fef7ef335591285a8aecbd7e8cf4f37ec0a7162203f6270990cf178e6e5c3d11efdaf15b868f2b65fe7ffc7b5208736c441800c5d38680c05e3c69ccbdb58983a28df0bbb5559683025a73f7cf6fa79aa", @generic="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", @generic="c6400e7b134a9e6f6145fcb79f2c6ed4d223485b1e8672f527585097d9ba30696c25d35654d398915e771471800d4b136aefffdd2db5b84d3c70f61f87658ad9fc1804b81672f3d2cdef4fb91d8552ac9f6fd03d0eb15ccf541aec2706b2a4fc276930d7772f3624ab0ff4b7bbd081a212a8cb2d9216bb62793292cbd23d4e86bbe9083990973dc19e34fe6a17ecb4ab2eb0fb6fe273be23", @generic="0d59cb74404a4aada09932c97ce023f00a9482d533ff14719bb06b1e969fe50d5867d1372a32394fed5f5930e167a7519439cfb5098f4304345966d120640d14d76f62ce9b45dffc9dfff9b227624b3e77d60907", @typed={0x8, 0x14, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x13dc}], 0x3, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}], 0x40, 0x20000010}, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r13 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r13, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000320019010000000000729d00dd000000698000003b13a9b3dcf42da12e2ef47958ad588f610568edbe00000800"], 0x18}}, 0x0) 16:54:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0x0) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000026c0)) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 285.105942] x86/PAT: syz-executor.2:13215 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0x0) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 285.152018] FAULT_INJECTION: forcing a failure. [ 285.152018] name failslab, interval 1, probability 0, space 0, times 0 16:54:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000026c0)) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0xfffffffffffffff9, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400f1ff310019014000f84500000000000020098e7a649def7df19fb3588d0000"], 0x14}}, 0x0) [ 285.226849] CPU: 0 PID: 13221 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 285.233994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.243358] Call Trace: [ 285.245963] dump_stack+0x138/0x19c [ 285.249593] should_fail.cold+0x10f/0x159 [ 285.253742] should_failslab+0xdb/0x130 [ 285.257709] kmem_cache_alloc+0x2d7/0x780 [ 285.262080] copy_process.part.0+0x444f/0x6a00 [ 285.266872] ? __cleanup_sighand+0x50/0x50 [ 285.271393] ? lock_downgrade+0x6e0/0x6e0 16:54:27 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x202, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)={'nat\x00', 0x6e, "3f67062e0153faec008591ad63cb99ec06eb2438814488934e6085ca7bb35f75e71ccf8e9bfa130a21790eb48f4cd1248188561b966b76a533205b14fc9f4a4e12ef54eb1a9db51c6d5661483604847481bc161a9ff06afa179e55f4e2c43c00307d659c7690e0c768e0d62d7f89"}, &(0x7f0000000180)=0x92) r1 = socket$inet(0x10, 0x3, 0xc) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000280)={'broute\x00'}, &(0x7f00000001c0)=0x78) sendmsg(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000160a43ba5d806055b6fdd80b40000000140001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) [ 285.275549] _do_fork+0x19e/0xce0 [ 285.279187] ? fork_idle+0x280/0x280 [ 285.282925] ? fput+0xd4/0x150 [ 285.286332] ? SyS_write+0x15e/0x230 [ 285.290045] SyS_clone+0x37/0x50 [ 285.293414] ? sys_vfork+0x30/0x30 [ 285.297075] do_syscall_64+0x1e8/0x640 [ 285.300961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.306065] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.311281] RIP: 0033:0x459879 [ 285.314453] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 285.322147] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 285.329408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 285.336669] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 285.343949] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 285.351218] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000001c0), r2, 0x0, 0x2, 0x4}}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r4 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x40) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000480)="60f11dd4fd69427ab7ac6165df6e1427e4877053776a1b78e4d884162c6afdeab632ff48f09b06afa0f1a86dbf45b20127499aecf07efb4ade4dd407ad2d2d0e2dc2d5c758813fc68806c2beed8e86fc9f9f99b8258fa3f9f051192700dc997281033de8f06d484adf6a6685a4c281c9a1d38087eeb602d88b53fe7153127297a92a8732e1c9abe19a2301a1f8ab31d59b5fe419816e8a630c9dcbd7d32d113fd61a9a9a54e39eb709f3b8ebf18607c39be36664a1ac809335335d7e555c6a3a328b1a57b7700db7c36572f9e3613da3384e22941c4f7340454e3bdf00928fb3f3c617f48b12c878ce881a1e94969325981ecd") pkey_alloc(0x0, 0x2) ioctl$FIONREAD(r4, 0x541b, &(0x7f00000000c0)) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x3c, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x21) [ 285.376436] x86/PAT: syz-executor.2:13213 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:28 executing program 2 (fault-call:8 fault-nth:54): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0x0) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:28 executing program 5: r0 = socket$inet(0x2, 0x10000000803, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x80000000027, &(0x7f0000000040)={@multicast2, @local}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000000000)={@multicast2, @local}, 0xc) [ 285.443355] x86/PAT: syz-executor.2:13213 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:28 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='%-\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000320019010000000000000001e4ff18fe000000"], 0x18}}, 0x0) 16:54:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(0x0, r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:28 executing program 0: r0 = socket(0x0, 0x6, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000016000/0x18000)=nil, 0x0, 0x0, 0x48, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000000)=0x4) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:54:28 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FICLONE(r0, 0x40049409, r0) socket$inet_tcp(0x2, 0x1, 0x0) epoll_create1(0x0) socket$inet6(0xa, 0x80000, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000080)=[0x4, 0x2d8000000]) getrusage(0xffffffffffffffff, &(0x7f0000000180)) r4 = getpgrp(0x0) sched_getaffinity(r4, 0x8, &(0x7f0000000100)) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 16:54:28 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x400) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x8000) r1 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x2, 0x6) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x11, 0x5}], 0x18) 16:54:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(0x0, r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 285.648273] x86/PAT: syz-executor.2:13270 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 285.676865] FAULT_INJECTION: forcing a failure. [ 285.676865] name failslab, interval 1, probability 0, space 0, times 0 [ 285.740518] CPU: 1 PID: 13270 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 285.747784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.757147] Call Trace: [ 285.759751] dump_stack+0x138/0x19c [ 285.763578] should_fail.cold+0x10f/0x159 [ 285.767749] should_failslab+0xdb/0x130 [ 285.771736] kmem_cache_alloc+0x47/0x780 [ 285.771752] ? __lock_is_held+0xb6/0x140 [ 285.771767] ? check_preemption_disabled+0x3c/0x250 [ 285.771783] anon_vma_clone+0xde/0x470 [ 285.771799] anon_vma_fork+0x87/0x4d0 [ 285.771815] copy_process.part.0+0x45e2/0x6a00 [ 285.771846] ? __cleanup_sighand+0x50/0x50 [ 285.785037] ? lock_downgrade+0x6e0/0x6e0 [ 285.785055] _do_fork+0x19e/0xce0 [ 285.809294] ? fork_idle+0x280/0x280 [ 285.813206] ? fput+0xd4/0x150 [ 285.816407] ? SyS_write+0x15e/0x230 [ 285.820405] SyS_clone+0x37/0x50 [ 285.823776] ? sys_vfork+0x30/0x30 [ 285.827411] do_syscall_64+0x1e8/0x640 [ 285.831404] ? trace_hardirqs_off_thunk+0x1a/0x1c 16:54:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x202, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1800ec5932001901000000000000000001000000ff000000"], 0x18}}, 0x0) [ 285.836255] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.841730] RIP: 0033:0x459879 [ 285.844921] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 285.852635] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 285.859912] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 285.867275] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.874548] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 285.881906] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x1e8, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@nested={0x1d4, 0x67, [@typed={0x4, 0x6b}, @generic="f59fdc4e6a7d89380be48a68668e6567265fe1c75c57d7e5e905219e49f38df1e357fbf57da213ad3fe62ed67383415fc5dbfbda1264aacec37c72a7152b196073355954abf33381a8beb6f9e10e018576a19d6ef3f0f5316cc8acfc9cc2429fe7893283f7d233a92c3d5d1337c704bffaca34747d7942caa5353fdb244facd4d529f653268099c0420659e63be9d95ed0d76197bc61a5e7b7b6f7b7e9e5c07b65d0e460144905be5ccc4ff0884d76436be7c8410af4e9a9aa912046fdfbe9f63540066447f9c599d81752c6cd", @generic="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"]}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x800}, 0x0) 16:54:28 executing program 2 (fault-call:8 fault-nth:55): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 285.994784] x86/PAT: syz-executor.2:13295 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:28 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556a, 0x25) r1 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80000) getsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x101, 0x400000) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000140)=""/84) 16:54:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000040)) [ 286.064530] x86/PAT: syz-executor.2:13295 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(0x0, r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 286.154907] netlink: 460 bytes leftover after parsing attributes in process `syz-executor.1'. 16:54:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000100)={'nlmon\t\x00\x7f\xed\xb1[\xe5\xa3\xcd\xb6\x00'}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xd4, r3, 0x0, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf2}]}]}]}, 0xd4}}, 0x40000) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r6 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$negate(0xd, r5, 0x4, r6) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000300)) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000280)={0xc, 0xba8e}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 16:54:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(0xffffffffffffffff, &(0x7f0000001e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=""/231, 0xe7}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)='[!\x00', 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4, 0x1) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x100, 0x0) syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x2, 0x2) openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x19ea6f098956b57c, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000400)={r0}) syz_open_dev$sndpcmp(&(0x7f0000000440)='/dev/snd/pcmC#D#p\x00', 0x7, 0x400000) r3 = accept$inet6(0xffffffffffffffff, &(0x7f00000004c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000500)=0x1c) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x1, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r4 = semget(0x3, 0x2, 0x0) semctl$IPC_INFO(r4, 0x3, 0x3, &(0x7f00000001c0)=""/21) fcntl$setstatus(r2, 0x4, 0x800) r5 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') sendto$netrom(r5, &(0x7f00000000c0)="6de673d5f34c085bad7805ab73a2dbf1e632c136917cfff06569f66430fdced6ca867a946d5ff8de0756cfede2866858fb04fbdaccb69b537219545ef328db3275e14e70b6e17cce9f409086b52b25fc2429f848ff546b5e5b73c5f0acfb1c9e1fddf7b6be759bb37110d772f901a955a259e2e9b6dc51b2", 0x78, 0x40040, &(0x7f0000000140)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4}, [@null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) lookup_dcookie(0x0, 0x0, 0x0) preadv(r5, &(0x7f00000017c0), 0x199, 0x0) [ 286.197317] openvswitch: netlink: Flow key attr not present in new flow. [ 286.215299] netlink: 460 bytes leftover after parsing attributes in process `syz-executor.1'. [ 286.217206] x86/PAT: syz-executor.2:13316 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 286.256620] FAULT_INJECTION: forcing a failure. [ 286.256620] name failslab, interval 1, probability 0, space 0, times 0 [ 286.271318] openvswitch: netlink: Flow key attr not present in new flow. [ 286.272589] CPU: 1 PID: 13316 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 286.285533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.295074] Call Trace: [ 286.297674] dump_stack+0x138/0x19c [ 286.301310] should_fail.cold+0x10f/0x159 16:54:28 executing program 3: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x2000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x138, r2, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x5c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x72}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffc00}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9e}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x40014}, 0x0) getsockopt$inet_int(r0, 0x10d, 0x10, &(0x7f000079bffc), &(0x7f0000000040)=0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x80000) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000340)) [ 286.305453] should_failslab+0xdb/0x130 [ 286.309428] kmem_cache_alloc+0x2d7/0x780 [ 286.313671] ? anon_vma_clone+0x310/0x470 [ 286.317919] anon_vma_fork+0x1ce/0x4d0 [ 286.321820] copy_process.part.0+0x45e2/0x6a00 [ 286.326750] ? __cleanup_sighand+0x50/0x50 [ 286.330994] ? lock_downgrade+0x6e0/0x6e0 [ 286.335162] _do_fork+0x19e/0xce0 [ 286.338635] ? fork_idle+0x280/0x280 [ 286.342351] ? fput+0xd4/0x150 [ 286.345694] ? SyS_write+0x15e/0x230 [ 286.349562] SyS_clone+0x37/0x50 [ 286.352927] ? sys_vfork+0x30/0x30 [ 286.356473] do_syscall_64+0x1e8/0x640 [ 286.360359] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.365386] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.365396] RIP: 0033:0x459879 [ 286.373918] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 286.381631] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 286.388910] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 286.388916] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:54:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:28 executing program 5: r0 = open(&(0x7f0000000200)='./file0\x00', 0x1, 0x100) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000240)={0x0, 0x6, 0x4, 0x4000000, {0x0, 0x7530}, {0x3, 0x1, 0x6, 0x3, 0xff, 0x8000, "14b1b681"}, 0x1, 0x3, @offset=0x806, 0x4}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x40080, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r1, 0x2, 0x2}, 0x14) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f00000002c0)={0x20, 0x5, 0x6}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x300, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='autogroup\x00') ioctl$SNDRV_TIMER_IOCTL_START(r5, 0x54a0) ioctl$TIOCSIG(r4, 0x40045436, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0xfffffffffffffffe, 0x209e1e, 0x3, 0x1}, 0xfffffffffffffe03) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000100)=0x3ff, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r6, &(0x7f0000000300), &(0x7f0000000340)}, 0x20) 16:54:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x42400, 0x110) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f00000000c0)={0x7ff, 0x7, 0x1}) [ 286.388922] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 286.388927] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 286.400838] x86/PAT: syz-executor.2:13316 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 286.442180] x86/PAT: syz-executor.2:13316 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) socket$caif_seqpacket(0x25, 0x5, 0x2) 16:54:29 executing program 2 (fault-call:8 fault-nth:56): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 286.497076] Unknown ioctl 1074025526 16:54:29 executing program 5: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000100)={'veth0_to_team\x00', 0x6, 0xd261}) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f00000000c0)=0x9, 0x498) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x2e0, [0x20000740, 0x0, 0x0, 0x20000770, 0x200009f0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x358) [ 286.528633] Unknown ioctl 1074025526 16:54:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200200, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r2, 0x400, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xfffffffffffff801, @media='ib\x00'}}}, ["", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="18001000320019010000000001000001ff000000"], 0x18}}, 0x0) 16:54:29 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf32, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(r0, 0x9) r1 = open(&(0x7f0000000600)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) [ 286.706658] x86/PAT: syz-executor.2:13360 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 286.727608] x_tables: eb_tables: snat target: used from hooks OUTPUT, but only usable from POSTROUTING [ 286.746188] FAULT_INJECTION: forcing a failure. [ 286.746188] name failslab, interval 1, probability 0, space 0, times 0 [ 286.763214] CPU: 1 PID: 13360 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 286.770358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.779812] Call Trace: [ 286.782399] dump_stack+0x138/0x19c [ 286.786050] should_fail.cold+0x10f/0x159 [ 286.790200] should_failslab+0xdb/0x130 [ 286.794160] kmem_cache_alloc+0x2d7/0x780 [ 286.798461] ? anon_vma_clone+0x310/0x470 [ 286.802606] anon_vma_fork+0x1ce/0x4d0 [ 286.806484] copy_process.part.0+0x45e2/0x6a00 [ 286.811066] ? __cleanup_sighand+0x50/0x50 [ 286.815287] ? lock_downgrade+0x6e0/0x6e0 [ 286.819720] _do_fork+0x19e/0xce0 [ 286.823162] ? fork_idle+0x280/0x280 [ 286.826866] ? fput+0xd4/0x150 [ 286.830061] ? SyS_write+0x15e/0x230 [ 286.833760] SyS_clone+0x37/0x50 [ 286.837108] ? sys_vfork+0x30/0x30 [ 286.840635] do_syscall_64+0x1e8/0x640 [ 286.844504] ? trace_hardirqs_off_thunk+0x1a/0x1c 16:54:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000801, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = open(&(0x7f0000000340)='./file0\x00', 0x2000, 0x1) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)=0x6389) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x800000000055) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)=0x9) accept4$netrom(r2, &(0x7f0000000200)={{0x3, @default}, [@rose, @rose, @netrom, @rose, @bcast, @default, @remote, @default]}, &(0x7f0000000140)=0x48, 0x80000) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) getegid() ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)=0x7ffb) ioctl$VIDIOC_G_AUDIO(0xffffffffffffffff, 0x80345621, &(0x7f0000000100)) [ 286.849333] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.861236] RIP: 0033:0x459879 [ 286.864412] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 286.872201] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 286.879566] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 286.886822] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.894158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 286.901411] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 16:54:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)={0xd5, 0x2}) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xaf, 0x5, 0x8, 0x80000001}, {0x3, 0x1, 0x20, 0xe173}]}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000100)={0x2b, 0x4, 0x0, {0x4, 0x39, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000180)={0x4, &(0x7f0000000140)=[{0x8, 0x1e58852e, 0x16, 0x3}, {0x14, 0x100000001, 0x1, 0x4}, {0x3ff, 0x0, 0x6, 0x1}, {0x3, 0x81, 0xffffffffffff0e95, 0x3}]}) getsockopt$packet_buf(r0, 0x107, 0x7, &(0x7f00000001c0)=""/185, &(0x7f0000000280)=0xb9) setsockopt$sock_int(r0, 0x1, 0x4, &(0x7f00000002c0)=0x8, 0x4) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$inet_dccp_buf(r0, 0x21, 0x82087bd37e936cb8, &(0x7f0000000300)="57bc8914dbabe684ddd46dd6bed127a6d2bac5329a8ae8f5a531b359a8c81c3c5a05e5cfbb986440e2e8e0ec75cd1735e2f20f36f516e2052937c83d5c0af3af25ab19aa09c89cdb84ef3f780145a4d609e479b0e6abea4fb4581884178be245d80f68f45956ace3166358d8264b2c4288e96c6853bd71d968afead6ed80cd6f66cb7e68b919b6ee633ddbda94b5e20d28478c223cd4ac5d50432ec9059d7053d59e041270c3ae9d18139dbbd78b5b9e2724349e26ab513507805e7344086ba10b4b3e0300", 0xc5) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000400)=0x1) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000440)=""/4096) ioctl$TCSETS(r1, 0x5402, &(0x7f0000001440)={0x6, 0xc07000000000000, 0x20, 0x3ff, 0x1, 0x5, 0x8, 0x7, 0xffffffffffffff2e, 0x180e, 0xf885, 0x3}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000001480)={0x6, 0x2}) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000001500)={0x0, {0x2, 0x4e23, @local}, {0x2, 0x4e20, @multicast1}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x2, 0x0, 0x0, 0x0, 0x6, &(0x7f00000014c0)='nr0\x00', 0x0, 0xffffffffffff8001, 0x800}) semget$private(0x0, 0x0, 0x200) r2 = fcntl$getown(r0, 0x9) move_pages(r2, 0x4, &(0x7f0000001580)=[&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil], &(0x7f00000015c0)=[0x7ff, 0xdf, 0x20], &(0x7f0000001600)=[0x0, 0x0], 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001640)) getpeername$packet(r0, &(0x7f00000016c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001700)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001740)={0x0, 0x0}, &(0x7f0000001780)=0xc) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000017c0)={{{@in6=@empty, @in6=@mcast1, 0x4e20, 0x100000000, 0x4e24, 0xffffffff, 0x2, 0x20, 0x20, 0x3a, r3, r4}, {0x0, 0x3, 0x3e0000, 0xb8f, 0x4, 0x5, 0x9b, 0xb89}, {0x100000001, 0x4, 0x101, 0x6}, 0x2, 0x6e6bb6, 0x3, 0x1, 0x1, 0x2}, {{@in6=@empty, 0x4d5, 0x2c7a0634f07fbe99}, 0x2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3506, 0x1, 0x3, 0x101, 0x80000001, 0x2, 0x10001}}, 0xe8) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f00000018c0)={0xc3, 0x4, 0x7, 0x8}, 0x6) iopl(0xffffffff) getpeername$packet(r0, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001940)=0x14) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x20000000, &(0x7f0000001980)=""/237) write$P9_ROPEN(r0, &(0x7f0000001a80)={0x18, 0x71, 0x2, {{0x0, 0x2, 0x4}, 0x40}}, 0x18) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000001ac0)=r0, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001b00)={0xffffffff, 0x2}, 0x4) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000001b40)={@bcast, @default, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 16:54:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x3e909933714325d0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 16:54:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:29 executing program 2 (fault-call:8 fault-nth:57): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 287.026903] x86/PAT: syz-executor.2:13360 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 287.064801] x86/PAT: syz-executor.2:13360 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, 0x0) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000480)={0x4, [0x7fffffff, 0x800, 0x77, 0x6bd]}, &(0x7f00000004c0)=0xc) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_VERSION(r3, 0xc0406400, &(0x7f0000000340)={0x2, 0x7, 0x4, 0x13, &(0x7f0000000100)=""/19, 0xe8, &(0x7f0000000140)=""/232, 0xc9, &(0x7f0000000240)=""/201}) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 287.094812] audit: type=1326 audit(1566665669.607:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13392 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x0 16:54:29 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x428057074a6b4845, 0x0) lsetxattr$security_selinux(&(0x7f0000000240)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000280)='security.selinux\x00', &(0x7f00000002c0)='u:object_r:app_data_file:s0:c512,c768\x00', 0x26, 0x3) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000200)={0x12, 0x35, 0x4, 0x15, 0x3, 0x0, 0x5, 0x73}) r2 = socket$unix(0x1, 0x100000000000001, 0x0) bind$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect(r3, &(0x7f0000000000)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x43) connect(r0, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x343000, 0x0) ioctl$PIO_UNISCRNMAP(r4, 0x4b6a, &(0x7f0000000180)="b5818194020b348b1cc178a1d87a7fa9e9e004cbde6d51c054ae0d18adfdff3f1520315fc47085cf819a") r5 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r5, 0x101000000000016) accept4(r2, 0x0, 0x0, 0x0) 16:54:29 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000500)={0x1, @raw_data="5dfb598a029cbbd61df8421c15ce725e044c2a7dd972f0a7bf6727ef95f444f99207ab742e4c13f077cc2e5b5bb40b41ec1d9f1c1dfdd94d29a57880317823de124344e8f755df5aa12a23e05434720e65194e25e3eda02d950a76ec97a22226c82361518f138ab8e744cf6bfcbe700f0a6f89e3ce2540725f04eef52c21123cc9d52ae6e3728248fff769fd683e01ebb8f4a7b371fcaf575058b160aa7a45adb2e01b54a679f482a38f1a50a19491f5c17232d443ffa41957dd55b83626a2e1dda2a0dcb34c7ac1"}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x20000, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000000)=0xc) sendmsg$nl_crypto(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x10}, 0x40) 16:54:29 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000005a80)='/dev/vcs\x00', 0x40200, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$kcm(0x10, 0x20000000000002, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000780)="d800000018008100e00f80ecdb4cb9040a1d65ef0b007c05e87c55a1bc000900b800069903000000050015000700812fa8001600030063e3e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f87f5730d16b8683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40ff040000e04adcdf634c0285dc4fc82a9ecbee5de6e4edee3d93452a92954b43370e970300000000b818b824f9cb1337a0d8d0d1e1c0", 0xd8}], 0x1}, 0x0) 16:54:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, 0x0) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 287.253026] net_ratelimit: 3 callbacks suppressed [ 287.253031] openvswitch: netlink: Flow key attr not present in new flow. [ 287.276582] x86/PAT: syz-executor.2:13409 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1800000032001901000000000000000001e4fffffe000000"], 0x18}}, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8, 0x20c0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f00000000c0)) [ 287.316359] FAULT_INJECTION: forcing a failure. [ 287.316359] name failslab, interval 1, probability 0, space 0, times 0 [ 287.358992] SELinux: Context u:object_r:app_data_file:s0:c512,c768 is not valid (left unmapped). [ 287.368803] audit: type=1400 audit(1566665669.867:96): avc: denied { mac_admin } for pid=13404 comm="syz-executor.3" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 287.375317] CPU: 0 PID: 13409 Comm: syz-executor.2 Not tainted 4.14.139 #35 16:54:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="20d0ba4a6fa7202873c5ad000100", @ANYRES16=r2, @ANYBLOB="05000000000000000000140000000c00070008000200dc070000"], 0x20}}, 0x0) [ 287.400896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.400901] Call Trace: [ 287.400921] dump_stack+0x138/0x19c [ 287.400939] should_fail.cold+0x10f/0x159 [ 287.400955] should_failslab+0xdb/0x130 [ 287.400967] kmem_cache_alloc+0x2d7/0x780 [ 287.400984] ptlock_alloc+0x20/0x70 [ 287.400997] pte_alloc_one+0x60/0x100 [ 287.401005] __pte_alloc+0x2a/0x2d0 [ 287.401015] copy_page_range+0x11ba/0x1bd0 [ 287.401028] ? anon_vma_fork+0x358/0x4d0 [ 287.401050] ? vma_compute_subtree_gap+0x190/0x1f0 [ 287.401067] ? __pmd_alloc+0x410/0x410 [ 287.401085] copy_process.part.0+0x4764/0x6a00 [ 287.401118] ? __cleanup_sighand+0x50/0x50 [ 287.401130] ? lock_downgrade+0x6e0/0x6e0 [ 287.401143] _do_fork+0x19e/0xce0 [ 287.401156] ? fork_idle+0x280/0x280 [ 287.401171] ? fput+0xd4/0x150 [ 287.401180] ? SyS_write+0x15e/0x230 [ 287.401192] SyS_clone+0x37/0x50 [ 287.401200] ? sys_vfork+0x30/0x30 [ 287.401214] do_syscall_64+0x1e8/0x640 [ 287.401222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.401239] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 287.401247] RIP: 0033:0x459879 [ 287.401253] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 287.401263] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 287.401268] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 287.401273] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 287.401279] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 287.401284] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 287.433311] openvswitch: netlink: Flow key attr not present in new flow. [ 287.440705] IPv6: NLM_F_CREATE should be specified when creating new route [ 287.465720] openvswitch: netlink: Flow key attr not present in new flow. [ 287.470651] x86/PAT: syz-executor.2:13409 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 287.541650] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.5'. [ 287.548096] x86/PAT: syz-executor.2:13409 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getresuid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', r1, r2, 0x1400) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x818030b0}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x74, r3, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcfde}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1e5e}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffd}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x48001) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:30 executing program 0: timer_create(0x0, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x4, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r0+10000000}}, 0x0) 16:54:30 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000140)={0x0, 0x7530}, 0x10) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x304, 0x0, 0x200003, 0x7ff}, 0x10) 16:54:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0224fc0010000b400c000200053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETX(r1, 0x5437, 0x0) 16:54:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, 0x0) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:30 executing program 2 (fault-call:8 fault-nth:58): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 287.895256] audit: type=1326 audit(1566665670.407:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13392 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45c6ba code=0x0 [ 287.997196] openvswitch: netlink: Flow key attr not present in new flow. [ 288.011722] x86/PAT: syz-executor.2:13444 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 288.028834] FAULT_INJECTION: forcing a failure. [ 288.028834] name failslab, interval 1, probability 0, space 0, times 0 16:54:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000440)=""/4096, &(0x7f0000000000)=0x1000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x0, 0x3, 0x2000, 0x2000, &(0x7f0000000000/0x2000)=nil}) 16:54:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(0x0, &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) accept4$netrom(r1, &(0x7f0000000080)={{0x3, @null}, [@bcast, @remote, @netrom, @rose, @remote, @bcast, @null]}, &(0x7f0000000140)=0x48, 0x80000) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="18000026632431cbdfe50032001901000000000000000001000000ff000000"], 0x18}}, 0x0) [ 288.083625] CPU: 0 PID: 13444 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 288.090765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.100244] Call Trace: [ 288.102843] dump_stack+0x138/0x19c [ 288.106497] should_fail.cold+0x10f/0x159 [ 288.110661] should_failslab+0xdb/0x130 [ 288.114732] kmem_cache_alloc+0x2d7/0x780 [ 288.119053] ptlock_alloc+0x20/0x70 [ 288.122666] pte_alloc_one+0x60/0x100 [ 288.126556] __pte_alloc+0x2a/0x2d0 [ 288.130314] copy_page_range+0x11ba/0x1bd0 [ 288.134550] ? anon_vma_fork+0x358/0x4d0 [ 288.138592] ? vma_compute_subtree_gap+0x190/0x1f0 [ 288.143504] ? __pmd_alloc+0x410/0x410 [ 288.147546] copy_process.part.0+0x4764/0x6a00 [ 288.152244] ? __cleanup_sighand+0x50/0x50 [ 288.156594] ? lock_downgrade+0x6e0/0x6e0 [ 288.160839] _do_fork+0x19e/0xce0 [ 288.164371] ? fork_idle+0x280/0x280 [ 288.168074] ? fput+0xd4/0x150 [ 288.171254] ? SyS_write+0x15e/0x230 [ 288.175083] SyS_clone+0x37/0x50 [ 288.178432] ? sys_vfork+0x30/0x30 [ 288.181971] do_syscall_64+0x1e8/0x640 [ 288.185877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.190726] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.195905] RIP: 0033:0x459879 [ 288.199247] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 288.207106] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 288.214483] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 288.221840] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:54:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x4000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f00000000c0)=0xfffffffffffffc01) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffd92, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="0000000000000000240012001400010005000000000000006c617665000000000c0005000800180003000000b19a9807a73b26ee1d9b00d3134cb78d55ffc8040d1e1ab50e5b4f327d1d453a7003cfa9565a2bc6907d34749886ef4617beb1e0437214bb7efbf51c48682344787a92c70530e4d9dfec6814fa2067592622f81ed104f705b7e8e34d11188ffb63019d60e309b788f0feaf9a4f7f3f599cd375895c940822a82beed84844c155d55e3173f3d6685f68b4743b9e30fb8f4146f42c1c1b84b163dbe321a4380386f5f0c08752b83ef5ad11ebf295b62e3d11be17ef6693dce1e8e2c3bc6ca424ef4f9102bf72a023e4d6b002ff439c8775e6a4d2b575123bab28428a4fb3877e0324fb8b5060ad9d148784a9b5b8ef4f080daa7d9651d71310e3a6c104f2990bc9ebd0ed4f119c560000def80c14f73959cebcce36f9d804aa"], 0x44}}, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000140)=ANY=[@ANYBLOB="6e0000000000000000000000008000"/114]) 16:54:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0224fc0010000b400c000200053582c137153e370900018004081700d1bd", 0x2e}], 0x1}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETX(r1, 0x5437, 0x0) [ 288.229112] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 288.236368] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 288.281154] x86/PAT: syz-executor.2:13444 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:30 executing program 2 (fault-call:8 fault-nth:59): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:30 executing program 3: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) r1 = socket$kcm(0x11, 0x2, 0x300) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000080)={0x100000000, 0x32314142, 0x80000001, 0x20, 0x386caf4d32d46c2c, @discrete={0x1, 0xffffffff}}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa300000000000007a4f0ffac290000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe000000008500000026000000b7000000000000009500"/112], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r3, 0x0, 0xe, 0x0, &(0x7f00000005c0)="1b3ae4a5a27e6aa1a30600000000", 0x0, 0x103}, 0x28) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) fcntl$dupfd(r2, 0x0, r3) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000280)=ANY=[@ANYBLOB="62736464662c004604c8eb577e1b0eddea602c3e533e5e044250a4dcf9017665390c91ef02c4c47915ad6be6b43d8b476d1c765707765c25ac93183cefd8f1473a161489ad00fe40a07b2a9699e1dfc83815875e1ecb56bc81424a5ebc028649908509c4634e25f2dc7f710ec01d9d973a02bcf04a88"]) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000040)={'rose0\x00', {0x2, 0x2, @empty}}) [ 288.327193] x86/PAT: syz-executor.2:13444 freeing invalid memtype [mem 0x00002000-0x00002fff] [ 288.348747] audit: type=1400 audit(1566665670.857:98): avc: denied { accept } for pid=13464 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 16:54:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5a0bcfe47bf070") prctl$PR_SET_PDEATHSIG(0x1, 0x1d) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7, 0x4002) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x20, &(0x7f00000000c0)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000001c0)={r3, 0xed}, 0x8) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 288.397612] selinux_nlmsg_perm: 6 callbacks suppressed [ 288.397625] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6157 sclass=netlink_route_socket pig=13469 comm=syz-executor.0 16:54:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(0x0, &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 288.445673] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6157 sclass=netlink_route_socket pig=13476 comm=syz-executor.0 16:54:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(0x0, &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x142}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 288.593618] audit: type=1400 audit(1566665671.107:99): avc: denied { getopt } for pid=13482 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 288.607259] x86/PAT: syz-executor.2:13486 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(0x0, &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 288.638410] openvswitch: netlink: Flow key attr not present in new flow. 16:54:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1800000032001901000000000000000001000000ff00000039e200038c1a343048c1d75671aace0cc4762c1cb1f4526475293fbe557a2ef67c625326d8fb7605d6b8c257bc8ba101a50d0c43bce0ae185906ab42114a5c842ff8bad37c7775de527fa97980a65dba0040000000000003ac3b2200c3a7d14304d74c07d928117deac4f7194cb73cb6"], 0x18}}, 0x0) [ 288.729789] FAULT_INJECTION: forcing a failure. [ 288.729789] name failslab, interval 1, probability 0, space 0, times 0 [ 288.741554] CPU: 0 PID: 13508 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 288.748673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.758027] Call Trace: [ 288.758050] dump_stack+0x138/0x19c [ 288.758074] should_fail.cold+0x10f/0x159 [ 288.758090] should_failslab+0xdb/0x130 [ 288.772475] kmem_cache_alloc+0x2d7/0x780 [ 288.776627] ptlock_alloc+0x20/0x70 16:54:31 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000180)={0x14, 0x6a, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty, 0xeae9}}}, 0x90) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000000)={'netdevsim0\x00', {0x2, 0x4e21, @remote}}) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) connect$packet(r0, &(0x7f0000000140)={0x11, 0x1, r2, 0x1, 0x9}, 0x14) [ 288.780259] pte_alloc_one+0x60/0x100 [ 288.784056] __pte_alloc+0x2a/0x2d0 [ 288.787684] copy_page_range+0x11ba/0x1bd0 [ 288.792006] ? anon_vma_fork+0x358/0x4d0 [ 288.792022] ? vma_compute_subtree_gap+0x190/0x1f0 [ 288.792041] ? __pmd_alloc+0x410/0x410 [ 288.792059] copy_process.part.0+0x4764/0x6a00 [ 288.792088] ? __cleanup_sighand+0x50/0x50 [ 288.800140] protocol 88fb is buggy, dev hsr_slave_0 [ 288.801048] ? lock_downgrade+0x6e0/0x6e0 [ 288.804954] protocol 88fb is buggy, dev hsr_slave_1 [ 288.809625] _do_fork+0x19e/0xce0 [ 288.832327] ? fork_idle+0x280/0x280 [ 288.836059] ? fput+0xd4/0x150 [ 288.839255] ? SyS_write+0x15e/0x230 [ 288.842987] SyS_clone+0x37/0x50 [ 288.846354] ? sys_vfork+0x30/0x30 [ 288.849900] do_syscall_64+0x1e8/0x640 [ 288.853787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.858657] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.864128] RIP: 0033:0x459879 [ 288.867509] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 16:54:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', 0x0, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 288.875298] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 288.882556] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 288.889806] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 288.897151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 288.904575] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 288.947831] openvswitch: netlink: Flow key attr not present in new flow. [ 288.949117] x86/PAT: syz-executor.2:13508 freeing invalid memtype [mem 0x00000000-0x00000fff] 16:54:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") prctl$PR_SET_PDEATHSIG(0x1, 0x3b) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1800000032001901000001000000ff004000000000000000"], 0x18}}, 0x0) 16:54:31 executing program 2 (fault-call:8 fault-nth:60): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 288.999637] x86/PAT: syz-executor.2:13508 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(0x0, &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0edca50d5e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x4000, 0x0) ftruncate(r3, 0x208200) fcntl$setstatus(r2, 0x4, 0x6000) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000040)) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2}]) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f0000000200)={0x0, @speck128}) io_submit(r4, 0x1, &(0x7f0000000440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000000140)="73844ae89d50", 0x6}]) 16:54:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffff, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-control\x00', 0x40000, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000300)={r1}) sendmsg$nl_generic(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc800}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xf0, 0x34, 0x1, 0x70bd2c, 0x25dfdbff, {0x1e}, [@generic="714f9f1d00aad0b439393fffccbbc3ea43e686463ea582da61ee250664d260a4d57b6d0fab4a7327c15f6a821da9aca08896db08c98438b035c9d642134c7c6607979e7392b536d27f345c200ca6efc591b2bc1443f8b0b13b466331f692589fda0c2de72e9bf0cd3d7cc419dc572c07402d3173758a26099d0eb7f9a91d31f3e309ab38d146dc210dc10649febbec6c0c291a0939263b99bac3b75a092d385aac3342c6583d57deb4a4834bc0adc35ceb2049aafa04cb657e168ba1389d2703b7850b738a0d16bda8e3961a316418db35f531e6f125a3c70a448b"]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000145c53655e113a02d2eca6320019010012000000"], 0x18}}, 0x0) 16:54:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', 0x0, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 289.170300] x86/PAT: syz-executor.2:13535 freeing invalid memtype [mem 0x00001000-0x00001fff] [ 289.198643] FAULT_INJECTION: forcing a failure. [ 289.198643] name failslab, interval 1, probability 0, space 0, times 0 [ 289.213230] CPU: 1 PID: 13535 Comm: syz-executor.2 Not tainted 4.14.139 #35 16:54:31 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', 0x0, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 289.220469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.229835] Call Trace: [ 289.232438] dump_stack+0x138/0x19c [ 289.236077] should_fail.cold+0x10f/0x159 [ 289.240245] should_failslab+0xdb/0x130 [ 289.244235] kmem_cache_alloc+0x2d7/0x780 [ 289.248636] ? __pmd_alloc+0x410/0x410 [ 289.252694] copy_process.part.0+0x444f/0x6a00 [ 289.257474] ? __cleanup_sighand+0x50/0x50 [ 289.261715] ? lock_downgrade+0x6e0/0x6e0 [ 289.265873] _do_fork+0x19e/0xce0 [ 289.269348] ? fork_idle+0x280/0x280 [ 289.273089] ? fput+0xd4/0x150 [ 289.276291] ? SyS_write+0x15e/0x230 [ 289.280017] SyS_clone+0x37/0x50 [ 289.283720] ? sys_vfork+0x30/0x30 [ 289.287305] do_syscall_64+0x1e8/0x640 [ 289.291286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.296226] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.301404] RIP: 0033:0x459879 [ 289.301414] RSP: 002b:00007f64ad62ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 289.301424] RAX: ffffffffffffffda RBX: 00007f64ad62ac90 RCX: 0000000000459879 [ 289.301429] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 289.301433] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 289.301438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad62b6d4 [ 289.301442] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 289.307165] x86/PAT: syz-executor.2:13535 freeing invalid memtype [mem 0x00000000-0x00000fff] [ 289.328229] x86/PAT: syz-executor.2:13535 freeing invalid memtype [mem 0x00002000-0x00002fff] 16:54:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', 0x0, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10000006, &(0x7f0000000280)="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") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) 16:54:34 executing program 2 (fault-call:8 fault-nth:61): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:54:34 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000001c0)={0x6}, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f0000000080)=""/196}, 0x18) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000240)={{0x2, 0x0, 0x8, 0x81, '\x00', 0xffffffff}, 0x1, [0x4, 0xfffffffffffffffd, 0x100000001, 0x8, 0x9, 0x0, 0x200, 0x9, 0x6, 0x77c0, 0x9, 0x65e6, 0x401, 0x4, 0x200, 0x5, 0x8, 0x8, 0xffffffffe35da444, 0xfffffffffffffff8, 0x7fff, 0x5, 0xce5, 0x9, 0x3, 0x1a9, 0x8, 0x8000, 0xffffffffffff0000, 0x10001, 0xc63a, 0x5e, 0xffffffff, 0x0, 0x7f, 0x1000, 0x8, 0x20, 0x101, 0x573, 0x4, 0x4, 0x8, 0x9, 0x4, 0xb0, 0x100000001, 0x0, 0x8, 0x10000, 0x800, 0x8, 0x3, 0xa2a, 0x5, 0x7, 0x7, 0x8000, 0x5, 0x7fff, 0x7, 0x8, 0x2f, 0xdda5, 0x1, 0x3, 0x4, 0x101, 0x10001, 0x4, 0x6, 0x35ecf9a0, 0x10000, 0x9, 0x4, 0x2, 0x7, 0xfffffffffffeffff, 0xffffffffffffffe0, 0xfffffffffffffff9, 0x5be, 0x400, 0x7fff, 0x4, 0x2, 0x3, 0x1, 0x0, 0x0, 0x8001, 0xffffffff, 0x401, 0x5, 0xffff, 0x9, 0x200, 0x3, 0x8, 0x3, 0xfffffffffffffffb, 0xfffffffffffffff9, 0x6dcb, 0x100000000, 0x3, 0x7fffffff, 0x8, 0x3, 0x3, 0x80000000, 0x80000001, 0xffff, 0x40, 0x0, 0xfffffffffffffff8, 0x6, 0x6, 0x4, 0x5, 0x100000000, 0xe5a6, 0x1000, 0x8, 0x1, 0x3, 0x8, 0x6, 0x6, 0x6], {r2, r3+10000000}}) 16:54:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="73797374656d5f756dd925d90000745f723a7661725f741f59b1e5360e18f0141eb77b833a7330208179ffff656d5f75ad91626a6563745f7218c9c1fb885e944bfab757cf3e733e6465766963656b69743f061dfa5f65686563703a75574862302030037a5430f93a62e9bf77db0510018c0069073a78ca2f92ec35ceb2f96d01bbde75e3ffdef1292570f23c3949bce47910ae40162674f7c0a001caa7131cc82a0b1a7dcb240da0f54e1222ba4bf4d4a610d45bf76a9b17f9ef85830600fece6f7f42da3fb9637b680e16116c204082720f3bbcfce2a334bb102fdd6609a8c1a378bd586b801fe0868507000000000000009f60f5cb0f5e7e7cf9cff2b0905104b1775ebe46dfd351989e77e941a1c20e8037be6e9dda4c598a1dd7aa9e4ff08d11c12c1bc97ee3c9545136957b98e0e8898dd4f21262b7d752b18408118e6e8875d2a5984ae0be02a60000000000fafc0d187a286c8e306303056cd98def8b1cd13f67f88f5010c0a83aff82ae15457a368e0706935dd57247c1ea01a53cc8162c317b8709bcd370b220dbb47ee6f3de4dba11d338000000000000004f34f0b2d4443af50da740216f68847373acdec5274202000000d300d698f75f620ca084794f99b56a16f6e7f22e9b6f673765ebf057585ea3f8c3b65b095b9e1f8e7f47dba9478e9d16889ef930db40bffc628d02cf2d53f82f01eaea8e10bf33b74ea1fd4e385881af323468c3a749035051a5538c6b7815274858b8be55cce965f5ca3d871836461db7287e93de1840af817573526800"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', 0x0, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', 0x0, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:34 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', 0x0, &(0x7f0000000c80)="ca6ed21f1a65e72684c2d77b1aa8a6abb5c0a4cc6ff33d21a43913ac1e591fcd3779aa719f6f16f998e3eb202101610ddfcf45bd82279e55ec19694a7feb665d1d26b5285dbc20ecbd023da446f6f1f18e8ea8d6d8f698d8445b3f9cadfd884d795fd824c3743441badeadd69b7850d4c8c93a2574c49906575e0bfea6b3259043c78390", 0x84, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) [ 291.728658] openvswitch: netlink: Flow key attr not present in new flow. 16:54:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="11dca50d5e0bcfe47bf07082eebbc4801f325a59bf6d411748c5678e00a83307d1615290ca4bd14d48ba9fc654055fc63530c6d3fff72fa1c475094611c4acb82b7fd39cdcdc2aa1ae45a4b90583ed3da6560c2bf8bc8515b234aec52c269c32f8964bca13d320bfc55193d66e38aeaf89a9f20e7004185dfb0d944ee9e7eb24b2beb738fc39a821") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="1800000032001901006200800000000000000000ff040000"], 0x18}}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000003500)={@rand_addr, 0x0}, &(0x7f0000003540)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000003580)={r2, 0x1, 0x6}, 0x10) 16:54:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x10, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x6c, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000080)={0x80ff}) [ 291.781525] x86/PAT: syz-executor.2:13564 freeing invalid memtype [mem 0x00001000-0x00001fff] 16:54:34 executing program 0: chdir(0x0) mkdir(&(0x7f00000005c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a80)={{}, {0x2}}, 0x24, 0x0) getrlimit(0xe, &(0x7f0000000000)) [ 291.854513] FAULT_INJECTION: forcing a failure. [ 291.854513] name failslab, interval 1, probability 0, space 0, times 0 16:54:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f00000000c0)={0x43, 0x2, 0x2}, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x18, 0x8000032, 0x119, 0x0, 0x0, {0x800000001}, [@generic="ff"]}, 0x18}}, 0x0) [ 291.899738] CPU: 1 PID: 13575 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 291.907241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.916606] Call Trace: [ 291.919214] dump_stack+0x138/0x19c [ 291.922868] should_fail.cold+0x10f/0x159 [ 291.927132] should_failslab+0xdb/0x130 [ 291.931548] kmem_cache_alloc_trace+0x2e9/0x790 [ 291.931562] ? pat_pagerange_is_ram+0x90/0xf0 [ 291.931570] ? __init_cache_modes+0x240/0x240 [ 291.931583] reserve_memtype+0x164/0x640 16:54:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) openat$ppp(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ppp\x00', 0x400003, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x80000, 0x0) getdents(r0, &(0x7f0000000880)=""/188, 0x84d505b74ae32da) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./sgro\x95?\xc4\x0f\xd8\\up/s\x87z1\x00', 0x200002, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netstat\x00') write$selinux_validatetrans(r1, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"/577], 0x1fa) accept$unix(0xffffffffffffff9c, &(0x7f0000000340)=@abs, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) clone(0x2902001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f00000005c0)={0x200}, 0x0, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x8) ioctl$UI_DEV_CREATE(r0, 0x5501) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) write$FUSE_BMAP(r1, &(0x7f0000000240)={0x18, 0x0, 0x6, {0x7fffffff}}, 0x18) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup/syz0\x00', 0x200002, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000300)={0x4, 0x7, 0x0, 0x6}) prctl$PR_CAP_AMBIENT(0x2f, 0x400000007, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r1, &(0x7f0000000940)="725f3be526811246b0cb312c95e41358c46fa2c7b6387ab9a815a7459115b6e4018eee175c213530ee5787a1693f77a14fcbf1e51be6fd9f47272c8c242a15ce2ef4241c6b52fde6bc5bb6a2565c190ec7d31ed6e6d3da60baf782935250818a9dbb68d58bef572f018dc423", 0x0}, 0x18) ptrace(0x10, r2) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002680)={@remote}, &(0x7f00000026c0)=0x8) sched_getparam(0x0, &(0x7f0000000080)) ptrace$pokeuser(0x6, r2, 0x388, 0xffffffffffffffff) symlinkat(&(0x7f0000000540)='./file0\x00', r1, &(0x7f0000000580)='./file0\x00') add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ptrace$cont(0x7, r2, 0x2, 0x18000000000) 16:54:34 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1, &(0x7f0000000080)=0x7, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000240)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x21, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$rose(r2, 0x104, 0x6, &(0x7f0000000040)=0x5, 0x21b) [ 291.949662] ? lock_downgrade+0x6e0/0x6e0 [ 291.953816] ? pat_init+0x420/0x420 [ 291.957452] ? __init_cache_modes+0x240/0x240 [ 291.962130] reserve_pfn_range+0x11c/0x390 [ 291.966377] ? arch_io_reserve_memtype_wc+0x80/0x80 [ 291.971409] ? copy_process.part.0+0x444f/0x6a00 [ 291.976263] ? SyS_clone+0x37/0x50 [ 291.979803] ? do_syscall_64+0x1e8/0x640 [ 291.983875] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 291.989253] track_pfn_copy+0x14a/0x190 [ 291.993240] ? reserve_pfn_range+0x390/0x390 [ 291.997663] ? trace_hardirqs_on+0x10/0x10 [ 292.001920] copy_page_range+0x1255/0x1bd0 [ 292.006313] ? save_trace+0x290/0x290 [ 292.010124] ? copy_process.part.0+0x41de/0x6a00 [ 292.014882] ? vma_compute_subtree_gap+0x190/0x1f0 [ 292.020001] ? vma_gap_callbacks_rotate+0x62/0x80 [ 292.024850] ? __rb_insert_augmented+0x22f/0xdf0 [ 292.030800] ? __pmd_alloc+0x410/0x410 [ 292.030811] ? __vma_link_rb+0x247/0x340 [ 292.030829] copy_process.part.0+0x4764/0x6a00 [ 292.030861] ? __cleanup_sighand+0x50/0x50 [ 292.030871] ? lock_downgrade+0x6e0/0x6e0 [ 292.030886] _do_fork+0x19e/0xce0 [ 292.051842] ? fork_idle+0x280/0x280 [ 292.051860] ? fput+0xd4/0x150 [ 292.051870] ? SyS_write+0x15e/0x230 [ 292.051885] SyS_clone+0x37/0x50 [ 292.051893] ? sys_vfork+0x30/0x30 [ 292.051910] do_syscall_64+0x1e8/0x640 [ 292.069581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.069603] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.069611] RIP: 0033:0x459879 [ 292.069618] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 292.098067] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 292.098073] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 292.098079] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 292.098085] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 292.098091] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 292.117757] ------------[ cut here ]------------ [ 292.139828] WARNING: CPU: 1 PID: 13575 at arch/x86/mm/pat.c:1020 untrack_pfn+0x1dc/0x220 [ 292.148075] Kernel panic - not syncing: panic_on_warn set ... [ 292.148075] [ 292.155532] CPU: 1 PID: 13575 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 292.162633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.172371] Call Trace: [ 292.174979] dump_stack+0x138/0x19c [ 292.178615] panic+0x1f2/0x426 [ 292.181805] ? add_taint.cold+0x16/0x16 [ 292.185787] ? untrack_pfn+0x1dc/0x220 [ 292.189673] ? __warn.cold+0x14/0x36 [ 292.193478] ? untrack_pfn+0x1dc/0x220 [ 292.197401] __warn.cold+0x2f/0x36 [ 292.200664] kobject: 'loop4' (ffff8880a4b04aa0): kobject_uevent_env [ 292.200949] ? ist_end_non_atomic+0x10/0x10 [ 292.211646] ? untrack_pfn+0x1dc/0x220 [ 292.215541] report_bug+0x216/0x254 [ 292.219176] do_error_trap+0x1bb/0x310 [ 292.223162] ? math_error+0x360/0x360 [ 292.227062] ? lock_downgrade+0x6e0/0x6e0 [ 292.230298] kobject: 'loop4' (ffff8880a4b04aa0): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 292.231224] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.231240] do_invalid_op+0x1b/0x20 [ 292.249210] invalid_op+0x1b/0x40 [ 292.252764] RIP: 0010:untrack_pfn+0x1dc/0x220 [ 292.257430] RSP: 0018:ffff888057d77948 EFLAGS: 00010246 [ 292.262976] RAX: 0000000000040000 RBX: ffff88808e4d6670 RCX: ffffc90008440000 [ 292.270248] RDX: 0000000000040000 RSI: ffffffff812a656c RDI: 0000000000000001 [ 292.277538] RBP: ffff888057d779d8 R08: ffff8880a064e740 R09: 0000000000000000 [ 292.284809] R10: 0000000000000000 R11: ffff8880a064e740 R12: 1ffff1100afaef2a [ 292.292164] R13: 0000000000000000 R14: 0000000000000000 R15: ffff888057d779b0 [ 292.299681] ? untrack_pfn+0x1dc/0x220 [ 292.303585] ? untrack_pfn+0x1dc/0x220 [ 292.307479] ? track_pfn_insert+0x150/0x150 [ 292.311833] ? vm_normal_page_pmd+0x360/0x360 [ 292.316422] ? uprobe_munmap+0x94/0x210 [ 292.320396] unmap_single_vma+0x182/0x2c0 [ 292.324545] unmap_vmas+0xac/0x170 [ 292.328277] exit_mmap+0x285/0x4e0 [ 292.331821] ? SyS_munmap+0x30/0x30 [ 292.335560] ? kmem_cache_free+0x244/0x2b0 [ 292.339800] ? __khugepaged_exit+0xcf/0x3d0 [ 292.344133] ? lock_downgrade+0x6e0/0x6e0 [ 292.346144] kobject: 'loop1' (ffff8880a49fb1e0): kobject_uevent_env [ 292.348311] mmput+0x114/0x440 [ 292.357884] copy_process.part.0+0x4743/0x6a00 [ 292.362486] ? __cleanup_sighand+0x50/0x50 [ 292.366727] ? lock_downgrade+0x6e0/0x6e0 [ 292.370972] _do_fork+0x19e/0xce0 [ 292.371535] kobject: 'loop1' (ffff8880a49fb1e0): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 292.374432] ? fork_idle+0x280/0x280 [ 292.374449] ? fput+0xd4/0x150 [ 292.374458] ? SyS_write+0x15e/0x230 [ 292.374469] SyS_clone+0x37/0x50 [ 292.374475] ? sys_vfork+0x30/0x30 [ 292.374489] do_syscall_64+0x1e8/0x640 [ 292.374496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.374513] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.374521] RIP: 0033:0x459879 [ 292.374526] RSP: 002b:00007f64ad609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 292.374537] RAX: ffffffffffffffda RBX: 00007f64ad609c90 RCX: 0000000000459879 [ 292.374542] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 292.374547] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 292.374552] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f64ad60a6d4 [ 292.374558] R13: 00000000004bfd46 R14: 00000000004d1af8 R15: 0000000000000006 [ 292.377383] Kernel Offset: disabled [ 292.469350] Rebooting in 86400 seconds..