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", 0x1000) 09:58:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f0000000000)={0x1, 0x1, 0x1, 0x8, 0x0, 0x1000, 0x9, 0x0, 0x9, 0x64e0, 0x9, 0xffffffff, 0xee1e, 0x3143}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, r3, {0xff}}, 0x18) 09:58:46 executing program 4: unshare(0x600) unshare(0x40000) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0xfffffffc) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth0_macvtap\x00'}, 0x18) 09:58:46 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) 09:58:46 executing program 5: unshare(0x600) unshare(0x4020100) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x0, @multicast2, 0x4e20, 0x3, 'sh\x00', 0x10, 0x3, 0x14}, 0x2c) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:46 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x509440, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f00000001c0)="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", 0x1000) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x509440, 0x0) (async) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f00000001c0)="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", 0x1000) (async) 09:58:46 executing program 4: unshare(0x600) unshare(0x40000) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) r0 = socket$inet(0x2, 0x5, 0xfffffffc) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth0_macvtap\x00'}, 0x18) 09:58:46 executing program 4: unshare(0x600) unshare(0x40000) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0xfffffffc) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth0_macvtap\x00'}, 0x18) unshare(0x600) (async) unshare(0x40000) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) socket$inet(0x2, 0x5, 0xfffffffc) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth0_macvtap\x00'}, 0x18) (async) 09:58:46 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x509440, 0x0) setsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f00000001c0)="6338ef64dbb287352428d958f28bfff6c4e9399b9104162d1c5c033881361f38eb841952b86673fa2e1891ae44b533f792665db9c82a596440730b0ccab4153bd4d308f6aa9f2a82c8caa9200c0643492a9f2357b3b8294882ec38d50a178b49271098dee82cea5a639335684a51722368ffe78fb878fb3fcd7312267afb7e2f4e30f94baab5a95a79aaa2cbee51fe3672380db81e2da2a8b29aa4bc39239385c5bb0b630f77b68da74ae96e6b6380e03adb295fa2bdfd5e0cafc112d34752577c3e68e4a604ed512d7d45341536a0a68485610a5195edb032ff94c96dc2e24f88ddf0f8fae6dcafddc5736b7d9cf68e0e21968d633bcc115e3b7bca87c33638c07b5cf2b207389bc1482f2ef4008857f96ca7b542a9bfd6fa774f181ed473e5c193e071730886a230f59f59823ba24775bee5df793503080f9b9bf4afbcf64b9c84fc24ef1053270305e48a64e54457c51b6dcecade14eb13e7bac967dfceb2c35e85f94bb2d2c89f994b10debd01c8dedbcf81973a3c3d722bba60c06716b61e2c263f34fbf474d6a643b2c370460656ae36812dd9989ae5ae453ac0101d52f4a634dc4462473287af41306f0c04bf9ea9ce5cbd838e953a338194621af66e641d7a3e13b4de42b8ff60bb4b409647fcee7af779b8e0e706a6309448e2177db68869f7c3d6e9491af16b032f6e21908912b86a059ba3785873a028d93729b27aa0cc835fb82ba7f4333dd1dae24afe7ce6c6c9d28515fb3bd3429415850a919fe204bfdc2172b46a0ffe0e42033b17f7dd5f1a6605ad3355f1250582e9bf81ccfcda537a684b4b9469d611d610f0ffa8812a65cd925953b47104cada29cba890b580498151143814ec40ad5467d5939cfcf917fd61e0ef24a3d1cd47fdf6ed4cf82e88e80a356a5604daff16f45ea91d7ce6ef6a8e5f34e7e1b30e66d9ab1ad95ea5e020585b60658ece5140035948f217fee7946eabca1fbf854b48fb552bd03687b689a7def1286f9bcce5d43d5f6e4bad33b60ef4acb5cb25dab6c970e578f53924ad22125a91a9711ee6471989b5c3408825657e9be4beaea526c2f4e64c9476c7e2bc284bc242e10b8b5917648ea4ff6e415d173857b54611192c3ac63ce4cb6ccec0d74378810757cab62b8f1600ec5554cad1a4b4fed86bd02453c3f5e8d55a0142b58bf9c85ca2a17977cea363893d8f467aa98710345ed40d49b07b0573dc6d062d1a9ce4a0f9ca6280c514376bc3f340270eb063055e81c84d97277c6e6d20840310e4c3fd5408e9446bab31d7a8beeb134506f1f98abc0d40fb2d19a0d600bdb5633acc6c17f4ab317136472c6fbe35446f48205836300fb61ca67811499a67364a636bd063084ac33407a0b71ef1c5e5511de3d05c34fc8b5c8c958be12eaa83cb52f97de94afcd0c693af7667fd45bdf709d6e3322e03990d30e99f84eb6d98054b25ef1db22b8292901bf1334b7052627e44d6442682c87c8108e213231fa0cf37b7709151af7436b5b6db4424afa7dee9a815503ae133e11780f8b02c3d13ec96200208d9f1b5dcd6ad52dbf5a5ba0dfe99f035dacb2cf26f6fe6e9f6baee6eddc4e20e401f0bc59741cf4562830169eede79b57ed5f31fa718f747e565f4921dae714762bddf44748797d573cdb758010ac97f3dc76b1167858551110936a8afdc02cf9aac0de97c587f6d6859106ad43e974740bf53c126b791adc0d36d585c88cdac9e06a35319a0900faa7b565aee35381861fe370f2c35289f2926303b55f7e3e65192a5a9d87285f56f8edf6bad0507e4c2f517aa25389097bf59a62386d8282336884c8c242ed134f39637b7c5d0703818075653c818d17bdb29627bd21a11bc1964e137c82e3b992217cb559a5c91265bc195ec2cefdb8967370a38875bc7fb97536be9a457091d15aad8f8ab44c528cbced802714c7435971ef07d50e0a57c8ff22fba976fde27470df2462324d5fb3b7ae648a962ad9d063ac679eaf536436ca9640a1f946e4b12b609a991f61a426cb580d42d4ae199172858b0215ead6af9b5960e74f0c314988bb3beb8e33ad7dde45c88eeef35ed739674ac4e753762a9c08567f9917a84eee8e11ebb61e74f75eb9ecad0880eb093ae8b3b1eeb894001a66ae34103dde78b3d6b362c4e829ff3918dd3c3794885b325f11938191dfc8ff3674ef251a74fcc04c9ee43df0f5833eca4f20436776c9c29e09b2296347983db3c5df38036c241c07a805fa27745b8a4c06dcd53106a43a6e31e4e1845dc232c88289ca257d8cf252f130f6a8df6ff31609bd244dcf48aadb0231d9b6177534e60681d637fbfa6e9806fc22624ccfe586eb0c27a820247e7dd2afd94b627abafb09bfe85a7d24cad18b022ff4570259f8a7c8b17449a8826a39fc993fef433219257827f25d73ed236574a1293873525a8057e5bdabacf87f991829af27af6e9a9f4c9be35987075ff628bc82ab5389de02c7ff0d95feae27affcc2da94a0c54301351685d817e4b078c45e76bc7086cb7d168c755eef0c2e51b122f1e1c4c007a0a2b43e7b1dec38fc657cf605dbce2b58d0683ff68223a5c2577118cad5fd640be93954522e7f384cfd05bae9578baeb68931c2060e971fbd0784289c8d75e4e99e052497ff82212902456fc08d23ad6ad612c3a17327549b6eb378ec37e4cbd85c9a379cf8ac26576f48ed37a7faaa12880eede5ae808655289d3e23d30df8f36dffe13a419123c78868fba12e8409cdc8bd90f0f0956e69f0beafbdcc390892fd495355945611e4ee38fbccac20c2403a3f6b5bdf52e508637f08e237965df3f745d8321c8c2cd1db658952ef4dc315356765b3bd236eee957c10b975f9ca800c1ee3beb16f38c0bf5e66f16ff8d295d5d330174a9d7fb28ebf252647d9e7b2cc22cdbee7aa4809efe4d07fc01a98969f961305a475370de3b8f320a1e414aae1f8008ed50035818875f610199fda01046a145d8d0722ea2bb5a9cb03be29d2d6c7003ab9d55a8281efae17d5a6531111229d7fca5e93b4aaa41528bfc3989c8fe097b071bfb648c95fa90c1b0233fc2bb411016f96b5d870c28075655bc0794a9b7b11f1a6388c4f501189be2f04d5d8aef68564bfd318b90cc6bde3e7069397fe2b2de34386af60a99e0fb0e242b5b74b189c007f5853ce9450710182275416622b55ba7759e12ad5bbc8c7be816a2b9f65fcb08a5eccab16c7f41dea57830d9fe48a8e9eae611e99d313137e91934180688c412b993559ff4daa33891e4abdd830a3f47e02e463b7f7a888925a3fa889ce6ab7574350338f1c7fde5aa9d52282ef9a0d046b6fba666446aa8ff6eca9ef8e0f2d0cb03254531a96d55ca10f278a323c324d8ff748a2622a41cf3b306f4c25ff46e8270bb583d172e7dd56f5d55f9dbb6c034b0931a0b9f0e6eb1c78f4cfe719e417721dc9e21a8f098f0e1d2570063f7097d3a2de2bbbe801141249ab0c9189b91163300067ecaf0f930892eafd36f61785d8d55e28cd43d19151ecb65baf9e4547def562e985c5e47cca9f5ffed8013826c6b79cabdbf86bab94bf630457d9e640cc828e58f99ec6c0b1ef5a1cc9b79dd451d73596c7f68817a82030ae80d52ffcf8af2fbe57af5c1c019edc94d5fcd26300877e45bbe9daf5c9588a19340ff6e98666537c9a2f3ed696417570cbdae6d4291ec5bce1fbcda17fef4c98469cbd7bf300ebcb2fda40751ff2fb8dae4f7e65cd7f80cb547a9fb7f276e267918cc9b2000eb66dc8b9f4398207633d0b0da98ee216f085f3918d7063f69be8554220a3013eb224d15be50b85fe61054ecc2a29a8fa83bff2241ed390027749dd9346a3720f5887e6bf962af6e910bb374b5f0393e52fbe8fb24562b429c5887d0144ab4a737973418d077a2dd1dd4e1c115e0b80a8451be5a0d81878f65360f037a7ee0f378a2d2141542c24df4ade1649702edd0be29fe2b7bddba68a9e50923e6760fd1ae3fc54abed9ebb402e5bcc6418b69c6958bdce08819ed1b8d9e530e67c3ab6df1bcec6bd7bf249dfbaa57eee8750caa13c1f3561edc030b1e0eb7d7c6545a0d4359da10fd625248d7f2122c53b5bed01aabeee3348d20861735409ff7b17ab276ede7587f3be02a05f130b960acc9663c6ae06414c4e792a812197b254ecef15961d05d1fc274596797b7262469c02cb95167b7bebebe83fedff147bd8ea5c0d5d9e56d780bfe2c79cb9761fd0c6aacaa1caa2388ed16b662536ba7e33861f59790121679fac6899795333d9049fb47c242374386813e322a1b467f038c0194a8a6f9aef2fe6359e66699070df7b90dd63360522557675dfebdc67df5ae36eed73cf3ee25ac67e9177d556a9b430364b33a140364d3f7b619bcdfa11abf7ac0f42de83a2854c3e21b7a1f6691d32f2537ae7c7326900a1acd4128f652f43e3590a35ae0c329fbf9aceba931b50b72ce67b0d8429178e45553bfff642c2240b0ccff25e3a5f5a60e4f65950ec527b9f197d2ab8407dbd068cc98323027f8132f9d060cd4527d29ffeab4d0c8e968e0ba4c28818d3737c16822eb0183fde39acee96c4f0bbf0fbdee3bd8c4e82e1a659dcc8a218f68f8336c52f3e364fc1e0d551286a74967200d8ce932034640d159d1fef6c92aed80392f481de95648c15ce6690f58f5943fe125437e0808219e1caad0a7c93b9c2cff8ace8440cd724517af96559e5ab5d5c5f869b1327c6e2fed89e9c038184550ef03419f4d6ab550ea3bfce852e57a06b1148afb7df481d3c9ff11b388f5bcafe328192a7e99e571c7a8c70ac392b6e8defec8afa5bff93fc5fc5e8eced5be7e91a4dfb60e90a7c4dc200d2cfb961c7d2ce63b0f8641ef96e8d53ca8e0aefd931134ada274fcd27195abae833d82432c79cc1324861aa634a326f0915d2bb05689480ea18b961c4475231327387fef8980985b34185439bcb3b479d74f8499df96d5247c78bb9aa8ccdc8ab3e2a1cb4923395e83ac4311c58449c0f3ebbb0e4eb3b59e02ad29940ec3b332ce53e9ed62d9a1c700430dbf08ee1637d1c616b353c2df0534c6c596c65ef184b61542469a58785665e53ed9ddf1c1cb40792647cb8b274cd55915b4cf258419fbd6b1120bda879874dddeb3b197ad7d332cd966b939db2fd07b8181836872a50a617bf31f09ca8fb2328c919f7f9edb285de8e91d45dcbc8e2c9b6e2f2d9c39527df3822567a9213421aad3ab29905b22305f69133446a31ab1a1016a56dd0324e30903c0752caecc0905d00297cd5a2bf663134e46460d3b1bd90fe46933c94a722054ab4f3533b7d340a28e12ddd4ec6acaf7d3ded3585a994477796c80b39fbbf57940eee53aba8b3ee3539964ae3637ea7c9bb2efd191b3d43c24f4224fcdc73d39384e9d6a6fcb979175c910dcb35b8b20aecbfc8cc88341f159d6d78287dc85267142feb7c91df4dffb642a7ca5467d3a7a07aa6b39cae25ce7330348728ae0475458745a4f1b99e70ea1237ae325c4324c3a22a482ca25a0109701bcd529c01848df7c5a38d99d1f9d2d391a6f45fea7f2aad84fcf80a4d1a94e15f37a8212bdae16ae8dee0a9acb5bb8165c716ac2447129a8486f9ed7fabee62578ae07ab661b27bf42200f3374cb6a67908c199fb9e7e98f572d66ef7697aa5fd71dbdac4cf14d0ff6b3fb1419d4e0c8c29820309ee6502fec41477a047faf200acf82864824ba1ae3df9c89da604fa828944eb8888a749b88aeb75daf78ff48e7ebb97b17f568c51458ac5908df4ae5b4acf87893c2805c3f", 0x1000) 09:58:46 executing program 5: unshare(0x600) unshare(0x4020100) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x0, @multicast2, 0x4e20, 0x3, 'sh\x00', 0x10, 0x3, 0x14}, 0x2c) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) [ 2750.285802][T23761] FAULT_INJECTION: forcing a failure. [ 2750.285802][T23761] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2750.291218][T23762] FAULT_INJECTION: forcing a failure. [ 2750.291218][T23762] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2750.299131][T23761] CPU: 1 PID: 23761 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2750.322412][T23761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2750.332443][T23761] Call Trace: [ 2750.335713][T23761] dump_stack+0x18e/0x1d5 [ 2750.340022][T23761] should_fail+0x604/0x770 [ 2750.344416][T23761] __alloc_pages_nodemask+0x12a/0x6f0 [ 2750.349765][T23761] pte_alloc_one+0x1b/0xb0 [ 2750.354160][T23761] __pte_alloc+0x1d/0x1c0 [ 2750.358470][T23761] copy_pte_range+0xf2c/0x1610 [ 2750.363213][T23761] copy_page_range+0x7b0/0xb00 [ 2750.367954][T23761] dup_mmap+0x829/0xb60 [ 2750.372089][T23761] dup_mm+0x8c/0x300 [ 2750.375962][T23761] copy_mm+0xe8/0x180 [ 2750.379920][T23761] copy_process+0x1048/0x3220 [ 2750.384577][T23761] ? proc_fail_nth_write+0x157/0x1c0 [ 2750.389844][T23761] _do_fork+0x142/0x730 [ 2750.393980][T23761] __x64_sys_clone+0x213/0x260 [ 2750.398722][T23761] do_syscall_64+0xcb/0x1c0 [ 2750.403205][T23761] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2750.409073][T23761] RIP: 0033:0x7fd3d983a0e9 [ 2750.413463][T23761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2750.433039][T23761] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2750.441426][T23761] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2750.449377][T23761] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2750.457323][T23761] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2750.465269][T23761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2750.473216][T23761] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2750.481170][T23762] CPU: 0 PID: 23762 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2750.491393][T23762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2750.501439][T23762] Call Trace: [ 2750.504720][T23762] dump_stack+0x18e/0x1d5 [ 2750.509036][T23762] should_fail+0x604/0x770 [ 2750.513438][T23762] __alloc_pages_nodemask+0x12a/0x6f0 [ 2750.518794][T23762] pte_alloc_one+0x1b/0xb0 [ 2750.523192][T23762] __pte_alloc+0x1d/0x1c0 [ 2750.527510][T23762] copy_pte_range+0xf2c/0x1610 [ 2750.532263][T23762] copy_page_range+0x7b0/0xb00 09:58:46 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) 09:58:46 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000001c0)={0x7, 0xfffffffffffffffc}, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000000000000000533200"/104], 0x68) unshare(0x10280) 09:58:46 executing program 5: unshare(0x600) unshare(0x4020100) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) [ 2750.537012][T23762] dup_mmap+0x829/0xb60 [ 2750.541153][T23762] dup_mm+0x8c/0x300 [ 2750.545031][T23762] copy_mm+0xe8/0x180 [ 2750.549002][T23762] copy_process+0x1048/0x3220 [ 2750.553667][T23762] ? proc_fail_nth_write+0x157/0x1c0 [ 2750.558938][T23762] _do_fork+0x142/0x730 [ 2750.563080][T23762] __x64_sys_clone+0x213/0x260 [ 2750.567834][T23762] do_syscall_64+0xcb/0x1c0 [ 2750.572329][T23762] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2750.578212][T23762] RIP: 0033:0x7f3d26b7c0e9 [ 2750.578223][T23762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2750.578228][T23762] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2750.578237][T23762] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2750.578242][T23762] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2750.578247][T23762] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2750.578253][T23762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2750.578258][T23762] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2750.672812][T23770] FAULT_INJECTION: forcing a failure. [ 2750.672812][T23770] name failslab, interval 1, probability 0, space 0, times 0 [ 2750.685459][T23770] CPU: 1 PID: 23770 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2750.695673][T23770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2750.705709][T23770] Call Trace: [ 2750.708988][T23770] dump_stack+0x18e/0x1d5 [ 2750.713312][T23770] should_fail+0x604/0x770 [ 2750.717712][T23770] ? dup_mmap+0x46c/0xb60 [ 2750.722025][T23770] should_failslab+0x5/0x20 [ 2750.726516][T23770] kmem_cache_alloc+0x24/0x210 [ 2750.731265][T23770] dup_mmap+0x46c/0xb60 [ 2750.735414][T23770] dup_mm+0x8c/0x300 [ 2750.739298][T23770] copy_mm+0xe8/0x180 [ 2750.743270][T23770] copy_process+0x1048/0x3220 [ 2750.747925][T23770] ? proc_fail_nth_write+0x157/0x1c0 [ 2750.753180][T23770] _do_fork+0x142/0x730 [ 2750.757303][T23770] __x64_sys_clone+0x213/0x260 [ 2750.762037][T23770] do_syscall_64+0xcb/0x1c0 [ 2750.766530][T23770] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2750.772405][T23770] RIP: 0033:0x7fd3d983a0e9 [ 2750.776788][T23770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2750.796357][T23770] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2750.804732][T23770] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2750.812668][T23770] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2750.820621][T23770] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2750.828561][T23770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2750.836500][T23770] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f0000000000)={0x1, 0x1, 0x1, 0x8, 0x0, 0x1000, 0x9, 0x0, 0x9, 0x64e0, 0x9, 0xffffffff, 0xee1e, 0x3143}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, r3, {0xff}}, 0x18) 09:58:47 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0x5, 0x0, [{}, {}, {}, {}, {}]}) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) 09:58:47 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000001c0)={0x7, 0xfffffffffffffffc}, 0x0, 0x0, 0x0) (async) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000000000000000533200"/104], 0x68) (async) unshare(0x10280) 09:58:47 executing program 5: unshare(0x600) unshare(0x4020100) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:47 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 09:58:47 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 09:58:47 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0x5, 0x0, [{}, {}, {}, {}, {}]}) (async) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) 09:58:47 executing program 5: unshare(0x600) unshare(0x4020100) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:47 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000001c0)={0x7, 0xfffffffffffffffc}, 0x0, 0x0, 0x0) (async) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004000000000000000000533200"/104], 0x68) (async) unshare(0x10280) 09:58:47 executing program 5: unshare(0x600) unshare(0x4020100) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:47 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0x5, 0x0, [{}, {}, {}, {}, {}]}) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) 09:58:47 executing program 5: unshare(0x600) unshare(0x4020100) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) [ 2751.113979][T23808] FAULT_INJECTION: forcing a failure. [ 2751.113979][T23808] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2751.127238][T23808] CPU: 0 PID: 23808 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2751.127356][T23809] FAULT_INJECTION: forcing a failure. [ 2751.127356][T23809] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2751.137453][T23808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2751.137456][T23808] Call Trace: [ 2751.137474][T23808] dump_stack+0x18e/0x1d5 [ 2751.137486][T23808] should_fail+0x604/0x770 [ 2751.137496][T23808] __alloc_pages_nodemask+0x12a/0x6f0 [ 2751.137507][T23808] pte_alloc_one+0x1b/0xb0 [ 2751.137516][T23808] __pte_alloc+0x1d/0x1c0 [ 2751.137526][T23808] copy_pte_range+0xf2c/0x1610 [ 2751.137541][T23808] copy_page_range+0x7b0/0xb00 [ 2751.137554][T23808] dup_mmap+0x829/0xb60 [ 2751.137572][T23808] dup_mm+0x8c/0x300 [ 2751.204250][T23808] copy_mm+0xe8/0x180 [ 2751.208212][T23808] copy_process+0x1048/0x3220 [ 2751.212866][T23808] ? proc_fail_nth_write+0x157/0x1c0 [ 2751.218131][T23808] _do_fork+0x142/0x730 [ 2751.222268][T23808] __x64_sys_clone+0x213/0x260 [ 2751.227012][T23808] do_syscall_64+0xcb/0x1c0 [ 2751.231497][T23808] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2751.237365][T23808] RIP: 0033:0x7f3d26b7c0e9 [ 2751.241757][T23808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2751.261332][T23808] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2751.269717][T23808] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2751.277664][T23808] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2751.285611][T23808] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2751.293557][T23808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2751.301505][T23808] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2751.309460][T23809] CPU: 1 PID: 23809 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2751.319690][T23809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2751.329732][T23809] Call Trace: [ 2751.333013][T23809] dump_stack+0x18e/0x1d5 [ 2751.337332][T23809] should_fail+0x604/0x770 [ 2751.341735][T23809] __alloc_pages_nodemask+0x12a/0x6f0 [ 2751.347092][T23809] pte_alloc_one+0x1b/0xb0 [ 2751.351491][T23809] __pte_alloc+0x1d/0x1c0 [ 2751.355805][T23809] copy_pte_range+0xf2c/0x1610 [ 2751.360556][T23809] copy_page_range+0x7b0/0xb00 [ 2751.365305][T23809] dup_mmap+0x829/0xb60 [ 2751.369452][T23809] dup_mm+0x8c/0x300 [ 2751.373335][T23809] copy_mm+0xe8/0x180 [ 2751.377302][T23809] copy_process+0x1048/0x3220 [ 2751.381966][T23809] ? proc_fail_nth_write+0x157/0x1c0 [ 2751.387239][T23809] _do_fork+0x142/0x730 [ 2751.391381][T23809] __x64_sys_clone+0x213/0x260 [ 2751.396134][T23809] do_syscall_64+0xcb/0x1c0 [ 2751.400622][T23809] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2751.406502][T23809] RIP: 0033:0x7fd3d983a0e9 [ 2751.410884][T23809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2751.430452][T23809] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2751.438830][T23809] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2751.446767][T23809] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2751.454705][T23809] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2751.462645][T23809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2751.470595][T23809] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f0000000000)={0x1, 0x1, 0x1, 0x8, 0x0, 0x1000, 0x9, 0x0, 0x9, 0x64e0, 0x9, 0xffffffff, 0xee1e, 0x3143}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, r3, {0xff}}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) ioctl$HIDIOCGFIELDINFO(0xffffffffffffffff, 0xc038480a, &(0x7f0000000000)={0x1, 0x1, 0x1, 0x8, 0x0, 0x1000, 0x9, 0x0, 0x9, 0x64e0, 0x9, 0xffffffff, 0xee1e, 0x3143}) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r2, 0x0, 0x0) (async) read$FUSE(r1, &(0x7f00000021c0)={0x2020}, 0x2020) (async) write$FUSE_BMAP(r2, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, r3, {0xff}}, 0x18) (async) 09:58:48 executing program 5: unshare(0x600) unshare(0x4020100) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:48 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f00000001c0)={0x9, 0x0, 0x4000000}, 0x0, 0x0, 0x0) ioprio_set$pid(0x1, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2]}, &(0x7f0000000040), 0x8) 09:58:48 executing program 2: unshare(0x600) pselect6(0x24, &(0x7f0000000180)={0x301, 0x0, 0x0, 0x0, 0xcfb, 0x0, 0x2, 0x80000000}, 0x0, 0x0, 0x0, 0x0) 09:58:48 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 09:58:48 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 09:58:48 executing program 2: unshare(0x600) (async) pselect6(0x24, &(0x7f0000000180)={0x301, 0x0, 0x0, 0x0, 0xcfb, 0x0, 0x2, 0x80000000}, 0x0, 0x0, 0x0, 0x0) 09:58:48 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:48 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f00000001c0)={0x9, 0x0, 0x4000000}, 0x0, 0x0, 0x0) (async) ioprio_set$pid(0x1, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2]}, &(0x7f0000000040), 0x8) 09:58:48 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:48 executing program 2: unshare(0x600) (async) pselect6(0x24, &(0x7f0000000180)={0x301, 0x0, 0x0, 0x0, 0xcfb, 0x0, 0x2, 0x80000000}, 0x0, 0x0, 0x0, 0x0) 09:58:48 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f00000001c0)={0x9, 0x0, 0x4000000}, 0x0, 0x0, 0x0) ioprio_set$pid(0x1, 0x0, 0x0) (async) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x2]}, &(0x7f0000000040), 0x8) 09:58:48 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:48 executing program 2: unshare(0x600) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)=0x7) unshare(0x280) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:58:48 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x10001) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'wg2\x00'}, 0x18) 09:58:48 executing program 2: unshare(0x600) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)=0x7) unshare(0x280) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)=0x7) (async) unshare(0x280) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) [ 2751.984562][T23858] FAULT_INJECTION: forcing a failure. [ 2751.984562][T23858] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2752.014725][T23858] CPU: 0 PID: 23858 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2752.024973][T23858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2752.035019][T23858] Call Trace: [ 2752.038308][T23858] dump_stack+0x18e/0x1d5 [ 2752.042638][T23858] should_fail+0x604/0x770 [ 2752.047047][T23858] __alloc_pages_nodemask+0x12a/0x6f0 [ 2752.052422][T23858] pte_alloc_one+0x1b/0xb0 [ 2752.056828][T23858] __pte_alloc+0x1d/0x1c0 [ 2752.061147][T23858] copy_pte_range+0xf2c/0x1610 [ 2752.065910][T23858] copy_page_range+0x7b0/0xb00 [ 2752.070666][T23858] dup_mmap+0x829/0xb60 [ 2752.071588][T23859] FAULT_INJECTION: forcing a failure. [ 2752.071588][T23859] name failslab, interval 1, probability 0, space 0, times 0 [ 2752.074812][T23858] dup_mm+0x8c/0x300 [ 2752.074827][T23858] copy_mm+0xe8/0x180 [ 2752.095208][T23858] copy_process+0x1048/0x3220 [ 2752.099870][T23858] ? proc_fail_nth_write+0x157/0x1c0 [ 2752.105131][T23858] _do_fork+0x142/0x730 [ 2752.109266][T23858] __x64_sys_clone+0x213/0x260 [ 2752.114008][T23858] do_syscall_64+0xcb/0x1c0 [ 2752.118519][T23858] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2752.124385][T23858] RIP: 0033:0x7f3d26b7c0e9 [ 2752.128775][T23858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2752.148354][T23858] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2752.156746][T23858] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2752.164691][T23858] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2752.172638][T23858] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2752.180582][T23858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2752.188526][T23858] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2752.196481][T23859] CPU: 1 PID: 23859 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2752.206711][T23859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2752.216751][T23859] Call Trace: [ 2752.220035][T23859] dump_stack+0x18e/0x1d5 [ 2752.224354][T23859] should_fail+0x604/0x770 [ 2752.228759][T23859] ? dup_mmap+0x46c/0xb60 [ 2752.233071][T23859] should_failslab+0x5/0x20 [ 2752.237561][T23859] kmem_cache_alloc+0x24/0x210 [ 2752.242307][T23859] dup_mmap+0x46c/0xb60 [ 2752.246453][T23859] dup_mm+0x8c/0x300 [ 2752.250331][T23859] copy_mm+0xe8/0x180 [ 2752.254299][T23859] copy_process+0x1048/0x3220 [ 2752.258964][T23859] ? proc_fail_nth_write+0x157/0x1c0 [ 2752.264242][T23859] _do_fork+0x142/0x730 [ 2752.268387][T23859] __x64_sys_clone+0x213/0x260 [ 2752.273139][T23859] do_syscall_64+0xcb/0x1c0 [ 2752.277627][T23859] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2752.283506][T23859] RIP: 0033:0x7fd3d983a0e9 [ 2752.287909][T23859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2752.307504][T23859] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2752.315901][T23859] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2752.323856][T23859] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 09:58:48 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) [ 2752.331811][T23859] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2752.339771][T23859] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2752.347726][T23859] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2752.374959][T23862] FAULT_INJECTION: forcing a failure. [ 2752.374959][T23862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2752.388560][T23862] CPU: 0 PID: 23862 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2752.398789][T23862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2752.408835][T23862] Call Trace: [ 2752.412121][T23862] dump_stack+0x18e/0x1d5 [ 2752.416440][T23862] should_fail+0x604/0x770 [ 2752.420847][T23862] __alloc_pages_nodemask+0x12a/0x6f0 [ 2752.426206][T23862] pte_alloc_one+0x1b/0xb0 [ 2752.430606][T23862] __pte_alloc+0x1d/0x1c0 09:58:48 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) 09:58:48 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x5, 0x10001) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'wg2\x00'}, 0x18) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) socket$inet(0x2, 0x5, 0x10001) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'wg2\x00'}, 0x18) (async) 09:58:48 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:48 executing program 2: unshare(0x600) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)=0x7) unshare(0x280) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000000)=0x7) (async) unshare(0x280) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:58:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x111001, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) bind$inet(r2, 0x0, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r4, &(0x7f0000000100)={0xfffffed0, 0xffffffffffffffda, r5}, 0x10) write$FUSE_DIRENT(r2, &(0x7f0000000000)={0x50, 0x0, r1, [{0x1, 0x8, 0x1, 0x80000001, '^'}, {0x0, 0x0, 0x3, 0x20, '(,['}]}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) 09:58:48 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) r0 = socket$inet(0x2, 0x5, 0x10001) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'wg2\x00'}, 0x18) [ 2752.434925][T23862] copy_pte_range+0xf2c/0x1610 [ 2752.439680][T23862] copy_page_range+0x7b0/0xb00 [ 2752.444436][T23862] dup_mmap+0x829/0xb60 [ 2752.448586][T23862] dup_mm+0x8c/0x300 [ 2752.452473][T23862] copy_mm+0xe8/0x180 [ 2752.456451][T23862] copy_process+0x1048/0x3220 [ 2752.461127][T23862] ? proc_fail_nth_write+0x157/0x1c0 09:58:48 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) 09:58:48 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'syztnl2\x00', r0, 0x2f, 0x1f, 0x40, 0x8, 0x9, @dev={0xfe, 0x80, '\x00', 0x18}, @loopback, 0x8000, 0x1, 0x0, 0x8000}}) unshare(0x600) unshare(0x40000) pselect6(0x40, &(0x7f0000000180)={0xffffffffea38a13c, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0) 09:58:48 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) [ 2752.461140][T23862] _do_fork+0x142/0x730 [ 2752.461152][T23862] __x64_sys_clone+0x213/0x260 [ 2752.461165][T23862] do_syscall_64+0xcb/0x1c0 [ 2752.461176][T23862] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2752.461184][T23862] RIP: 0033:0x7f3d26b7c0e9 09:58:48 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'syztnl2\x00', r0, 0x2f, 0x1f, 0x40, 0x8, 0x9, @dev={0xfe, 0x80, '\x00', 0x18}, @loopback, 0x8000, 0x1, 0x0, 0x8000}}) unshare(0x600) (async) unshare(0x40000) pselect6(0x40, &(0x7f0000000180)={0xffffffffea38a13c, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0) [ 2752.461194][T23862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2752.461199][T23862] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 09:58:48 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) (async) 09:58:48 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) [ 2752.461208][T23862] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2752.461213][T23862] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2752.461218][T23862] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2752.461223][T23862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2752.461229][T23862] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2752.648353][T23902] FAULT_INJECTION: forcing a failure. [ 2752.648353][T23902] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2752.664406][T23902] CPU: 0 PID: 23902 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2752.674640][T23902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2752.684687][T23902] Call Trace: [ 2752.687970][T23902] dump_stack+0x18e/0x1d5 [ 2752.692301][T23902] should_fail+0x604/0x770 [ 2752.696712][T23902] __alloc_pages_nodemask+0x12a/0x6f0 [ 2752.702086][T23902] ? preempt_schedule+0x84/0x90 [ 2752.706935][T23902] pte_alloc_one+0x1b/0xb0 [ 2752.711346][T23902] __pte_alloc+0x1d/0x1c0 [ 2752.715669][T23902] copy_pte_range+0xf2c/0x1610 [ 2752.720421][T23902] copy_page_range+0x7b0/0xb00 [ 2752.725173][T23902] dup_mmap+0x829/0xb60 [ 2752.729325][T23902] dup_mm+0x8c/0x300 [ 2752.733209][T23902] copy_mm+0xe8/0x180 [ 2752.737182][T23902] copy_process+0x1048/0x3220 [ 2752.738390][T23901] FAULT_INJECTION: forcing a failure. [ 2752.738390][T23901] name failslab, interval 1, probability 0, space 0, times 0 [ 2752.741851][T23902] ? proc_fail_nth_write+0x157/0x1c0 [ 2752.741867][T23902] _do_fork+0x142/0x730 [ 2752.763819][T23902] __x64_sys_clone+0x213/0x260 [ 2752.768562][T23902] do_syscall_64+0xcb/0x1c0 [ 2752.773042][T23902] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2752.778908][T23902] RIP: 0033:0x7fd3d983a0e9 [ 2752.783299][T23902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2752.802872][T23902] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2752.811257][T23902] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2752.819204][T23902] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2752.827150][T23902] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2752.835098][T23902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2752.843042][T23902] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2752.850998][T23901] CPU: 1 PID: 23901 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2752.861219][T23901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2752.871261][T23901] Call Trace: [ 2752.874544][T23901] dump_stack+0x18e/0x1d5 [ 2752.878860][T23901] should_fail+0x604/0x770 [ 2752.883262][T23901] ? dup_mmap+0x46c/0xb60 [ 2752.887583][T23901] should_failslab+0x5/0x20 [ 2752.892068][T23901] kmem_cache_alloc+0x24/0x210 [ 2752.896811][T23901] dup_mmap+0x46c/0xb60 [ 2752.900953][T23901] dup_mm+0x8c/0x300 [ 2752.904832][T23901] copy_mm+0xe8/0x180 [ 2752.908800][T23901] copy_process+0x1048/0x3220 [ 2752.913461][T23901] ? proc_fail_nth_write+0x157/0x1c0 [ 2752.918737][T23901] _do_fork+0x142/0x730 [ 2752.922883][T23901] __x64_sys_clone+0x213/0x260 [ 2752.927636][T23901] do_syscall_64+0xcb/0x1c0 [ 2752.932127][T23901] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2752.937992][T23901] RIP: 0033:0x7f3d26b7c0e9 [ 2752.942377][T23901] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2752.962066][T23901] RSP: 002b:00007f3d25cf2118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2752.970446][T23901] RAX: ffffffffffffffda RBX: 00007f3d26c8ef60 RCX: 00007f3d26b7c0e9 [ 2752.978390][T23901] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 09:58:49 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) 09:58:49 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000400)={'ip6_vti0\x00', &(0x7f0000000380)={'syztnl2\x00', r0, 0x2f, 0x1f, 0x40, 0x8, 0x9, @dev={0xfe, 0x80, '\x00', 0x18}, @loopback, 0x8000, 0x1, 0x0, 0x8000}}) unshare(0x600) (async) unshare(0x40000) (async) pselect6(0x40, &(0x7f0000000180)={0xffffffffea38a13c, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0, 0x0) 09:58:49 executing program 4: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:58:49 executing program 5: unshare(0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) [ 2752.986340][T23901] RBP: 00007f3d25cf21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2752.994286][T23901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2753.002246][T23901] R13: 00007ffff14b1b8f R14: 00007f3d25cf2300 R15: 0000000000022000 [ 2753.122956][T23913] FAULT_INJECTION: forcing a failure. [ 2753.122956][T23913] name failslab, interval 1, probability 0, space 0, times 0 [ 2753.135587][T23913] CPU: 1 PID: 23913 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2753.145792][T23913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2753.155821][T23913] Call Trace: [ 2753.159083][T23913] dump_stack+0x18e/0x1d5 [ 2753.163407][T23913] should_fail+0x604/0x770 [ 2753.167802][T23913] ? dup_mmap+0x46c/0xb60 [ 2753.172104][T23913] should_failslab+0x5/0x20 [ 2753.176675][T23913] kmem_cache_alloc+0x24/0x210 [ 2753.181416][T23913] dup_mmap+0x46c/0xb60 [ 2753.185569][T23913] dup_mm+0x8c/0x300 [ 2753.189457][T23913] copy_mm+0xe8/0x180 [ 2753.193430][T23913] copy_process+0x1048/0x3220 [ 2753.198086][T23913] ? proc_fail_nth_write+0x157/0x1c0 [ 2753.203348][T23913] _do_fork+0x142/0x730 [ 2753.207497][T23913] __x64_sys_clone+0x213/0x260 [ 2753.212238][T23913] do_syscall_64+0xcb/0x1c0 [ 2753.216722][T23913] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2753.222586][T23913] RIP: 0033:0x7fd3d983a0e9 [ 2753.226973][T23913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2753.246557][T23913] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2753.254946][T23913] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2753.262895][T23913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 09:58:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x111001, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) (async) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) bind$inet(r2, 0x0, 0x0) (async) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r4, 0x0, 0x0) (async) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r4, &(0x7f0000000100)={0xfffffed0, 0xffffffffffffffda, r5}, 0x10) (async) write$FUSE_DIRENT(r2, &(0x7f0000000000)={0x50, 0x0, r1, [{0x1, 0x8, 0x1, 0x80000001, '^'}, {0x0, 0x0, 0x3, 0x20, '(,['}]}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) 09:58:49 executing program 4: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:58:49 executing program 2: setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000000)={0x2, {{0x2, 0x4e21, @broadcast}}}, 0x88) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 09:58:49 executing program 5: unshare(0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:49 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 09:58:49 executing program 4: pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:58:49 executing program 2: setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000000)={0x2, {{0x2, 0x4e21, @broadcast}}}, 0x88) (async) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 09:58:49 executing program 5: unshare(0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) [ 2753.270836][T23913] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2753.278775][T23913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2753.286726][T23913] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:49 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 09:58:49 executing program 2: setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000000)={0x2, {{0x2, 0x4e21, @broadcast}}}, 0x88) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000000)={0x2, {{0x2, 0x4e21, @broadcast}}}, 0x88) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) (async) 09:58:49 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x3, 0x80000000}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x2, 0x80000001}, 0x0, 0x0, 0x0) 09:58:49 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) [ 2753.435760][T23941] FAULT_INJECTION: forcing a failure. [ 2753.435760][T23941] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2753.449268][T23941] CPU: 1 PID: 23941 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2753.459495][T23941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2753.469542][T23941] Call Trace: [ 2753.472829][T23941] dump_stack+0x18e/0x1d5 [ 2753.477148][T23941] should_fail+0x604/0x770 [ 2753.481555][T23941] __alloc_pages_nodemask+0x12a/0x6f0 [ 2753.486919][T23941] pte_alloc_one+0x1b/0xb0 [ 2753.491315][T23941] __pte_alloc+0x1d/0x1c0 [ 2753.495629][T23941] copy_pte_range+0xf2c/0x1610 [ 2753.500381][T23941] copy_page_range+0x7b0/0xb00 [ 2753.505132][T23941] dup_mmap+0x829/0xb60 [ 2753.509276][T23941] dup_mm+0x8c/0x300 [ 2753.513156][T23941] copy_mm+0xe8/0x180 [ 2753.516557][T23943] FAULT_INJECTION: forcing a failure. [ 2753.516557][T23943] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2753.517126][T23941] copy_process+0x1048/0x3220 [ 2753.517143][T23941] ? proc_fail_nth_write+0x157/0x1c0 [ 2753.540250][T23941] _do_fork+0x142/0x730 [ 2753.544390][T23941] __x64_sys_clone+0x213/0x260 [ 2753.549133][T23941] do_syscall_64+0xcb/0x1c0 [ 2753.553616][T23941] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2753.559497][T23941] RIP: 0033:0x7f3d26b7c0e9 [ 2753.563891][T23941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2753.583470][T23941] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2753.591857][T23941] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2753.599804][T23941] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2753.607768][T23941] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2753.615717][T23941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2753.623665][T23941] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2753.631620][T23943] CPU: 0 PID: 23943 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2753.641843][T23943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2753.651890][T23943] Call Trace: [ 2753.655176][T23943] dump_stack+0x18e/0x1d5 [ 2753.659501][T23943] should_fail+0x604/0x770 [ 2753.663914][T23943] __alloc_pages_nodemask+0x12a/0x6f0 [ 2753.669278][T23943] pte_alloc_one+0x1b/0xb0 [ 2753.673676][T23943] __pte_alloc+0x1d/0x1c0 [ 2753.677994][T23943] copy_pte_range+0xf2c/0x1610 [ 2753.682750][T23943] copy_page_range+0x7b0/0xb00 [ 2753.687499][T23943] dup_mmap+0x829/0xb60 [ 2753.691638][T23943] dup_mm+0x8c/0x300 [ 2753.695515][T23943] copy_mm+0xe8/0x180 [ 2753.699483][T23943] copy_process+0x1048/0x3220 [ 2753.704145][T23943] ? proc_fail_nth_write+0x157/0x1c0 [ 2753.709417][T23943] _do_fork+0x142/0x730 [ 2753.713561][T23943] __x64_sys_clone+0x213/0x260 [ 2753.718315][T23943] do_syscall_64+0xcb/0x1c0 [ 2753.722814][T23943] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2753.728692][T23943] RIP: 0033:0x7fd3d983a0e9 [ 2753.733092][T23943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2753.752674][T23943] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2753.761056][T23943] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2753.769017][T23943] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2753.776962][T23943] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2753.784911][T23943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2753.792864][T23943] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x111001, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) bind$inet(r2, 0x0, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r4, 0x0, 0x0) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r4, &(0x7f0000000100)={0xfffffed0, 0xffffffffffffffda, r5}, 0x10) write$FUSE_DIRENT(r2, &(0x7f0000000000)={0x50, 0x0, r1, [{0x1, 0x8, 0x1, 0x80000001, '^'}, {0x0, 0x0, 0x3, 0x20, '(,['}]}, 0x50) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x111001, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r3, 0x0, 0x0) (async) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) (async) bind$inet(r2, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r4, 0x0, 0x0) (async) read$FUSE(r2, &(0x7f00000021c0)={0x2020}, 0x2020) (async) write$FUSE_INTERRUPT(r4, &(0x7f0000000100)={0xfffffed0, 0xffffffffffffffda, r5}, 0x10) (async) write$FUSE_DIRENT(r2, &(0x7f0000000000)={0x50, 0x0, r1, [{0x1, 0x8, 0x1, 0x80000001, '^'}, {0x0, 0x0, 0x3, 0x20, '(,['}]}, 0x50) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) 09:58:50 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x3, 0x80000000}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x2, 0x80000001}, 0x0, 0x0, 0x0) 09:58:50 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:50 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0x7, 0x2, 0x3c8, 0x0, 0x110, 0x110, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@private, @dev, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'macsec0\x00', 'veth1_virt_wifi\x00', {}, {}, 0x2}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast1, @empty}}}, {{@arp={@rand_addr, @broadcast, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'wlan1\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}, {{@arp={@local, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_1\x00', 'syz_tun\x00'}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffff5}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x7}, 0x8) unshare(0x600) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r1) 09:58:50 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 09:58:50 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 09:58:50 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:50 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0x7, 0x2, 0x3c8, 0x0, 0x110, 0x110, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@private, @dev, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'macsec0\x00', 'veth1_virt_wifi\x00', {}, {}, 0x2}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast1, @empty}}}, {{@arp={@rand_addr, @broadcast, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'wlan1\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}, {{@arp={@local, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_1\x00', 'syz_tun\x00'}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffff5}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x7}, 0x8) unshare(0x600) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0x7, 0x2, 0x3c8, 0x0, 0x110, 0x110, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@private, @dev, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'macsec0\x00', 'veth1_virt_wifi\x00', {}, {}, 0x2}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast1, @empty}}}, {{@arp={@rand_addr, @broadcast, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'wlan1\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}, {{@arp={@local, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_1\x00', 'syz_tun\x00'}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) (async) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffff5}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x7}, 0x8) (async) unshare(0x600) (async) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0x0, 0x0, 0x0) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r1) (async) 09:58:50 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x3, 0x80000000}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x2, 0x80000001}, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x3, 0x80000000}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x4, 0xfffffffffffffffc, 0x0, 0x2, 0x80000001}, 0x0, 0x0, 0x0) (async) 09:58:50 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:50 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0x7, 0x2, 0x3c8, 0x0, 0x110, 0x110, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@private, @dev, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'macsec0\x00', 'veth1_virt_wifi\x00', {}, {}, 0x2}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote, @empty, @multicast1, @empty}}}, {{@arp={@rand_addr, @broadcast, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'wlan1\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}, {{@arp={@local, @dev, 0x0, 0x0, 0x0, 0x0, {@mac=@link_local}, {@mac=@multicast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'team_slave_1\x00', 'syz_tun\x00'}, 0xc0, 0xe8}, @unspec=@AUDIT={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) (async) write$FUSE_INTERRUPT(r1, &(0x7f0000000040)={0x10, 0xfffffffffffffff5}, 0x10) (async) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x7}, 0x8) unshare(0x600) ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0x0, 0x0, 0x0) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000000), r1) 09:58:50 executing program 4: unshare(0x600) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x2, 0x200, 0x8127}) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x26, &(0x7f00000000c0)="430732162104d5ee948fcaaca48671179be1f184e34981c31e870886329fb429420e1a0e16b6d591f14584d348752e2e515ddbe9d7953aa2bd786ed7ce82df506c64d3c2319aff865e2ee67d32f537eb66d5c3f22d4817366d1c0665db2281a042560a1474137f4ac4d816b54256627b4c778f3949ab6250ddfdb3568eac0d29aea3d9d74b6b8a3dcaf57f7ffb46585e6d70d5e8bcaca9410ce09413e5696f684e74371da1eededba27ec71cc93450d06cdd140c81e8412390489345c9", 0xbd) unshare(0x50000000) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000040)={0x2, 0x3, 0x10001}) r1 = syz_open_dev$hiddev(&(0x7f0000000200), 0x3, 0x8000) ioctl$HIDIOCSUSAGES(r1, 0x501c4814, &(0x7f0000000240)={{0x3, 0xffffffff, 0x48, 0x20, 0x80000000, 0xfffffffd}, 0x36, [0x8, 0x5, 0x9, 0x7fff, 0x3b29, 0x7fff, 0x8, 0xffffffff, 0x200, 0x2, 0x3, 0x96, 0x7fff, 0xfffff656, 0x80, 0x3f, 0xb6c, 0x1000, 0x0, 0xe794, 0x85a, 0x8, 0xed, 0x3, 0xff, 0x6, 0x259, 0x1bf, 0x84, 0x3f, 0x5, 0xd2e, 0x200, 0x1, 0x8, 0x8001, 0x2, 0x5, 0x81, 0x5, 0x51c0, 0x40, 0x0, 0x0, 0x5, 0x13aad74f, 0x40, 0xd4, 0x242, 0x400, 0x1f4d, 0xef90, 0xffff9e52, 0x6, 0x7ff, 0x9, 0x80000001, 0x7fff, 0x8001, 0x1, 0x7, 0x6, 0x0, 0x9c76, 0x0, 0x7, 0xffffffff, 0x81, 0x7fffffff, 0x2, 0x0, 0x6, 0x2, 0x5, 0x7d10, 0x8000, 0x200, 0x4, 0x800, 0xedf, 0xffff0001, 0x5, 0x8, 0xcb, 0x80000001, 0xfffffffc, 0xfff, 0x84, 0x6, 0x80, 0x48fb, 0x4, 0x7fffffff, 0x4, 0x193, 0x1, 0x5, 0x8, 0x1, 0x200, 0x4, 0x6, 0xfffffff7, 0x9, 0x5, 0x4, 0xfffe0, 0xd32, 0x9, 0x0, 0x7fff, 0xf042, 0x8, 0x80, 0xffffff01, 0x0, 0x0, 0x1, 0x3ff, 0x3, 0x8000, 0x3ff, 0xff, 0x7ff, 0x1533, 0x5, 0x35, 0xfffffffa, 0x7, 0x7, 0x9, 0x3, 0x8001, 0x200, 0x6, 0x2, 0x401, 0x10000, 0xffff, 0x5, 0x776a, 0x5, 0x5, 0x50e2f0a8, 0x7ff, 0x0, 0x6, 0x6869, 0xcb, 0x9, 0x5, 0x2, 0x5, 0x6, 0x91, 0x8, 0x2f66, 0x6, 0x3f, 0x5087, 0xfffffffc, 0x0, 0x3c82549a, 0x8, 0x3ff, 0x80000000, 0x9, 0x7, 0x9f, 0x4, 0x1, 0x54e, 0x756, 0x7fff, 0xffffffeb, 0x31, 0x80000000, 0x0, 0xcc89, 0x3ff, 0x5, 0x1000, 0x1c, 0xffffffb9, 0x1, 0x7ff, 0x800, 0x3, 0x8000, 0xf5, 0x9, 0x100, 0x200, 0x7f, 0xe6, 0x2, 0x1, 0x101, 0x3, 0x7, 0x80000000, 0x6, 0x3, 0x7f, 0x1000, 0xfffffffc, 0x6, 0x8533, 0x9, 0x200, 0x6, 0x81, 0xfffffff9, 0x2, 0x0, 0x8, 0x9, 0xffffffff, 0xffffffff, 0x9, 0xff, 0x5, 0x3, 0xfffffe05, 0xfffff000, 0x6, 0x80000001, 0xc07, 0xfff, 0x2, 0x3f, 0x10000, 0xffffffff, 0x9, 0x401, 0x4, 0x6, 0x75, 0xf4, 0x7, 0x6, 0x1, 0x0, 0x80000000, 0x80000000, 0x1, 0xfffffff7, 0x3, 0x7, 0x5, 0x4, 0xff, 0x3f, 0x10000, 0x7, 0x3, 0x1, 0x5, 0x8001, 0x2, 0x1ff, 0x5, 0x3, 0x2, 0x80, 0x100, 0x8, 0x7a62b86f, 0xffffffe0, 0x9371, 0x1, 0x0, 0x9, 0x5, 0x101, 0x49c, 0x401, 0x4, 0x562c, 0x1, 0xe94, 0x9483, 0x200, 0x82a2f60d, 0x7, 0x636, 0x69ce5b6f, 0x3e2, 0x9, 0x4, 0x6, 0x8, 0xcc3, 0x0, 0x6, 0x6, 0x8, 0x1ff, 0x0, 0xfffff222, 0x87a, 0x3f, 0x2, 0x1, 0xde68608, 0x3ff, 0x7, 0x5, 0x7, 0x5, 0x401, 0x7fffffff, 0x4aa, 0x5, 0x37d, 0x4, 0x8, 0x7ff, 0x1, 0x9, 0x4, 0x4, 0x4, 0x101, 0xffff, 0x0, 0x1, 0xfffffff9, 0x1, 0x3, 0x7, 0x800, 0x4, 0x1f, 0x5, 0x6, 0x1, 0x8001, 0x9, 0x3, 0x1f, 0x0, 0x8, 0x0, 0x4, 0xc785, 0xffffffff, 0x4, 0x4, 0x6, 0x0, 0x2, 0x0, 0x702, 0x8, 0x7f, 0x3, 0xbd4, 0x4, 0x80, 0x1, 0x6, 0x400, 0x800, 0x2, 0x3f, 0x0, 0xffff, 0x85cb0a4f, 0x8de7, 0x86, 0x202000, 0x4, 0xffffffd1, 0x0, 0x1f, 0x0, 0x7, 0x7, 0x5a7, 0x8, 0x4, 0x20, 0x44, 0x40, 0x8, 0xe20a, 0x6, 0x7fff, 0x7, 0x6, 0x5, 0x7fff, 0x6, 0x7fff, 0x2, 0x3, 0xba4, 0x93, 0x8001, 0x8, 0x8, 0xb1, 0x8, 0x2e0, 0x7ff, 0x0, 0x3, 0xfff, 0x3, 0x9, 0x2, 0x10000, 0xfffffffa, 0x57, 0x80000001, 0x1000, 0xffff8000, 0x9, 0x7fff, 0xffff, 0x5, 0x7dd, 0x3, 0x4db, 0x9, 0x1, 0x1, 0x7, 0x7c, 0x88000000, 0x401, 0x800, 0x87, 0xfffffff8, 0xb025, 0x1, 0x7, 0x3ff, 0x1000, 0x0, 0x7f, 0x8, 0x7fff, 0x8, 0x8, 0x5aed616, 0x4, 0x1, 0x8, 0x6, 0xfffffff9, 0xffffffff, 0x10000, 0x3ff, 0x3, 0x6, 0xca, 0x4, 0x12b1, 0xffffffff, 0x3, 0xfffffffe, 0xfdd6, 0x7fffffff, 0xe26, 0x0, 0x6, 0x0, 0x200, 0x1, 0x0, 0x5afd, 0x5, 0x9e7a, 0x80, 0x8000, 0xfff, 0x1386, 0x9, 0x80, 0x5, 0x877a, 0x80, 0xb29, 0x6, 0x0, 0x3ff80000, 0x400, 0x6, 0x1, 0x1, 0xffffffff, 0x7, 0x2, 0x9, 0x77e2, 0x0, 0x4f4c, 0x0, 0x8001, 0xfffffeff, 0x6, 0x92b8, 0x4, 0x800, 0x8, 0xfffffff9, 0x7f, 0xfffffffa, 0x7, 0xfffffffa, 0x8001, 0x3, 0xf1, 0xffffffff, 0x2, 0x9, 0x0, 0xfff, 0xfa, 0x4, 0x4, 0x2fcf, 0x8, 0x100, 0x3ff, 0x61, 0x6, 0x0, 0x5, 0xff, 0x10000, 0x101, 0x6b, 0x7f, 0x6, 0x0, 0xffffffff, 0x5, 0x8, 0x5, 0x1, 0x7, 0x0, 0x7, 0x672, 0x10000, 0x8, 0x4, 0xe0, 0x5, 0x0, 0x7, 0xdb, 0x4, 0x0, 0x4a, 0x75, 0x1, 0x86c1, 0x725, 0x3, 0x2, 0x3f, 0x1d1, 0x0, 0x81, 0x8, 0x7fffffff, 0x101, 0x0, 0x3f, 0x1, 0x9, 0x8000, 0x100, 0x7fffffff, 0xda, 0x87f3, 0x4, 0x7, 0x800, 0x3f, 0x3, 0x2, 0xe917, 0x8, 0x4, 0x188, 0x4, 0x7fffffff, 0x2, 0x5, 0x2, 0x2, 0x100, 0x3da, 0x1, 0xffff, 0xfff, 0x5, 0x800, 0x0, 0x845, 0x3ff, 0x0, 0x2, 0xdc7, 0x38f1, 0x7, 0x7, 0x40, 0x7e6, 0x6, 0x5, 0xbb, 0x9, 0x9, 0x0, 0x3, 0x8, 0x8, 0x4, 0x7, 0x1, 0x7ff, 0x8, 0x7, 0x1000, 0x3, 0xc9fc, 0x7, 0x1, 0x7fffffff, 0x91, 0x7, 0x4, 0x6, 0x4, 0x81, 0x6, 0x10001, 0x26, 0x5, 0x800, 0x81, 0x645, 0x1, 0x5, 0x9, 0x10001, 0x0, 0x8, 0x0, 0xfffffffe, 0x100, 0x8, 0x6, 0x1f, 0x6, 0x0, 0x8, 0x7, 0xd2, 0x4a, 0x8, 0x7dce, 0x9d, 0x3, 0x20, 0x7, 0x4, 0x100, 0xe9, 0x2, 0x3, 0xffff, 0x5, 0x9, 0xfffffff7, 0x7fff, 0x10000, 0x40, 0x0, 0x7, 0x8, 0x100, 0xa4, 0xffffffde, 0xe5f, 0x0, 0x10001, 0xffff, 0x10001, 0x53, 0x0, 0x37af, 0x3, 0xa00, 0x6, 0x10000, 0xffff, 0x1f, 0x4, 0x6, 0xd2a, 0x9, 0x7fff, 0xd6, 0xc1b1, 0x8, 0xa9f, 0x28b3, 0x96, 0x81, 0xfffffffe, 0x6, 0x3b53, 0x5, 0x80000000, 0xffff, 0xa0, 0xb4, 0xfffffffb, 0x0, 0xb6000000, 0x9, 0x6, 0xf8fb, 0x4, 0x401, 0x80000000, 0x8, 0x1, 0x7, 0x8, 0xa3a, 0x100, 0x1f, 0x5, 0x5, 0x10001, 0x5, 0xae02, 0xb83, 0xfffffffe, 0x1f, 0x7, 0x1, 0x5c5f, 0x40, 0x9, 0x8000, 0x3, 0x100, 0x8000, 0x4, 0x8, 0x101, 0x7, 0x401, 0x3, 0x6, 0x5, 0x3, 0x547, 0x5, 0x1ff, 0x6, 0x101, 0x4, 0x0, 0x4, 0x3, 0x7, 0xb7, 0x1, 0x0, 0x6, 0x8001, 0x10000, 0x1, 0x0, 0x8, 0x6, 0x9, 0x8, 0xffff0001, 0x1, 0x2, 0x10001, 0x0, 0x4, 0xffff, 0x91, 0x3, 0x0, 0x2, 0xfffffffd, 0xeef1, 0x800, 0xa56, 0x4, 0x634, 0x2, 0x94, 0x4, 0x5, 0x1, 0x8, 0x4, 0x7ff, 0x1ff, 0x5, 0x7, 0x9, 0x5, 0x59f9, 0x2, 0x0, 0x7ff, 0x7fff, 0x7fff, 0x9, 0x4, 0x10001, 0x60, 0x64e, 0x7f, 0x1ff, 0x6, 0x80000000, 0x3, 0x2, 0x7, 0x10, 0x1, 0x8, 0x3, 0x84f4e45, 0x9, 0x2, 0x9, 0x50000, 0x5, 0xff, 0x8, 0x1, 0xfff, 0x5, 0x3, 0x7f, 0x0, 0x9, 0x7, 0x9, 0x4, 0xfff, 0x1, 0x8, 0x9, 0x9, 0x200, 0x4, 0x6, 0x3, 0xff, 0x10000, 0xebdf, 0x7, 0x1, 0xea30, 0x2, 0xfffffff9, 0x5, 0x8001, 0x56, 0x8, 0x1ff, 0x7b6, 0x401, 0x7f, 0x6, 0xffff, 0x6, 0x2, 0x4eb, 0x8e, 0x7, 0x5, 0x639, 0x0, 0x780aeefa, 0x9, 0x7f, 0x80000000, 0x0, 0x20, 0x8001, 0x0, 0x2, 0x3ff, 0x5f9, 0x2, 0x7, 0x346f963d, 0x2, 0x7fff, 0x4fa6, 0x262, 0x0, 0x40, 0x4, 0xfffffffd, 0x4, 0x2684, 0x7fff, 0x2, 0x5, 0x2, 0x2, 0x7f, 0xff, 0x3ff, 0x1, 0xffffffff, 0x5, 0xca1, 0x0, 0x4, 0x7, 0x7c000000, 0x6, 0xfffffff7, 0x800, 0x8000, 0x4, 0x4000, 0x7ff, 0x8001, 0x1, 0x0, 0x1, 0xa74f, 0x101, 0xff, 0x97e, 0x6, 0x6, 0x100, 0x0, 0x9, 0x4, 0x0, 0x4, 0x4, 0x3, 0x8293, 0x3f, 0x4, 0xbd7f, 0x1, 0x3, 0x0, 0x6, 0x2, 0x100, 0x3ff, 0x8, 0x1, 0x81, 0xd2, 0x4, 0x9, 0x8001, 0x40, 0xff, 0x728c, 0x3, 0xfffffff8, 0x2, 0x2, 0x6, 0x8, 0x2, 0x4, 0x401, 0x6, 0x1, 0xd, 0x8, 0x4dd, 0x0, 0xffffffff, 0x3ff, 0x0, 0xfe, 0xa129, 0x3, 0x101, 0xfffffff8, 0x9, 0x0, 0x8, 0xfffffffd, 0x38e, 0x5, 0x7, 0xffff, 0x10001, 0x8, 0x3, 0xffffffff, 0x5d, 0x3ff, 0x1020, 0x8, 0x81, 0xfffffff7, 0x0, 0x9, 0x0, 0x6]}) 09:58:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:58:50 executing program 2: pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000001c0)={"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"}) clock_getres(0x2, &(0x7f0000000000)) 09:58:50 executing program 4: unshare(0x600) (async) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x2, 0x200, 0x8127}) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async, rerun: 64) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x26, &(0x7f00000000c0)="430732162104d5ee948fcaaca48671179be1f184e34981c31e870886329fb429420e1a0e16b6d591f14584d348752e2e515ddbe9d7953aa2bd786ed7ce82df506c64d3c2319aff865e2ee67d32f537eb66d5c3f22d4817366d1c0665db2281a042560a1474137f4ac4d816b54256627b4c778f3949ab6250ddfdb3568eac0d29aea3d9d74b6b8a3dcaf57f7ffb46585e6d70d5e8bcaca9410ce09413e5696f684e74371da1eededba27ec71cc93450d06cdd140c81e8412390489345c9", 0xbd) unshare(0x50000000) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000040)={0x2, 0x3, 0x10001}) (async) r1 = syz_open_dev$hiddev(&(0x7f0000000200), 0x3, 0x8000) ioctl$HIDIOCSUSAGES(r1, 0x501c4814, &(0x7f0000000240)={{0x3, 0xffffffff, 0x48, 0x20, 0x80000000, 0xfffffffd}, 0x36, [0x8, 0x5, 0x9, 0x7fff, 0x3b29, 0x7fff, 0x8, 0xffffffff, 0x200, 0x2, 0x3, 0x96, 0x7fff, 0xfffff656, 0x80, 0x3f, 0xb6c, 0x1000, 0x0, 0xe794, 0x85a, 0x8, 0xed, 0x3, 0xff, 0x6, 0x259, 0x1bf, 0x84, 0x3f, 0x5, 0xd2e, 0x200, 0x1, 0x8, 0x8001, 0x2, 0x5, 0x81, 0x5, 0x51c0, 0x40, 0x0, 0x0, 0x5, 0x13aad74f, 0x40, 0xd4, 0x242, 0x400, 0x1f4d, 0xef90, 0xffff9e52, 0x6, 0x7ff, 0x9, 0x80000001, 0x7fff, 0x8001, 0x1, 0x7, 0x6, 0x0, 0x9c76, 0x0, 0x7, 0xffffffff, 0x81, 0x7fffffff, 0x2, 0x0, 0x6, 0x2, 0x5, 0x7d10, 0x8000, 0x200, 0x4, 0x800, 0xedf, 0xffff0001, 0x5, 0x8, 0xcb, 0x80000001, 0xfffffffc, 0xfff, 0x84, 0x6, 0x80, 0x48fb, 0x4, 0x7fffffff, 0x4, 0x193, 0x1, 0x5, 0x8, 0x1, 0x200, 0x4, 0x6, 0xfffffff7, 0x9, 0x5, 0x4, 0xfffe0, 0xd32, 0x9, 0x0, 0x7fff, 0xf042, 0x8, 0x80, 0xffffff01, 0x0, 0x0, 0x1, 0x3ff, 0x3, 0x8000, 0x3ff, 0xff, 0x7ff, 0x1533, 0x5, 0x35, 0xfffffffa, 0x7, 0x7, 0x9, 0x3, 0x8001, 0x200, 0x6, 0x2, 0x401, 0x10000, 0xffff, 0x5, 0x776a, 0x5, 0x5, 0x50e2f0a8, 0x7ff, 0x0, 0x6, 0x6869, 0xcb, 0x9, 0x5, 0x2, 0x5, 0x6, 0x91, 0x8, 0x2f66, 0x6, 0x3f, 0x5087, 0xfffffffc, 0x0, 0x3c82549a, 0x8, 0x3ff, 0x80000000, 0x9, 0x7, 0x9f, 0x4, 0x1, 0x54e, 0x756, 0x7fff, 0xffffffeb, 0x31, 0x80000000, 0x0, 0xcc89, 0x3ff, 0x5, 0x1000, 0x1c, 0xffffffb9, 0x1, 0x7ff, 0x800, 0x3, 0x8000, 0xf5, 0x9, 0x100, 0x200, 0x7f, 0xe6, 0x2, 0x1, 0x101, 0x3, 0x7, 0x80000000, 0x6, 0x3, 0x7f, 0x1000, 0xfffffffc, 0x6, 0x8533, 0x9, 0x200, 0x6, 0x81, 0xfffffff9, 0x2, 0x0, 0x8, 0x9, 0xffffffff, 0xffffffff, 0x9, 0xff, 0x5, 0x3, 0xfffffe05, 0xfffff000, 0x6, 0x80000001, 0xc07, 0xfff, 0x2, 0x3f, 0x10000, 0xffffffff, 0x9, 0x401, 0x4, 0x6, 0x75, 0xf4, 0x7, 0x6, 0x1, 0x0, 0x80000000, 0x80000000, 0x1, 0xfffffff7, 0x3, 0x7, 0x5, 0x4, 0xff, 0x3f, 0x10000, 0x7, 0x3, 0x1, 0x5, 0x8001, 0x2, 0x1ff, 0x5, 0x3, 0x2, 0x80, 0x100, 0x8, 0x7a62b86f, 0xffffffe0, 0x9371, 0x1, 0x0, 0x9, 0x5, 0x101, 0x49c, 0x401, 0x4, 0x562c, 0x1, 0xe94, 0x9483, 0x200, 0x82a2f60d, 0x7, 0x636, 0x69ce5b6f, 0x3e2, 0x9, 0x4, 0x6, 0x8, 0xcc3, 0x0, 0x6, 0x6, 0x8, 0x1ff, 0x0, 0xfffff222, 0x87a, 0x3f, 0x2, 0x1, 0xde68608, 0x3ff, 0x7, 0x5, 0x7, 0x5, 0x401, 0x7fffffff, 0x4aa, 0x5, 0x37d, 0x4, 0x8, 0x7ff, 0x1, 0x9, 0x4, 0x4, 0x4, 0x101, 0xffff, 0x0, 0x1, 0xfffffff9, 0x1, 0x3, 0x7, 0x800, 0x4, 0x1f, 0x5, 0x6, 0x1, 0x8001, 0x9, 0x3, 0x1f, 0x0, 0x8, 0x0, 0x4, 0xc785, 0xffffffff, 0x4, 0x4, 0x6, 0x0, 0x2, 0x0, 0x702, 0x8, 0x7f, 0x3, 0xbd4, 0x4, 0x80, 0x1, 0x6, 0x400, 0x800, 0x2, 0x3f, 0x0, 0xffff, 0x85cb0a4f, 0x8de7, 0x86, 0x202000, 0x4, 0xffffffd1, 0x0, 0x1f, 0x0, 0x7, 0x7, 0x5a7, 0x8, 0x4, 0x20, 0x44, 0x40, 0x8, 0xe20a, 0x6, 0x7fff, 0x7, 0x6, 0x5, 0x7fff, 0x6, 0x7fff, 0x2, 0x3, 0xba4, 0x93, 0x8001, 0x8, 0x8, 0xb1, 0x8, 0x2e0, 0x7ff, 0x0, 0x3, 0xfff, 0x3, 0x9, 0x2, 0x10000, 0xfffffffa, 0x57, 0x80000001, 0x1000, 0xffff8000, 0x9, 0x7fff, 0xffff, 0x5, 0x7dd, 0x3, 0x4db, 0x9, 0x1, 0x1, 0x7, 0x7c, 0x88000000, 0x401, 0x800, 0x87, 0xfffffff8, 0xb025, 0x1, 0x7, 0x3ff, 0x1000, 0x0, 0x7f, 0x8, 0x7fff, 0x8, 0x8, 0x5aed616, 0x4, 0x1, 0x8, 0x6, 0xfffffff9, 0xffffffff, 0x10000, 0x3ff, 0x3, 0x6, 0xca, 0x4, 0x12b1, 0xffffffff, 0x3, 0xfffffffe, 0xfdd6, 0x7fffffff, 0xe26, 0x0, 0x6, 0x0, 0x200, 0x1, 0x0, 0x5afd, 0x5, 0x9e7a, 0x80, 0x8000, 0xfff, 0x1386, 0x9, 0x80, 0x5, 0x877a, 0x80, 0xb29, 0x6, 0x0, 0x3ff80000, 0x400, 0x6, 0x1, 0x1, 0xffffffff, 0x7, 0x2, 0x9, 0x77e2, 0x0, 0x4f4c, 0x0, 0x8001, 0xfffffeff, 0x6, 0x92b8, 0x4, 0x800, 0x8, 0xfffffff9, 0x7f, 0xfffffffa, 0x7, 0xfffffffa, 0x8001, 0x3, 0xf1, 0xffffffff, 0x2, 0x9, 0x0, 0xfff, 0xfa, 0x4, 0x4, 0x2fcf, 0x8, 0x100, 0x3ff, 0x61, 0x6, 0x0, 0x5, 0xff, 0x10000, 0x101, 0x6b, 0x7f, 0x6, 0x0, 0xffffffff, 0x5, 0x8, 0x5, 0x1, 0x7, 0x0, 0x7, 0x672, 0x10000, 0x8, 0x4, 0xe0, 0x5, 0x0, 0x7, 0xdb, 0x4, 0x0, 0x4a, 0x75, 0x1, 0x86c1, 0x725, 0x3, 0x2, 0x3f, 0x1d1, 0x0, 0x81, 0x8, 0x7fffffff, 0x101, 0x0, 0x3f, 0x1, 0x9, 0x8000, 0x100, 0x7fffffff, 0xda, 0x87f3, 0x4, 0x7, 0x800, 0x3f, 0x3, 0x2, 0xe917, 0x8, 0x4, 0x188, 0x4, 0x7fffffff, 0x2, 0x5, 0x2, 0x2, 0x100, 0x3da, 0x1, 0xffff, 0xfff, 0x5, 0x800, 0x0, 0x845, 0x3ff, 0x0, 0x2, 0xdc7, 0x38f1, 0x7, 0x7, 0x40, 0x7e6, 0x6, 0x5, 0xbb, 0x9, 0x9, 0x0, 0x3, 0x8, 0x8, 0x4, 0x7, 0x1, 0x7ff, 0x8, 0x7, 0x1000, 0x3, 0xc9fc, 0x7, 0x1, 0x7fffffff, 0x91, 0x7, 0x4, 0x6, 0x4, 0x81, 0x6, 0x10001, 0x26, 0x5, 0x800, 0x81, 0x645, 0x1, 0x5, 0x9, 0x10001, 0x0, 0x8, 0x0, 0xfffffffe, 0x100, 0x8, 0x6, 0x1f, 0x6, 0x0, 0x8, 0x7, 0xd2, 0x4a, 0x8, 0x7dce, 0x9d, 0x3, 0x20, 0x7, 0x4, 0x100, 0xe9, 0x2, 0x3, 0xffff, 0x5, 0x9, 0xfffffff7, 0x7fff, 0x10000, 0x40, 0x0, 0x7, 0x8, 0x100, 0xa4, 0xffffffde, 0xe5f, 0x0, 0x10001, 0xffff, 0x10001, 0x53, 0x0, 0x37af, 0x3, 0xa00, 0x6, 0x10000, 0xffff, 0x1f, 0x4, 0x6, 0xd2a, 0x9, 0x7fff, 0xd6, 0xc1b1, 0x8, 0xa9f, 0x28b3, 0x96, 0x81, 0xfffffffe, 0x6, 0x3b53, 0x5, 0x80000000, 0xffff, 0xa0, 0xb4, 0xfffffffb, 0x0, 0xb6000000, 0x9, 0x6, 0xf8fb, 0x4, 0x401, 0x80000000, 0x8, 0x1, 0x7, 0x8, 0xa3a, 0x100, 0x1f, 0x5, 0x5, 0x10001, 0x5, 0xae02, 0xb83, 0xfffffffe, 0x1f, 0x7, 0x1, 0x5c5f, 0x40, 0x9, 0x8000, 0x3, 0x100, 0x8000, 0x4, 0x8, 0x101, 0x7, 0x401, 0x3, 0x6, 0x5, 0x3, 0x547, 0x5, 0x1ff, 0x6, 0x101, 0x4, 0x0, 0x4, 0x3, 0x7, 0xb7, 0x1, 0x0, 0x6, 0x8001, 0x10000, 0x1, 0x0, 0x8, 0x6, 0x9, 0x8, 0xffff0001, 0x1, 0x2, 0x10001, 0x0, 0x4, 0xffff, 0x91, 0x3, 0x0, 0x2, 0xfffffffd, 0xeef1, 0x800, 0xa56, 0x4, 0x634, 0x2, 0x94, 0x4, 0x5, 0x1, 0x8, 0x4, 0x7ff, 0x1ff, 0x5, 0x7, 0x9, 0x5, 0x59f9, 0x2, 0x0, 0x7ff, 0x7fff, 0x7fff, 0x9, 0x4, 0x10001, 0x60, 0x64e, 0x7f, 0x1ff, 0x6, 0x80000000, 0x3, 0x2, 0x7, 0x10, 0x1, 0x8, 0x3, 0x84f4e45, 0x9, 0x2, 0x9, 0x50000, 0x5, 0xff, 0x8, 0x1, 0xfff, 0x5, 0x3, 0x7f, 0x0, 0x9, 0x7, 0x9, 0x4, 0xfff, 0x1, 0x8, 0x9, 0x9, 0x200, 0x4, 0x6, 0x3, 0xff, 0x10000, 0xebdf, 0x7, 0x1, 0xea30, 0x2, 0xfffffff9, 0x5, 0x8001, 0x56, 0x8, 0x1ff, 0x7b6, 0x401, 0x7f, 0x6, 0xffff, 0x6, 0x2, 0x4eb, 0x8e, 0x7, 0x5, 0x639, 0x0, 0x780aeefa, 0x9, 0x7f, 0x80000000, 0x0, 0x20, 0x8001, 0x0, 0x2, 0x3ff, 0x5f9, 0x2, 0x7, 0x346f963d, 0x2, 0x7fff, 0x4fa6, 0x262, 0x0, 0x40, 0x4, 0xfffffffd, 0x4, 0x2684, 0x7fff, 0x2, 0x5, 0x2, 0x2, 0x7f, 0xff, 0x3ff, 0x1, 0xffffffff, 0x5, 0xca1, 0x0, 0x4, 0x7, 0x7c000000, 0x6, 0xfffffff7, 0x800, 0x8000, 0x4, 0x4000, 0x7ff, 0x8001, 0x1, 0x0, 0x1, 0xa74f, 0x101, 0xff, 0x97e, 0x6, 0x6, 0x100, 0x0, 0x9, 0x4, 0x0, 0x4, 0x4, 0x3, 0x8293, 0x3f, 0x4, 0xbd7f, 0x1, 0x3, 0x0, 0x6, 0x2, 0x100, 0x3ff, 0x8, 0x1, 0x81, 0xd2, 0x4, 0x9, 0x8001, 0x40, 0xff, 0x728c, 0x3, 0xfffffff8, 0x2, 0x2, 0x6, 0x8, 0x2, 0x4, 0x401, 0x6, 0x1, 0xd, 0x8, 0x4dd, 0x0, 0xffffffff, 0x3ff, 0x0, 0xfe, 0xa129, 0x3, 0x101, 0xfffffff8, 0x9, 0x0, 0x8, 0xfffffffd, 0x38e, 0x5, 0x7, 0xffff, 0x10001, 0x8, 0x3, 0xffffffff, 0x5d, 0x3ff, 0x1020, 0x8, 0x81, 0xfffffff7, 0x0, 0x9, 0x0, 0x6]}) 09:58:50 executing program 2: pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000001c0)={"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"}) (async) clock_getres(0x2, &(0x7f0000000000)) [ 2754.298316][T24006] FAULT_INJECTION: forcing a failure. [ 2754.298316][T24006] name failslab, interval 1, probability 0, space 0, times 0 [ 2754.309888][T24007] FAULT_INJECTION: forcing a failure. [ 2754.309888][T24007] name failslab, interval 1, probability 0, space 0, times 0 [ 2754.311313][T24006] CPU: 0 PID: 24006 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2754.333726][T24006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2754.343758][T24006] Call Trace: [ 2754.347034][T24006] dump_stack+0x18e/0x1d5 [ 2754.351342][T24006] should_fail+0x604/0x770 [ 2754.355735][T24006] ? dup_mmap+0x46c/0xb60 [ 2754.360039][T24006] should_failslab+0x5/0x20 [ 2754.364515][T24006] kmem_cache_alloc+0x24/0x210 [ 2754.369252][T24006] dup_mmap+0x46c/0xb60 [ 2754.373387][T24006] dup_mm+0x8c/0x300 [ 2754.377260][T24006] copy_mm+0xe8/0x180 [ 2754.381223][T24006] copy_process+0x1048/0x3220 [ 2754.385878][T24006] ? proc_fail_nth_write+0x157/0x1c0 [ 2754.391139][T24006] _do_fork+0x142/0x730 [ 2754.395276][T24006] __x64_sys_clone+0x213/0x260 [ 2754.400014][T24006] do_syscall_64+0xcb/0x1c0 [ 2754.404495][T24006] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2754.410362][T24006] RIP: 0033:0x7fd3d983a0e9 [ 2754.414755][T24006] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2754.434332][T24006] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2754.442722][T24006] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2754.450671][T24006] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2754.458619][T24006] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2754.466565][T24006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2754.474514][T24006] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2754.482470][T24007] CPU: 1 PID: 24007 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2754.492692][T24007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2754.502735][T24007] Call Trace: [ 2754.506023][T24007] dump_stack+0x18e/0x1d5 [ 2754.510339][T24007] should_fail+0x604/0x770 [ 2754.514742][T24007] ? dup_mmap+0x46c/0xb60 [ 2754.519062][T24007] should_failslab+0x5/0x20 [ 2754.523552][T24007] kmem_cache_alloc+0x24/0x210 [ 2754.528298][T24007] dup_mmap+0x46c/0xb60 [ 2754.532440][T24007] dup_mm+0x8c/0x300 [ 2754.536322][T24007] copy_mm+0xe8/0x180 [ 2754.540291][T24007] copy_process+0x1048/0x3220 [ 2754.544958][T24007] ? proc_fail_nth_write+0x157/0x1c0 [ 2754.550232][T24007] _do_fork+0x142/0x730 [ 2754.554383][T24007] __x64_sys_clone+0x213/0x260 [ 2754.559147][T24007] do_syscall_64+0xcb/0x1c0 [ 2754.563644][T24007] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2754.569519][T24007] RIP: 0033:0x7f3d26b7c0e9 [ 2754.573907][T24007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2754.593481][T24007] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2754.601861][T24007] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2754.609800][T24007] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2754.617740][T24007] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2754.625693][T24007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2754.633634][T24007] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:58:50 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) 09:58:50 executing program 4: unshare(0x600) (async) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x2, 0x200, 0x8127}) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) setsockopt$inet_buf(r0, 0x0, 0x26, &(0x7f00000000c0)="430732162104d5ee948fcaaca48671179be1f184e34981c31e870886329fb429420e1a0e16b6d591f14584d348752e2e515ddbe9d7953aa2bd786ed7ce82df506c64d3c2319aff865e2ee67d32f537eb66d5c3f22d4817366d1c0665db2281a042560a1474137f4ac4d816b54256627b4c778f3949ab6250ddfdb3568eac0d29aea3d9d74b6b8a3dcaf57f7ffb46585e6d70d5e8bcaca9410ce09413e5696f684e74371da1eededba27ec71cc93450d06cdd140c81e8412390489345c9", 0xbd) (async) unshare(0x50000000) (async) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000040)={0x2, 0x3, 0x10001}) r1 = syz_open_dev$hiddev(&(0x7f0000000200), 0x3, 0x8000) ioctl$HIDIOCSUSAGES(r1, 0x501c4814, &(0x7f0000000240)={{0x3, 0xffffffff, 0x48, 0x20, 0x80000000, 0xfffffffd}, 0x36, [0x8, 0x5, 0x9, 0x7fff, 0x3b29, 0x7fff, 0x8, 0xffffffff, 0x200, 0x2, 0x3, 0x96, 0x7fff, 0xfffff656, 0x80, 0x3f, 0xb6c, 0x1000, 0x0, 0xe794, 0x85a, 0x8, 0xed, 0x3, 0xff, 0x6, 0x259, 0x1bf, 0x84, 0x3f, 0x5, 0xd2e, 0x200, 0x1, 0x8, 0x8001, 0x2, 0x5, 0x81, 0x5, 0x51c0, 0x40, 0x0, 0x0, 0x5, 0x13aad74f, 0x40, 0xd4, 0x242, 0x400, 0x1f4d, 0xef90, 0xffff9e52, 0x6, 0x7ff, 0x9, 0x80000001, 0x7fff, 0x8001, 0x1, 0x7, 0x6, 0x0, 0x9c76, 0x0, 0x7, 0xffffffff, 0x81, 0x7fffffff, 0x2, 0x0, 0x6, 0x2, 0x5, 0x7d10, 0x8000, 0x200, 0x4, 0x800, 0xedf, 0xffff0001, 0x5, 0x8, 0xcb, 0x80000001, 0xfffffffc, 0xfff, 0x84, 0x6, 0x80, 0x48fb, 0x4, 0x7fffffff, 0x4, 0x193, 0x1, 0x5, 0x8, 0x1, 0x200, 0x4, 0x6, 0xfffffff7, 0x9, 0x5, 0x4, 0xfffe0, 0xd32, 0x9, 0x0, 0x7fff, 0xf042, 0x8, 0x80, 0xffffff01, 0x0, 0x0, 0x1, 0x3ff, 0x3, 0x8000, 0x3ff, 0xff, 0x7ff, 0x1533, 0x5, 0x35, 0xfffffffa, 0x7, 0x7, 0x9, 0x3, 0x8001, 0x200, 0x6, 0x2, 0x401, 0x10000, 0xffff, 0x5, 0x776a, 0x5, 0x5, 0x50e2f0a8, 0x7ff, 0x0, 0x6, 0x6869, 0xcb, 0x9, 0x5, 0x2, 0x5, 0x6, 0x91, 0x8, 0x2f66, 0x6, 0x3f, 0x5087, 0xfffffffc, 0x0, 0x3c82549a, 0x8, 0x3ff, 0x80000000, 0x9, 0x7, 0x9f, 0x4, 0x1, 0x54e, 0x756, 0x7fff, 0xffffffeb, 0x31, 0x80000000, 0x0, 0xcc89, 0x3ff, 0x5, 0x1000, 0x1c, 0xffffffb9, 0x1, 0x7ff, 0x800, 0x3, 0x8000, 0xf5, 0x9, 0x100, 0x200, 0x7f, 0xe6, 0x2, 0x1, 0x101, 0x3, 0x7, 0x80000000, 0x6, 0x3, 0x7f, 0x1000, 0xfffffffc, 0x6, 0x8533, 0x9, 0x200, 0x6, 0x81, 0xfffffff9, 0x2, 0x0, 0x8, 0x9, 0xffffffff, 0xffffffff, 0x9, 0xff, 0x5, 0x3, 0xfffffe05, 0xfffff000, 0x6, 0x80000001, 0xc07, 0xfff, 0x2, 0x3f, 0x10000, 0xffffffff, 0x9, 0x401, 0x4, 0x6, 0x75, 0xf4, 0x7, 0x6, 0x1, 0x0, 0x80000000, 0x80000000, 0x1, 0xfffffff7, 0x3, 0x7, 0x5, 0x4, 0xff, 0x3f, 0x10000, 0x7, 0x3, 0x1, 0x5, 0x8001, 0x2, 0x1ff, 0x5, 0x3, 0x2, 0x80, 0x100, 0x8, 0x7a62b86f, 0xffffffe0, 0x9371, 0x1, 0x0, 0x9, 0x5, 0x101, 0x49c, 0x401, 0x4, 0x562c, 0x1, 0xe94, 0x9483, 0x200, 0x82a2f60d, 0x7, 0x636, 0x69ce5b6f, 0x3e2, 0x9, 0x4, 0x6, 0x8, 0xcc3, 0x0, 0x6, 0x6, 0x8, 0x1ff, 0x0, 0xfffff222, 0x87a, 0x3f, 0x2, 0x1, 0xde68608, 0x3ff, 0x7, 0x5, 0x7, 0x5, 0x401, 0x7fffffff, 0x4aa, 0x5, 0x37d, 0x4, 0x8, 0x7ff, 0x1, 0x9, 0x4, 0x4, 0x4, 0x101, 0xffff, 0x0, 0x1, 0xfffffff9, 0x1, 0x3, 0x7, 0x800, 0x4, 0x1f, 0x5, 0x6, 0x1, 0x8001, 0x9, 0x3, 0x1f, 0x0, 0x8, 0x0, 0x4, 0xc785, 0xffffffff, 0x4, 0x4, 0x6, 0x0, 0x2, 0x0, 0x702, 0x8, 0x7f, 0x3, 0xbd4, 0x4, 0x80, 0x1, 0x6, 0x400, 0x800, 0x2, 0x3f, 0x0, 0xffff, 0x85cb0a4f, 0x8de7, 0x86, 0x202000, 0x4, 0xffffffd1, 0x0, 0x1f, 0x0, 0x7, 0x7, 0x5a7, 0x8, 0x4, 0x20, 0x44, 0x40, 0x8, 0xe20a, 0x6, 0x7fff, 0x7, 0x6, 0x5, 0x7fff, 0x6, 0x7fff, 0x2, 0x3, 0xba4, 0x93, 0x8001, 0x8, 0x8, 0xb1, 0x8, 0x2e0, 0x7ff, 0x0, 0x3, 0xfff, 0x3, 0x9, 0x2, 0x10000, 0xfffffffa, 0x57, 0x80000001, 0x1000, 0xffff8000, 0x9, 0x7fff, 0xffff, 0x5, 0x7dd, 0x3, 0x4db, 0x9, 0x1, 0x1, 0x7, 0x7c, 0x88000000, 0x401, 0x800, 0x87, 0xfffffff8, 0xb025, 0x1, 0x7, 0x3ff, 0x1000, 0x0, 0x7f, 0x8, 0x7fff, 0x8, 0x8, 0x5aed616, 0x4, 0x1, 0x8, 0x6, 0xfffffff9, 0xffffffff, 0x10000, 0x3ff, 0x3, 0x6, 0xca, 0x4, 0x12b1, 0xffffffff, 0x3, 0xfffffffe, 0xfdd6, 0x7fffffff, 0xe26, 0x0, 0x6, 0x0, 0x200, 0x1, 0x0, 0x5afd, 0x5, 0x9e7a, 0x80, 0x8000, 0xfff, 0x1386, 0x9, 0x80, 0x5, 0x877a, 0x80, 0xb29, 0x6, 0x0, 0x3ff80000, 0x400, 0x6, 0x1, 0x1, 0xffffffff, 0x7, 0x2, 0x9, 0x77e2, 0x0, 0x4f4c, 0x0, 0x8001, 0xfffffeff, 0x6, 0x92b8, 0x4, 0x800, 0x8, 0xfffffff9, 0x7f, 0xfffffffa, 0x7, 0xfffffffa, 0x8001, 0x3, 0xf1, 0xffffffff, 0x2, 0x9, 0x0, 0xfff, 0xfa, 0x4, 0x4, 0x2fcf, 0x8, 0x100, 0x3ff, 0x61, 0x6, 0x0, 0x5, 0xff, 0x10000, 0x101, 0x6b, 0x7f, 0x6, 0x0, 0xffffffff, 0x5, 0x8, 0x5, 0x1, 0x7, 0x0, 0x7, 0x672, 0x10000, 0x8, 0x4, 0xe0, 0x5, 0x0, 0x7, 0xdb, 0x4, 0x0, 0x4a, 0x75, 0x1, 0x86c1, 0x725, 0x3, 0x2, 0x3f, 0x1d1, 0x0, 0x81, 0x8, 0x7fffffff, 0x101, 0x0, 0x3f, 0x1, 0x9, 0x8000, 0x100, 0x7fffffff, 0xda, 0x87f3, 0x4, 0x7, 0x800, 0x3f, 0x3, 0x2, 0xe917, 0x8, 0x4, 0x188, 0x4, 0x7fffffff, 0x2, 0x5, 0x2, 0x2, 0x100, 0x3da, 0x1, 0xffff, 0xfff, 0x5, 0x800, 0x0, 0x845, 0x3ff, 0x0, 0x2, 0xdc7, 0x38f1, 0x7, 0x7, 0x40, 0x7e6, 0x6, 0x5, 0xbb, 0x9, 0x9, 0x0, 0x3, 0x8, 0x8, 0x4, 0x7, 0x1, 0x7ff, 0x8, 0x7, 0x1000, 0x3, 0xc9fc, 0x7, 0x1, 0x7fffffff, 0x91, 0x7, 0x4, 0x6, 0x4, 0x81, 0x6, 0x10001, 0x26, 0x5, 0x800, 0x81, 0x645, 0x1, 0x5, 0x9, 0x10001, 0x0, 0x8, 0x0, 0xfffffffe, 0x100, 0x8, 0x6, 0x1f, 0x6, 0x0, 0x8, 0x7, 0xd2, 0x4a, 0x8, 0x7dce, 0x9d, 0x3, 0x20, 0x7, 0x4, 0x100, 0xe9, 0x2, 0x3, 0xffff, 0x5, 0x9, 0xfffffff7, 0x7fff, 0x10000, 0x40, 0x0, 0x7, 0x8, 0x100, 0xa4, 0xffffffde, 0xe5f, 0x0, 0x10001, 0xffff, 0x10001, 0x53, 0x0, 0x37af, 0x3, 0xa00, 0x6, 0x10000, 0xffff, 0x1f, 0x4, 0x6, 0xd2a, 0x9, 0x7fff, 0xd6, 0xc1b1, 0x8, 0xa9f, 0x28b3, 0x96, 0x81, 0xfffffffe, 0x6, 0x3b53, 0x5, 0x80000000, 0xffff, 0xa0, 0xb4, 0xfffffffb, 0x0, 0xb6000000, 0x9, 0x6, 0xf8fb, 0x4, 0x401, 0x80000000, 0x8, 0x1, 0x7, 0x8, 0xa3a, 0x100, 0x1f, 0x5, 0x5, 0x10001, 0x5, 0xae02, 0xb83, 0xfffffffe, 0x1f, 0x7, 0x1, 0x5c5f, 0x40, 0x9, 0x8000, 0x3, 0x100, 0x8000, 0x4, 0x8, 0x101, 0x7, 0x401, 0x3, 0x6, 0x5, 0x3, 0x547, 0x5, 0x1ff, 0x6, 0x101, 0x4, 0x0, 0x4, 0x3, 0x7, 0xb7, 0x1, 0x0, 0x6, 0x8001, 0x10000, 0x1, 0x0, 0x8, 0x6, 0x9, 0x8, 0xffff0001, 0x1, 0x2, 0x10001, 0x0, 0x4, 0xffff, 0x91, 0x3, 0x0, 0x2, 0xfffffffd, 0xeef1, 0x800, 0xa56, 0x4, 0x634, 0x2, 0x94, 0x4, 0x5, 0x1, 0x8, 0x4, 0x7ff, 0x1ff, 0x5, 0x7, 0x9, 0x5, 0x59f9, 0x2, 0x0, 0x7ff, 0x7fff, 0x7fff, 0x9, 0x4, 0x10001, 0x60, 0x64e, 0x7f, 0x1ff, 0x6, 0x80000000, 0x3, 0x2, 0x7, 0x10, 0x1, 0x8, 0x3, 0x84f4e45, 0x9, 0x2, 0x9, 0x50000, 0x5, 0xff, 0x8, 0x1, 0xfff, 0x5, 0x3, 0x7f, 0x0, 0x9, 0x7, 0x9, 0x4, 0xfff, 0x1, 0x8, 0x9, 0x9, 0x200, 0x4, 0x6, 0x3, 0xff, 0x10000, 0xebdf, 0x7, 0x1, 0xea30, 0x2, 0xfffffff9, 0x5, 0x8001, 0x56, 0x8, 0x1ff, 0x7b6, 0x401, 0x7f, 0x6, 0xffff, 0x6, 0x2, 0x4eb, 0x8e, 0x7, 0x5, 0x639, 0x0, 0x780aeefa, 0x9, 0x7f, 0x80000000, 0x0, 0x20, 0x8001, 0x0, 0x2, 0x3ff, 0x5f9, 0x2, 0x7, 0x346f963d, 0x2, 0x7fff, 0x4fa6, 0x262, 0x0, 0x40, 0x4, 0xfffffffd, 0x4, 0x2684, 0x7fff, 0x2, 0x5, 0x2, 0x2, 0x7f, 0xff, 0x3ff, 0x1, 0xffffffff, 0x5, 0xca1, 0x0, 0x4, 0x7, 0x7c000000, 0x6, 0xfffffff7, 0x800, 0x8000, 0x4, 0x4000, 0x7ff, 0x8001, 0x1, 0x0, 0x1, 0xa74f, 0x101, 0xff, 0x97e, 0x6, 0x6, 0x100, 0x0, 0x9, 0x4, 0x0, 0x4, 0x4, 0x3, 0x8293, 0x3f, 0x4, 0xbd7f, 0x1, 0x3, 0x0, 0x6, 0x2, 0x100, 0x3ff, 0x8, 0x1, 0x81, 0xd2, 0x4, 0x9, 0x8001, 0x40, 0xff, 0x728c, 0x3, 0xfffffff8, 0x2, 0x2, 0x6, 0x8, 0x2, 0x4, 0x401, 0x6, 0x1, 0xd, 0x8, 0x4dd, 0x0, 0xffffffff, 0x3ff, 0x0, 0xfe, 0xa129, 0x3, 0x101, 0xfffffff8, 0x9, 0x0, 0x8, 0xfffffffd, 0x38e, 0x5, 0x7, 0xffff, 0x10001, 0x8, 0x3, 0xffffffff, 0x5d, 0x3ff, 0x1020, 0x8, 0x81, 0xfffffff7, 0x0, 0x9, 0x0, 0x6]}) 09:58:50 executing program 2: pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f00000001c0)={"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"}) (async, rerun: 32) clock_getres(0x2, &(0x7f0000000000)) (rerun: 32) 09:58:50 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) 09:58:50 executing program 2: unshare(0x600) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x2f, @multicast1, 0x4e24, 0x0, 'dh\x00', 0xc, 0x7, 0x46}, 0x2c) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) [ 2754.809389][T24024] FAULT_INJECTION: forcing a failure. [ 2754.809389][T24024] name failslab, interval 1, probability 0, space 0, times 0 [ 2754.813990][T24025] FAULT_INJECTION: forcing a failure. [ 2754.813990][T24025] name failslab, interval 1, probability 0, space 0, times 0 [ 2754.822092][T24024] CPU: 0 PID: 24024 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2754.844795][T24024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2754.854838][T24024] Call Trace: [ 2754.858110][T24024] dump_stack+0x18e/0x1d5 [ 2754.862419][T24024] should_fail+0x604/0x770 [ 2754.866815][T24024] ? dup_mmap+0x46c/0xb60 [ 2754.871118][T24024] should_failslab+0x5/0x20 [ 2754.875600][T24024] kmem_cache_alloc+0x24/0x210 [ 2754.880338][T24024] dup_mmap+0x46c/0xb60 [ 2754.884478][T24024] dup_mm+0x8c/0x300 [ 2754.888348][T24024] copy_mm+0xe8/0x180 [ 2754.892320][T24024] copy_process+0x1048/0x3220 [ 2754.896984][T24024] ? proc_fail_nth_write+0x157/0x1c0 [ 2754.902260][T24024] _do_fork+0x142/0x730 [ 2754.906405][T24024] __x64_sys_clone+0x213/0x260 [ 2754.911161][T24024] do_syscall_64+0xcb/0x1c0 [ 2754.915649][T24024] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2754.921526][T24024] RIP: 0033:0x7f3d26b7c0e9 [ 2754.925927][T24024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2754.945516][T24024] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2754.953906][T24024] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2754.961855][T24024] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2754.969801][T24024] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2754.977750][T24024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2754.985699][T24024] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2754.993666][T24025] CPU: 1 PID: 24025 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2755.003891][T24025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2755.013936][T24025] Call Trace: [ 2755.017222][T24025] dump_stack+0x18e/0x1d5 [ 2755.021540][T24025] should_fail+0x604/0x770 [ 2755.025944][T24025] ? dup_mmap+0x46c/0xb60 [ 2755.030262][T24025] should_failslab+0x5/0x20 [ 2755.034753][T24025] kmem_cache_alloc+0x24/0x210 [ 2755.039497][T24025] dup_mmap+0x46c/0xb60 [ 2755.043646][T24025] dup_mm+0x8c/0x300 [ 2755.047525][T24025] copy_mm+0xe8/0x180 [ 2755.051489][T24025] copy_process+0x1048/0x3220 09:58:51 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:51 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) 09:58:51 executing program 2: unshare(0x600) (async) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x2f, @multicast1, 0x4e24, 0x0, 'dh\x00', 0xc, 0x7, 0x46}, 0x2c) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:58:51 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) 09:58:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) [ 2755.056152][T24025] ? proc_fail_nth_write+0x157/0x1c0 [ 2755.061427][T24025] _do_fork+0x142/0x730 [ 2755.065572][T24025] __x64_sys_clone+0x213/0x260 [ 2755.070320][T24025] do_syscall_64+0xcb/0x1c0 [ 2755.074821][T24025] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2755.080693][T24025] RIP: 0033:0x7fd3d983a0e9 [ 2755.085095][T24025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 09:58:51 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) 09:58:51 executing program 2: unshare(0x600) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x2f, @multicast1, 0x4e24, 0x0, 'dh\x00', 0xc, 0x7, 0x46}, 0x2c) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:58:51 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0x0) [ 2755.104701][T24025] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2755.104710][T24025] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2755.104714][T24025] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2755.104718][T24025] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 09:58:51 executing program 2: unshare(0x0) prctl$PR_PAC_RESET_KEYS(0x36, 0x1d) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:58:51 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe}, &(0x7f00000001c0)={0x7, 0x5, 0x4}, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) [ 2755.104721][T24025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2755.104725][T24025] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:51 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) 09:58:51 executing program 2: unshare(0x0) (async) prctl$PR_PAC_RESET_KEYS(0x36, 0x1d) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) [ 2755.253005][T24050] FAULT_INJECTION: forcing a failure. [ 2755.253005][T24050] name failslab, interval 1, probability 0, space 0, times 0 [ 2755.267569][T24050] CPU: 0 PID: 24050 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2755.277802][T24050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2755.287846][T24050] Call Trace: [ 2755.291131][T24050] dump_stack+0x18e/0x1d5 [ 2755.295448][T24050] should_fail+0x604/0x770 [ 2755.299847][T24050] ? dup_mmap+0x46c/0xb60 [ 2755.304156][T24050] should_failslab+0x5/0x20 [ 2755.308641][T24050] kmem_cache_alloc+0x24/0x210 [ 2755.313388][T24050] dup_mmap+0x46c/0xb60 [ 2755.317531][T24050] dup_mm+0x8c/0x300 [ 2755.321410][T24050] copy_mm+0xe8/0x180 [ 2755.325378][T24050] copy_process+0x1048/0x3220 [ 2755.330053][T24050] ? proc_fail_nth_write+0x157/0x1c0 [ 2755.335340][T24050] _do_fork+0x142/0x730 [ 2755.339490][T24050] __x64_sys_clone+0x213/0x260 [ 2755.344243][T24050] do_syscall_64+0xcb/0x1c0 [ 2755.348734][T24050] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2755.351641][T24057] FAULT_INJECTION: forcing a failure. [ 2755.351641][T24057] name failslab, interval 1, probability 0, space 0, times 0 [ 2755.354615][T24050] RIP: 0033:0x7f3d26b7c0e9 [ 2755.354625][T24050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2755.354629][T24050] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2755.354645][T24050] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2755.407501][T24050] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2755.415447][T24050] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2755.423392][T24050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2755.431335][T24050] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2755.439724][T24057] CPU: 1 PID: 24057 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2755.449947][T24057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2755.459989][T24057] Call Trace: [ 2755.463268][T24057] dump_stack+0x18e/0x1d5 [ 2755.467588][T24057] should_fail+0x604/0x770 [ 2755.471989][T24057] ? dup_mmap+0x46c/0xb60 [ 2755.476304][T24057] should_failslab+0x5/0x20 [ 2755.480796][T24057] kmem_cache_alloc+0x24/0x210 [ 2755.485543][T24057] dup_mmap+0x46c/0xb60 [ 2755.489687][T24057] dup_mm+0x8c/0x300 [ 2755.493574][T24057] copy_mm+0xe8/0x180 [ 2755.497543][T24057] copy_process+0x1048/0x3220 [ 2755.502203][T24057] ? proc_fail_nth_write+0x157/0x1c0 [ 2755.507477][T24057] _do_fork+0x142/0x730 [ 2755.511624][T24057] __x64_sys_clone+0x213/0x260 [ 2755.516373][T24057] do_syscall_64+0xcb/0x1c0 [ 2755.520863][T24057] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2755.526734][T24057] RIP: 0033:0x7fd3d983a0e9 [ 2755.531137][T24057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2755.550722][T24057] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2755.559105][T24057] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2755.567045][T24057] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2755.575036][T24057] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2755.582991][T24057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2755.590937][T24057] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:52 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x0, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:52 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 09:58:52 executing program 2: unshare(0x0) prctl$PR_PAC_RESET_KEYS(0x36, 0x1d) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:58:52 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 09:58:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 09:58:52 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x7f4b]}, &(0x7f0000000040), &(0x7f00000000c0)={r1, r2+10000000}, 0x59) 09:58:52 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) (async) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x7f4b]}, &(0x7f0000000040), &(0x7f00000000c0)={r1, r2+10000000}, 0x59) 09:58:52 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x7f4b]}, &(0x7f0000000040), &(0x7f00000000c0)={r1, r2+10000000}, 0x59) 09:58:52 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe}, &(0x7f00000001c0)={0x7, 0x5, 0x4}, 0x0, 0x0, 0x0) (async) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) 09:58:52 executing program 2: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_buf(r0, 0x0, 0x23, &(0x7f0000000000)="9ef390f630c491b077bab3893d26821c1754b24fa14c4da91effda471cb127208cf75582e1102d1475f9f0638467", 0x2e) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x402}, 0x0, 0x0, 0x0, 0x0) unshare(0x22000c00) 09:58:52 executing program 2: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_buf(r0, 0x0, 0x23, &(0x7f0000000000)="9ef390f630c491b077bab3893d26821c1754b24fa14c4da91effda471cb127208cf75582e1102d1475f9f0638467", 0x2e) (async) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x402}, 0x0, 0x0, 0x0, 0x0) unshare(0x22000c00) [ 2756.061816][T24085] FAULT_INJECTION: forcing a failure. [ 2756.061816][T24085] name failslab, interval 1, probability 0, space 0, times 0 [ 2756.077308][T24085] CPU: 1 PID: 24085 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2756.086868][T24087] FAULT_INJECTION: forcing a failure. [ 2756.086868][T24087] name failslab, interval 1, probability 0, space 0, times 0 [ 2756.087537][T24085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2756.087540][T24085] Call Trace: [ 2756.087557][T24085] dump_stack+0x18e/0x1d5 [ 2756.087569][T24085] should_fail+0x604/0x770 [ 2756.087577][T24085] ? dup_mmap+0x46c/0xb60 [ 2756.087584][T24085] should_failslab+0x5/0x20 [ 2756.087602][T24085] kmem_cache_alloc+0x24/0x210 [ 2756.135641][T24085] dup_mmap+0x46c/0xb60 [ 2756.139780][T24085] dup_mm+0x8c/0x300 [ 2756.143681][T24085] copy_mm+0xe8/0x180 [ 2756.147641][T24085] copy_process+0x1048/0x3220 [ 2756.152305][T24085] ? proc_fail_nth_write+0x157/0x1c0 [ 2756.157574][T24085] _do_fork+0x142/0x730 [ 2756.161714][T24085] __x64_sys_clone+0x213/0x260 [ 2756.166459][T24085] do_syscall_64+0xcb/0x1c0 [ 2756.170938][T24085] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2756.176803][T24085] RIP: 0033:0x7fd3d983a0e9 [ 2756.181194][T24085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2756.200775][T24085] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2756.209165][T24085] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2756.217114][T24085] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2756.225060][T24085] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2756.233004][T24085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2756.240955][T24085] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2756.248910][T24087] CPU: 0 PID: 24087 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2756.259135][T24087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2756.269179][T24087] Call Trace: [ 2756.272463][T24087] dump_stack+0x18e/0x1d5 [ 2756.276781][T24087] should_fail+0x604/0x770 [ 2756.281182][T24087] ? dup_mmap+0x46c/0xb60 [ 2756.285495][T24087] should_failslab+0x5/0x20 [ 2756.289980][T24087] kmem_cache_alloc+0x24/0x210 [ 2756.294729][T24087] dup_mmap+0x46c/0xb60 [ 2756.298869][T24087] dup_mm+0x8c/0x300 [ 2756.302750][T24087] copy_mm+0xe8/0x180 [ 2756.306720][T24087] copy_process+0x1048/0x3220 09:58:52 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) [ 2756.311384][T24087] ? proc_fail_nth_write+0x157/0x1c0 [ 2756.316667][T24087] _do_fork+0x142/0x730 [ 2756.320983][T24087] __x64_sys_clone+0x213/0x260 [ 2756.325732][T24087] do_syscall_64+0xcb/0x1c0 [ 2756.330221][T24087] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2756.336092][T24087] RIP: 0033:0x7f3d26b7c0e9 [ 2756.340493][T24087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2756.360088][T24087] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2756.368486][T24087] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2756.376443][T24087] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2756.384399][T24087] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2756.392352][T24087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2756.400309][T24087] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2756.443864][T24093] FAULT_INJECTION: forcing a failure. [ 2756.443864][T24093] name failslab, interval 1, probability 0, space 0, times 0 [ 2756.456558][T24093] CPU: 1 PID: 24093 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2756.466784][T24093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2756.476832][T24093] Call Trace: [ 2756.480121][T24093] dump_stack+0x18e/0x1d5 [ 2756.484449][T24093] should_fail+0x604/0x770 [ 2756.488856][T24093] ? anon_vma_clone+0xa1/0x4d0 [ 2756.493605][T24093] should_failslab+0x5/0x20 [ 2756.498098][T24093] kmem_cache_alloc+0x24/0x210 [ 2756.502847][T24093] anon_vma_clone+0xa1/0x4d0 [ 2756.507406][T24093] anon_vma_fork+0x8c/0x4d0 [ 2756.511885][T24093] ? dup_mmap+0x46c/0xb60 [ 2756.516180][T24093] dup_mmap+0x536/0xb60 [ 2756.520305][T24093] dup_mm+0x8c/0x300 [ 2756.524166][T24093] copy_mm+0xe8/0x180 [ 2756.528117][T24093] copy_process+0x1048/0x3220 [ 2756.532764][T24093] ? proc_fail_nth_write+0x157/0x1c0 [ 2756.538028][T24093] _do_fork+0x142/0x730 [ 2756.542173][T24093] __x64_sys_clone+0x213/0x260 [ 2756.546917][T24093] do_syscall_64+0xcb/0x1c0 [ 2756.551834][T24093] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2756.557709][T24093] RIP: 0033:0x7fd3d983a0e9 [ 2756.562091][T24093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2756.581664][T24093] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2756.590041][T24093] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2756.597979][T24093] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2756.605918][T24093] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2756.613859][T24093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2756.621823][T24093] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:53 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:53 executing program 2: r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_buf(r0, 0x0, 0x23, &(0x7f0000000000)="9ef390f630c491b077bab3893d26821c1754b24fa14c4da91effda471cb127208cf75582e1102d1475f9f0638467", 0x2e) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x402}, 0x0, 0x0, 0x0, 0x0) unshare(0x22000c00) 09:58:53 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) 09:58:53 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) 09:58:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$mouse(&(0x7f00000000c0), 0x1, 0x10000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x4, 0x5, 0x7f, 0x4, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @empty, 0x20, 0x80, 0x1e, 0x1}}) 09:58:53 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:53 executing program 2: unshare(0x600) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @private, @broadcast}, &(0x7f00000001c0)=0xc) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x9, 0x322e, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0xb, &(0x7f0000000000)=""/230, &(0x7f0000000100)=0xe6) 09:58:53 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:53 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe}, &(0x7f00000001c0)={0x7, 0x5, 0x4}, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffe}, &(0x7f00000001c0)={0x7, 0x5, 0x4}, 0x0, 0x0, 0x0) (async) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) (async) 09:58:53 executing program 2: unshare(0x600) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @private, @broadcast}, &(0x7f00000001c0)=0xc) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x9, 0x322e, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0xb, &(0x7f0000000000)=""/230, &(0x7f0000000100)=0xe6) 09:58:53 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:53 executing program 2: unshare(0x600) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @private, @broadcast}, &(0x7f00000001c0)=0xc) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x9, 0x322e, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0xb, &(0x7f0000000000)=""/230, &(0x7f0000000100)=0xe6) unshare(0x600) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @private, @broadcast}, &(0x7f00000001c0)=0xc) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x9, 0x322e, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) getsockopt$inet_opts(r0, 0x0, 0xb, &(0x7f0000000000)=""/230, &(0x7f0000000100)=0xe6) (async) 09:58:53 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) 09:58:53 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) getpgid(r0) getpgid(r0) [ 2756.956435][T24133] FAULT_INJECTION: forcing a failure. [ 2756.956435][T24133] name failslab, interval 1, probability 0, space 0, times 0 [ 2756.969151][T24133] CPU: 0 PID: 24133 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2756.973413][T24137] FAULT_INJECTION: forcing a failure. [ 2756.973413][T24137] name failslab, interval 1, probability 0, space 0, times 0 [ 2756.979393][T24133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2756.979398][T24133] Call Trace: [ 2756.979418][T24133] dump_stack+0x18e/0x1d5 [ 2756.979431][T24133] should_fail+0x604/0x770 [ 2756.979441][T24133] ? anon_vma_clone+0xa1/0x4d0 [ 2756.979448][T24133] should_failslab+0x5/0x20 [ 2756.979458][T24133] kmem_cache_alloc+0x24/0x210 [ 2756.979466][T24133] anon_vma_clone+0xa1/0x4d0 [ 2756.979477][T24133] anon_vma_fork+0x8c/0x4d0 [ 2756.979484][T24133] ? dup_mmap+0x46c/0xb60 [ 2756.979491][T24133] dup_mmap+0x536/0xb60 [ 2756.979503][T24133] dup_mm+0x8c/0x300 [ 2756.979513][T24133] copy_mm+0xe8/0x180 [ 2756.979524][T24133] copy_process+0x1048/0x3220 [ 2756.979537][T24133] ? proc_fail_nth_write+0x157/0x1c0 [ 2756.979549][T24133] _do_fork+0x142/0x730 [ 2756.979560][T24133] __x64_sys_clone+0x213/0x260 [ 2756.979571][T24133] do_syscall_64+0xcb/0x1c0 [ 2756.979581][T24133] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2756.979588][T24133] RIP: 0033:0x7fd3d983a0e9 [ 2756.979604][T24133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2757.106337][T24133] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2757.114726][T24133] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2757.122676][T24133] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2757.130624][T24133] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2757.138574][T24133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2757.146522][T24133] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2757.154478][T24137] CPU: 1 PID: 24137 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2757.164703][T24137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2757.174747][T24137] Call Trace: [ 2757.178031][T24137] dump_stack+0x18e/0x1d5 [ 2757.182353][T24137] should_fail+0x604/0x770 [ 2757.186759][T24137] ? anon_vma_clone+0xa1/0x4d0 [ 2757.191508][T24137] should_failslab+0x5/0x20 [ 2757.196001][T24137] kmem_cache_alloc+0x24/0x210 [ 2757.200753][T24137] anon_vma_clone+0xa1/0x4d0 [ 2757.205330][T24137] anon_vma_fork+0x8c/0x4d0 [ 2757.209820][T24137] ? dup_mmap+0x46c/0xb60 [ 2757.214121][T24137] dup_mmap+0x536/0xb60 [ 2757.218246][T24137] dup_mm+0x8c/0x300 [ 2757.222110][T24137] copy_mm+0xe8/0x180 [ 2757.226060][T24137] copy_process+0x1048/0x3220 [ 2757.230736][T24137] ? proc_fail_nth_write+0x157/0x1c0 [ 2757.235992][T24137] _do_fork+0x142/0x730 [ 2757.240173][T24137] __x64_sys_clone+0x213/0x260 [ 2757.244913][T24137] do_syscall_64+0xcb/0x1c0 [ 2757.250906][T24137] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2757.256782][T24137] RIP: 0033:0x7f3d26b7c0e9 [ 2757.261187][T24137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2757.280765][T24137] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2757.289154][T24137] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2757.297104][T24137] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2757.305070][T24137] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2757.313026][T24137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2757.320984][T24137] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:58:53 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) 09:58:53 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) getpgid(r0) (async, rerun: 32) getpgid(r0) (rerun: 32) [ 2757.432567][T24146] FAULT_INJECTION: forcing a failure. [ 2757.432567][T24146] name failslab, interval 1, probability 0, space 0, times 0 [ 2757.445323][T24146] CPU: 1 PID: 24146 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2757.455535][T24146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2757.465563][T24146] Call Trace: [ 2757.468841][T24146] dump_stack+0x18e/0x1d5 [ 2757.473153][T24146] should_fail+0x604/0x770 [ 2757.477583][T24146] ? anon_vma_clone+0xa1/0x4d0 [ 2757.482313][T24146] should_failslab+0x5/0x20 [ 2757.486787][T24146] kmem_cache_alloc+0x24/0x210 [ 2757.491519][T24146] anon_vma_clone+0xa1/0x4d0 [ 2757.496080][T24146] anon_vma_fork+0x8c/0x4d0 [ 2757.500548][T24146] ? dup_mmap+0x46c/0xb60 [ 2757.504847][T24146] dup_mmap+0x536/0xb60 [ 2757.508985][T24146] dup_mm+0x8c/0x300 [ 2757.512846][T24146] copy_mm+0xe8/0x180 [ 2757.516798][T24146] copy_process+0x1048/0x3220 [ 2757.521446][T24146] ? proc_fail_nth_write+0x157/0x1c0 [ 2757.526702][T24146] _do_fork+0x142/0x730 [ 2757.530827][T24146] __x64_sys_clone+0x213/0x260 [ 2757.535566][T24146] do_syscall_64+0xcb/0x1c0 [ 2757.540041][T24146] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2757.545899][T24146] RIP: 0033:0x7f3d26b7c0e9 [ 2757.550281][T24146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2757.569855][T24146] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 09:58:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$mouse(&(0x7f00000000c0), 0x1, 0x10000) (async) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x4, 0x5, 0x7f, 0x4, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @empty, 0x20, 0x80, 0x1e, 0x1}}) 09:58:53 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) 09:58:53 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) (async) getpgid(r0) getpgid(r0) [ 2757.578230][T24146] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2757.586169][T24146] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2757.594108][T24146] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2757.602046][T24146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2757.609986][T24146] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:58:53 executing program 2: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) unshare(0x600) ioctl$VHOST_SET_FEATURES(r0, 0x4008af60, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC(r1, 0x4068aea3, &(0x7f0000000000)) unshare(0x4000400) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:58:53 executing program 4: unshare(0x400) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.freeze\x00', 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x8d, 0xfffffffa, 0x0, 0xc1, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x3, 0x1, 0x9, 0x4, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x4}, 0x48) r4 = syz_open_dev$mouse(&(0x7f0000000300), 0x3, 0x400000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x59ed}, [@call={0x85, 0x0, 0x0, 0x2e}, @generic={0x5, 0x5, 0xc, 0x5, 0x1}, @btf_id={0x18, 0xc, 0x3, 0x0, 0x3}, @generic={0x8, 0x5, 0x2, 0x6, 0xdb21}, @map_idx={0x18, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8001}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000080)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x0, 0x8001}, 0x10, 0x2a0b7, r1, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0x1, 0x1, 0xffffffffffffffff, r4]}, 0x80) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:58:53 executing program 2: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) unshare(0x600) ioctl$VHOST_SET_FEATURES(r0, 0x4008af60, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC(r1, 0x4068aea3, &(0x7f0000000000)) unshare(0x4000400) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) unshare(0x600) (async) ioctl$VHOST_SET_FEATURES(r0, 0x4008af60, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$KVM_CAP_HYPERV_SYNIC(r1, 0x4068aea3, &(0x7f0000000000)) (async) unshare(0x4000400) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:58:53 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) 09:58:54 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) 09:58:54 executing program 4: unshare(0x400) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.freeze\x00', 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async, rerun: 32) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x8d, 0xfffffffa, 0x0, 0xc1, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) (async, rerun: 32) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x3, 0x1, 0x9, 0x4, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x4}, 0x48) (async) r4 = syz_open_dev$mouse(&(0x7f0000000300), 0x3, 0x400000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x59ed}, [@call={0x85, 0x0, 0x0, 0x2e}, @generic={0x5, 0x5, 0xc, 0x5, 0x1}, @btf_id={0x18, 0xc, 0x3, 0x0, 0x3}, @generic={0x8, 0x5, 0x2, 0x6, 0xdb21}, @map_idx={0x18, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8001}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000080)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x0, 0x8001}, 0x10, 0x2a0b7, r1, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0x1, 0x1, 0xffffffffffffffff, r4]}, 0x80) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:58:54 executing program 2: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) unshare(0x600) ioctl$VHOST_SET_FEATURES(r0, 0x4008af60, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC(r1, 0x4068aea3, &(0x7f0000000000)) unshare(0x4000400) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) unshare(0x600) (async) ioctl$VHOST_SET_FEATURES(r0, 0x4008af60, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$KVM_CAP_HYPERV_SYNIC(r1, 0x4068aea3, &(0x7f0000000000)) (async) unshare(0x4000400) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:58:54 executing program 4: unshare(0x400) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.freeze\x00', 0x0, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x11, 0x8d, 0xfffffffa, 0x0, 0xc1, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5}, 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x3, 0x1, 0x9, 0x4, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x5, 0x4}, 0x48) r4 = syz_open_dev$mouse(&(0x7f0000000300), 0x3, 0x400000) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_ext={0x1c, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x59ed}, [@call={0x85, 0x0, 0x0, 0x2e}, @generic={0x5, 0x5, 0xc, 0x5, 0x1}, @btf_id={0x18, 0xc, 0x3, 0x0, 0x3}, @generic={0x8, 0x5, 0x2, 0x6, 0xdb21}, @map_idx={0x18, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8001}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000080)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x0, 0x8001}, 0x10, 0x2a0b7, r1, 0x0, &(0x7f0000000340)=[0xffffffffffffffff, r2, 0xffffffffffffffff, r3, 0x1, 0x1, 0xffffffffffffffff, r4]}, 0x80) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (rerun: 64) [ 2757.749259][T24163] FAULT_INJECTION: forcing a failure. [ 2757.749259][T24163] name failslab, interval 1, probability 0, space 0, times 0 [ 2757.803917][T24163] CPU: 0 PID: 24163 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2757.814168][T24163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2757.824210][T24163] Call Trace: [ 2757.827495][T24163] dump_stack+0x18e/0x1d5 [ 2757.831818][T24163] should_fail+0x604/0x770 [ 2757.836226][T24163] ? anon_vma_clone+0xa1/0x4d0 [ 2757.840981][T24163] should_failslab+0x5/0x20 [ 2757.845478][T24163] kmem_cache_alloc+0x24/0x210 [ 2757.845489][T24163] anon_vma_clone+0xa1/0x4d0 [ 2757.845500][T24163] anon_vma_fork+0x8c/0x4d0 [ 2757.845508][T24163] ? dup_mmap+0x46c/0xb60 [ 2757.845516][T24163] dup_mmap+0x536/0xb60 [ 2757.845528][T24163] dup_mm+0x8c/0x300 [ 2757.845538][T24163] copy_mm+0xe8/0x180 [ 2757.845549][T24163] copy_process+0x1048/0x3220 [ 2757.845562][T24163] ? proc_fail_nth_write+0x157/0x1c0 [ 2757.845575][T24163] _do_fork+0x142/0x730 [ 2757.845586][T24163] __x64_sys_clone+0x213/0x260 [ 2757.845598][T24163] do_syscall_64+0xcb/0x1c0 [ 2757.845609][T24163] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2757.845617][T24163] RIP: 0033:0x7fd3d983a0e9 [ 2757.845627][T24163] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2757.845632][T24163] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2757.845641][T24163] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2757.845652][T24163] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 09:58:54 executing program 4: unshare(0x600) socket$inet(0x2, 0x2, 0x9) unshare(0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) [ 2757.891281][T24195] FAULT_INJECTION: forcing a failure. [ 2757.891281][T24195] name failslab, interval 1, probability 0, space 0, times 0 [ 2757.894459][T24163] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2757.894463][T24163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2757.894468][T24163] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2757.989978][T24195] CPU: 0 PID: 24195 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2758.000195][T24195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2758.010217][T24195] Call Trace: [ 2758.013478][T24195] dump_stack+0x18e/0x1d5 [ 2758.017777][T24195] should_fail+0x604/0x770 [ 2758.022164][T24195] ? anon_vma_clone+0xa1/0x4d0 [ 2758.026894][T24195] should_failslab+0x5/0x20 [ 2758.031368][T24195] kmem_cache_alloc+0x24/0x210 [ 2758.036099][T24195] anon_vma_clone+0xa1/0x4d0 [ 2758.040658][T24195] anon_vma_fork+0x8c/0x4d0 [ 2758.045126][T24195] ? dup_mmap+0x46c/0xb60 [ 2758.049423][T24195] dup_mmap+0x536/0xb60 [ 2758.053552][T24195] dup_mm+0x8c/0x300 [ 2758.057415][T24195] copy_mm+0xe8/0x180 [ 2758.061364][T24195] copy_process+0x1048/0x3220 [ 2758.066012][T24195] ? proc_fail_nth_write+0x157/0x1c0 [ 2758.071266][T24195] _do_fork+0x142/0x730 [ 2758.075390][T24195] __x64_sys_clone+0x213/0x260 [ 2758.080121][T24195] do_syscall_64+0xcb/0x1c0 [ 2758.084609][T24195] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2758.090485][T24195] RIP: 0033:0x7f3d26b7c0e9 [ 2758.094871][T24195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2758.114442][T24195] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2758.122819][T24195] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2758.130758][T24195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2758.138714][T24195] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2758.146653][T24195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2758.154605][T24195] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:58:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) syz_open_dev$mouse(&(0x7f00000000c0), 0x1, 0x10000) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x4, 0x5, 0x7f, 0x4, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @empty, 0x20, 0x80, 0x1e, 0x1}}) 09:58:54 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 09:58:54 executing program 4: unshare(0x600) (async) socket$inet(0x2, 0x2, 0x9) (async) unshare(0x0) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:58:54 executing program 2: unshare(0x4000600) pselect6(0x40, &(0x7f0000000180)={0xfffffffffffffff5, 0x0, 0x20, 0xfffffffffffffffe, 0x0, 0x5, 0x40, 0x7fffffffffffffff}, 0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xffffffffffffe830]}, &(0x7f0000000040), 0x8) unshare(0x26020000) 09:58:54 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 09:58:54 executing program 2: unshare(0x4000600) (async, rerun: 32) pselect6(0x40, &(0x7f0000000180)={0xfffffffffffffff5, 0x0, 0x20, 0xfffffffffffffffe, 0x0, 0x5, 0x40, 0x7fffffffffffffff}, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xffffffffffffe830]}, &(0x7f0000000040), 0x8) unshare(0x26020000) 09:58:54 executing program 4: unshare(0x600) (async) socket$inet(0x2, 0x2, 0x9) (async) unshare(0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) [ 2758.610091][T24222] FAULT_INJECTION: forcing a failure. [ 2758.610091][T24222] name failslab, interval 1, probability 0, space 0, times 0 [ 2758.610163][T24223] FAULT_INJECTION: forcing a failure. [ 2758.610163][T24223] name failslab, interval 1, probability 0, space 0, times 0 [ 2758.622797][T24222] CPU: 1 PID: 24222 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2758.645506][T24222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2758.655538][T24222] Call Trace: [ 2758.658810][T24222] dump_stack+0x18e/0x1d5 [ 2758.663122][T24222] should_fail+0x604/0x770 [ 2758.667514][T24222] ? anon_vma_fork+0xed/0x4d0 [ 2758.672163][T24222] should_failslab+0x5/0x20 [ 2758.676988][T24222] kmem_cache_alloc+0x24/0x210 [ 2758.681734][T24222] anon_vma_fork+0xed/0x4d0 [ 2758.686219][T24222] ? dup_mmap+0x46c/0xb60 [ 2758.690538][T24222] dup_mmap+0x536/0xb60 [ 2758.694671][T24222] dup_mm+0x8c/0x300 [ 2758.698545][T24222] copy_mm+0xe8/0x180 [ 2758.702506][T24222] copy_process+0x1048/0x3220 [ 2758.707160][T24222] ? proc_fail_nth_write+0x157/0x1c0 [ 2758.712441][T24222] _do_fork+0x142/0x730 [ 2758.716586][T24222] __x64_sys_clone+0x213/0x260 [ 2758.721333][T24222] do_syscall_64+0xcb/0x1c0 [ 2758.725820][T24222] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2758.731695][T24222] RIP: 0033:0x7f3d26b7c0e9 [ 2758.736090][T24222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2758.755669][T24222] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2758.764053][T24222] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2758.771998][T24222] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2758.779944][T24222] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2758.787891][T24222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2758.795852][T24222] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:58:55 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) 09:58:55 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x3ff, 0x80000000000000, 0x4}, &(0x7f00000001c0)={0x7, 0x1}, 0x0, 0x0, 0x0) 09:58:55 executing program 2: unshare(0x4000600) (async) pselect6(0x40, &(0x7f0000000180)={0xfffffffffffffff5, 0x0, 0x20, 0xfffffffffffffffe, 0x0, 0x5, 0x40, 0x7fffffffffffffff}, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xffffffffffffe830]}, &(0x7f0000000040), 0x8) (async, rerun: 64) unshare(0x26020000) 09:58:55 executing program 2: unshare(0x600) r0 = socket$inet(0x2, 0x1, 0x3) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000000)={0xfffffff8, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e20, @empty}}}, 0x108) unshare(0x480) pselect6(0x40, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0) [ 2758.803807][T24223] CPU: 0 PID: 24223 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2758.814030][T24223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2758.824070][T24223] Call Trace: [ 2758.827349][T24223] dump_stack+0x18e/0x1d5 [ 2758.831683][T24223] should_fail+0x604/0x770 [ 2758.831696][T24223] ? anon_vma_fork+0xed/0x4d0 09:58:55 executing program 4: unshare(0x600) (async, rerun: 32) pselect6(0x40, &(0x7f0000000180)={0x3ff, 0x80000000000000, 0x4}, &(0x7f00000001c0)={0x7, 0x1}, 0x0, 0x0, 0x0) (rerun: 32) [ 2758.831704][T24223] should_failslab+0x5/0x20 [ 2758.831715][T24223] kmem_cache_alloc+0x24/0x210 [ 2758.831725][T24223] anon_vma_fork+0xed/0x4d0 [ 2758.831732][T24223] ? dup_mmap+0x46c/0xb60 [ 2758.831741][T24223] dup_mmap+0x536/0xb60 [ 2758.831753][T24223] dup_mm+0x8c/0x300 [ 2758.831770][T24223] copy_mm+0xe8/0x180 [ 2758.831782][T24223] copy_process+0x1048/0x3220 [ 2758.831795][T24223] ? proc_fail_nth_write+0x157/0x1c0 [ 2758.831808][T24223] _do_fork+0x142/0x730 [ 2758.831819][T24223] __x64_sys_clone+0x213/0x260 [ 2758.831831][T24223] do_syscall_64+0xcb/0x1c0 [ 2758.831842][T24223] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2758.831851][T24223] RIP: 0033:0x7fd3d983a0e9 [ 2758.831860][T24223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2758.831865][T24223] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2758.831875][T24223] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2758.831880][T24223] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2758.831885][T24223] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2758.831890][T24223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2758.831896][T24223] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:55 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 09:58:55 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x3ff, 0x80000000000000, 0x4}, &(0x7f00000001c0)={0x7, 0x1}, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x3ff, 0x80000000000000, 0x4}, &(0x7f00000001c0)={0x7, 0x1}, 0x0, 0x0, 0x0) (async) 09:58:55 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 09:58:55 executing program 4: unshare(0x600) prctl$PR_SET_TSC(0x1a, 0x3) pselect6(0x40, &(0x7f0000000180)={0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f00000001c0)={0x7, 0x1000, 0x0, 0x5}, 0x0, 0x0, 0x0) personality(0x5000002) prctl$PR_SVE_SET_VL(0x32, 0x86d8) 09:58:55 executing program 4: unshare(0x600) (async, rerun: 64) prctl$PR_SET_TSC(0x1a, 0x3) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f00000001c0)={0x7, 0x1000, 0x0, 0x5}, 0x0, 0x0, 0x0) (async) personality(0x5000002) (async) prctl$PR_SVE_SET_VL(0x32, 0x86d8) 09:58:55 executing program 4: unshare(0x600) (async) prctl$PR_SET_TSC(0x1a, 0x3) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0xfffffffffffffff4, 0x0, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f00000001c0)={0x7, 0x1000, 0x0, 0x5}, 0x0, 0x0, 0x0) (async) personality(0x5000002) prctl$PR_SVE_SET_VL(0x32, 0x86d8) 09:58:55 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x20000000001}, &(0x7f00000001c0)={0x7, 0x4, 0x0, 0x3, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0x0) clock_getres(0x6, &(0x7f0000000040)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) [ 2759.473924][T24259] FAULT_INJECTION: forcing a failure. [ 2759.473924][T24259] name failslab, interval 1, probability 0, space 0, times 0 [ 2759.491576][T24259] CPU: 0 PID: 24259 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2759.501823][T24259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2759.511870][T24259] Call Trace: [ 2759.515158][T24259] dump_stack+0x18e/0x1d5 [ 2759.519495][T24259] should_fail+0x604/0x770 [ 2759.523904][T24259] ? anon_vma_fork+0x1b6/0x4d0 [ 2759.528658][T24259] should_failslab+0x5/0x20 [ 2759.533147][T24259] kmem_cache_alloc+0x24/0x210 [ 2759.537899][T24259] anon_vma_fork+0x1b6/0x4d0 [ 2759.542481][T24259] ? dup_mmap+0x46c/0xb60 [ 2759.546797][T24259] dup_mmap+0x536/0xb60 [ 2759.550943][T24259] dup_mm+0x8c/0x300 [ 2759.554828][T24259] copy_mm+0xe8/0x180 [ 2759.558803][T24259] copy_process+0x1048/0x3220 [ 2759.563467][T24259] ? proc_fail_nth_write+0x157/0x1c0 [ 2759.568743][T24259] _do_fork+0x142/0x730 [ 2759.572892][T24259] __x64_sys_clone+0x213/0x260 [ 2759.577643][T24259] do_syscall_64+0xcb/0x1c0 [ 2759.582150][T24259] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2759.588024][T24259] RIP: 0033:0x7fd3d983a0e9 [ 2759.592432][T24259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2759.597715][T24262] FAULT_INJECTION: forcing a failure. [ 2759.597715][T24262] name failslab, interval 1, probability 0, space 0, times 0 [ 2759.612020][T24259] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2759.612029][T24259] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2759.612033][T24259] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2759.612037][T24259] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2759.612042][T24259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2759.612047][T24259] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:55 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:55 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x20000000001}, &(0x7f00000001c0)={0x7, 0x4, 0x0, 0x3, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0x0) (async) clock_getres(0x6, &(0x7f0000000040)) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 09:58:55 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@empty, @private, 0x0}, &(0x7f0000000080)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000023c0)={0xffffffffffffffff, 0xe0, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000021c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000002200), &(0x7f0000002240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002280)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000002480)={'ip6_vti0\x00', &(0x7f0000002400)={'syztnl2\x00', 0x0, 0x0, 0x6, 0xff, 0x8, 0x1, @dev={0xfe, 0x80, '\x00', 0xd}, @loopback, 0x8, 0x10, 0xffffffff, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002540)={'syztnl0\x00', &(0x7f00000024c0)={'syztnl0\x00', 0x0, 0x29, 0x82, 0x8, 0x83, 0x28, @mcast1, @rand_addr=' \x01\x00', 0x20, 0x7800, 0xffff, 0x8}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002880)={0xffffffffffffffff, 0xe0, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000002580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000025c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002600)=[0x0], 0x0, 0x8, &(0x7f0000002640)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000026c0), &(0x7f0000002700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002740)}}, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000003100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000030c0)={&(0x7f00000028c0)={0x7d8, 0x0, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8}, {0x17c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x9, 0x0, 0x40, 0x3}, {0x3, 0xff, 0x1f, 0x261}, {0x1, 0x0, 0x9, 0x10000}, {0x2, 0xfe, 0x9, 0x81}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xba4b}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @user_linkup_enabled={{}, {0x0, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x6, 0x6, 0xfe, 0x2}, {0x2, 0xe, 0xff, 0x3ff}, {0x57f, 0xb5, 0x9, 0xa509}, {0x7, 0x6, 0x5, 0xd08}, {0x8001, 0x7f, 0x3f, 0x8}, {0x3, 0x20, 0x9}, {0x400, 0x3, 0x3, 0x3ff}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x7d, 0x0, 0xcba}, {0x3, 0x0, 0x56, 0x8}, {0x8, 0x6, 0x0, 0xfffffff7}]}}}]}}, {{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x42}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{}, {}, {0x0, 0x4, [{0x4, 0x7, 0x0, 0x3}]}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r2}, {0x168, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xf6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x232}}, {0x8, 0x6, r4}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80}}, {0x8}}}]}}]}, 0x7d8}, 0x1, 0x0, 0x0, 0x20000801}, 0x40030) r5 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r5, &(0x7f0000000180)={0x2020}, 0x2020) 09:58:55 executing program 2: unshare(0x600) (async) r0 = socket$inet(0x2, 0x1, 0x3) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000000)={0xfffffff8, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e20, @empty}}}, 0x108) (async) unshare(0x480) (async) pselect6(0x40, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0) 09:58:55 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) [ 2759.676396][T24262] CPU: 1 PID: 24262 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2759.686625][T24262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2759.696667][T24262] Call Trace: [ 2759.699947][T24262] dump_stack+0x18e/0x1d5 [ 2759.704265][T24262] should_fail+0x604/0x770 [ 2759.708668][T24262] ? anon_vma_fork+0x1b6/0x4d0 [ 2759.713421][T24262] should_failslab+0x5/0x20 [ 2759.717918][T24262] kmem_cache_alloc+0x24/0x210 [ 2759.722672][T24262] anon_vma_fork+0x1b6/0x4d0 [ 2759.727252][T24262] ? dup_mmap+0x46c/0xb60 [ 2759.731570][T24262] dup_mmap+0x536/0xb60 [ 2759.735717][T24262] dup_mm+0x8c/0x300 [ 2759.739605][T24262] copy_mm+0xe8/0x180 [ 2759.743574][T24262] copy_process+0x1048/0x3220 [ 2759.748369][T24262] ? proc_fail_nth_write+0x157/0x1c0 [ 2759.753788][T24262] _do_fork+0x142/0x730 [ 2759.757932][T24262] __x64_sys_clone+0x213/0x260 [ 2759.762679][T24262] do_syscall_64+0xcb/0x1c0 [ 2759.767173][T24262] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2759.773048][T24262] RIP: 0033:0x7f3d26b7c0e9 [ 2759.777445][T24262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2759.797046][T24262] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2759.797056][T24262] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2759.797068][T24262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2759.821363][T24262] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2759.827247][T24274] FAULT_INJECTION: forcing a failure. [ 2759.827247][T24274] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2759.829314][T24262] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2759.829320][T24262] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2759.859440][T24274] CPU: 0 PID: 24274 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2759.869676][T24274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2759.879714][T24274] Call Trace: [ 2759.882995][T24274] dump_stack+0x18e/0x1d5 [ 2759.887312][T24274] should_fail+0x604/0x770 [ 2759.891718][T24274] __alloc_pages_nodemask+0x12a/0x6f0 [ 2759.897076][T24274] pte_alloc_one+0x1b/0xb0 [ 2759.901477][T24274] __pte_alloc+0x1d/0x1c0 [ 2759.905795][T24274] copy_pte_range+0xf2c/0x1610 [ 2759.910551][T24274] copy_page_range+0x7b0/0xb00 [ 2759.915303][T24274] dup_mmap+0x829/0xb60 [ 2759.919445][T24274] dup_mm+0x8c/0x300 [ 2759.923327][T24274] copy_mm+0xe8/0x180 09:58:56 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) 09:58:56 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x20000000001}, &(0x7f00000001c0)={0x7, 0x4, 0x0, 0x3, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0x0) clock_getres(0x6, &(0x7f0000000040)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1d, 0x0, 0x0, 0x20000000001}, &(0x7f00000001c0)={0x7, 0x4, 0x0, 0x3, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0x0) (async) clock_getres(0x6, &(0x7f0000000040)) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) [ 2759.927301][T24274] copy_process+0x1048/0x3220 [ 2759.931971][T24274] ? proc_fail_nth_write+0x157/0x1c0 [ 2759.937241][T24274] _do_fork+0x142/0x730 [ 2759.941390][T24274] __x64_sys_clone+0x213/0x260 [ 2759.946147][T24274] do_syscall_64+0xcb/0x1c0 [ 2759.950641][T24274] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2759.956515][T24274] RIP: 0033:0x7fd3d983a0e9 [ 2759.960920][T24274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2759.980504][T24274] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2759.988897][T24274] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2759.996851][T24274] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2760.004806][T24274] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2760.012760][T24274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2760.020714][T24274] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2760.030632][T24286] FAULT_INJECTION: forcing a failure. [ 2760.030632][T24286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2760.044224][T24286] CPU: 1 PID: 24286 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2760.054451][T24286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2760.064492][T24286] Call Trace: [ 2760.067772][T24286] dump_stack+0x18e/0x1d5 [ 2760.072092][T24286] should_fail+0x604/0x770 [ 2760.076495][T24286] __alloc_pages_nodemask+0x12a/0x6f0 [ 2760.081851][T24286] pte_alloc_one+0x1b/0xb0 [ 2760.086248][T24286] __pte_alloc+0x1d/0x1c0 [ 2760.090561][T24286] copy_pte_range+0xf2c/0x1610 [ 2760.095319][T24286] copy_page_range+0x7b0/0xb00 [ 2760.100071][T24286] dup_mmap+0x829/0xb60 [ 2760.104213][T24286] dup_mm+0x8c/0x300 [ 2760.108091][T24286] copy_mm+0xe8/0x180 [ 2760.112057][T24286] copy_process+0x1048/0x3220 [ 2760.116725][T24286] ? proc_fail_nth_write+0x157/0x1c0 [ 2760.121992][T24286] _do_fork+0x142/0x730 [ 2760.126139][T24286] __x64_sys_clone+0x213/0x260 [ 2760.130872][T24286] do_syscall_64+0xcb/0x1c0 [ 2760.135356][T24286] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2760.141213][T24286] RIP: 0033:0x7f3d26b7c0e9 [ 2760.145599][T24286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2760.165172][T24286] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 09:58:56 executing program 4: ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x3, 0x1, 0x20}) unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:58:56 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 09:58:56 executing program 4: ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x3, 0x1, 0x20}) unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x3, 0x1, 0x20}) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) [ 2760.173549][T24286] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2760.181492][T24286] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2760.189433][T24286] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2760.197390][T24286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2760.205343][T24286] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:58:56 executing program 4: ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x3, 0x1, 0x20}) unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x3, 0x1, 0x20}) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:58:56 executing program 4: unshare(0x600) capget(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x7fff, 0x800002, 0x9, 0xe94, 0x6, 0x6}) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) [ 2760.337767][T24303] FAULT_INJECTION: forcing a failure. [ 2760.337767][T24303] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2760.351005][T24303] CPU: 1 PID: 24303 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2760.361206][T24303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2760.371232][T24303] Call Trace: [ 2760.374495][T24303] dump_stack+0x18e/0x1d5 [ 2760.378806][T24303] should_fail+0x604/0x770 [ 2760.383205][T24303] __alloc_pages_nodemask+0x12a/0x6f0 [ 2760.388546][T24303] pte_alloc_one+0x1b/0xb0 [ 2760.392930][T24303] __pte_alloc+0x1d/0x1c0 [ 2760.397236][T24303] copy_pte_range+0xf2c/0x1610 [ 2760.401971][T24303] copy_page_range+0x7b0/0xb00 [ 2760.406706][T24303] dup_mmap+0x829/0xb60 [ 2760.410832][T24303] dup_mm+0x8c/0x300 [ 2760.414698][T24303] copy_mm+0xe8/0x180 [ 2760.418648][T24303] copy_process+0x1048/0x3220 [ 2760.423294][T24303] ? proc_fail_nth_write+0x157/0x1c0 [ 2760.428545][T24303] _do_fork+0x142/0x730 [ 2760.432669][T24303] __x64_sys_clone+0x213/0x260 [ 2760.437418][T24303] do_syscall_64+0xcb/0x1c0 [ 2760.441893][T24303] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2760.447750][T24303] RIP: 0033:0x7fd3d983a0e9 [ 2760.452131][T24303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2760.471702][T24303] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2760.480078][T24303] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2760.488016][T24303] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2760.495954][T24303] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2760.503892][T24303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2760.511835][T24303] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:56 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:56 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 09:58:56 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@empty, @private, 0x0}, &(0x7f0000000080)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000023c0)={0xffffffffffffffff, 0xe0, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000021c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000002200), &(0x7f0000002240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002280)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000002480)={'ip6_vti0\x00', &(0x7f0000002400)={'syztnl2\x00', 0x0, 0x0, 0x6, 0xff, 0x8, 0x1, @dev={0xfe, 0x80, '\x00', 0xd}, @loopback, 0x8, 0x10, 0xffffffff, 0x3}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002540)={'syztnl0\x00', &(0x7f00000024c0)={'syztnl0\x00', 0x0, 0x29, 0x82, 0x8, 0x83, 0x28, @mcast1, @rand_addr=' \x01\x00', 0x20, 0x7800, 0xffff, 0x8}}) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002880)={0xffffffffffffffff, 0xe0, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000002580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000025c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002600)=[0x0], 0x0, 0x8, &(0x7f0000002640)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000026c0), &(0x7f0000002700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002740)}}, 0x10) (rerun: 32) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000003100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000030c0)={&(0x7f00000028c0)={0x7d8, 0x0, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8}, {0x17c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x9, 0x0, 0x40, 0x3}, {0x3, 0xff, 0x1f, 0x261}, {0x1, 0x0, 0x9, 0x10000}, {0x2, 0xfe, 0x9, 0x81}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xba4b}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @user_linkup_enabled={{}, {0x0, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x6, 0x6, 0xfe, 0x2}, {0x2, 0xe, 0xff, 0x3ff}, {0x57f, 0xb5, 0x9, 0xa509}, {0x7, 0x6, 0x5, 0xd08}, {0x8001, 0x7f, 0x3f, 0x8}, {0x3, 0x20, 0x9}, {0x400, 0x3, 0x3, 0x3ff}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x7d, 0x0, 0xcba}, {0x3, 0x0, 0x56, 0x8}, {0x8, 0x6, 0x0, 0xfffffff7}]}}}]}}, {{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x42}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{}, {}, {0x0, 0x4, [{0x4, 0x7, 0x0, 0x3}]}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r2}, {0x168, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xf6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x232}}, {0x8, 0x6, r4}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80}}, {0x8}}}]}}]}, 0x7d8}, 0x1, 0x0, 0x0, 0x20000801}, 0x40030) r5 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r5, &(0x7f0000000180)={0x2020}, 0x2020) 09:58:56 executing program 4: unshare(0x600) capget(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x7fff, 0x800002, 0x9, 0xe94, 0x6, 0x6}) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:58:56 executing program 2: unshare(0x600) r0 = socket$inet(0x2, 0x1, 0x3) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000000)={0xfffffff8, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e20, @empty}}}, 0x108) unshare(0x480) pselect6(0x40, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0x0, 0x0) 09:58:56 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) [ 2760.637181][T24308] FAULT_INJECTION: forcing a failure. [ 2760.637181][T24308] name failslab, interval 1, probability 0, space 0, times 0 [ 2760.649772][T24308] CPU: 1 PID: 24308 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2760.659978][T24308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2760.670003][T24308] Call Trace: [ 2760.673271][T24308] dump_stack+0x18e/0x1d5 [ 2760.677576][T24308] should_fail+0x604/0x770 [ 2760.681976][T24308] ? dup_mmap+0x46c/0xb60 09:58:56 executing program 4: unshare(0x600) capget(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x7fff, 0x800002, 0x9, 0xe94, 0x6, 0x6}) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) unshare(0x600) (async) capget(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x7fff, 0x800002, 0x9, 0xe94, 0x6, 0x6}) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) [ 2760.686291][T24308] should_failslab+0x5/0x20 [ 2760.690789][T24308] kmem_cache_alloc+0x24/0x210 [ 2760.695547][T24308] dup_mmap+0x46c/0xb60 [ 2760.699699][T24308] dup_mm+0x8c/0x300 [ 2760.703585][T24308] copy_mm+0xe8/0x180 [ 2760.707562][T24308] copy_process+0x1048/0x3220 [ 2760.712229][T24308] ? proc_fail_nth_write+0x157/0x1c0 [ 2760.717511][T24308] _do_fork+0x142/0x730 [ 2760.721658][T24308] __x64_sys_clone+0x213/0x260 [ 2760.726414][T24308] do_syscall_64+0xcb/0x1c0 [ 2760.730902][T24308] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2760.736785][T24308] RIP: 0033:0x7f3d26b7c0e9 [ 2760.741184][T24308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2760.760779][T24308] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2760.769172][T24308] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2760.777126][T24308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 09:58:57 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0), 0x0, 0x10, &(0x7f00000000c0), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) [ 2760.785086][T24308] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2760.793040][T24308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2760.796256][T24319] FAULT_INJECTION: forcing a failure. [ 2760.796256][T24319] name failslab, interval 1, probability 0, space 0, times 0 [ 2760.800992][T24308] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2760.828372][T24319] CPU: 0 PID: 24319 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2760.838609][T24319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2760.838613][T24319] Call Trace: [ 2760.838631][T24319] dump_stack+0x18e/0x1d5 [ 2760.838644][T24319] should_fail+0x604/0x770 [ 2760.838655][T24319] ? anon_vma_clone+0xa1/0x4d0 [ 2760.838663][T24319] should_failslab+0x5/0x20 [ 2760.838674][T24319] kmem_cache_alloc+0x24/0x210 [ 2760.838683][T24319] anon_vma_clone+0xa1/0x4d0 [ 2760.838693][T24319] anon_vma_fork+0x8c/0x4d0 [ 2760.838701][T24319] ? dup_mmap+0x46c/0xb60 09:58:57 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) [ 2760.838709][T24319] dup_mmap+0x536/0xb60 [ 2760.838722][T24319] dup_mm+0x8c/0x300 [ 2760.838732][T24319] copy_mm+0xe8/0x180 [ 2760.838742][T24319] copy_process+0x1048/0x3220 [ 2760.838754][T24319] ? proc_fail_nth_write+0x157/0x1c0 [ 2760.838766][T24319] _do_fork+0x142/0x730 [ 2760.838777][T24319] __x64_sys_clone+0x213/0x260 [ 2760.838789][T24319] do_syscall_64+0xcb/0x1c0 [ 2760.838800][T24319] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2760.838807][T24319] RIP: 0033:0x7fd3d983a0e9 [ 2760.838821][T24319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2760.953110][T24319] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2760.961511][T24319] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2760.969464][T24319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2760.977418][T24319] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 09:58:57 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0), 0x0, 0x10, &(0x7f00000000c0), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (rerun: 32) 09:58:57 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0), 0x0, 0x10, &(0x7f00000000c0), &(0x7f00000003c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) [ 2760.985374][T24319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2760.993330][T24319] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2761.013513][T24331] FAULT_INJECTION: forcing a failure. [ 2761.013513][T24331] name failslab, interval 1, probability 0, space 0, times 0 [ 2761.026602][T24331] CPU: 1 PID: 24331 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 09:58:57 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) [ 2761.036830][T24331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2761.046871][T24331] Call Trace: [ 2761.050154][T24331] dump_stack+0x18e/0x1d5 [ 2761.054474][T24331] should_fail+0x604/0x770 [ 2761.058877][T24331] ? anon_vma_clone+0xa1/0x4d0 [ 2761.063629][T24331] should_failslab+0x5/0x20 [ 2761.063646][T24331] kmem_cache_alloc+0x24/0x210 [ 2761.072867][T24331] anon_vma_clone+0xa1/0x4d0 [ 2761.077448][T24331] anon_vma_fork+0x8c/0x4d0 [ 2761.081942][T24331] ? dup_mmap+0x46c/0xb60 [ 2761.086252][T24331] dup_mmap+0x536/0xb60 [ 2761.090377][T24331] dup_mm+0x8c/0x300 [ 2761.094242][T24331] copy_mm+0xe8/0x180 [ 2761.098189][T24331] copy_process+0x1048/0x3220 [ 2761.102835][T24331] ? proc_fail_nth_write+0x157/0x1c0 [ 2761.108086][T24331] _do_fork+0x142/0x730 [ 2761.112213][T24331] __x64_sys_clone+0x213/0x260 [ 2761.116945][T24331] do_syscall_64+0xcb/0x1c0 [ 2761.121415][T24331] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2761.127276][T24331] RIP: 0033:0x7f3d26b7c0e9 [ 2761.131665][T24331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2761.151236][T24331] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2761.159664][T24331] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2761.167614][T24331] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2761.175571][T24331] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2761.183523][T24331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2761.191480][T24331] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:58:57 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:57 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:58:57 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) 09:58:57 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000040)={@empty, @private, 0x0}, &(0x7f0000000080)=0xc) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000023c0)={0xffffffffffffffff, 0xe0, &(0x7f00000022c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000021c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000002200), &(0x7f0000002240), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002280)}}, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000002480)={'ip6_vti0\x00', &(0x7f0000002400)={'syztnl2\x00', 0x0, 0x0, 0x6, 0xff, 0x8, 0x1, @dev={0xfe, 0x80, '\x00', 0xd}, @loopback, 0x8, 0x10, 0xffffffff, 0x3}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000002540)={'syztnl0\x00', &(0x7f00000024c0)={'syztnl0\x00', 0x0, 0x29, 0x82, 0x8, 0x83, 0x28, @mcast1, @rand_addr=' \x01\x00', 0x20, 0x7800, 0xffff, 0x8}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002880)={0xffffffffffffffff, 0xe0, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000002580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000025c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002600)=[0x0], 0x0, 0x8, &(0x7f0000002640)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000026c0), &(0x7f0000002700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002740)}}, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000003100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000030c0)={&(0x7f00000028c0)={0x7d8, 0x0, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8}, {0x17c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x9, 0x0, 0x40, 0x3}, {0x3, 0xff, 0x1f, 0x261}, {0x1, 0x0, 0x9, 0x10000}, {0x2, 0xfe, 0x9, 0x81}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}]}}, {{0x8, 0x1, r2}, {0x78, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xba4b}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x1b4, 0x2, 0x0, 0x1, [{0x40, 0x1, @user_linkup_enabled={{}, {0x0, 0x6, r4}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x6, 0x6, 0xfe, 0x2}, {0x2, 0xe, 0xff, 0x3ff}, {0x57f, 0xb5, 0x9, 0xa509}, {0x7, 0x6, 0x5, 0xd08}, {0x8001, 0x7f, 0x3f, 0x8}, {0x3, 0x20, 0x9}, {0x400, 0x3, 0x3, 0x3ff}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x3, 0x7d, 0x0, 0xcba}, {0x3, 0x0, 0x56, 0x8}, {0x8, 0x6, 0x0, 0xfffffff7}]}}}]}}, {{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x42}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{}, {}, {0x0, 0x4, [{0x4, 0x7, 0x0, 0x3}]}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8, 0x1, r2}, {0x168, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xf6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x232}}, {0x8, 0x6, r4}}}]}}, {{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x80}}, {0x8}}}]}}]}, 0x7d8}, 0x1, 0x0, 0x0, 0x20000801}, 0x40030) r5 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r5, &(0x7f0000000180)={0x2020}, 0x2020) 09:58:57 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) 09:58:57 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:58:57 executing program 2: unshare(0x300) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) clock_getres(0x5, &(0x7f0000000000)) 09:58:57 executing program 2: unshare(0x300) (async, rerun: 32) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) clock_getres(0x5, &(0x7f0000000000)) 09:58:57 executing program 4: unshare(0x600) unshare(0x800) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0xa, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:58:57 executing program 2: unshare(0x300) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) clock_getres(0x5, &(0x7f0000000000)) 09:58:57 executing program 4: unshare(0x600) unshare(0x800) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0xa, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:58:57 executing program 2: unshare(0x64000000) pselect6(0x40, &(0x7f0000000180)={0x200000000868f, 0x0, 0x6, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0) setrlimit(0x9, &(0x7f0000000000)={0x8, 0x8}) rt_sigtimedwait(&(0x7f0000000040)={[0x80000001]}, &(0x7f0000000080), &(0x7f0000000100)={0x77359400}, 0x8) [ 2761.774189][T24376] FAULT_INJECTION: forcing a failure. [ 2761.774189][T24376] name failslab, interval 1, probability 0, space 0, times 0 [ 2761.787324][T24376] CPU: 1 PID: 24376 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2761.797499][T24378] FAULT_INJECTION: forcing a failure. [ 2761.797499][T24378] name failslab, interval 1, probability 0, space 0, times 0 [ 2761.797553][T24376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2761.820136][T24376] Call Trace: [ 2761.823410][T24376] dump_stack+0x18e/0x1d5 [ 2761.827718][T24376] should_fail+0x604/0x770 [ 2761.832111][T24376] ? anon_vma_clone+0xa1/0x4d0 [ 2761.836851][T24376] should_failslab+0x5/0x20 [ 2761.841329][T24376] kmem_cache_alloc+0x24/0x210 [ 2761.846070][T24376] anon_vma_clone+0xa1/0x4d0 [ 2761.850656][T24376] anon_vma_fork+0x8c/0x4d0 [ 2761.855143][T24376] ? dup_mmap+0x46c/0xb60 [ 2761.859453][T24376] dup_mmap+0x536/0xb60 [ 2761.863592][T24376] dup_mm+0x8c/0x300 [ 2761.867464][T24376] copy_mm+0xe8/0x180 [ 2761.871426][T24376] copy_process+0x1048/0x3220 [ 2761.876084][T24376] ? proc_fail_nth_write+0x157/0x1c0 [ 2761.881348][T24376] _do_fork+0x142/0x730 [ 2761.885482][T24376] __x64_sys_clone+0x213/0x260 [ 2761.890227][T24376] do_syscall_64+0xcb/0x1c0 [ 2761.894709][T24376] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2761.900576][T24376] RIP: 0033:0x7f3d26b7c0e9 [ 2761.904975][T24376] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2761.924554][T24376] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2761.932937][T24376] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2761.940882][T24376] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2761.948856][T24376] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2761.956803][T24376] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2761.964748][T24376] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2761.972706][T24378] CPU: 0 PID: 24378 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2761.982935][T24378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2761.992973][T24378] Call Trace: [ 2761.996256][T24378] dump_stack+0x18e/0x1d5 [ 2762.000572][T24378] should_fail+0x604/0x770 [ 2762.004972][T24378] ? anon_vma_clone+0xa1/0x4d0 [ 2762.009718][T24378] should_failslab+0x5/0x20 [ 2762.014211][T24378] kmem_cache_alloc+0x24/0x210 [ 2762.018966][T24378] anon_vma_clone+0xa1/0x4d0 [ 2762.023541][T24378] anon_vma_fork+0x8c/0x4d0 [ 2762.028015][T24378] ? dup_mmap+0x46c/0xb60 [ 2762.032311][T24378] dup_mmap+0x536/0xb60 [ 2762.036435][T24378] dup_mm+0x8c/0x300 [ 2762.040300][T24378] copy_mm+0xe8/0x180 [ 2762.044258][T24378] copy_process+0x1048/0x3220 [ 2762.048908][T24378] ? proc_fail_nth_write+0x157/0x1c0 [ 2762.054166][T24378] _do_fork+0x142/0x730 [ 2762.058290][T24378] __x64_sys_clone+0x213/0x260 [ 2762.063022][T24378] do_syscall_64+0xcb/0x1c0 [ 2762.067498][T24378] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2762.073358][T24378] RIP: 0033:0x7fd3d983a0e9 [ 2762.077740][T24378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2762.097313][T24378] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2762.105692][T24378] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2762.113630][T24378] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2762.121569][T24378] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2762.129508][T24378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2762.137447][T24378] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:58 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:58 executing program 4: unshare(0x600) unshare(0x800) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0xa, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) unshare(0x600) (async) unshare(0x800) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0xa, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:58:58 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) 09:58:58 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) 09:58:58 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0xa}, 0x0, 0x0, 0x0) 09:58:58 executing program 4: ptrace$getregs(0xc, 0xffffffffffffffff, 0x3, &(0x7f0000000200)=""/251) unshare(0x10080) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0xfffffffffffffffc}, &(0x7f00000001c0)={0x8000000000000001, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) ptrace$getregs(0xc, r0, 0x78e, &(0x7f0000000000)=""/131) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x141b00, 0x0) 09:58:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x1000, 0x1, 0x6, 0x135b, 0xffffffffffffffff, 0xff, '\x00', 0x0, r1, 0x5, 0x2, 0x1}, 0x48) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:58:58 executing program 4: ptrace$getregs(0xc, 0xffffffffffffffff, 0x3, &(0x7f0000000200)=""/251) (async, rerun: 64) unshare(0x10080) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0xfffffffffffffffc}, &(0x7f00000001c0)={0x8000000000000001, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) ptrace$getregs(0xc, r0, 0x78e, &(0x7f0000000000)=""/131) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x141b00, 0x0) 09:58:58 executing program 5: unshare(0x4000600) pselect6(0x40, &(0x7f0000000180)={0xfffffffffffffff5, 0x0, 0x20, 0xfffffffffffffffe, 0x0, 0x5, 0x40, 0x7fffffffffffffff}, 0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xffffffffffffe830]}, &(0x7f0000000040), 0x8) unshare(0x26020000) 09:58:58 executing program 5: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x7f4b]}, &(0x7f0000000040), &(0x7f00000000c0)={r1, r2+10000000}, 0x59) 09:58:58 executing program 4: ptrace$getregs(0xc, 0xffffffffffffffff, 0x3, &(0x7f0000000200)=""/251) unshare(0x10080) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0xfffffffffffffffc}, &(0x7f00000001c0)={0x8000000000000001, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) ptrace$getregs(0xc, r0, 0x78e, &(0x7f0000000000)=""/131) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x141b00, 0x0) ptrace$getregs(0xc, 0xffffffffffffffff, 0x3, &(0x7f0000000200)=""/251) (async) unshare(0x10080) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0xfffffffffffffffc}, &(0x7f00000001c0)={0x8000000000000001, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) (async) getpgid(0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) (async) ptrace$getregs(0xc, r0, 0x78e, &(0x7f0000000000)=""/131) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x141b00, 0x0) (async) 09:58:58 executing program 2: unshare(0x64000000) (async) pselect6(0x40, &(0x7f0000000180)={0x200000000868f, 0x0, 0x6, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0) (async) setrlimit(0x9, &(0x7f0000000000)={0x8, 0x8}) rt_sigtimedwait(&(0x7f0000000040)={[0x80000001]}, &(0x7f0000000080), &(0x7f0000000100)={0x77359400}, 0x8) 09:58:58 executing program 5: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:58:58 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0xfffffffefffffffc}, 0x0, 0x0, 0x0) [ 2762.640759][T24425] FAULT_INJECTION: forcing a failure. [ 2762.640759][T24425] name failslab, interval 1, probability 0, space 0, times 0 [ 2762.647721][T24426] FAULT_INJECTION: forcing a failure. [ 2762.647721][T24426] name failslab, interval 1, probability 0, space 0, times 0 [ 2762.653708][T24425] CPU: 1 PID: 24425 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2762.676137][T24425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2762.686165][T24425] Call Trace: [ 2762.689437][T24425] dump_stack+0x18e/0x1d5 [ 2762.693743][T24425] should_fail+0x604/0x770 [ 2762.698136][T24425] ? anon_vma_clone+0xa1/0x4d0 [ 2762.702875][T24425] should_failslab+0x5/0x20 [ 2762.707356][T24425] kmem_cache_alloc+0x24/0x210 [ 2762.712098][T24425] anon_vma_clone+0xa1/0x4d0 [ 2762.716664][T24425] anon_vma_fork+0x8c/0x4d0 [ 2762.721141][T24425] ? dup_mmap+0x46c/0xb60 [ 2762.725445][T24425] dup_mmap+0x536/0xb60 [ 2762.729578][T24425] dup_mm+0x8c/0x300 [ 2762.733449][T24425] copy_mm+0xe8/0x180 [ 2762.737410][T24425] copy_process+0x1048/0x3220 [ 2762.742081][T24425] ? proc_fail_nth_write+0x157/0x1c0 [ 2762.747362][T24425] _do_fork+0x142/0x730 [ 2762.751523][T24425] __x64_sys_clone+0x213/0x260 [ 2762.756274][T24425] do_syscall_64+0xcb/0x1c0 [ 2762.760756][T24425] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2762.766626][T24425] RIP: 0033:0x7fd3d983a0e9 [ 2762.771021][T24425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2762.790601][T24425] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2762.798985][T24425] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2762.806931][T24425] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2762.814880][T24425] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2762.822827][T24425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2762.830773][T24425] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:59 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) [ 2762.838734][T24426] CPU: 0 PID: 24426 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2762.848959][T24426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2762.858997][T24426] Call Trace: [ 2762.862276][T24426] dump_stack+0x18e/0x1d5 [ 2762.866596][T24426] should_fail+0x604/0x770 [ 2762.870999][T24426] ? anon_vma_clone+0xa1/0x4d0 [ 2762.875748][T24426] should_failslab+0x5/0x20 [ 2762.880235][T24426] kmem_cache_alloc+0x24/0x210 [ 2762.884979][T24426] anon_vma_clone+0xa1/0x4d0 [ 2762.889553][T24426] anon_vma_fork+0x8c/0x4d0 [ 2762.894050][T24426] ? dup_mmap+0x46c/0xb60 [ 2762.898367][T24426] dup_mmap+0x536/0xb60 [ 2762.902512][T24426] dup_mm+0x8c/0x300 [ 2762.906394][T24426] copy_mm+0xe8/0x180 [ 2762.910366][T24426] copy_process+0x1048/0x3220 [ 2762.915033][T24426] ? proc_fail_nth_write+0x157/0x1c0 [ 2762.920309][T24426] _do_fork+0x142/0x730 [ 2762.924449][T24426] __x64_sys_clone+0x213/0x260 [ 2762.929194][T24426] do_syscall_64+0xcb/0x1c0 [ 2762.933679][T24426] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2762.939552][T24426] RIP: 0033:0x7f3d26b7c0e9 [ 2762.943948][T24426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2762.963536][T24426] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2762.971934][T24426] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2762.979889][T24426] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2762.984380][T24430] FAULT_INJECTION: forcing a failure. [ 2762.984380][T24430] name failslab, interval 1, probability 0, space 0, times 0 [ 2762.987844][T24426] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2762.987850][T24426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2762.987855][T24426] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2763.034815][T24430] CPU: 0 PID: 24430 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2763.045049][T24430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2763.055087][T24430] Call Trace: [ 2763.058364][T24430] dump_stack+0x18e/0x1d5 [ 2763.062683][T24430] should_fail+0x604/0x770 [ 2763.067087][T24430] ? anon_vma_fork+0xed/0x4d0 [ 2763.071743][T24430] should_failslab+0x5/0x20 [ 2763.076222][T24430] kmem_cache_alloc+0x24/0x210 [ 2763.080955][T24430] anon_vma_fork+0xed/0x4d0 [ 2763.085422][T24430] ? dup_mmap+0x46c/0xb60 [ 2763.089718][T24430] dup_mmap+0x536/0xb60 [ 2763.093840][T24430] dup_mm+0x8c/0x300 [ 2763.097704][T24430] copy_mm+0xe8/0x180 [ 2763.101652][T24430] copy_process+0x1048/0x3220 [ 2763.106297][T24430] ? proc_fail_nth_write+0x157/0x1c0 [ 2763.111552][T24430] _do_fork+0x142/0x730 [ 2763.115676][T24430] __x64_sys_clone+0x213/0x260 [ 2763.120406][T24430] do_syscall_64+0xcb/0x1c0 [ 2763.124877][T24430] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2763.130735][T24430] RIP: 0033:0x7fd3d983a0e9 [ 2763.135119][T24430] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2763.154689][T24430] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2763.163067][T24430] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2763.171008][T24430] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2763.178956][T24430] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 09:58:59 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) [ 2763.186895][T24430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2763.194834][T24430] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:58:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x1000, 0x1, 0x6, 0x135b, 0xffffffffffffffff, 0xff, '\x00', 0x0, r1, 0x5, 0x2, 0x1}, 0x48) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:58:59 executing program 5: unshare(0x64000000) pselect6(0x40, &(0x7f0000000180)={0x200000000868f, 0x0, 0x6, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0) setrlimit(0x9, &(0x7f0000000000)={0x8, 0x8}) rt_sigtimedwait(&(0x7f0000000040)={[0x80000001]}, &(0x7f0000000080), &(0x7f0000000100)={0x77359400}, 0x8) 09:58:59 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0xfffffffefffffffc}, 0x0, 0x0, 0x0) 09:58:59 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) [ 2763.333897][T24434] FAULT_INJECTION: forcing a failure. [ 2763.333897][T24434] name failslab, interval 1, probability 0, space 0, times 0 [ 2763.351888][T24434] CPU: 0 PID: 24434 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2763.362138][T24434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2763.362148][T24434] Call Trace: [ 2763.375460][T24434] dump_stack+0x18e/0x1d5 [ 2763.379788][T24434] should_fail+0x604/0x770 09:58:59 executing program 2: unshare(0x64000000) (async) pselect6(0x40, &(0x7f0000000180)={0x200000000868f, 0x0, 0x6, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0) (async) setrlimit(0x9, &(0x7f0000000000)={0x8, 0x8}) (async) rt_sigtimedwait(&(0x7f0000000040)={[0x80000001]}, &(0x7f0000000080), &(0x7f0000000100)={0x77359400}, 0x8) [ 2763.384189][T24434] ? anon_vma_fork+0xed/0x4d0 [ 2763.388846][T24434] should_failslab+0x5/0x20 [ 2763.393335][T24434] kmem_cache_alloc+0x24/0x210 [ 2763.398084][T24434] anon_vma_fork+0xed/0x4d0 [ 2763.402569][T24434] ? dup_mmap+0x46c/0xb60 [ 2763.406882][T24434] dup_mmap+0x536/0xb60 [ 2763.411027][T24434] dup_mm+0x8c/0x300 [ 2763.414907][T24434] copy_mm+0xe8/0x180 [ 2763.418883][T24434] copy_process+0x1048/0x3220 [ 2763.423550][T24434] ? proc_fail_nth_write+0x157/0x1c0 [ 2763.428824][T24434] _do_fork+0x142/0x730 [ 2763.432967][T24434] __x64_sys_clone+0x213/0x260 [ 2763.437717][T24434] do_syscall_64+0xcb/0x1c0 [ 2763.442209][T24434] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2763.448090][T24434] RIP: 0033:0x7f3d26b7c0e9 [ 2763.452491][T24434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2763.472082][T24434] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 09:58:59 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0xfffffffefffffffc}, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0xfffffffefffffffc}, 0x0, 0x0, 0x0) (async) [ 2763.480478][T24434] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2763.487394][T24452] FAULT_INJECTION: forcing a failure. [ 2763.487394][T24452] name failslab, interval 1, probability 0, space 0, times 0 [ 2763.488432][T24434] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2763.488438][T24434] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2763.488443][T24434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2763.488448][T24434] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2763.552588][T24452] CPU: 1 PID: 24452 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2763.562831][T24452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2763.572872][T24452] Call Trace: [ 2763.576158][T24452] dump_stack+0x18e/0x1d5 [ 2763.580476][T24452] should_fail+0x604/0x770 [ 2763.584877][T24452] ? anon_vma_fork+0x1b6/0x4d0 [ 2763.589625][T24452] should_failslab+0x5/0x20 [ 2763.594111][T24452] kmem_cache_alloc+0x24/0x210 09:58:59 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) [ 2763.598857][T24452] anon_vma_fork+0x1b6/0x4d0 [ 2763.603428][T24452] ? dup_mmap+0x46c/0xb60 [ 2763.607748][T24452] dup_mmap+0x536/0xb60 [ 2763.611892][T24452] dup_mm+0x8c/0x300 [ 2763.615772][T24452] copy_mm+0xe8/0x180 [ 2763.619746][T24452] copy_process+0x1048/0x3220 [ 2763.624409][T24452] ? proc_fail_nth_write+0x157/0x1c0 [ 2763.629681][T24452] _do_fork+0x142/0x730 [ 2763.633825][T24452] __x64_sys_clone+0x213/0x260 [ 2763.638571][T24452] do_syscall_64+0xcb/0x1c0 [ 2763.643062][T24452] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2763.648931][T24452] RIP: 0033:0x7fd3d983a0e9 [ 2763.653330][T24452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2763.672915][T24452] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2763.681310][T24452] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2763.689264][T24452] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 09:58:59 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000000)={{0x3b, @multicast1, 0x4e24, 0x1, 'rr\x00', 0x4, 0xf0000000, 0x26}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x4e21, 0x1, 0x0, 0xfffffff8, 0x1}}, 0x44) unshare(0x20b00) [ 2763.697216][T24452] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2763.699011][T24458] FAULT_INJECTION: forcing a failure. [ 2763.699011][T24458] name failslab, interval 1, probability 0, space 0, times 0 [ 2763.705168][T24452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2763.705172][T24452] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2763.735518][T24458] CPU: 0 PID: 24458 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2763.745741][T24458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2763.755774][T24458] Call Trace: [ 2763.759053][T24458] dump_stack+0x18e/0x1d5 [ 2763.763368][T24458] should_fail+0x604/0x770 [ 2763.767769][T24458] ? anon_vma_fork+0x1b6/0x4d0 [ 2763.772514][T24458] should_failslab+0x5/0x20 [ 2763.777003][T24458] kmem_cache_alloc+0x24/0x210 [ 2763.781751][T24458] anon_vma_fork+0x1b6/0x4d0 [ 2763.786327][T24458] ? dup_mmap+0x46c/0xb60 [ 2763.790636][T24458] dup_mmap+0x536/0xb60 [ 2763.794777][T24458] dup_mm+0x8c/0x300 [ 2763.798657][T24458] copy_mm+0xe8/0x180 [ 2763.802627][T24458] copy_process+0x1048/0x3220 [ 2763.807293][T24458] ? proc_fail_nth_write+0x157/0x1c0 [ 2763.812572][T24458] _do_fork+0x142/0x730 [ 2763.816719][T24458] __x64_sys_clone+0x213/0x260 [ 2763.821471][T24458] do_syscall_64+0xcb/0x1c0 [ 2763.825962][T24458] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2763.831849][T24458] RIP: 0033:0x7f3d26b7c0e9 09:59:00 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 09:59:00 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000000)={{0x3b, @multicast1, 0x4e24, 0x1, 'rr\x00', 0x4, 0xf0000000, 0x26}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x4e21, 0x1, 0x0, 0xfffffff8, 0x1}}, 0x44) (async) unshare(0x20b00) 09:59:00 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000000)={{0x3b, @multicast1, 0x4e24, 0x1, 'rr\x00', 0x4, 0xf0000000, 0x26}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x4e21, 0x1, 0x0, 0xfffffff8, 0x1}}, 0x44) unshare(0x20b00) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000000)={{0x3b, @multicast1, 0x4e24, 0x1, 'rr\x00', 0x4, 0xf0000000, 0x26}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x4e21, 0x1, 0x0, 0xfffffff8, 0x1}}, 0x44) (async) unshare(0x20b00) (async) [ 2763.836250][T24458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2763.855841][T24458] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2763.864236][T24458] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2763.872199][T24458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2763.880159][T24458] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2763.888118][T24458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2763.896076][T24458] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2763.923381][T24476] FAULT_INJECTION: forcing a failure. [ 2763.923381][T24476] name failslab, interval 1, probability 0, space 0, times 0 [ 2763.942488][T24476] CPU: 1 PID: 24476 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2763.952726][T24476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2763.962769][T24476] Call Trace: [ 2763.966056][T24476] dump_stack+0x18e/0x1d5 [ 2763.970377][T24476] should_fail+0x604/0x770 [ 2763.974781][T24476] ? dup_mmap+0x46c/0xb60 [ 2763.979094][T24476] should_failslab+0x5/0x20 [ 2763.983582][T24476] kmem_cache_alloc+0x24/0x210 [ 2763.988330][T24476] dup_mmap+0x46c/0xb60 [ 2763.992477][T24476] dup_mm+0x8c/0x300 [ 2763.996359][T24476] copy_mm+0xe8/0x180 [ 2764.000324][T24476] copy_process+0x1048/0x3220 [ 2764.004989][T24476] ? proc_fail_nth_write+0x157/0x1c0 [ 2764.010269][T24476] _do_fork+0x142/0x730 [ 2764.014422][T24476] __x64_sys_clone+0x213/0x260 [ 2764.019180][T24476] do_syscall_64+0xcb/0x1c0 09:59:00 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r0 = socket(0x6, 0x3, 0x3) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x214, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x4, 0x8, 0x7f, 0x9}, {0x1, 0xff, 0x0, 0x3}, {0x4, 0x3, 0x70, 0x1000}, {0x8000, 0x3, 0x1f}, {0x6, 0xfd, 0x20, 0x80}, {0x1000, 0xc, 0x1f, 0x40}, {0x40, 0x8, 0x43, 0x1}]}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x214}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x109800, 0x0) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_FLAGS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40) [ 2764.023676][T24476] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2764.029549][T24476] RIP: 0033:0x7fd3d983a0e9 [ 2764.033947][T24476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2764.053544][T24476] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2764.053561][T24476] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2764.069897][T24476] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2764.077845][T24476] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2764.085785][T24476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2764.093727][T24476] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:59:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x1000, 0x1, 0x6, 0x135b, 0xffffffffffffffff, 0xff, '\x00', 0x0, r1, 0x5, 0x2, 0x1}, 0x48) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x1000, 0x1, 0x6, 0x135b, 0xffffffffffffffff, 0xff, '\x00', 0x0, r1, 0x5, 0x2, 0x1}, 0x48) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 09:59:00 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) r0 = socket(0x6, 0x3, 0x3) (async) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x214, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x4, 0x8, 0x7f, 0x9}, {0x1, 0xff, 0x0, 0x3}, {0x4, 0x3, 0x70, 0x1000}, {0x8000, 0x3, 0x1f}, {0x6, 0xfd, 0x20, 0x80}, {0x1000, 0xc, 0x1f, 0x40}, {0x40, 0x8, 0x43, 0x1}]}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x214}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x109800, 0x0) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_FLAGS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40) 09:59:00 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) 09:59:00 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 09:59:00 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000180)={0x300, 0xff, 0x7f, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0) 09:59:00 executing program 5: unshare(0x600) unshare(0x4020100) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:59:00 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r0 = socket(0x6, 0x3, 0x3) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x214, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x4, 0x8, 0x7f, 0x9}, {0x1, 0xff, 0x0, 0x3}, {0x4, 0x3, 0x70, 0x1000}, {0x8000, 0x3, 0x1f}, {0x6, 0xfd, 0x20, 0x80}, {0x1000, 0xc, 0x1f, 0x40}, {0x40, 0x8, 0x43, 0x1}]}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x214}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x109800, 0x0) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_FLAGS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) socket(0x6, 0x3, 0x3) (async) syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x214, r1, 0x100, 0x70bd25, 0x25dfdbfd, {}, [{{0x8}, {0x70, 0x2, 0x0, 0x1, [{0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x4, 0x8, 0x7f, 0x9}, {0x1, 0xff, 0x0, 0x3}, {0x4, 0x3, 0x70, 0x1000}, {0x8000, 0x3, 0x1f}, {0x6, 0xfd, 0x20, 0x80}, {0x1000, 0xc, 0x1f, 0x40}, {0x40, 0x8, 0x43, 0x1}]}}}]}}, {{0x8}, {0x7c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x214}, 0x1, 0x0, 0x0, 0x10}, 0x4004000) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x109800, 0x0) (async) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_FLAGS={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x40) (async) 09:59:00 executing program 2: unshare(0x600) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0xff, 0x7f, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0) 09:59:00 executing program 5: unshare(0x600) unshare(0x4020100) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000040)={0x0, @multicast2, 0x4e20, 0x3, 'sh\x00', 0x10, 0x3, 0x14}, 0x2c) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) unshare(0x4000180) pselect6(0x40, &(0x7f0000000180)={0x0, 0x7, 0x0, 0x0, 0x3, 0xfffffffffffffffc, 0x0, 0x2}, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x0, 0x8000, 0xfffffffffffffffe}, 0x0, 0x0, 0x0) 09:59:00 executing program 4: unshare(0x600) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000200)="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", 0x1000) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x20, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) 09:59:00 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:00 executing program 4: unshare(0x600) (async) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000200)="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", 0x1000) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x20, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) [ 2764.324961][T24512] FAULT_INJECTION: forcing a failure. [ 2764.324961][T24512] name failslab, interval 1, probability 0, space 0, times 0 [ 2764.343868][T24512] CPU: 1 PID: 24512 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2764.354101][T24512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2764.362514][T24519] FAULT_INJECTION: forcing a failure. [ 2764.362514][T24519] name failslab, interval 1, probability 0, space 0, times 0 [ 2764.364139][T24512] Call Trace: [ 2764.364155][T24512] dump_stack+0x18e/0x1d5 [ 2764.364172][T24512] should_fail+0x604/0x770 [ 2764.388668][T24512] ? dup_mmap+0x46c/0xb60 [ 2764.392973][T24512] should_failslab+0x5/0x20 [ 2764.397449][T24512] kmem_cache_alloc+0x24/0x210 [ 2764.402188][T24512] dup_mmap+0x46c/0xb60 [ 2764.406325][T24512] dup_mm+0x8c/0x300 [ 2764.410196][T24512] copy_mm+0xe8/0x180 [ 2764.414157][T24512] copy_process+0x1048/0x3220 [ 2764.418811][T24512] ? proc_fail_nth_write+0x157/0x1c0 [ 2764.424075][T24512] _do_fork+0x142/0x730 [ 2764.428212][T24512] __x64_sys_clone+0x213/0x260 [ 2764.432955][T24512] do_syscall_64+0xcb/0x1c0 [ 2764.437433][T24512] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2764.443297][T24512] RIP: 0033:0x7f3d26b7c0e9 [ 2764.447692][T24512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2764.467269][T24512] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2764.475652][T24512] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2764.483597][T24512] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2764.491546][T24512] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2764.499490][T24512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2764.507435][T24512] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2764.515389][T24519] CPU: 0 PID: 24519 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2764.525607][T24519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2764.535648][T24519] Call Trace: [ 2764.538931][T24519] dump_stack+0x18e/0x1d5 [ 2764.543267][T24519] should_fail+0x604/0x770 [ 2764.547673][T24519] ? anon_vma_clone+0xa1/0x4d0 [ 2764.552421][T24519] should_failslab+0x5/0x20 [ 2764.556909][T24519] kmem_cache_alloc+0x24/0x210 [ 2764.561656][T24519] anon_vma_clone+0xa1/0x4d0 [ 2764.566229][T24519] anon_vma_fork+0x8c/0x4d0 [ 2764.570718][T24519] ? dup_mmap+0x46c/0xb60 [ 2764.575031][T24519] dup_mmap+0x536/0xb60 [ 2764.579175][T24519] dup_mm+0x8c/0x300 [ 2764.583056][T24519] copy_mm+0xe8/0x180 [ 2764.587019][T24519] copy_process+0x1048/0x3220 [ 2764.591682][T24519] ? proc_fail_nth_write+0x157/0x1c0 [ 2764.596960][T24519] _do_fork+0x142/0x730 [ 2764.601098][T24519] __x64_sys_clone+0x213/0x260 [ 2764.605839][T24519] do_syscall_64+0xcb/0x1c0 [ 2764.610317][T24519] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2764.616180][T24519] RIP: 0033:0x7fd3d983a0e9 [ 2764.620563][T24519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2764.640150][T24519] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2764.648527][T24519] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2764.656466][T24519] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2764.664406][T24519] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2764.672344][T24519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2764.680281][T24519] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:59:01 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002080), 0x10400, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, 0xfffffffffffffffc) bind$inet(r1, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x1cbb) ioctl$HIDIOCGSTRING(r1, 0x81044804, &(0x7f00000020c0)={0xd7, "be49082ae722bcaab6675ac262adfdd8076e54fd3c1bbf1e19bebf1db6855b30cf130d117b52da832df6ba7ba711627c954d027cebed21551e705ffbe8bdbfb1e118331a7a4e9a7fcae145d1ed0f6a826854827033fe752b60323f62c3d1b0de109077f95ffe5d8be1c9768b9c28ba139ddf3f11770790166c86e77f84690a5bb6a5ddd8eab9b3b50c39085dc6fb3b8641cf5eccb01a147076f6de2dcb69191229e266c096b4ff534043a3c5b489ce8ac79cada1aaa0cead6f86e23d68dc10b7724c2c1c15378c4227adda1b61cafae62dac1a4cbb4ada"}) 09:59:01 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0xff, 0x7f, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0) 09:59:01 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:01 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) 09:59:01 executing program 4: unshare(0x600) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000200)="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", 0x1000) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x20, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) unshare(0x600) (async) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000200)="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", 0x1000) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x20, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) (async) 09:59:01 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) 09:59:01 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:01 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002080), 0x10400, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) (async) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, 0xfffffffffffffffc) (async) bind$inet(r1, 0x0, 0x0) (async) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) (async) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x1cbb) (async) ioctl$HIDIOCGSTRING(r1, 0x81044804, &(0x7f00000020c0)={0xd7, "be49082ae722bcaab6675ac262adfdd8076e54fd3c1bbf1e19bebf1db6855b30cf130d117b52da832df6ba7ba711627c954d027cebed21551e705ffbe8bdbfb1e118331a7a4e9a7fcae145d1ed0f6a826854827033fe752b60323f62c3d1b0de109077f95ffe5d8be1c9768b9c28ba139ddf3f11770790166c86e77f84690a5bb6a5ddd8eab9b3b50c39085dc6fb3b8641cf5eccb01a147076f6de2dcb69191229e266c096b4ff534043a3c5b489ce8ac79cada1aaa0cead6f86e23d68dc10b7724c2c1c15378c4227adda1b61cafae62dac1a4cbb4ada"}) 09:59:01 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x8300}, 0x0, 0x0, 0x0, 0x0) 09:59:01 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:01 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x8300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x8300}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:01 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002240)={0xa8, 0x0, r1, [{{0x0, 0x3, 0x8001, 0x6c4, 0x6, 0x5732, {0x3, 0x1000, 0x3, 0x800, 0x7ff, 0x9, 0x0, 0x3, 0xff, 0xc000, 0x4, r2, 0x0, 0x100, 0x7}}, {0x2, 0x3}}]}, 0xa8) unshare(0x600) pselect6(0x40, &(0x7f00000000c0)={0xffffffff80000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, &(0x7f00000001c0)={0x3, 0x0, 0x200, 0x3, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000002300)={0x0, 0x7fce}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2, 0x4e20, 0x3, 'fo\x00', 0x20, 0x1, 0x3c}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @empty}, &(0x7f0000000080)=0xc) 09:59:01 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002080), 0x10400, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) (async) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, 0xfffffffffffffffc) (async) bind$inet(r1, 0x0, 0x0) (async) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) (async) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x1cbb) (async) ioctl$HIDIOCGSTRING(r1, 0x81044804, &(0x7f00000020c0)={0xd7, "be49082ae722bcaab6675ac262adfdd8076e54fd3c1bbf1e19bebf1db6855b30cf130d117b52da832df6ba7ba711627c954d027cebed21551e705ffbe8bdbfb1e118331a7a4e9a7fcae145d1ed0f6a826854827033fe752b60323f62c3d1b0de109077f95ffe5d8be1c9768b9c28ba139ddf3f11770790166c86e77f84690a5bb6a5ddd8eab9b3b50c39085dc6fb3b8641cf5eccb01a147076f6de2dcb69191229e266c096b4ff534043a3c5b489ce8ac79cada1aaa0cead6f86e23d68dc10b7724c2c1c15378c4227adda1b61cafae62dac1a4cbb4ada"}) 09:59:01 executing program 5: unshare(0x600) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:01 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002240)={0xa8, 0x0, r1, [{{0x0, 0x3, 0x8001, 0x6c4, 0x6, 0x5732, {0x3, 0x1000, 0x3, 0x800, 0x7ff, 0x9, 0x0, 0x3, 0xff, 0xc000, 0x4, r2, 0x0, 0x100, 0x7}}, {0x2, 0x3}}]}, 0xa8) unshare(0x600) pselect6(0x40, &(0x7f00000000c0)={0xffffffff80000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, &(0x7f00000001c0)={0x3, 0x0, 0x200, 0x3, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000002300)={0x0, 0x7fce}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2, 0x4e20, 0x3, 'fo\x00', 0x20, 0x1, 0x3c}, 0x2c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @empty}, &(0x7f0000000080)=0xc) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) (async) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) (async) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002240)={0xa8, 0x0, r1, [{{0x0, 0x3, 0x8001, 0x6c4, 0x6, 0x5732, {0x3, 0x1000, 0x3, 0x800, 0x7ff, 0x9, 0x0, 0x3, 0xff, 0xc000, 0x4, r2, 0x0, 0x100, 0x7}}, {0x2, 0x3}}]}, 0xa8) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f00000000c0)={0xffffffff80000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, &(0x7f00000001c0)={0x3, 0x0, 0x200, 0x3, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0x0) (async) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000002300)={0x0, 0x7fce}) (async) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2, 0x4e20, 0x3, 'fo\x00', 0x20, 0x1, 0x3c}, 0x2c) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @empty}, &(0x7f0000000080)=0xc) (async) [ 2765.203662][T24571] FAULT_INJECTION: forcing a failure. [ 2765.203662][T24571] name failslab, interval 1, probability 0, space 0, times 0 [ 2765.212473][T24572] FAULT_INJECTION: forcing a failure. [ 2765.212473][T24572] name failslab, interval 1, probability 0, space 0, times 0 [ 2765.216310][T24571] CPU: 1 PID: 24571 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2765.239012][T24571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2765.249042][T24571] Call Trace: [ 2765.252316][T24571] dump_stack+0x18e/0x1d5 [ 2765.256624][T24571] should_fail+0x604/0x770 [ 2765.261018][T24571] ? anon_vma_clone+0xa1/0x4d0 [ 2765.265753][T24571] should_failslab+0x5/0x20 [ 2765.270233][T24571] kmem_cache_alloc+0x24/0x210 [ 2765.274972][T24571] anon_vma_clone+0xa1/0x4d0 [ 2765.279536][T24571] anon_vma_fork+0x8c/0x4d0 [ 2765.284012][T24571] ? dup_mmap+0x46c/0xb60 [ 2765.288314][T24571] dup_mmap+0x536/0xb60 [ 2765.292449][T24571] dup_mm+0x8c/0x300 [ 2765.296324][T24571] copy_mm+0xe8/0x180 [ 2765.300282][T24571] copy_process+0x1048/0x3220 [ 2765.304937][T24571] ? proc_fail_nth_write+0x157/0x1c0 [ 2765.310202][T24571] _do_fork+0x142/0x730 [ 2765.314338][T24571] __x64_sys_clone+0x213/0x260 [ 2765.319076][T24571] do_syscall_64+0xcb/0x1c0 [ 2765.323554][T24571] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2765.329424][T24571] RIP: 0033:0x7f3d26b7c0e9 [ 2765.333817][T24571] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2765.353391][T24571] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2765.361775][T24571] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2765.369716][T24571] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2765.377660][T24571] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2765.385605][T24571] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2765.393554][T24571] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2765.401509][T24572] CPU: 0 PID: 24572 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2765.411726][T24572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2765.421765][T24572] Call Trace: [ 2765.425043][T24572] dump_stack+0x18e/0x1d5 [ 2765.429362][T24572] should_fail+0x604/0x770 [ 2765.433777][T24572] ? anon_vma_clone+0xa1/0x4d0 [ 2765.438523][T24572] should_failslab+0x5/0x20 [ 2765.443012][T24572] kmem_cache_alloc+0x24/0x210 [ 2765.447762][T24572] anon_vma_clone+0xa1/0x4d0 [ 2765.452342][T24572] anon_vma_fork+0x8c/0x4d0 [ 2765.456834][T24572] ? dup_mmap+0x46c/0xb60 [ 2765.461146][T24572] dup_mmap+0x536/0xb60 [ 2765.465290][T24572] dup_mm+0x8c/0x300 [ 2765.469168][T24572] copy_mm+0xe8/0x180 [ 2765.473131][T24572] copy_process+0x1048/0x3220 [ 2765.477796][T24572] ? proc_fail_nth_write+0x157/0x1c0 [ 2765.483068][T24572] _do_fork+0x142/0x730 [ 2765.487212][T24572] __x64_sys_clone+0x213/0x260 [ 2765.491961][T24572] do_syscall_64+0xcb/0x1c0 [ 2765.496448][T24572] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2765.502321][T24572] RIP: 0033:0x7fd3d983a0e9 [ 2765.506717][T24572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2765.526300][T24572] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2765.534693][T24572] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2765.541950][T24579] FAULT_INJECTION: forcing a failure. [ 2765.541950][T24579] name failslab, interval 1, probability 0, space 0, times 0 09:59:01 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) 09:59:01 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x8300}, 0x0, 0x0, 0x0, 0x0) [ 2765.542651][T24572] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2765.563152][T24572] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2765.571109][T24572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2765.579058][T24572] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2765.587467][T24579] CPU: 1 PID: 24579 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2765.597692][T24579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2765.607732][T24579] Call Trace: [ 2765.611014][T24579] dump_stack+0x18e/0x1d5 [ 2765.615327][T24579] should_fail+0x604/0x770 [ 2765.619730][T24579] ? anon_vma_clone+0xa1/0x4d0 [ 2765.624478][T24579] should_failslab+0x5/0x20 [ 2765.628973][T24579] kmem_cache_alloc+0x24/0x210 [ 2765.633723][T24579] anon_vma_clone+0xa1/0x4d0 [ 2765.638308][T24579] anon_vma_fork+0x8c/0x4d0 [ 2765.642796][T24579] ? dup_mmap+0x46c/0xb60 [ 2765.647110][T24579] dup_mmap+0x536/0xb60 [ 2765.651256][T24579] dup_mm+0x8c/0x300 [ 2765.655133][T24579] copy_mm+0xe8/0x180 [ 2765.659084][T24579] copy_process+0x1048/0x3220 [ 2765.663734][T24579] ? proc_fail_nth_write+0x157/0x1c0 [ 2765.669093][T24579] _do_fork+0x142/0x730 [ 2765.673219][T24579] __x64_sys_clone+0x213/0x260 [ 2765.677956][T24579] do_syscall_64+0xcb/0x1c0 [ 2765.682441][T24579] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2765.688316][T24579] RIP: 0033:0x7f3d26b7c0e9 [ 2765.692703][T24579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2765.712277][T24579] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2765.720657][T24579] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2765.728598][T24579] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2765.736538][T24579] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2765.744489][T24579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 09:59:02 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 87) 09:59:02 executing program 5: unshare(0x600) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:02 executing program 3: r0 = socket(0x22, 0x6, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r1, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:02 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) (async) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002240)={0xa8, 0x0, r1, [{{0x0, 0x3, 0x8001, 0x6c4, 0x6, 0x5732, {0x3, 0x1000, 0x3, 0x800, 0x7ff, 0x9, 0x0, 0x3, 0xff, 0xc000, 0x4, r2, 0x0, 0x100, 0x7}}, {0x2, 0x3}}]}, 0xa8) unshare(0x600) (async) pselect6(0x40, &(0x7f00000000c0)={0xffffffff80000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, &(0x7f00000001c0)={0x3, 0x0, 0x200, 0x3, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0x0) (async) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000002300)={0x0, 0x7fce}) (async) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @multicast2, 0x4e20, 0x3, 'fo\x00', 0x20, 0x1, 0x3c}, 0x2c) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @remote, @empty}, &(0x7f0000000080)=0xc) 09:59:02 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x1, 0x9, 0x3, 0x1, 0xffff, 0x3, 0x1, 0x9}, &(0x7f00000000c0)={0x1000, 0xffffffff, 0xfff, 0x7, 0x7, 0x40, 0x9, 0x7ff}, &(0x7f0000000100)={0x839, 0x7fffffff, 0x4, 0x8001, 0x1000, 0x9, 0x3, 0xfffffffffffffffc}, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x4]}, 0x8}) bind$inet(r0, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x78) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@empty, @in6=@private2}}, {{@in6=@ipv4={""/10, ""/2, @broadcast}}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) 09:59:02 executing program 5: unshare(0x600) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) [ 2765.752544][T24579] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:59:02 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x36b7, 0x0, 0x0, 0x0, 0x3ff, 0x3, 0xff000000000}, &(0x7f00000001c0), 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x401]}, &(0x7f0000000040), 0x8) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) clock_getres(0x6, &(0x7f0000000080)) 09:59:02 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:02 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:02 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 87) 09:59:02 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:02 executing program 5: unshare(0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) [ 2765.941077][T24613] FAULT_INJECTION: forcing a failure. [ 2765.941077][T24613] name failslab, interval 1, probability 0, space 0, times 0 [ 2765.953812][T24613] CPU: 1 PID: 24613 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2765.964041][T24613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2765.974078][T24613] Call Trace: [ 2765.977357][T24613] dump_stack+0x18e/0x1d5 [ 2765.981676][T24613] should_fail+0x604/0x770 [ 2765.986078][T24613] ? anon_vma_clone+0xa1/0x4d0 [ 2765.990826][T24613] should_failslab+0x5/0x20 [ 2765.995311][T24613] kmem_cache_alloc+0x24/0x210 [ 2766.000062][T24613] anon_vma_clone+0xa1/0x4d0 [ 2766.004636][T24613] anon_vma_fork+0x8c/0x4d0 [ 2766.009119][T24613] ? dup_mmap+0x46c/0xb60 [ 2766.013431][T24613] dup_mmap+0x536/0xb60 [ 2766.017580][T24613] dup_mm+0x8c/0x300 [ 2766.021457][T24613] copy_mm+0xe8/0x180 [ 2766.025424][T24613] copy_process+0x1048/0x3220 [ 2766.030085][T24613] ? proc_fail_nth_write+0x157/0x1c0 [ 2766.035359][T24613] _do_fork+0x142/0x730 [ 2766.039501][T24613] __x64_sys_clone+0x213/0x260 [ 2766.044257][T24613] do_syscall_64+0xcb/0x1c0 [ 2766.044976][T24614] FAULT_INJECTION: forcing a failure. [ 2766.044976][T24614] name failslab, interval 1, probability 0, space 0, times 0 [ 2766.048745][T24613] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2766.048753][T24613] RIP: 0033:0x7fd3d983a0e9 [ 2766.048762][T24613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2766.048767][T24613] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2766.099524][T24613] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2766.107470][T24613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2766.115412][T24613] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2766.123356][T24613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2766.131303][T24613] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2766.139256][T24614] CPU: 0 PID: 24614 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2766.149479][T24614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2766.159513][T24614] Call Trace: [ 2766.162792][T24614] dump_stack+0x18e/0x1d5 [ 2766.167109][T24614] should_fail+0x604/0x770 [ 2766.171507][T24614] ? anon_vma_clone+0xa1/0x4d0 [ 2766.176249][T24614] should_failslab+0x5/0x20 [ 2766.180735][T24614] kmem_cache_alloc+0x24/0x210 [ 2766.185483][T24614] anon_vma_clone+0xa1/0x4d0 [ 2766.190069][T24614] anon_vma_fork+0x8c/0x4d0 [ 2766.194557][T24614] ? dup_mmap+0x46c/0xb60 [ 2766.198875][T24614] dup_mmap+0x536/0xb60 [ 2766.203018][T24614] dup_mm+0x8c/0x300 [ 2766.206907][T24614] copy_mm+0xe8/0x180 [ 2766.210879][T24614] copy_process+0x1048/0x3220 [ 2766.215544][T24614] ? proc_fail_nth_write+0x157/0x1c0 [ 2766.220817][T24614] _do_fork+0x142/0x730 [ 2766.224957][T24614] __x64_sys_clone+0x213/0x260 [ 2766.229706][T24614] do_syscall_64+0xcb/0x1c0 [ 2766.234199][T24614] entry_SYSCALL_64_after_hwframe+0x44/0xa9 09:59:02 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 88) 09:59:02 executing program 5: unshare(0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) [ 2766.240073][T24614] RIP: 0033:0x7f3d26b7c0e9 [ 2766.244472][T24614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2766.264058][T24614] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2766.272453][T24614] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2766.280406][T24614] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2766.283401][T24621] FAULT_INJECTION: forcing a failure. [ 2766.283401][T24621] name failslab, interval 1, probability 0, space 0, times 0 [ 2766.288360][T24614] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2766.288365][T24614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2766.288370][T24614] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2766.338502][T24621] CPU: 0 PID: 24621 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2766.348729][T24621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2766.358767][T24621] Call Trace: [ 2766.362048][T24621] dump_stack+0x18e/0x1d5 [ 2766.366364][T24621] should_fail+0x604/0x770 [ 2766.370770][T24621] ? anon_vma_fork+0xed/0x4d0 [ 2766.375427][T24621] should_failslab+0x5/0x20 [ 2766.379922][T24621] kmem_cache_alloc+0x24/0x210 [ 2766.384666][T24621] anon_vma_fork+0xed/0x4d0 [ 2766.389138][T24621] ? dup_mmap+0x46c/0xb60 [ 2766.393435][T24621] dup_mmap+0x536/0xb60 [ 2766.397563][T24621] dup_mm+0x8c/0x300 [ 2766.401432][T24621] copy_mm+0xe8/0x180 [ 2766.405390][T24621] copy_process+0x1048/0x3220 [ 2766.410037][T24621] ? proc_fail_nth_write+0x157/0x1c0 [ 2766.415288][T24621] _do_fork+0x142/0x730 [ 2766.419412][T24621] __x64_sys_clone+0x213/0x260 [ 2766.424146][T24621] do_syscall_64+0xcb/0x1c0 [ 2766.428617][T24621] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2766.434474][T24621] RIP: 0033:0x7fd3d983a0e9 [ 2766.438857][T24621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2766.458442][T24621] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2766.466816][T24621] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2766.474754][T24621] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2766.482709][T24621] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2766.490647][T24621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2766.498595][T24621] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:59:02 executing program 3: r0 = socket(0x22, 0x6, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r1, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:02 executing program 5: unshare(0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:02 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000080)={0x1, 0x9, 0x3, 0x1, 0xffff, 0x3, 0x1, 0x9}, &(0x7f00000000c0)={0x1000, 0xffffffff, 0xfff, 0x7, 0x7, 0x40, 0x9, 0x7ff}, &(0x7f0000000100)={0x839, 0x7fffffff, 0x4, 0x8001, 0x1000, 0x9, 0x3, 0xfffffffffffffffc}, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x4]}, 0x8}) bind$inet(r0, 0x0, 0x0) (async) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x78) (async) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@empty, @in6=@private2}}, {{@in6=@ipv4={""/10, ""/2, @broadcast}}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) 09:59:02 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 88) 09:59:02 executing program 4: unshare(0x600) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x0, 0x36b7, 0x0, 0x0, 0x0, 0x3ff, 0x3, 0xff000000000}, &(0x7f00000001c0), 0x0, 0x0, 0x0) (async, rerun: 64) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x401]}, &(0x7f0000000040), 0x8) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) clock_getres(0x6, &(0x7f0000000080)) 09:59:02 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 89) 09:59:02 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:02 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:02 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) [ 2766.711001][T24643] FAULT_INJECTION: forcing a failure. [ 2766.711001][T24643] name failslab, interval 1, probability 0, space 0, times 0 [ 2766.725364][T24643] CPU: 1 PID: 24643 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2766.735598][T24643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2766.745640][T24643] Call Trace: [ 2766.748918][T24643] dump_stack+0x18e/0x1d5 [ 2766.753236][T24643] should_fail+0x604/0x770 [ 2766.757638][T24643] ? anon_vma_fork+0xed/0x4d0 [ 2766.762298][T24643] should_failslab+0x5/0x20 [ 2766.766787][T24643] kmem_cache_alloc+0x24/0x210 [ 2766.771535][T24643] anon_vma_fork+0xed/0x4d0 [ 2766.776021][T24643] ? dup_mmap+0x46c/0xb60 [ 2766.780328][T24643] dup_mmap+0x536/0xb60 [ 2766.783236][T24646] FAULT_INJECTION: forcing a failure. [ 2766.783236][T24646] name failslab, interval 1, probability 0, space 0, times 0 [ 2766.784479][T24643] dup_mm+0x8c/0x300 [ 2766.784494][T24643] copy_mm+0xe8/0x180 [ 2766.804878][T24643] copy_process+0x1048/0x3220 [ 2766.809541][T24643] ? proc_fail_nth_write+0x157/0x1c0 [ 2766.814806][T24643] _do_fork+0x142/0x730 [ 2766.818939][T24643] __x64_sys_clone+0x213/0x260 [ 2766.823680][T24643] do_syscall_64+0xcb/0x1c0 [ 2766.828163][T24643] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2766.834026][T24643] RIP: 0033:0x7f3d26b7c0e9 [ 2766.838418][T24643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2766.858004][T24643] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2766.866402][T24643] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2766.874353][T24643] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2766.882301][T24643] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2766.890246][T24643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2766.898194][T24643] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2766.906156][T24646] CPU: 0 PID: 24646 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2766.916381][T24646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2766.926424][T24646] Call Trace: [ 2766.929711][T24646] dump_stack+0x18e/0x1d5 [ 2766.934034][T24646] should_fail+0x604/0x770 [ 2766.938442][T24646] ? anon_vma_fork+0x1b6/0x4d0 [ 2766.943193][T24646] should_failslab+0x5/0x20 [ 2766.947687][T24646] kmem_cache_alloc+0x24/0x210 [ 2766.952440][T24646] anon_vma_fork+0x1b6/0x4d0 [ 2766.957013][T24646] ? dup_mmap+0x46c/0xb60 09:59:03 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 89) [ 2766.961332][T24646] dup_mmap+0x536/0xb60 [ 2766.965486][T24646] dup_mm+0x8c/0x300 [ 2766.969371][T24646] copy_mm+0xe8/0x180 [ 2766.973341][T24646] copy_process+0x1048/0x3220 [ 2766.978013][T24646] ? proc_fail_nth_write+0x157/0x1c0 [ 2766.983290][T24646] _do_fork+0x142/0x730 [ 2766.987432][T24646] __x64_sys_clone+0x213/0x260 [ 2766.992183][T24646] do_syscall_64+0xcb/0x1c0 [ 2766.996680][T24646] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2767.002560][T24646] RIP: 0033:0x7fd3d983a0e9 [ 2767.006962][T24646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2767.026548][T24646] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2767.034948][T24646] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2767.042906][T24646] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2767.050859][T24646] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 09:59:03 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:03 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) [ 2767.058814][T24646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2767.066769][T24646] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2767.092318][T24652] FAULT_INJECTION: forcing a failure. [ 2767.092318][T24652] name failslab, interval 1, probability 0, space 0, times 0 [ 2767.105126][T24652] CPU: 1 PID: 24652 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2767.115348][T24652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2767.125387][T24652] Call Trace: [ 2767.128674][T24652] dump_stack+0x18e/0x1d5 [ 2767.132997][T24652] should_fail+0x604/0x770 [ 2767.137404][T24652] ? anon_vma_fork+0x1b6/0x4d0 [ 2767.137412][T24652] should_failslab+0x5/0x20 [ 2767.137423][T24652] kmem_cache_alloc+0x24/0x210 [ 2767.137432][T24652] anon_vma_fork+0x1b6/0x4d0 [ 2767.137440][T24652] ? dup_mmap+0x46c/0xb60 [ 2767.137448][T24652] dup_mmap+0x536/0xb60 [ 2767.137460][T24652] dup_mm+0x8c/0x300 [ 2767.137470][T24652] copy_mm+0xe8/0x180 [ 2767.137481][T24652] copy_process+0x1048/0x3220 [ 2767.137494][T24652] ? proc_fail_nth_write+0x157/0x1c0 [ 2767.137506][T24652] _do_fork+0x142/0x730 [ 2767.137518][T24652] __x64_sys_clone+0x213/0x260 [ 2767.137529][T24652] do_syscall_64+0xcb/0x1c0 [ 2767.137541][T24652] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2767.137548][T24652] RIP: 0033:0x7f3d26b7c0e9 [ 2767.137557][T24652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2767.137562][T24652] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2767.137571][T24652] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2767.137577][T24652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2767.137582][T24652] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2767.137587][T24652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2767.137593][T24652] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:59:03 executing program 3: r0 = socket(0x22, 0x6, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) (async) r1 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r1, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:03 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 90) 09:59:03 executing program 2: unshare(0x600) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x1, 0x9, 0x3, 0x1, 0xffff, 0x3, 0x1, 0x9}, &(0x7f00000000c0)={0x1000, 0xffffffff, 0xfff, 0x7, 0x7, 0x40, 0x9, 0x7ff}, &(0x7f0000000100)={0x839, 0x7fffffff, 0x4, 0x8001, 0x1000, 0x9, 0x3, 0xfffffffffffffffc}, &(0x7f0000000140)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0)={[0x4]}, 0x8}) (async) bind$inet(r0, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x78) (async) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@empty, @in6=@private2}}, {{@in6=@ipv4={""/10, ""/2, @broadcast}}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) 09:59:03 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 90) 09:59:03 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x36b7, 0x0, 0x0, 0x0, 0x3ff, 0x3, 0xff000000000}, &(0x7f00000001c0), 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x401]}, &(0x7f0000000040), 0x8) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) clock_getres(0x6, &(0x7f0000000080)) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x36b7, 0x0, 0x0, 0x0, 0x3ff, 0x3, 0xff000000000}, &(0x7f00000001c0), 0x0, 0x0, 0x0) (async) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x401]}, &(0x7f0000000040), 0x8) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.kill\x00', 0x0, 0x0) (async) clock_getres(0x6, &(0x7f0000000080)) (async) 09:59:03 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:03 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:03 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:03 executing program 5: unshare(0x600) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'vcan0\x00', 0x1}, 0x18) 09:59:03 executing program 5: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x200100, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, 0x0, 0x0) 09:59:03 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000000)={0x7fffffff}, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) unshare(0x6a020480) [ 2767.598018][T24684] FAULT_INJECTION: forcing a failure. [ 2767.598018][T24684] name failslab, interval 1, probability 0, space 0, times 0 [ 2767.598984][T24686] FAULT_INJECTION: forcing a failure. [ 2767.598984][T24686] name failslab, interval 1, probability 0, space 0, times 0 [ 2767.615370][T24684] CPU: 1 PID: 24684 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2767.633521][T24684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2767.643571][T24684] Call Trace: [ 2767.646841][T24684] dump_stack+0x18e/0x1d5 [ 2767.651148][T24684] should_fail+0x604/0x770 [ 2767.655538][T24684] ? dup_mmap+0x46c/0xb60 [ 2767.659843][T24684] should_failslab+0x5/0x20 [ 2767.664322][T24684] kmem_cache_alloc+0x24/0x210 [ 2767.669058][T24684] dup_mmap+0x46c/0xb60 [ 2767.673190][T24684] dup_mm+0x8c/0x300 [ 2767.677062][T24684] copy_mm+0xe8/0x180 [ 2767.681022][T24684] copy_process+0x1048/0x3220 [ 2767.685682][T24684] ? proc_fail_nth_write+0x157/0x1c0 [ 2767.690946][T24684] _do_fork+0x142/0x730 [ 2767.695077][T24684] __x64_sys_clone+0x213/0x260 [ 2767.699820][T24684] do_syscall_64+0xcb/0x1c0 [ 2767.704304][T24684] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2767.710170][T24684] RIP: 0033:0x7f3d26b7c0e9 [ 2767.714563][T24684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2767.734154][T24684] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2767.742541][T24684] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2767.750492][T24684] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2767.758442][T24684] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2767.766388][T24684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2767.774333][T24684] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2767.782294][T24686] CPU: 0 PID: 24686 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2767.792514][T24686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2767.802558][T24686] Call Trace: [ 2767.805837][T24686] dump_stack+0x18e/0x1d5 [ 2767.810159][T24686] should_fail+0x604/0x770 [ 2767.814557][T24686] ? dup_mmap+0x46c/0xb60 [ 2767.818867][T24686] should_failslab+0x5/0x20 [ 2767.823353][T24686] kmem_cache_alloc+0x24/0x210 [ 2767.828099][T24686] dup_mmap+0x46c/0xb60 [ 2767.832237][T24686] dup_mm+0x8c/0x300 [ 2767.836116][T24686] copy_mm+0xe8/0x180 [ 2767.840083][T24686] copy_process+0x1048/0x3220 09:59:04 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000000)={0x7fffffff}, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) unshare(0x6a020480) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000000)={0x7fffffff}, 0x0, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) (async) unshare(0x6a020480) (async) [ 2767.844747][T24686] ? proc_fail_nth_write+0x157/0x1c0 [ 2767.850029][T24686] _do_fork+0x142/0x730 [ 2767.850044][T24686] __x64_sys_clone+0x213/0x260 [ 2767.858915][T24686] do_syscall_64+0xcb/0x1c0 [ 2767.863411][T24686] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2767.869289][T24686] RIP: 0033:0x7fd3d983a0e9 [ 2767.873688][T24686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2767.893274][T24686] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2767.901652][T24686] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2767.909596][T24686] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2767.917543][T24686] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2767.925484][T24686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2767.933423][T24686] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:59:04 executing program 3: setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000021c0)={{0x21, @loopback, 0x4e21, 0x0, 'wrr\x00', 0x3a, 0x5, 0x29}, {@broadcast, 0x4e21, 0x10002, 0x9, 0xfffffff7, 0x7fffffff}}, 0x44) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, {{0x9, 0xbf7b, 0x2}}}, 0x28) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl0\x00', r2, 0x29, 0x3, 0x2, 0x7, 0x40, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10, 0x10, 0x8, 0xfffffe00}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:04 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 91) 09:59:04 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x3, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, &(0x7f0000000000)={0x7fffffff}, 0x0, 0x0, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) unshare(0x6a020480) 09:59:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f00000033c0)=ANY=[@ANYBLOB="d000000000000000", @ANYRES64=0x0, @ANYBLOB="00000000000000000700000000000000000000002000000002000000000000001f0000000000000003004000000000005c5c2b0000000000030000000000000009000000000000000e000000010000802827292f28b5282eda28262b272a00000500000000000000060000000000000008000000000000802840272f2a2d40230400000000000000000000000000000007000000ae2d00005d2540253a5b7b0003000000000000003e00000000000000060000000200000074756e6c30000000"], 0xd0) unshare(0x600) unshare(0x10000100) pselect6(0x40, &(0x7f0000000180)={0x0, 0xfffffffffffffffb}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000300), 0xffffffffffffffff) syz_genetlink_get_family_id$wireguard(&(0x7f0000001340), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0xf}, 0x37fe0}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x29, 0xb6, 0x0, 0x401, 0x20, @ipv4={'\x00', '\xff\xff', @remote}, @local, 0x20, 0x80, 0xfffffff7, 0x9}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000440)=[0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000004c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000007c0)=[{}], 0x8, 0x10, &(0x7f0000000800), &(0x7f0000000840), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000a80)={'erspan0\x00', &(0x7f0000000a00)={'tunl0\x00', 0x0, 0x80, 0x10, 0x7, 0xb1b, {{0x9, 0x4, 0x1, 0x2e, 0x24, 0x65, 0x0, 0x85, 0x4, 0x0, @loopback, @multicast2, {[@rr={0x7, 0xb, 0x2f, [@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000b40)={'syztnl1\x00', &(0x7f0000000ac0)={'syztnl0\x00', 0x0, 0x2f, 0xff, 0x80, 0x4, 0x40, @mcast2, @empty, 0x1, 0x40, 0x3, 0x8}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b80)={0x0, @initdev, @broadcast}, &(0x7f0000000bc0)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000001300)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000012c0)={&(0x7f0000000c00)={0x6ac, r1, 0x300, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0x100, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8f24}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}]}}, {{0x8}, {0x130, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r4}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x180}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x5c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x2c, 0x4, [{0xff, 0x50, 0xfa, 0x5}, {0x2, 0x9, 0x81, 0x7}, {0xc1, 0x81, 0xb6, 0xb63d}, {0x1, 0x20, 0xd, 0x5}, {0x1, 0x0, 0x9, 0x3}]}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}}]}}, {{0x8, 0x1, r6}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r8}, {0x1d8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x101}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7f}}, {0x8}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x64, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x34, 0x4, [{0x7, 0x1, 0x44, 0xdd}, {0x6, 0x5, 0x7, 0x6d}, {0x1, 0x8, 0x9, 0x2}, {0x200, 0xff, 0x9, 0x5}, {0xb7f, 0x40, 0x7, 0x6}, {0x11, 0x2, 0x3, 0x4}]}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8001}}}]}}]}, 0x6ac}, 0x1, 0x0, 0x0, 0x4000}, 0x0) rt_sigtimedwait(&(0x7f0000000080)={[0x48000000000]}, &(0x7f00000000c0), &(0x7f0000000140), 0x8) r9 = syz_open_dev$mouse(&(0x7f0000000200), 0x3, 0x240a81) ioctl$KVM_CAP_HYPERV_SYNIC2(r9, 0x4068aea3, &(0x7f0000000240)) 09:59:04 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 91) 09:59:04 executing program 2: clock_gettime(0x7, &(0x7f0000000040)) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:04 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1000}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:04 executing program 2: clock_gettime(0x7, &(0x7f0000000040)) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x7, &(0x7f0000000040)) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:04 executing program 5: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0xffffffff) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000140)={0x70, 0x0, &(0x7f00000000c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000000)=ANY=[@ANYBLOB="856164660000000001000000000000000100060000000000090000000000000085616466000000000600000000000000010000000000000027000000000000008561646600000000050000000000000000000000000000002800000000000000"], &(0x7f0000000080)={0x0, 0x20, 0x40}}}, @decrefs, @free_buffer={0x40086303, r0}, @acquire_done={0x40106309, 0x1}, @exit_looper], 0x7b, 0x0, &(0x7f00000001c0)="c9886a59cb9cd99f8d763739db26e9f8aaf397bb67aa2ee17bdd2d36ba86c322c8bc192269e477a8e24786bd43a3e243cd6a84f53cff7d71f1c391f81083c0d15362bfbaa1f5b3fdf25b5f91b18ea54ccde647b48ee28eb28c80fc4411bdf2ef38a295670ef009f2d7947f9dfce5cbde78ba61f7fe2736b64653d3"}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x10000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)) syz_genetlink_get_family_id$wireguard(&(0x7f0000000240), r1) 09:59:04 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1000}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:04 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000002080)={0x1ff, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000021c0)={0x2, 'nr0\x00'}, 0x18) read$FUSE(r0, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_setattr(r1, &(0x7f0000002040)={0x38}, 0x0) 09:59:04 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1000}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) [ 2768.459513][T24727] FAULT_INJECTION: forcing a failure. [ 2768.459513][T24727] name failslab, interval 1, probability 0, space 0, times 0 [ 2768.461933][T24728] FAULT_INJECTION: forcing a failure. [ 2768.461933][T24728] name failslab, interval 1, probability 0, space 0, times 0 [ 2768.472194][T24727] CPU: 0 PID: 24727 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2768.494901][T24727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2768.504926][T24727] Call Trace: [ 2768.508194][T24727] dump_stack+0x18e/0x1d5 [ 2768.512505][T24727] should_fail+0x604/0x770 [ 2768.516895][T24727] ? dup_mmap+0x46c/0xb60 [ 2768.521201][T24727] should_failslab+0x5/0x20 [ 2768.525690][T24727] kmem_cache_alloc+0x24/0x210 [ 2768.530429][T24727] dup_mmap+0x46c/0xb60 [ 2768.534567][T24727] dup_mm+0x8c/0x300 [ 2768.538439][T24727] copy_mm+0xe8/0x180 [ 2768.542399][T24727] copy_process+0x1048/0x3220 [ 2768.547055][T24727] ? proc_fail_nth_write+0x157/0x1c0 [ 2768.552316][T24727] _do_fork+0x142/0x730 [ 2768.556447][T24727] __x64_sys_clone+0x213/0x260 [ 2768.561187][T24727] do_syscall_64+0xcb/0x1c0 [ 2768.565669][T24727] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2768.571540][T24727] RIP: 0033:0x7f3d26b7c0e9 [ 2768.575934][T24727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2768.595507][T24727] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2768.603893][T24727] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2768.611834][T24727] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2768.619780][T24727] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2768.627735][T24727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2768.635678][T24727] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2768.643638][T24728] CPU: 1 PID: 24728 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2768.653856][T24728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2768.663893][T24728] Call Trace: [ 2768.667174][T24728] dump_stack+0x18e/0x1d5 [ 2768.671492][T24728] should_fail+0x604/0x770 [ 2768.675894][T24728] ? dup_mmap+0x46c/0xb60 [ 2768.680208][T24728] should_failslab+0x5/0x20 [ 2768.684691][T24728] kmem_cache_alloc+0x24/0x210 [ 2768.689435][T24728] dup_mmap+0x46c/0xb60 [ 2768.693578][T24728] dup_mm+0x8c/0x300 [ 2768.697458][T24728] copy_mm+0xe8/0x180 [ 2768.701423][T24728] copy_process+0x1048/0x3220 [ 2768.706085][T24728] ? proc_fail_nth_write+0x157/0x1c0 [ 2768.711354][T24728] _do_fork+0x142/0x730 [ 2768.715494][T24728] __x64_sys_clone+0x213/0x260 [ 2768.720243][T24728] do_syscall_64+0xcb/0x1c0 [ 2768.724729][T24728] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2768.730598][T24728] RIP: 0033:0x7fd3d983a0e9 [ 2768.734981][T24728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2768.754567][T24728] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2768.762943][T24728] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2768.770882][T24728] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2768.778826][T24728] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2768.786769][T24728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2768.794710][T24728] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:59:05 executing program 3: setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000021c0)={{0x21, @loopback, 0x4e21, 0x0, 'wrr\x00', 0x3a, 0x5, 0x29}, {@broadcast, 0x4e21, 0x10002, 0x9, 0xfffffff7, 0x7fffffff}}, 0x44) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, {{0x9, 0xbf7b, 0x2}}}, 0x28) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl0\x00', r2, 0x29, 0x3, 0x2, 0x7, 0x40, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10, 0x10, 0x8, 0xfffffe00}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000021c0)={{0x21, @loopback, 0x4e21, 0x0, 'wrr\x00', 0x3a, 0x5, 0x29}, {@broadcast, 0x4e21, 0x10002, 0x9, 0xfffffff7, 0x7fffffff}}, 0x44) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) (async) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, {{0x9, 0xbf7b, 0x2}}}, 0x28) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl0\x00', r2, 0x29, 0x3, 0x2, 0x7, 0x40, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10, 0x10, 0x8, 0xfffffe00}}) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 09:59:05 executing program 2: clock_gettime(0x7, &(0x7f0000000040)) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x7, &(0x7f0000000040)) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:05 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000440)) rt_sigtimedwait(&(0x7f0000000480)={[0x120]}, &(0x7f00000004c0), &(0x7f0000000540)={0x0, 0x3938700}, 0x8) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x1, 0x3, 0xe597, 0x0, 0x7, 0xfa}, &(0x7f00000000c0)={0x8000000000000001, 0xfa4, 0x101, 0xd2dd, 0x200, 0x7b33, 0x1, 0x7d00}, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x400, 0xfffffffffffffff8, 0x7, 0x1, 0x7fff}, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0xacb]}, 0x8}) prctl$PR_GET_SECCOMP(0x15) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280)={0x8, 0x4, 0x6, 0x1, 0xc55f, 0x2c, 0x4, 0x5}, &(0x7f00000002c0)={0x40, 0x6, 0x0, 0x40, 0x40, 0x4, 0x2, 0x3}, &(0x7f0000000300)={0x3, 0x1e, 0x1, 0xcdb6, 0x7, 0x1, 0x3, 0xfffffffffffeffff}, &(0x7f0000000380)={r1, r2+60000000}, &(0x7f0000000400)={&(0x7f00000003c0)={[0x2]}, 0x8}) bind$inet(r0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@initdev, @dev}, &(0x7f0000000040)=0xc) 09:59:05 executing program 5: unshare(0x600) unshare(0x44000000) pselect6(0x40, &(0x7f0000000180), &(0x7f0000000000)={0x7}, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:59:05 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 92) 09:59:05 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 92) 09:59:05 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x410822, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x1a, 0x4, 0x8}) getegid() pselect6(0x40, &(0x7f0000000180)={0x401, 0x0, 0x0, 0x4, 0x80, 0x0, 0x3}, 0x0, 0x0, 0x0, 0x0) 09:59:05 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x410822, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x1a, 0x4, 0x8}) getegid() pselect6(0x40, &(0x7f0000000180)={0x401, 0x0, 0x0, 0x4, 0x80, 0x0, 0x3}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x410822, 0x0) (async) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x1a, 0x4, 0x8}) (async) getegid() (async) pselect6(0x40, &(0x7f0000000180)={0x401, 0x0, 0x0, 0x4, 0x80, 0x0, 0x3}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:05 executing program 5: unshare(0x600) unshare(0x44000000) pselect6(0x40, &(0x7f0000000180), &(0x7f0000000000)={0x7}, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 09:59:05 executing program 3: setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000021c0)={{0x21, @loopback, 0x4e21, 0x0, 'wrr\x00', 0x3a, 0x5, 0x29}, {@broadcast, 0x4e21, 0x10002, 0x9, 0xfffffff7, 0x7fffffff}}, 0x44) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, {{0x9, 0xbf7b, 0x2}}}, 0x28) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl0\x00', r2, 0x29, 0x3, 0x2, 0x7, 0x40, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10, 0x10, 0x8, 0xfffffe00}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000021c0)={{0x21, @loopback, 0x4e21, 0x0, 'wrr\x00', 0x3a, 0x5, 0x29}, {@broadcast, 0x4e21, 0x10002, 0x9, 0xfffffff7, 0x7fffffff}}, 0x44) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) (async) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, 0x0, {{0x9, 0xbf7b, 0x2}}}, 0x28) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl0\x00', r2, 0x29, 0x3, 0x2, 0x7, 0x40, @mcast2, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10, 0x10, 0x8, 0xfffffe00}}) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 09:59:05 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) clock_gettime(0x1, &(0x7f0000000440)) rt_sigtimedwait(&(0x7f0000000480)={[0x120]}, &(0x7f00000004c0), &(0x7f0000000540)={0x0, 0x3938700}, 0x8) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x1, 0x3, 0xe597, 0x0, 0x7, 0xfa}, &(0x7f00000000c0)={0x8000000000000001, 0xfa4, 0x101, 0xd2dd, 0x200, 0x7b33, 0x1, 0x7d00}, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x400, 0xfffffffffffffff8, 0x7, 0x1, 0x7fff}, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0xacb]}, 0x8}) prctl$PR_GET_SECCOMP(0x15) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280)={0x8, 0x4, 0x6, 0x1, 0xc55f, 0x2c, 0x4, 0x5}, &(0x7f00000002c0)={0x40, 0x6, 0x0, 0x40, 0x40, 0x4, 0x2, 0x3}, &(0x7f0000000300)={0x3, 0x1e, 0x1, 0xcdb6, 0x7, 0x1, 0x3, 0xfffffffffffeffff}, &(0x7f0000000380)={r1, r2+60000000}, &(0x7f0000000400)={&(0x7f00000003c0)={[0x2]}, 0x8}) bind$inet(r0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@initdev, @dev}, &(0x7f0000000040)=0xc) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) clock_gettime(0x1, &(0x7f0000000440)) (async) rt_sigtimedwait(&(0x7f0000000480)={[0x120]}, &(0x7f00000004c0), &(0x7f0000000540)={0x0, 0x3938700}, 0x8) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000080)={0x1, 0x3, 0xe597, 0x0, 0x7, 0xfa}, &(0x7f00000000c0)={0x8000000000000001, 0xfa4, 0x101, 0xd2dd, 0x200, 0x7b33, 0x1, 0x7d00}, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x400, 0xfffffffffffffff8, 0x7, 0x1, 0x7fff}, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0xacb]}, 0x8}) (async) prctl$PR_GET_SECCOMP(0x15) (async) clock_gettime(0x0, &(0x7f0000000340)) (async) pselect6(0x40, &(0x7f0000000280)={0x8, 0x4, 0x6, 0x1, 0xc55f, 0x2c, 0x4, 0x5}, &(0x7f00000002c0)={0x40, 0x6, 0x0, 0x40, 0x40, 0x4, 0x2, 0x3}, &(0x7f0000000300)={0x3, 0x1e, 0x1, 0xcdb6, 0x7, 0x1, 0x3, 0xfffffffffffeffff}, &(0x7f0000000380)={r1, r2+60000000}, &(0x7f0000000400)={&(0x7f00000003c0)={[0x2]}, 0x8}) (async) bind$inet(r0, 0x0, 0x0) (async) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@initdev, @dev}, &(0x7f0000000040)=0xc) (async) 09:59:05 executing program 2: unshare(0x600) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x410822, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000040)={0x1a, 0x4, 0x8}) getegid() (async) pselect6(0x40, &(0x7f0000000180)={0x401, 0x0, 0x0, 0x4, 0x80, 0x0, 0x3}, 0x0, 0x0, 0x0, 0x0) 09:59:05 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x7fff}, 0x0, 0x0, 0x0, 0x0) 09:59:05 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x7fff}, 0x0, 0x0, 0x0, 0x0) 09:59:05 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @private, @loopback}, &(0x7f0000000040)=0xc) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r0, 0x29, 0x3, 0x2, 0x1ff, 0x40, @dev={0xfe, 0x80, '\x00', 0x27}, @rand_addr=' \x01\x00', 0x7, 0x7, 0x8001, 0x7}}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r4, 0x0, 0x0) read$FUSE(r3, &(0x7f0000002040)={0x2020}, 0x2026) 09:59:05 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async, rerun: 64) clock_gettime(0x1, &(0x7f0000000440)) (rerun: 64) rt_sigtimedwait(&(0x7f0000000480)={[0x120]}, &(0x7f00000004c0), &(0x7f0000000540)={0x0, 0x3938700}, 0x8) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000080)={0x1, 0x3, 0xe597, 0x0, 0x7, 0xfa}, &(0x7f00000000c0)={0x8000000000000001, 0xfa4, 0x101, 0xd2dd, 0x200, 0x7b33, 0x1, 0x7d00}, &(0x7f0000000100)={0x0, 0x7, 0x0, 0x400, 0xfffffffffffffff8, 0x7, 0x1, 0x7fff}, &(0x7f0000000140)={0x0, 0x3938700}, &(0x7f0000000240)={&(0x7f0000000200)={[0xacb]}, 0x8}) prctl$PR_GET_SECCOMP(0x15) (async) clock_gettime(0x0, &(0x7f0000000340)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000280)={0x8, 0x4, 0x6, 0x1, 0xc55f, 0x2c, 0x4, 0x5}, &(0x7f00000002c0)={0x40, 0x6, 0x0, 0x40, 0x40, 0x4, 0x2, 0x3}, &(0x7f0000000300)={0x3, 0x1e, 0x1, 0xcdb6, 0x7, 0x1, 0x3, 0xfffffffffffeffff}, &(0x7f0000000380)={r1, r2+60000000}, &(0x7f0000000400)={&(0x7f00000003c0)={[0x2]}, 0x8}) (async) bind$inet(r0, 0x0, 0x0) (async, rerun: 32) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@initdev, @dev}, &(0x7f0000000040)=0xc) (rerun: 32) [ 2769.363444][T24797] FAULT_INJECTION: forcing a failure. [ 2769.363444][T24797] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.369291][T24798] FAULT_INJECTION: forcing a failure. [ 2769.369291][T24798] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.376580][T24797] CPU: 0 PID: 24797 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2769.398825][T24797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2769.408857][T24797] Call Trace: [ 2769.412127][T24797] dump_stack+0x18e/0x1d5 [ 2769.416442][T24797] should_fail+0x604/0x770 [ 2769.420834][T24797] ? dup_mmap+0x46c/0xb60 [ 2769.425139][T24797] should_failslab+0x5/0x20 [ 2769.429620][T24797] kmem_cache_alloc+0x24/0x210 [ 2769.434360][T24797] dup_mmap+0x46c/0xb60 [ 2769.438493][T24797] dup_mm+0x8c/0x300 [ 2769.442366][T24797] copy_mm+0xe8/0x180 [ 2769.446324][T24797] copy_process+0x1048/0x3220 [ 2769.450985][T24797] ? proc_fail_nth_write+0x157/0x1c0 [ 2769.456252][T24797] _do_fork+0x142/0x730 [ 2769.460387][T24797] __x64_sys_clone+0x213/0x260 [ 2769.465132][T24797] do_syscall_64+0xcb/0x1c0 [ 2769.469626][T24797] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2769.475502][T24797] RIP: 0033:0x7fd3d983a0e9 [ 2769.479902][T24797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2769.499494][T24797] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2769.507889][T24797] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2769.515839][T24797] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2769.523787][T24797] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2769.531745][T24797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2769.539719][T24797] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2769.555892][T24798] CPU: 0 PID: 24798 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2769.566122][T24798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2769.576160][T24798] Call Trace: [ 2769.579431][T24798] dump_stack+0x18e/0x1d5 [ 2769.583731][T24798] should_fail+0x604/0x770 [ 2769.588118][T24798] ? dup_mmap+0x46c/0xb60 [ 2769.592416][T24798] should_failslab+0x5/0x20 [ 2769.596889][T24798] kmem_cache_alloc+0x24/0x210 [ 2769.601619][T24798] dup_mmap+0x46c/0xb60 [ 2769.605856][T24798] dup_mm+0x8c/0x300 [ 2769.609724][T24798] copy_mm+0xe8/0x180 [ 2769.613680][T24798] copy_process+0x1048/0x3220 [ 2769.618345][T24798] ? proc_fail_nth_write+0x157/0x1c0 [ 2769.623608][T24798] _do_fork+0x142/0x730 [ 2769.627735][T24798] __x64_sys_clone+0x213/0x260 [ 2769.632469][T24798] do_syscall_64+0xcb/0x1c0 [ 2769.636943][T24798] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2769.642803][T24798] RIP: 0033:0x7f3d26b7c0e9 [ 2769.647185][T24798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2769.666755][T24798] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2769.675132][T24798] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2769.683072][T24798] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2769.691014][T24798] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2769.698954][T24798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2769.706892][T24798] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:59:06 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 93) 09:59:06 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x7fff}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x7fff}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) unshare(0x600) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x6c}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@private, @loopback, 0x0}, &(0x7f0000000340)=0xc) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x34}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 09:59:06 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @private, @loopback}, &(0x7f0000000040)=0xc) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r0, 0x29, 0x3, 0x2, 0x1ff, 0x40, @dev={0xfe, 0x80, '\x00', 0x27}, @rand_addr=' \x01\x00', 0x7, 0x7, 0x8001, 0x7}}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) (async) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r4, 0x0, 0x0) read$FUSE(r3, &(0x7f0000002040)={0x2020}, 0x2026) 09:59:06 executing program 4: unshare(0x600) unshare(0x40020280) clock_getres(0x3, &(0x7f0000000000)) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) 09:59:06 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 93) 09:59:06 executing program 4: unshare(0x600) (async) unshare(0x40020280) clock_getres(0x3, &(0x7f0000000000)) (async) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) 09:59:06 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 32) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @private, @loopback}, &(0x7f0000000040)=0xc) (rerun: 32) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl0\x00', r0, 0x29, 0x3, 0x2, 0x1ff, 0x40, @dev={0xfe, 0x80, '\x00', 0x27}, @rand_addr=' \x01\x00', 0x7, 0x7, 0x8001, 0x7}}) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) (async) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) (async, rerun: 32) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 32) bind$inet(r4, 0x0, 0x0) (async) read$FUSE(r3, &(0x7f0000002040)={0x2020}, 0x2026) 09:59:06 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x20000000001, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 09:59:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) unshare(0x600) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x6c}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@private, @loopback, 0x0}, &(0x7f0000000340)=0xc) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x34}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 09:59:06 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x20000000001, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 09:59:06 executing program 4: unshare(0x600) (async) unshare(0x40020280) (async, rerun: 64) clock_getres(0x3, &(0x7f0000000000)) (rerun: 64) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000080)={0x20, 0x0, 0x0, {0x0, 0x4}}, 0x20) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0) [ 2769.953909][T24833] FAULT_INJECTION: forcing a failure. [ 2769.953909][T24833] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.960531][T24834] FAULT_INJECTION: forcing a failure. [ 2769.960531][T24834] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.966534][T24833] CPU: 1 PID: 24833 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2769.989286][T24833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2769.999315][T24833] Call Trace: [ 2770.002587][T24833] dump_stack+0x18e/0x1d5 [ 2770.006897][T24833] should_fail+0x604/0x770 [ 2770.011292][T24833] ? anon_vma_clone+0xa1/0x4d0 [ 2770.016027][T24833] should_failslab+0x5/0x20 [ 2770.020505][T24833] kmem_cache_alloc+0x24/0x210 [ 2770.025241][T24833] anon_vma_clone+0xa1/0x4d0 [ 2770.029805][T24833] anon_vma_fork+0x8c/0x4d0 [ 2770.034281][T24833] ? dup_mmap+0x46c/0xb60 [ 2770.038583][T24833] dup_mmap+0x536/0xb60 [ 2770.042718][T24833] dup_mm+0x8c/0x300 [ 2770.046590][T24833] copy_mm+0xe8/0x180 [ 2770.050554][T24833] copy_process+0x1048/0x3220 [ 2770.055209][T24833] ? proc_fail_nth_write+0x157/0x1c0 [ 2770.060470][T24833] _do_fork+0x142/0x730 [ 2770.064609][T24833] __x64_sys_clone+0x213/0x260 [ 2770.069350][T24833] do_syscall_64+0xcb/0x1c0 [ 2770.073829][T24833] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2770.079693][T24833] RIP: 0033:0x7fd3d983a0e9 [ 2770.084088][T24833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2770.103664][T24833] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2770.112048][T24833] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2770.119996][T24833] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2770.127941][T24833] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2770.135886][T24833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2770.143829][T24833] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2770.151784][T24834] CPU: 0 PID: 24834 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2770.162004][T24834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2770.172043][T24834] Call Trace: [ 2770.175324][T24834] dump_stack+0x18e/0x1d5 [ 2770.179640][T24834] should_fail+0x604/0x770 [ 2770.184041][T24834] ? anon_vma_clone+0xa1/0x4d0 [ 2770.188786][T24834] should_failslab+0x5/0x20 [ 2770.193272][T24834] kmem_cache_alloc+0x24/0x210 [ 2770.198028][T24834] anon_vma_clone+0xa1/0x4d0 [ 2770.202585][T24834] anon_vma_fork+0x8c/0x4d0 [ 2770.207058][T24834] ? dup_mmap+0x46c/0xb60 [ 2770.211352][T24834] dup_mmap+0x536/0xb60 [ 2770.215477][T24834] dup_mm+0x8c/0x300 [ 2770.219341][T24834] copy_mm+0xe8/0x180 [ 2770.223289][T24834] copy_process+0x1048/0x3220 [ 2770.227932][T24834] ? proc_fail_nth_write+0x157/0x1c0 [ 2770.233183][T24834] _do_fork+0x142/0x730 [ 2770.237305][T24834] __x64_sys_clone+0x213/0x260 [ 2770.242035][T24834] do_syscall_64+0xcb/0x1c0 [ 2770.246504][T24834] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2770.252362][T24834] RIP: 0033:0x7f3d26b7c0e9 [ 2770.256743][T24834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2770.276311][T24834] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2770.284685][T24834] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2770.292622][T24834] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2770.300558][T24834] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2770.308507][T24834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2770.316464][T24834] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:59:06 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 94) 09:59:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) unshare(0x600) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x6c}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@private, @loopback, 0x0}, &(0x7f0000000340)=0xc) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, 0x0, 0x4, 0x70bd2d, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x34}}]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 09:59:06 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x20000000001, 0x0, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0) 09:59:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x2, 0x3, 0x7ffffffb}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x1}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 09:59:06 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) 09:59:06 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 94) 09:59:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) unshare(0x600) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x6c}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000140)={@private, @loopback}, &(0x7f0000000340)=0xc) 09:59:06 executing program 2: unshare(0x600) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, &(0x7f0000000080)={0x1, 0x3, 0x0, 0x14}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000040)={0x3, 0x57}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000100)={0x3, r0}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 09:59:06 executing program 2: unshare(0x600) (async) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, &(0x7f0000000080)={0x1, 0x3, 0x0, 0x14}) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000040)={0x3, 0x57}) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000100)={0x3, r0}) (async) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 09:59:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) unshare(0x600) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x6c}, 0x1, 0x0, 0x0, 0x20000800}, 0x8000) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:06 executing program 2: unshare(0x600) (async) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, &(0x7f0000000080)={0x1, 0x3, 0x0, 0x14}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000040)={0x3, 0x57}) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f0000000100)={0x3, r0}) (async) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) 09:59:06 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) [ 2770.507955][T24866] FAULT_INJECTION: forcing a failure. [ 2770.507955][T24866] name failslab, interval 1, probability 0, space 0, times 0 [ 2770.520881][T24866] CPU: 1 PID: 24866 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2770.531105][T24866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2770.541149][T24866] Call Trace: [ 2770.544433][T24866] dump_stack+0x18e/0x1d5 [ 2770.548759][T24866] should_fail+0x604/0x770 [ 2770.553167][T24866] ? anon_vma_clone+0xa1/0x4d0 [ 2770.557915][T24866] should_failslab+0x5/0x20 [ 2770.562407][T24866] kmem_cache_alloc+0x24/0x210 [ 2770.567153][T24866] anon_vma_clone+0xa1/0x4d0 [ 2770.571728][T24866] anon_vma_fork+0x8c/0x4d0 [ 2770.576212][T24866] ? dup_mmap+0x46c/0xb60 [ 2770.580520][T24866] dup_mmap+0x536/0xb60 [ 2770.584659][T24866] dup_mm+0x8c/0x300 [ 2770.588541][T24866] copy_mm+0xe8/0x180 [ 2770.592507][T24866] copy_process+0x1048/0x3220 [ 2770.595048][T24867] FAULT_INJECTION: forcing a failure. [ 2770.595048][T24867] name failslab, interval 1, probability 0, space 0, times 0 [ 2770.597223][T24866] ? proc_fail_nth_write+0x157/0x1c0 [ 2770.597245][T24866] _do_fork+0x142/0x730 [ 2770.619197][T24866] __x64_sys_clone+0x213/0x260 [ 2770.623940][T24866] do_syscall_64+0xcb/0x1c0 [ 2770.628421][T24866] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2770.634285][T24866] RIP: 0033:0x7fd3d983a0e9 [ 2770.638675][T24866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2770.658252][T24866] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2770.666634][T24866] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2770.674579][T24866] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2770.682522][T24866] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2770.690468][T24866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2770.698413][T24866] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2770.706380][T24867] CPU: 0 PID: 24867 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2770.716597][T24867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2770.726633][T24867] Call Trace: [ 2770.729912][T24867] dump_stack+0x18e/0x1d5 [ 2770.734227][T24867] should_fail+0x604/0x770 [ 2770.738625][T24867] ? anon_vma_clone+0xa1/0x4d0 [ 2770.743376][T24867] should_failslab+0x5/0x20 [ 2770.747869][T24867] kmem_cache_alloc+0x24/0x210 [ 2770.752615][T24867] anon_vma_clone+0xa1/0x4d0 [ 2770.757173][T24867] anon_vma_fork+0x8c/0x4d0 [ 2770.761652][T24867] ? dup_mmap+0x46c/0xb60 [ 2770.765958][T24867] dup_mmap+0x536/0xb60 [ 2770.770088][T24867] dup_mm+0x8c/0x300 [ 2770.773952][T24867] copy_mm+0xe8/0x180 [ 2770.777934][T24867] copy_process+0x1048/0x3220 [ 2770.782593][T24867] ? proc_fail_nth_write+0x157/0x1c0 [ 2770.787849][T24867] _do_fork+0x142/0x730 [ 2770.791998][T24867] __x64_sys_clone+0x213/0x260 [ 2770.796738][T24867] do_syscall_64+0xcb/0x1c0 [ 2770.801208][T24867] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2770.807074][T24867] RIP: 0033:0x7f3d26b7c0e9 [ 2770.811460][T24867] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2770.831033][T24867] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2770.839419][T24867] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2770.847364][T24867] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2770.855321][T24867] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2770.863267][T24867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2770.871224][T24867] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:59:07 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 95) 09:59:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:07 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)={r2}, 0x4) bind$inet(r1, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) [ 2770.994895][T24876] FAULT_INJECTION: forcing a failure. [ 2770.994895][T24876] name failslab, interval 1, probability 0, space 0, times 0 [ 2771.007506][T24876] CPU: 0 PID: 24876 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2771.017710][T24876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2771.027735][T24876] Call Trace: [ 2771.030996][T24876] dump_stack+0x18e/0x1d5 [ 2771.035296][T24876] should_fail+0x604/0x770 [ 2771.039684][T24876] ? anon_vma_fork+0xed/0x4d0 [ 2771.044331][T24876] should_failslab+0x5/0x20 [ 2771.048804][T24876] kmem_cache_alloc+0x24/0x210 [ 2771.053537][T24876] anon_vma_fork+0xed/0x4d0 [ 2771.058006][T24876] ? dup_mmap+0x46c/0xb60 [ 2771.062303][T24876] dup_mmap+0x536/0xb60 [ 2771.066430][T24876] dup_mm+0x8c/0x300 [ 2771.070323][T24876] copy_mm+0xe8/0x180 [ 2771.074282][T24876] copy_process+0x1048/0x3220 [ 2771.078926][T24876] ? proc_fail_nth_write+0x157/0x1c0 [ 2771.084186][T24876] _do_fork+0x142/0x730 [ 2771.088319][T24876] __x64_sys_clone+0x213/0x260 [ 2771.093057][T24876] do_syscall_64+0xcb/0x1c0 [ 2771.097528][T24876] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2771.103386][T24876] RIP: 0033:0x7f3d26b7c0e9 [ 2771.107772][T24876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2771.127343][T24876] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2771.135717][T24876] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 09:59:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x2, 0x3, 0x7ffffffb}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x1}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x2, 0x3, 0x7ffffffb}) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x1}) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r2, 0x0, 0x0) (async) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) (async) [ 2771.143655][T24876] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2771.151593][T24876] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2771.159533][T24876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2771.167471][T24876] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:59:07 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) (async) 09:59:07 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 95) 09:59:07 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)={r2}, 0x4) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 09:59:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'geneve0\x00'}) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:07 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)={r2}, 0x4) bind$inet(r1, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000680)={r2}, 0x4) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) (async) 09:59:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x541b, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:07 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:07 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 96) 09:59:07 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x8, 0x20000010000000, 0x0, 0x2000000000000, 0xfffffffffffffffe, 0x0, 0xfffffffffe, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100), 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000080), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000100)}}, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0, 0xfffffffffffffffe, 0x0, {{0x2, 0x3, 0x1, 0x87, 0xffffffff, 0x4f, {0x5, 0x40, 0x9, 0x7fffffffffffffff, 0xfffffffffffffff8, 0xe972, 0x5, 0x3, 0x6a3, 0x6000, 0x1ff, 0xee01, 0xee00, 0x6, 0x3}}}}, 0xa0) 09:59:07 executing program 5: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) [ 2771.376138][T24916] FAULT_INJECTION: forcing a failure. [ 2771.376138][T24916] name failslab, interval 1, probability 0, space 0, times 0 [ 2771.388811][T24916] CPU: 0 PID: 24916 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2771.399030][T24916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2771.409073][T24916] Call Trace: [ 2771.412354][T24916] dump_stack+0x18e/0x1d5 [ 2771.416667][T24916] should_fail+0x604/0x770 [ 2771.421069][T24916] ? anon_vma_clone+0xa1/0x4d0 [ 2771.421316][T24917] FAULT_INJECTION: forcing a failure. [ 2771.421316][T24917] name failslab, interval 1, probability 0, space 0, times 0 [ 2771.425816][T24916] should_failslab+0x5/0x20 [ 2771.425827][T24916] kmem_cache_alloc+0x24/0x210 [ 2771.425836][T24916] anon_vma_clone+0xa1/0x4d0 [ 2771.425850][T24916] anon_vma_fork+0x8c/0x4d0 [ 2771.456664][T24916] ? dup_mmap+0x46c/0xb60 [ 2771.460974][T24916] dup_mmap+0x536/0xb60 [ 2771.465111][T24916] dup_mm+0x8c/0x300 [ 2771.468989][T24916] copy_mm+0xe8/0x180 [ 2771.472948][T24916] copy_process+0x1048/0x3220 [ 2771.477606][T24916] ? proc_fail_nth_write+0x157/0x1c0 [ 2771.482869][T24916] _do_fork+0x142/0x730 [ 2771.487004][T24916] __x64_sys_clone+0x213/0x260 [ 2771.491747][T24916] do_syscall_64+0xcb/0x1c0 [ 2771.496229][T24916] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2771.502097][T24916] RIP: 0033:0x7fd3d983a0e9 [ 2771.506489][T24916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2771.526065][T24916] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2771.534472][T24916] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2771.542418][T24916] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2771.550369][T24916] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2771.558316][T24916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2771.566264][T24916] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2771.574218][T24917] CPU: 1 PID: 24917 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2771.584441][T24917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2771.594482][T24917] Call Trace: [ 2771.597769][T24917] dump_stack+0x18e/0x1d5 [ 2771.602085][T24917] should_fail+0x604/0x770 [ 2771.606484][T24917] ? anon_vma_clone+0xa1/0x4d0 [ 2771.611232][T24917] should_failslab+0x5/0x20 [ 2771.615723][T24917] kmem_cache_alloc+0x24/0x210 [ 2771.620481][T24917] anon_vma_clone+0xa1/0x4d0 [ 2771.625066][T24917] anon_vma_fork+0x8c/0x4d0 [ 2771.629549][T24917] ? dup_mmap+0x46c/0xb60 [ 2771.633845][T24917] dup_mmap+0x536/0xb60 [ 2771.637975][T24917] dup_mm+0x8c/0x300 [ 2771.641842][T24917] copy_mm+0xe8/0x180 [ 2771.645794][T24917] copy_process+0x1048/0x3220 [ 2771.650441][T24917] ? proc_fail_nth_write+0x157/0x1c0 [ 2771.655694][T24917] _do_fork+0x142/0x730 [ 2771.659816][T24917] __x64_sys_clone+0x213/0x260 [ 2771.664546][T24917] do_syscall_64+0xcb/0x1c0 [ 2771.669108][T24917] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2771.674971][T24917] RIP: 0033:0x7f3d26b7c0e9 [ 2771.679356][T24917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2771.698926][T24917] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2771.707412][T24917] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2771.715363][T24917] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2771.723314][T24917] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2771.731267][T24917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2771.739228][T24917] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:59:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x2, 0x3, 0x7ffffffb}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x1}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$HIDIOCGREPORT(0xffffffffffffffff, 0x400c4807, &(0x7f0000000000)={0x2, 0x3, 0x7ffffffb}) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x1}) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r2, 0x0, 0x0) (async) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) (async) 09:59:08 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x8, 0x20000010000000, 0x0, 0x2000000000000, 0xfffffffffffffffe, 0x0, 0xfffffffffe, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0) (async) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100), 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000080), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000100)}}, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0, 0xfffffffffffffffe, 0x0, {{0x2, 0x3, 0x1, 0x87, 0xffffffff, 0x4f, {0x5, 0x40, 0x9, 0x7fffffffffffffff, 0xfffffffffffffff8, 0xe972, 0x5, 0x3, 0x6a3, 0x6000, 0x1ff, 0xee01, 0xee00, 0x6, 0x3}}}}, 0xa0) 09:59:08 executing program 5: unshare(0x0) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:08 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 96) 09:59:08 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 97) 09:59:08 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) nanosleep(&(0x7f0000000000)={0x77359400}, 0x0) (async) 09:59:08 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x8, 0x20000010000000, 0x0, 0x2000000000000, 0xfffffffffffffffe, 0x0, 0xfffffffffe, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100), 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000080), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000100)}}, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0, 0xfffffffffffffffe, 0x0, {{0x2, 0x3, 0x1, 0x87, 0xffffffff, 0x4f, {0x5, 0x40, 0x9, 0x7fffffffffffffff, 0xfffffffffffffff8, 0xe972, 0x5, 0x3, 0x6a3, 0x6000, 0x1ff, 0xee01, 0xee00, 0x6, 0x3}}}}, 0xa0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x8, 0x20000010000000, 0x0, 0x2000000000000, 0xfffffffffffffffe, 0x0, 0xfffffffffe, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100), 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000080), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000100)}}, 0x10) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000400)={0xa0, 0xfffffffffffffffe, 0x0, {{0x2, 0x3, 0x1, 0x87, 0xffffffff, 0x4f, {0x5, 0x40, 0x9, 0x7fffffffffffffff, 0xfffffffffffffff8, 0xe972, 0x5, 0x3, 0x6a3, 0x6000, 0x1ff, 0xee01, 0xee00, 0x6, 0x3}}}}, 0xa0) (async) 09:59:08 executing program 5: unshare(0x0) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:08 executing program 5: unshare(0x0) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:08 executing program 2: unshare(0x600) unshare(0x1000) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:08 executing program 2: unshare(0x600) unshare(0x1000) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:08 executing program 5: unshare(0x600) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 09:59:08 executing program 2: unshare(0x600) unshare(0x1000) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:08 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000)={[0x6]}, 0x0, &(0x7f0000000040), 0x8) [ 2772.216078][T24971] FAULT_INJECTION: forcing a failure. [ 2772.216078][T24971] name failslab, interval 1, probability 0, space 0, times 0 [ 2772.228793][T24971] CPU: 0 PID: 24971 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2772.237736][T24972] FAULT_INJECTION: forcing a failure. [ 2772.237736][T24972] name failslab, interval 1, probability 0, space 0, times 0 [ 2772.239007][T24971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2772.239010][T24971] Call Trace: [ 2772.239027][T24971] dump_stack+0x18e/0x1d5 [ 2772.239043][T24971] should_fail+0x604/0x770 [ 2772.273565][T24971] ? anon_vma_clone+0xa1/0x4d0 [ 2772.278308][T24971] should_failslab+0x5/0x20 [ 2772.282788][T24971] kmem_cache_alloc+0x24/0x210 [ 2772.287530][T24971] anon_vma_clone+0xa1/0x4d0 [ 2772.292098][T24971] anon_vma_fork+0x8c/0x4d0 [ 2772.296575][T24971] ? dup_mmap+0x46c/0xb60 [ 2772.300879][T24971] dup_mmap+0x536/0xb60 [ 2772.305012][T24971] dup_mm+0x8c/0x300 [ 2772.308886][T24971] copy_mm+0xe8/0x180 [ 2772.312841][T24971] copy_process+0x1048/0x3220 [ 2772.317499][T24971] ? proc_fail_nth_write+0x157/0x1c0 [ 2772.322758][T24971] _do_fork+0x142/0x730 [ 2772.326890][T24971] __x64_sys_clone+0x213/0x260 [ 2772.331633][T24971] do_syscall_64+0xcb/0x1c0 [ 2772.336115][T24971] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2772.341984][T24971] RIP: 0033:0x7fd3d983a0e9 [ 2772.346375][T24971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2772.365956][T24971] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2772.374344][T24971] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2772.382290][T24971] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2772.390235][T24971] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2772.398181][T24971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2772.406132][T24971] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2772.414085][T24972] CPU: 1 PID: 24972 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2772.424305][T24972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2772.434340][T24972] Call Trace: [ 2772.437614][T24972] dump_stack+0x18e/0x1d5 [ 2772.441931][T24972] should_fail+0x604/0x770 [ 2772.446330][T24972] ? anon_vma_fork+0xed/0x4d0 [ 2772.450991][T24972] should_failslab+0x5/0x20 [ 2772.455481][T24972] kmem_cache_alloc+0x24/0x210 [ 2772.460235][T24972] anon_vma_fork+0xed/0x4d0 [ 2772.464722][T24972] ? dup_mmap+0x46c/0xb60 [ 2772.469036][T24972] dup_mmap+0x536/0xb60 [ 2772.473186][T24972] dup_mm+0x8c/0x300 [ 2772.477066][T24972] copy_mm+0xe8/0x180 [ 2772.481034][T24972] copy_process+0x1048/0x3220 [ 2772.485696][T24972] ? proc_fail_nth_write+0x157/0x1c0 [ 2772.490967][T24972] _do_fork+0x142/0x730 [ 2772.495110][T24972] __x64_sys_clone+0x213/0x260 [ 2772.499855][T24972] do_syscall_64+0xcb/0x1c0 [ 2772.504341][T24972] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2772.510214][T24972] RIP: 0033:0x7f3d26b7c0e9 09:59:08 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 97) [ 2772.514614][T24972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2772.534204][T24972] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2772.542604][T24972] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2772.550556][T24972] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2772.554876][T24976] FAULT_INJECTION: forcing a failure. [ 2772.554876][T24976] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2772.558510][T24972] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2772.558514][T24972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2772.558519][T24972] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2772.596277][T24976] CPU: 0 PID: 24976 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2772.606499][T24976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 09:59:08 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 98) [ 2772.616534][T24976] Call Trace: [ 2772.619810][T24976] dump_stack+0x18e/0x1d5 [ 2772.624142][T24976] should_fail+0x604/0x770 [ 2772.628545][T24976] __alloc_pages_nodemask+0x12a/0x6f0 [ 2772.633906][T24976] pte_alloc_one+0x1b/0xb0 [ 2772.638310][T24976] __pte_alloc+0x1d/0x1c0 [ 2772.642626][T24976] copy_pte_range+0xf2c/0x1610 [ 2772.647382][T24976] copy_page_range+0x7b0/0xb00 [ 2772.652144][T24976] dup_mmap+0x829/0xb60 [ 2772.656290][T24976] dup_mm+0x8c/0x300 [ 2772.660175][T24976] copy_mm+0xe8/0x180 [ 2772.664144][T24976] copy_process+0x1048/0x3220 [ 2772.668810][T24976] ? proc_fail_nth_write+0x157/0x1c0 [ 2772.674085][T24976] _do_fork+0x142/0x730 [ 2772.678229][T24976] __x64_sys_clone+0x213/0x260 [ 2772.682980][T24976] do_syscall_64+0xcb/0x1c0 [ 2772.687469][T24976] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2772.693341][T24976] RIP: 0033:0x7fd3d983a0e9 [ 2772.697738][T24976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2772.717329][T24976] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2772.725731][T24976] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2772.733691][T24976] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2772.741647][T24976] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2772.746358][T24979] FAULT_INJECTION: forcing a failure. [ 2772.746358][T24979] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2772.749600][T24976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2772.749606][T24976] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2772.779625][T24979] CPU: 1 PID: 24979 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2772.789847][T24979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2772.799882][T24979] Call Trace: [ 2772.803164][T24979] dump_stack+0x18e/0x1d5 [ 2772.807481][T24979] should_fail+0x604/0x770 [ 2772.811886][T24979] __alloc_pages_nodemask+0x12a/0x6f0 [ 2772.817248][T24979] pte_alloc_one+0x1b/0xb0 [ 2772.821647][T24979] __pte_alloc+0x1d/0x1c0 [ 2772.825962][T24979] copy_pte_range+0xf2c/0x1610 [ 2772.830715][T24979] copy_page_range+0x7b0/0xb00 [ 2772.835465][T24979] dup_mmap+0x829/0xb60 [ 2772.839609][T24979] dup_mm+0x8c/0x300 [ 2772.843488][T24979] copy_mm+0xe8/0x180 [ 2772.847451][T24979] copy_process+0x1048/0x3220 [ 2772.852115][T24979] ? proc_fail_nth_write+0x157/0x1c0 [ 2772.857392][T24979] _do_fork+0x142/0x730 [ 2772.861537][T24979] __x64_sys_clone+0x213/0x260 [ 2772.866288][T24979] do_syscall_64+0xcb/0x1c0 [ 2772.870780][T24979] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2772.876651][T24979] RIP: 0033:0x7f3d26b7c0e9 [ 2772.881051][T24979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2772.900631][T24979] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2772.909009][T24979] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 09:59:09 executing program 4: unshare(0x600) ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, &(0x7f0000000000)={0x3, 0x2, 0xfb49}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:09 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000)={[0x6]}, 0x0, &(0x7f0000000040), 0x8) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) rt_sigtimedwait(&(0x7f0000000000)={[0x6]}, 0x0, &(0x7f0000000040), 0x8) (async) 09:59:09 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 98) 09:59:09 executing program 4: unshare(0x600) ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, &(0x7f0000000000)={0x3, 0x2, 0xfb49}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) unshare(0x600) (async) ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, &(0x7f0000000000)={0x3, 0x2, 0xfb49}) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:59:09 executing program 4: unshare(0x600) ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, &(0x7f0000000000)={0x3, 0x2, 0xfb49}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) unshare(0x600) (async) ioctl$HIDIOCGREPORTINFO(0xffffffffffffffff, 0xc00c4809, &(0x7f0000000000)={0x3, 0x2, 0xfb49}) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:59:09 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000)={[0x6]}, 0x0, &(0x7f0000000040), 0x8) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) rt_sigtimedwait(&(0x7f0000000000)={[0x6]}, 0x0, &(0x7f0000000040), 0x8) (async) 09:59:09 executing program 5: unshare(0x600) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2772.916960][T24979] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2772.924916][T24979] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2772.932870][T24979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2772.940828][T24979] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:59:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) (async) 09:59:09 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x27, &(0x7f00000001c0)="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", 0x1000) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:09 executing program 2: unshare(0x600) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) setsockopt$inet_buf(r0, 0x0, 0x27, &(0x7f00000001c0)="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", 0x1000) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:09 executing program 4: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000003c0)=0x4000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'sit0\x00', r0, 0x4, 0x8, 0x6, 0xe3, 0x5a, @remote, @private2, 0x7800, 0x8, 0x7, 0x8}}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000580)={r3, @local, @multicast1}, 0xc) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:09 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 99) 09:59:09 executing program 2: unshare(0x600) (async, rerun: 32) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 32) bind$inet(r0, 0x0, 0x0) (async) setsockopt$inet_buf(r0, 0x0, 0x27, &(0x7f00000001c0)="1dba8108834463b20a3a4676db9633da8f71938254a61b5600caaea0add67e55e380cb6c20f61a150b7c2c35340825903c1a49aa8f04f1fb6ef663b891c7270023ebc7f1af62eb1b1185edaae6d2af7b51e3058caed5d20919f5e6e251acc78eca73df10dd3bd62bbb48bb843b19271d3acd26eec873cc64cbba750e82402e72de3a5f2065912046051390a70dbbd21947dd178efc82ccbcd189d0364cdb3e22b7190a669ad7fa77ea38f156b69b2504e5d59a84e9c4cd7a7ce1da6fa6e024e2b0c942a29ffc1aafd5f9975ee4e5feeb8d05f272abc9e8b34f8f9a4d151f4b0b8da256dc93052345f24fa52a071731ea0d9f4ffd746e9538efd15b773253e5488e3c57ef4aec402aa4bb097bf4355171c055ac48f25cfde293bce8ab00696c21c48d943fd4402d3275061a50b7cfcd3abaee62704c30a65ea6605a79787ded8da8dacffc5e1bab1e1c77e818e2a8ec2ca8c40c35f0fc70a920b1af9957293ab9e78d8665bed5de78674948a2e6af1d3e7c1dcf5068796ba1e2ef9f7ad7c24c8199fa080fd6cd7c5df6227937d133c4216b89b4a2f548a577ede960a4cdd6932c9f2e5487896f922a7e01cdbc14ef39fdc843512c0bb3daf87adcf2cfec7d0b0dcd692a6ebb8ea984176677aa50fd82434dcb0af2d54d8f2221842ee3333420d5954b3b85ba899bd58e938233dea6e83fbe970a20f365f9ccd76fee4a3c8ea2353f061fd402b6034ce44fffa42d7fc2d435e64052d0107fa89a2a95b43bc07d38fe122760f5090be97603609e3ae498e161ffb968c0e2ba0d273d86675b777061ec84d056d9de63b4ae4522b97a63dbecc0a2d09bc19146007b925268dc880c09e72acc8f7a54ae7ae367278b308a03ca2b7b10db0cda2cde4216eaf679650401bf478af046828f771e0e25d383fd52899be3a49714c7c9ea535ada0bfef933e80d327a6305e163b6fcdb9347777c51e410a5ba035c5b78ab1f64e41f68dc7e0471a7532e68e1de954035602de9139b46daf358f3e287f2743e8c75faeb7f6f607eacec6f83f6939435b22b3b9f054e67b3adda380787456c5e5ecace0e1dc9a058c8fda5f7eedde304c9c6a4e56192880bd98b0998d030802dbebfa5845162729d7888df4eebc054a13288799939ab0a3df084d32addbc5a79105075be85ef2584b7db4c6ee327ad5ccc678e7f8d627e013c8145c56e1653850abd540c60ab692917921b8801bceabb840d479d2ef9cc5e9373bfeb77374237cc1328f49dacc858bfbbe41c3a0da1e55c66a1c5469fbef022b8d620ede135d779889d51718afb636bdf03b3bfe6e6623c72bcb3ea26dcac19686b5f758b8468ac75ea70b2363972970a79d83bd4e0f56807cbce861bfa2240f8bca7d483c085e0b038ef35943441e3032ec15ee4e897b7c3462db0a0daea334fe1b7286d817d9657f8113232ed95073463a89ab1c46d2c1bdfbe481a91e3a9f50958d1e658bff698b222f16f60f235484698425448e7a56910a20695af3ea86a5e2cdd0ee1d9d015bbadba0e405679763f5cc5b34beefb432f1ba7c5aebc8ed8ceb267b0ff1c4a17a41d22c3a184211084fbc9bafba284afead4ce35e14f6a69632b07a95714503848071a67f8de86f468c8f661ad45976b4d0c8d7e0dc711287bc6d64734df6cc4c21936a78c43c17991b584a2907afa3203002c5e4b9d3406a195f9bf6178b5a44f44c0f30d0679a8e2bf0ef06fec8f37a675747c61b582721653051916f6df5e8030d288da42ac303f3f374ba1cfaab4343542be3018e67b17f68a49384271c2c13f6198ad0d649754c31bdf695c11ddce7563174292500a91bf2145d129524b84bb3c4c8c3837d75eeb3667278e202481c5bd3849544a292ace8ab793d45c9f558f1167145c2a18ee54c0714493040bb4c0fb21c1ee30b27ec7a23112aab9ca524ce5471e77ba33cfbc904bb4c8e3effd05afabce7a102aa9542c49e8ba622a333c3741d35ad84ab84eeb5c4b899ccad282b325a4e863591e468551dabe950d29d3fcb302c5a35e965fee83a40146fa44507bb5a9c8c4063fffcbd7279b374f3e64ac958762304f8ea252e47be586fc427e3e8c52a17a38945af650273b00b82c43213dd42170678f5060a6fe735d8123c6d09178fcfa83502c206c231a574705a5c03d229cf8e92ed6dc71ab74b52e76ab653d45c775cff6ca4ea04715d2fc4e80ab9c89d99cc9e3cc93013b39301d190ad7366ecc30f37f326ef7ed073e5913b75af2792d5779ea89b2734e4a97a3cd0530ec5147ab0cd016c141efdaeafd1de6f2e9b7c922945a1879669f3fc598889b67762bc76cc48ba1a3e90aab619512ee75109d04c356c2eba874318d2372cc3ad1e7807bc43676965dcd351b9e58788c91f47b1e5fa3b5e3fad040d602c429d199aa70909d7111fe0feea0ef18ea1766141d39cad8480208bac77aac4a22230d998ee5f2cc937b964ba9f9cc1ecf045de5366bd996e2018abba395bfa64dc5b9c12f05e549ec2e669894866b38209a5a6e5cd43a768b38d5ceb1e71d4d5b4832030bdb57a2997f28963dea60190573369f7344be70588f05babe8dd74c7971c3fd0d520b4cb31de8e6aaf81b97b04eec93b2781bfc6f32b67e10c697bc738e56768a0a60a86e6f75d2ebb6c00d58e32e9edefab6de00d0ecf52a9e01b8b97380fe357b08d3b4547b5e4a8ff18a4954c4e7f3af629fcaafc208ca772bd0e35bcf27bf64e82ded244da33c498d2c7902dea1e643aa93b28b3607a1613a27531974ae52e2acd0dd6a57150c7bf9a054110e19b7222ac46d2ea149c4b683de16f0c711e2974af4819d2f52a281dcd67e5e5b4e6ce8bd3c84e167f397329696f152b7828a1fcf32b42986dc96612bccd021c16dc4f5a844e04b1cea3c96cd667c71160f17249940b58b04acf64c1f6c8bbff4c88a6e0ba6313cd10c1123715d5b83b2c3f215bef704b28555e2f98d9078bc9300d22ec273db047d8fe51d569cbb761e7d0baf729e4d9c5323a12b1edfc2184f9398270349d7454ce77e5f6cef8303496be3a57086d5ca1f8d3d4070fd063a1e1d870e18d2b781e87d9a84c00fa4542cfb56bfe0561ffd1db9f5d2b684e49ab5c1a1ecbb611876d7c0f286e031f97e32cbf32defb764c94d78f77b4c38443a0c5d661c04412bf6e3beb54b419228ef7884447f8eee4f0ed28b54701819f10465d7afe65ba1b76d45a4832fa54fa3b83042cee7adf4b31a3e3528b2d1ee0f7ee3acfea97e72e89823571c6c63f0f5a1ba6cdd55931a55de5b0b8a2cafb77ee3853349e1fde143bd45cb26a3974290985883ad7d3a9e22c7887a05de414062b869e92ecbaba1f88e6e28eba1a0db55327ec205b778afa1419d12155056763715e47a514525fed7226b040bbf787927f41b5a6eefc99dc8ffdb89d1df787163baa3bcb0a115c815da85dd1a158ce96ec9372b6f935bccef9f679275b51b705d90e7de7471bc5088d67b2e7f8d8e29133a1040cc01942ad18e49c377b2943814281c10c5a90cef8750bf7816f83405abc53841d86ef0b995a7542e4ea6d68ae7edd76b33a71e599e11179c027f40fb74c02c243c971448c6051082ed115c1e51825a1686797b607fe922e09663d92507832d368eaa7a5cdd40ae30d2160cb80103bb718e08190049f72720c10e0bc5a845f567cb93d67f7f7310e84d027a15a1ebe7c56b6ab9be808abb1fad9c7433921a3bf408fefd5fca7e6a048a176d70fd179f42b7aefc58fbbe2bdaa9e2b6d2e74d25fc9fea86da89dbcf62512b2b03391cbca6c87996fbd99a0cedad423cd4f5157d95d16e98197b9a3067d7a8a505a601ca095a320636d06d2e4cb0cb52d7e77b0ef38de7100aecdbfa1d599d6d504162cda967cf4b6b6f1d75c722e3a2183c5d93ffb53530e1baa6ddfcb887f53b3fcae2c050f140a73a7d24eeb20eb57adf13e92d2b13fd3e57bccb0d6eb80424952a81cd10f8f92dbf9dc60308cd42569d834d4d447631df29cc62195ce29b1e6013e1935293eba552c1fe637c13a835a8798800f01df7690f1b827b90da28fcca0e1da44e26348eecc5179417f3511eced12eb5ad195e6cd8bfbfe3d27f8a83b175c6399d8770e6f8eed58770ee076312b7837d984bc9513756c9b606589a34b66d816edd9cccca98cfa7f506e86dbc9c91a06a230218b9c3611412cbef839f8c5ffeac607c0f90a8e9c31c097784fa3824c4d0c1d2e1a8786e7f439d064289edccf66039b2e5e72d58e005dcd21795445dbd3c99316d146b4ba747a69b5405d2df1a44a1cbfe45bc3f84f8124570640577f55253abbd3046a1109aa4ce7e120bc6f25d9fe8638615d2ea4a9bfce2185fa66b4ecea522cbbc08603db59d06577eba9312f75166b830e845781290e846e39854ba02424c814ca7ef4d0a529e8f237fe5bca80f77957b26b884fbd1d59cbcf6335a3c636ffa93fd4705a57311a2a028e8b52f2979de56fb9f5647aca49207dfab54e417e44e27a61ea89d7da70867ce291286b24b12485e778bc5111d427aabd44c02b31b4b3da8b7f5f881fe0ea883570cd4dcc198437e80c2ae402216b9c75307aa5edcda0f13ed4e3377e88111d8677c7ebd2adc66a448292654d92ad712c8954abf8d6fc3fcbb313107d650b1010385b6302d46ae7739548ae36f4a1a5075ebb23ae579e0eca65ba0b74b1766cf8150855ae28e9d75eec066f6a5668e1aba7f44b0f350620ff044e8084d247b2d50d31e191192e932d0832057b542b412ba49482732205f0de5fdff08cb2810c659a4ab43e986fe7196a25bbfcd7ea30cad11cfa54ece514633263d00f66bc73ec3445236912e98590050d3e8caaf26ed762d2b6009a2abb815fb39e2ca05a5e872fee7cfbd360f260a9abc45b34f82efce1a307d1c5a2ecada0865ed0de851984f237237410811553ccee8499fcde0d6390425334999570362524139c4d48c8000f08e1b45d5c8e59a5d3d3adafa39955500c7480f62332f5a4e81c0888f975881a531178a253e6af1c11a9ec472e2516b2788ceeaf0a7c38a04440d83fca919fdd568c2cb8d62a308afd225b2833b2aa0432267025afc1db98bc7a9809333847af3322a9720a94215cc16ff9d92813869ea048b2e7cdd9179761f755d8822cf565c14476cef60e406f843706cd19f0619ac50687330280e0c3a70dad2d945956a4dfa332c63a03c91cf231f185512328c92e974014d37f997b6edd93f4869b9006d7e9119398bf030278c2128ae9dfaa2754034500adeff7314ed5bd5d7cf68ab7629a7139881e64fd6d93a8ac9de84f28c87e232d405585be242faec3ff6c98c682d9e129f95f659a9fee6cbccb338d5e408726a6c7ce78e37dbe44341c862a8dbb2125a57c1aabb205f9f03033b6ca584594d63c7cef560e94219ad6cf6395e400449672d6e2885384566233dc3fc20a734459cdaa14ff23c27bba6c45ba3a61f004d4469fe4446dfdfa1d358a5fc19c4b3c0995b1c647446d4ec504f9384bd201b31d1dcf416e6045a8ec077d998ba0896f9c04ddc073fa6af8e87d2a021569f0732f710a617cf7230164060f3ff15aefded848e7390807ad7704393826305aaabfa06eb80077cb80ea31cf45a24034995b1b2794771ed302f58493975f69f4db82abb4f7b74a2ced4bbd979e47d797b1c787565dfb50d8dd6d0a65207a1c845c21810ca2e06a82eca0ca9122d6cf7b7c83741bd58aaf2938bc9eb70b42636bcb4c5a97a9286824b7d8f34c630977dd859cf6d88229bb3200e6c87549c8b8f18bb9a", 0x1000) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:09 executing program 4: unshare(0x600) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000003c0)=0x4000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'sit0\x00', r0, 0x4, 0x8, 0x6, 0xe3, 0x5a, @remote, @private2, 0x7800, 0x8, 0x7, 0x8}}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000580)={r3, @local, @multicast1}, 0xc) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) [ 2773.116606][T25024] FAULT_INJECTION: forcing a failure. [ 2773.116606][T25024] name failslab, interval 1, probability 0, space 0, times 0 [ 2773.129267][T25024] CPU: 0 PID: 25024 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2773.139486][T25024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2773.149524][T25024] Call Trace: [ 2773.152803][T25024] dump_stack+0x18e/0x1d5 [ 2773.157120][T25024] should_fail+0x604/0x770 [ 2773.161521][T25024] ? anon_vma_fork+0xed/0x4d0 [ 2773.166178][T25024] should_failslab+0x5/0x20 [ 2773.170669][T25024] kmem_cache_alloc+0x24/0x210 [ 2773.171439][T25025] FAULT_INJECTION: forcing a failure. [ 2773.171439][T25025] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2773.175420][T25024] anon_vma_fork+0xed/0x4d0 [ 2773.175428][T25024] ? dup_mmap+0x46c/0xb60 [ 2773.175442][T25024] dup_mmap+0x536/0xb60 [ 2773.201510][T25024] dup_mm+0x8c/0x300 [ 2773.205382][T25024] copy_mm+0xe8/0x180 [ 2773.209341][T25024] copy_process+0x1048/0x3220 [ 2773.214000][T25024] ? proc_fail_nth_write+0x157/0x1c0 [ 2773.219259][T25024] _do_fork+0x142/0x730 [ 2773.223390][T25024] __x64_sys_clone+0x213/0x260 [ 2773.228129][T25024] do_syscall_64+0xcb/0x1c0 [ 2773.232610][T25024] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2773.238480][T25024] RIP: 0033:0x7fd3d983a0e9 [ 2773.242870][T25024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2773.262457][T25024] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2773.270843][T25024] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2773.278786][T25024] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2773.286730][T25024] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2773.294674][T25024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2773.302620][T25024] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2773.310575][T25025] CPU: 1 PID: 25025 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2773.320792][T25025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2773.330828][T25025] Call Trace: [ 2773.334114][T25025] dump_stack+0x18e/0x1d5 [ 2773.338429][T25025] should_fail+0x604/0x770 [ 2773.342833][T25025] __alloc_pages_nodemask+0x12a/0x6f0 [ 2773.348192][T25025] pte_alloc_one+0x1b/0xb0 [ 2773.352590][T25025] __pte_alloc+0x1d/0x1c0 [ 2773.356899][T25025] copy_pte_range+0xf2c/0x1610 [ 2773.361654][T25025] copy_page_range+0x7b0/0xb00 [ 2773.366404][T25025] dup_mmap+0x829/0xb60 [ 2773.370544][T25025] dup_mm+0x8c/0x300 [ 2773.374423][T25025] copy_mm+0xe8/0x180 [ 2773.378388][T25025] copy_process+0x1048/0x3220 [ 2773.383051][T25025] ? proc_fail_nth_write+0x157/0x1c0 [ 2773.388320][T25025] _do_fork+0x142/0x730 [ 2773.392460][T25025] __x64_sys_clone+0x213/0x260 [ 2773.397202][T25025] do_syscall_64+0xcb/0x1c0 [ 2773.401675][T25025] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2773.407537][T25025] RIP: 0033:0x7f3d26b7c0e9 [ 2773.411923][T25025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2773.431497][T25025] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2773.439877][T25025] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2773.447816][T25025] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2773.455756][T25025] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 09:59:09 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 99) 09:59:09 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x34000100) 09:59:09 executing program 4: unshare(0x600) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) bind$inet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000003c0)=0x4000000) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'sit0\x00', r0, 0x4, 0x8, 0x6, 0xe3, 0x5a, @remote, @private2, 0x7800, 0x8, 0x7, 0x8}}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000580)={r3, @local, @multicast1}, 0xc) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:09 executing program 4: unshare(0x600) syz_clone(0x1011000, &(0x7f0000000040)="51c67e49d604d710d228d1dfe5b1eb718f16", 0x12, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f0000000240)={0x1, 0x1, 0x5, 0x0, 0x1, 0x3}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) ptrace$getregs(0xc, 0xffffffffffffffff, 0x7, &(0x7f0000000140)=""/39) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000100)={0x7}) clock_getres(0x0, &(0x7f0000000000)) [ 2773.463696][T25025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2773.471635][T25025] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 [ 2773.599010][T25037] FAULT_INJECTION: forcing a failure. [ 2773.599010][T25037] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2773.612281][T25037] CPU: 0 PID: 25037 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2773.622490][T25037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2773.632515][T25037] Call Trace: [ 2773.635776][T25037] dump_stack+0x18e/0x1d5 [ 2773.640077][T25037] should_fail+0x604/0x770 [ 2773.644462][T25037] __alloc_pages_nodemask+0x12a/0x6f0 [ 2773.649801][T25037] pte_alloc_one+0x1b/0xb0 [ 2773.654183][T25037] __pte_alloc+0x1d/0x1c0 [ 2773.658481][T25037] copy_pte_range+0xf2c/0x1610 [ 2773.663214][T25037] copy_page_range+0x7b0/0xb00 [ 2773.667949][T25037] dup_mmap+0x829/0xb60 [ 2773.672074][T25037] dup_mm+0x8c/0x300 [ 2773.675952][T25037] copy_mm+0xe8/0x180 [ 2773.679904][T25037] copy_process+0x1048/0x3220 [ 2773.684548][T25037] ? proc_fail_nth_write+0x157/0x1c0 [ 2773.689801][T25037] _do_fork+0x142/0x730 [ 2773.693925][T25037] __x64_sys_clone+0x213/0x260 [ 2773.698657][T25037] do_syscall_64+0xcb/0x1c0 [ 2773.703134][T25037] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2773.708994][T25037] RIP: 0033:0x7fd3d983a0e9 [ 2773.713377][T25037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2773.732960][T25037] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2773.741335][T25037] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 09:59:10 executing program 5: unshare(0x600) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2773.749289][T25037] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2773.757232][T25037] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2773.765173][T25037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2773.773120][T25037] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 09:59:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 09:59:10 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x34000100) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) unshare(0x34000100) (async) 09:59:10 executing program 4: unshare(0x600) syz_clone(0x1011000, &(0x7f0000000040)="51c67e49d604d710d228d1dfe5b1eb718f16", 0x12, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f0000000240)={0x1, 0x1, 0x5, 0x0, 0x1, 0x3}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) ptrace$getregs(0xc, 0xffffffffffffffff, 0x7, &(0x7f0000000140)=""/39) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000100)={0x7}) clock_getres(0x0, &(0x7f0000000000)) unshare(0x600) (async) syz_clone(0x1011000, &(0x7f0000000040)="51c67e49d604d710d228d1dfe5b1eb718f16", 0x12, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) (async) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f0000000240)={0x1, 0x1, 0x5, 0x0, 0x1, 0x3}) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) ptrace$getregs(0xc, 0xffffffffffffffff, 0x7, &(0x7f0000000140)=""/39) (async) getpgid(0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x0, 0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000100)={0x7}) (async) clock_getres(0x0, &(0x7f0000000000)) (async) 09:59:10 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 100) 09:59:10 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 100) 09:59:10 executing program 2: unshare(0x600) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (rerun: 64) unshare(0x34000100) 09:59:10 executing program 4: unshare(0x600) (async) syz_clone(0x1011000, &(0x7f0000000040)="51c67e49d604d710d228d1dfe5b1eb718f16", 0x12, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x2000, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f0000000240)={0x1, 0x1, 0x5, 0x0, 0x1, 0x3}) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) ptrace$getregs(0xc, 0xffffffffffffffff, 0x7, &(0x7f0000000140)=""/39) (async) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000100)={0x7}) (async) clock_getres(0x0, &(0x7f0000000000)) 09:59:10 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000040)={0x101, 0x0, 0x4000000000002, 0x0, 0x0, 0x0, 0x40005}, 0x0, 0x0, 0x0, 0x0) 09:59:10 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000040)={0x101, 0x0, 0x4000000000002, 0x0, 0x0, 0x0, 0x40005}, 0x0, 0x0, 0x0, 0x0) 09:59:10 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000200)) unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 09:59:10 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000040)={0x101, 0x0, 0x4000000000002, 0x0, 0x0, 0x0, 0x40005}, 0x0, 0x0, 0x0, 0x0) [ 2773.991045][T25072] FAULT_INJECTION: forcing a failure. [ 2773.991045][T25072] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2774.000303][T25073] FAULT_INJECTION: forcing a failure. [ 2774.000303][T25073] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2774.004517][T25072] CPU: 0 PID: 25072 Comm: syz-executor.0 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2774.027630][T25072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2774.037658][T25072] Call Trace: [ 2774.040934][T25072] dump_stack+0x18e/0x1d5 [ 2774.045241][T25072] should_fail+0x604/0x770 [ 2774.049633][T25072] __alloc_pages_nodemask+0x12a/0x6f0 [ 2774.054983][T25072] pte_alloc_one+0x1b/0xb0 [ 2774.059376][T25072] __pte_alloc+0x1d/0x1c0 [ 2774.063687][T25072] copy_pte_range+0xf2c/0x1610 [ 2774.068435][T25072] copy_page_range+0x7b0/0xb00 [ 2774.073179][T25072] dup_mmap+0x829/0xb60 [ 2774.077312][T25072] dup_mm+0x8c/0x300 [ 2774.081185][T25072] copy_mm+0xe8/0x180 [ 2774.085140][T25072] copy_process+0x1048/0x3220 [ 2774.089792][T25072] ? proc_fail_nth_write+0x157/0x1c0 [ 2774.095055][T25072] _do_fork+0x142/0x730 [ 2774.099188][T25072] __x64_sys_clone+0x213/0x260 [ 2774.103931][T25072] do_syscall_64+0xcb/0x1c0 [ 2774.108410][T25072] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2774.114275][T25072] RIP: 0033:0x7fd3d983a0e9 [ 2774.118671][T25072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2774.138247][T25072] RSP: 002b:00007fd3d898f118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2774.146630][T25072] RAX: ffffffffffffffda RBX: 00007fd3d994d030 RCX: 00007fd3d983a0e9 [ 2774.154580][T25072] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2774.162527][T25072] RBP: 00007fd3d898f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2774.170471][T25072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2774.178418][T25072] R13: 00007ffe42b26f2f R14: 00007fd3d898f300 R15: 0000000000022000 [ 2774.186371][T25073] CPU: 1 PID: 25073 Comm: syz-executor.1 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2774.196587][T25073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2774.206628][T25073] Call Trace: [ 2774.209907][T25073] dump_stack+0x18e/0x1d5 [ 2774.214220][T25073] should_fail+0x604/0x770 [ 2774.218619][T25073] __alloc_pages_nodemask+0x12a/0x6f0 [ 2774.223976][T25073] pte_alloc_one+0x1b/0xb0 [ 2774.228377][T25073] __pte_alloc+0x1d/0x1c0 [ 2774.232686][T25073] copy_pte_range+0xf2c/0x1610 [ 2774.237525][T25073] copy_page_range+0x7b0/0xb00 [ 2774.242274][T25073] dup_mmap+0x829/0xb60 [ 2774.246413][T25073] dup_mm+0x8c/0x300 [ 2774.250290][T25073] copy_mm+0xe8/0x180 [ 2774.254258][T25073] copy_process+0x1048/0x3220 [ 2774.258918][T25073] ? proc_fail_nth_write+0x157/0x1c0 [ 2774.264187][T25073] _do_fork+0x142/0x730 [ 2774.268327][T25073] __x64_sys_clone+0x213/0x260 [ 2774.273070][T25073] do_syscall_64+0xcb/0x1c0 [ 2774.277540][T25073] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2774.283396][T25073] RIP: 0033:0x7f3d26b7c0e9 [ 2774.287797][T25073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2774.307368][T25073] RSP: 002b:00007f3d25cd1118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2774.315754][T25073] RAX: ffffffffffffffda RBX: 00007f3d26c8f030 RCX: 00007f3d26b7c0e9 [ 2774.323691][T25073] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2774.331630][T25073] RBP: 00007f3d25cd11d0 R08: 0000000000000000 R09: 0000000000000000 [ 2774.339569][T25073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 2774.347507][T25073] R13: 00007ffff14b1b8f R14: 00007f3d25cd1300 R15: 0000000000022000 09:59:10 executing program 5: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:10 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0xfffffc64) 09:59:10 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000200)) unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000200)) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) (async) 09:59:10 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0xffffffffb7c990db, 0x100000000, 0x67579499}, 0x0, 0x0, 0x0, 0x0) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000000)) 09:59:10 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:10 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:10 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0xffffffffb7c990db, 0x100000000, 0x67579499}, 0x0, 0x0, 0x0, 0x0) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000000)) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0xffffffffb7c990db, 0x100000000, 0x67579499}, 0x0, 0x0, 0x0, 0x0) (async) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000000)) (async) 09:59:10 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0xfffffc64) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0xfffffc64) (async) 09:59:10 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000200)) unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f0000000200)) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) (async) 09:59:11 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0xffffffffb7c990db, 0x100000000, 0x67579499}, 0x0, 0x0, 0x0, 0x0) (async) ioctl$HIDIOCGVERSION(0xffffffffffffffff, 0x80044801, &(0x7f0000000000)) 09:59:11 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0xfffffc64) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0xfffffc64) (async) 09:59:11 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6737}, &(0x7f00000001c0)={0x2dc4, 0x400001000}, 0x0, 0x0, 0x0) 09:59:11 executing program 5: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:11 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x10200, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000080)={0x4000000000300, 0x1, 0x0, 0x0, 0x1, 0x9}, 0x0, 0x0, 0x0, 0x0) 09:59:11 executing program 4: unshare(0x600) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6737}, &(0x7f00000001c0)={0x2dc4, 0x400001000}, 0x0, 0x0, 0x0) (rerun: 64) 09:59:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x2, 0xfd2, 0x40, @ipv4={'\x00', '\xff\xff', @multicast1}, @empty, 0x20, 0x20, 0x3}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:11 executing program 0: mlockall(0x3) syz_clone(0x8, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:11 executing program 1: mlockall(0x3) syz_clone(0x8, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:11 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x6737}, &(0x7f00000001c0)={0x2dc4, 0x400001000}, 0x0, 0x0, 0x0) 09:59:11 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x10200, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000080)={0x4000000000300, 0x1, 0x0, 0x0, 0x1, 0x9}, 0x0, 0x0, 0x0, 0x0) 09:59:11 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x9, 0x0, 0x0, 0x35934c74, 0x0, 0x0, 0x401}, 0x0, 0x0, 0x0) 09:59:11 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x10200, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000080)={0x4000000000300, 0x1, 0x0, 0x0, 0x1, 0x9}, 0x0, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x10200, 0x0) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000080)={0x4000000000300, 0x1, 0x0, 0x0, 0x1, 0x9}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:11 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x9, 0x0, 0x0, 0x35934c74, 0x0, 0x0, 0x401}, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x9, 0x0, 0x0, 0x35934c74, 0x0, 0x0, 0x401}, 0x0, 0x0, 0x0) (async) 09:59:11 executing program 2: unshare(0x4040000) 09:59:12 executing program 5: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0x0, 0x0) 09:59:12 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x9, 0x0, 0x0, 0x35934c74, 0x0, 0x0, 0x401}, 0x0, 0x0, 0x0) 09:59:12 executing program 2: unshare(0x4040000) unshare(0x4040000) (async) 09:59:12 executing program 0: mlockall(0x3) syz_clone(0x10, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:12 executing program 1: mlockall(0x3) syz_clone(0x10, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x2, 0xfd2, 0x40, @ipv4={'\x00', '\xff\xff', @multicast1}, @empty, 0x20, 0x20, 0x3}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x2, 0xfd2, 0x40, @ipv4={'\x00', '\xff\xff', @multicast1}, @empty, 0x20, 0x20, 0x3}}) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 09:59:12 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x10001}, &(0x7f00000001c0)={0x7, 0x1a9}, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffffffffffe]}, &(0x7f0000000080), &(0x7f0000000100)={0x0, 0x3938700}, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 09:59:12 executing program 2: unshare(0x4040000) 09:59:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={0x0, @dev, @local}, &(0x7f0000000240)=0xc) bind$inet(r0, 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f00000001c0)={0x64b3, 0x2, 0x97}) unshare(0x600) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x2fd, 0x0, 0x0, 0x0, 0x2, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x2, 0xa18, 0x2b47, 0xfffffffffffffc01, 0xffffffff, 0x0, 0xe303, 0x2}, &(0x7f0000000040)={0x200, 0xfd3, 0x1, 0x9, 0x7fffffff, 0x5, 0xc, 0x2}, &(0x7f0000000080)={0x8, 0x4, 0x0, 0x6, 0x3, 0xffffffff, 0x3000000000, 0x1}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 09:59:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={0x0, @dev, @local}, &(0x7f0000000240)=0xc) bind$inet(r0, 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f00000001c0)={0x64b3, 0x2, 0x97}) unshare(0x600) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x2fd, 0x0, 0x0, 0x0, 0x2, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x2, 0xa18, 0x2b47, 0xfffffffffffffc01, 0xffffffff, 0x0, 0xe303, 0x2}, &(0x7f0000000040)={0x200, 0xfd3, 0x1, 0x9, 0x7fffffff, 0x5, 0xc, 0x2}, &(0x7f0000000080)={0x8, 0x4, 0x0, 0x6, 0x3, 0xffffffff, 0x3000000000, 0x1}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={0x0, @dev, @local}, &(0x7f0000000240)=0xc) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f00000001c0)={0x64b3, 0x2, 0x97}) (async) unshare(0x600) (async) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000180)={0x2fd, 0x0, 0x0, 0x0, 0x2, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000000)={0x2, 0xa18, 0x2b47, 0xfffffffffffffc01, 0xffffffff, 0x0, 0xe303, 0x2}, &(0x7f0000000040)={0x200, 0xfd3, 0x1, 0x9, 0x7fffffff, 0x5, 0xc, 0x2}, &(0x7f0000000080)={0x8, 0x4, 0x0, 0x6, 0x3, 0xffffffff, 0x3000000000, 0x1}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) (async) 09:59:12 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x10001}, &(0x7f00000001c0)={0x7, 0x1a9}, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffffffffffe]}, &(0x7f0000000080), &(0x7f0000000100)={0x0, 0x3938700}, 0x8) (async) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (async, rerun: 64) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) 09:59:12 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={0x0, @dev, @local}, &(0x7f0000000240)=0xc) (async) bind$inet(r0, 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f00000001c0)={0x64b3, 0x2, 0x97}) unshare(0x600) (async) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x2fd, 0x0, 0x0, 0x0, 0x2, 0x2000000000000}, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x2, 0xa18, 0x2b47, 0xfffffffffffffc01, 0xffffffff, 0x0, 0xe303, 0x2}, &(0x7f0000000040)={0x200, 0xfd3, 0x1, 0x9, 0x7fffffff, 0x5, 0xc, 0x2}, &(0x7f0000000080)={0x8, 0x4, 0x0, 0x6, 0x3, 0xffffffff, 0x3000000000, 0x1}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 09:59:13 executing program 5: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x304}, 0x0, 0x0, 0x0, 0x0) 09:59:13 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x2fd, 0x7fff, 0x0, 0x4, 0x0, 0x7, 0x0, 0xe7e3}, 0x0, 0x0, 0x0, 0x0) 09:59:13 executing program 1: mlockall(0x3) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:13 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x10001}, &(0x7f00000001c0)={0x7, 0x1a9}, 0x0, 0x0, 0x0) (async) rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffffffffffe]}, &(0x7f0000000080), &(0x7f0000000100)={0x0, 0x3938700}, 0x8) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 09:59:13 executing program 0: mlockall(0x3) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x2, 0xfd2, 0x40, @ipv4={'\x00', '\xff\xff', @multicast1}, @empty, 0x20, 0x20, 0x3}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x2f, 0x8, 0x2, 0xfd2, 0x40, @ipv4={'\x00', '\xff\xff', @multicast1}, @empty, 0x20, 0x20, 0x3}}) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 09:59:13 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000003c0)=0x4000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'sit0\x00', r0, 0x4, 0x8, 0x6, 0xe3, 0x5a, @remote, @private2, 0x7800, 0x8, 0x7, 0x8}}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000580)={r3, @local, @multicast1}, 0xc) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:13 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x2fd, 0x7fff, 0x0, 0x4, 0x0, 0x7, 0x0, 0xe7e3}, 0x0, 0x0, 0x0, 0x0) 09:59:13 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000003c0)=0x4000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'sit0\x00', r0, 0x4, 0x8, 0x6, 0xe3, 0x5a, @remote, @private2, 0x7800, 0x8, 0x7, 0x8}}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000580)={r3, @local, @multicast1}, 0xc) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:13 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x2fd, 0x7fff, 0x0, 0x4, 0x0, 0x7, 0x0, 0xe7e3}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x2fd, 0x7fff, 0x0, 0x4, 0x0, 0x7, 0x0, 0xe7e3}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:13 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000003c0)=0x4000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'sit0\x00', r0, 0x4, 0x8, 0x6, 0xe3, 0x5a, @remote, @private2, 0x7800, 0x8, 0x7, 0x8}}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000580)={r3, @local, @multicast1}, 0xc) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:13 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:13 executing program 4: unshare(0x600) unshare(0x40030080) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:13 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000003c0)=0x4000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'sit0\x00', r0, 0x4, 0x8, 0x6, 0xe3, 0x5a, @remote, @private2, 0x7800, 0x8, 0x7, 0x8}}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000580)={r3, @local, @multicast1}, 0xc) 09:59:13 executing program 1: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:13 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) unshare(0x600) (async, rerun: 32) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 09:59:13 executing program 4: unshare(0x600) unshare(0x40030080) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) unshare(0x600) (async) unshare(0x40030080) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:59:14 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) ioctl$HIDIOCGUSAGES(r2, 0xd01c4813, &(0x7f0000000240)={{0x3, 0x0, 0x6, 0xe5, 0x401}, 0x1e, [0x2, 0x12, 0xcf13, 0x0, 0x7, 0x3, 0x5, 0x6, 0x7ff, 0x1f, 0x97, 0x11a56f8, 0xfff, 0x6, 0x5d, 0x93c, 0x4, 0x921, 0x8, 0x6, 0x0, 0x0, 0x8, 0x400, 0x8, 0x6, 0x9, 0x10001, 0x5, 0x2, 0x7, 0x200, 0xff, 0x81, 0x2800, 0x2, 0x0, 0xac, 0xffffffff, 0x8, 0x1, 0x0, 0x37, 0x9, 0x7, 0x7a6aa0e4, 0x2, 0x7ff, 0x98a, 0x6d, 0x101, 0x4, 0x1, 0xd56f, 0x2, 0x9, 0x54e, 0x401, 0xd7a, 0x4, 0x7f, 0xfffffffd, 0x0, 0x0, 0x3, 0xa1ac, 0x80000000, 0x9, 0x8c5, 0xffffff20, 0x4, 0x800000, 0x8, 0x7, 0x3, 0x8, 0x7ff, 0x4, 0x2, 0x800, 0x7, 0x800, 0x9, 0x1, 0x81, 0x1f, 0xbfb6, 0xfff, 0x7, 0x4, 0x59c4c7a2, 0xdc3d, 0x5, 0x158, 0x2, 0x5, 0x20, 0x2, 0x8cf, 0x164, 0x80000001, 0x2, 0x0, 0x10001, 0xd, 0x10001, 0x1000, 0x8, 0x9, 0x7, 0xff, 0x534b, 0x9, 0x8bf, 0xaee, 0x3, 0x9, 0x2, 0x4, 0x7, 0x3, 0x8961, 0xf61, 0xfffffffd, 0x6, 0x100, 0x101, 0xffffffff, 0x7, 0xd79, 0x7, 0x8, 0xffffffff, 0xfff, 0xa9, 0xca8, 0x1, 0x7fffffff, 0x5, 0x8, 0x5, 0x10001, 0xfffffc01, 0x7e, 0x1f, 0x2, 0x40, 0x7c, 0x9, 0x1, 0x7f, 0x7ff, 0x7f, 0x2, 0x4, 0x5, 0x3, 0xffff, 0x5, 0x9, 0x1, 0x1dcd, 0x1, 0x6, 0x400, 0x6, 0x2, 0x2, 0x142, 0x1efe, 0x8, 0xc36, 0x7, 0x4, 0x80000001, 0x0, 0x1, 0xfffffff7, 0xe17, 0x7, 0x10001, 0x2f, 0x5, 0x8, 0x7, 0x80000001, 0x38, 0x5936, 0x7fff, 0x9, 0x9, 0x1, 0x6, 0xd0f0, 0x2, 0x81, 0x2, 0x2, 0x3, 0x4, 0x10000, 0x9c8, 0x2, 0x80000000, 0x5, 0x1, 0x50, 0x5, 0xe9cc, 0x8, 0x3, 0xa8, 0x2, 0x6, 0x7, 0x5, 0x9, 0x6, 0x8, 0x10001, 0x4, 0xffffffe0, 0x9, 0xfd0, 0x7ff, 0x2, 0x0, 0x9, 0x7ef0, 0x4, 0x401, 0x3, 0x5, 0x4, 0x9, 0xdfff, 0xffff0, 0x487e, 0x81, 0x0, 0x7, 0xc397, 0x101, 0xfffffffb, 0x7fff, 0xec, 0x20, 0xfffffffe, 0x5, 0x800, 0x40a0, 0x7, 0x340, 0xffffffff, 0x4, 0x0, 0x8000, 0x4, 0x0, 0x8, 0x6, 0x7, 0x1, 0x0, 0x0, 0x800, 0x844, 0x5, 0xa5a4, 0x101, 0xba2d, 0x6, 0x80000000, 0x1, 0xff, 0x80000000, 0x7ff, 0x7, 0x7fff, 0x0, 0x1f, 0x4b0a, 0x81, 0x20, 0xba8, 0xe710, 0x2, 0x3ff, 0x8, 0x40, 0x4, 0x8001, 0x20, 0x80, 0x9, 0xc000, 0x9, 0x7f, 0x6, 0x80000000, 0x1, 0x8, 0x3, 0x0, 0x0, 0x80000001, 0x5, 0x3, 0x7fff, 0x85e0, 0xea28, 0x0, 0x1, 0x8, 0x6, 0x9, 0x1ff, 0x3, 0x3, 0x10000, 0x8b, 0x9, 0x7fffffff, 0x7, 0x4, 0x5, 0xfff, 0x6, 0x9ba, 0x569, 0x1, 0x4, 0xff, 0x2, 0x3b, 0x4, 0x9, 0x7, 0x7ff, 0x3, 0xf011, 0x6, 0x9a, 0x9, 0x1477, 0x8, 0x2, 0x8001, 0xed, 0x4, 0x800, 0x1, 0x52, 0x8, 0x81, 0x8001, 0xfffffffb, 0x5, 0x3f, 0x1, 0x7, 0xa499, 0xc1c7, 0x5, 0x5, 0x6, 0xc848, 0x4, 0x6a7, 0xfb2c, 0x8d2, 0x3, 0x1, 0x6c9e, 0x3f, 0x8, 0x3, 0x80000, 0x2, 0x9, 0x8, 0x100, 0x7fff, 0x5, 0x9, 0x4879, 0xffffffbc, 0xdf5, 0x2c41, 0x200040, 0x786, 0x5, 0x3, 0x7, 0x9, 0x4, 0xe0, 0xf7da, 0x80000000, 0x25, 0x7, 0x3, 0x4, 0x0, 0xc97, 0xfffff9bd, 0x1, 0x0, 0x364, 0x2, 0x200, 0xfffffff9, 0x9, 0x8, 0xff, 0x4, 0x8001, 0x0, 0x5, 0xff, 0x0, 0x0, 0x1a, 0xc6, 0x5, 0x0, 0x7, 0x2fa, 0x3ff, 0x4, 0xfa7, 0x3, 0x73e, 0x6, 0x8, 0x8000, 0x69, 0x7, 0x1, 0x7, 0xfffffffe, 0x1ff, 0xfffffe01, 0x7, 0x6d, 0x6, 0x8, 0x7fff, 0x6, 0x6, 0x8000, 0x5, 0x9, 0x5, 0x9, 0x2, 0x94, 0x0, 0x3, 0x40, 0x7, 0x0, 0x3, 0x7, 0x7, 0x8, 0x80000000, 0x6, 0xfffffff8, 0x1, 0x5, 0x2, 0x0, 0x389, 0x72, 0xa1, 0x3, 0xa70d, 0x80, 0x40, 0xb099, 0x3737, 0x9, 0xa8f3, 0x3, 0x3145aa13, 0x170, 0x8, 0x47a3, 0x1f, 0x6, 0x72805d78, 0xff, 0x560, 0x6f84a9e7, 0xf3, 0x5, 0x9, 0x4, 0x7fffffff, 0x4, 0x7, 0x6, 0xffffffff, 0x0, 0x3ff, 0x20, 0x64f, 0xf61, 0x3, 0x2dfc, 0x4, 0x1, 0x5, 0x0, 0x6, 0x5, 0x2f4, 0x7, 0x6, 0x8, 0xd8, 0xaa3, 0x4, 0x0, 0x7, 0x9dce, 0xffffffff, 0x1, 0x1, 0x4, 0x1ff, 0x9, 0x2, 0xc4, 0x5, 0x8000, 0x8, 0x2b5d51e, 0x6, 0xe600000, 0x0, 0x8, 0x3ff, 0xffffffff, 0x3, 0x6, 0x6, 0x6c, 0x30, 0x200, 0x400, 0x3a, 0xfffffff9, 0x7, 0x1, 0x401, 0x8001, 0x10, 0x5, 0xdd2, 0x4, 0xffff7fff, 0x94a4, 0x4, 0x6, 0x200, 0x7f, 0x40, 0x20, 0x5, 0x80000001, 0x0, 0x1, 0x80000000, 0x1, 0x400, 0x6, 0x8, 0x400, 0x8, 0xff, 0x9, 0x9, 0x20, 0x80000001, 0x1ff, 0x51, 0x5a6f, 0x43, 0x3, 0xfb0, 0x4d, 0x6, 0x80, 0x7, 0x7, 0x7f, 0x9, 0x3, 0x9, 0xfffffffe, 0x5, 0x390, 0x11, 0x40, 0x7, 0xff000000, 0x4, 0x2, 0x1f, 0x0, 0x8, 0x2021e924, 0x3, 0x6, 0xf7f, 0x401, 0x10000, 0x7fff, 0x8001, 0x400, 0xffff, 0x80, 0x200, 0x6, 0x400, 0x770, 0x9, 0x20, 0x2, 0x784b, 0x4, 0x71b, 0x5690, 0xfe, 0x3, 0xe16b, 0xfff, 0x6cb, 0x80000000, 0x0, 0x1, 0x66, 0x2, 0x0, 0x6, 0x400, 0x8001, 0x1, 0x6, 0x6712, 0xffffff7b, 0x7ff, 0x5, 0x6, 0x7fff, 0x1, 0x7, 0x1000, 0x5, 0xfce, 0x5, 0x3ff, 0x8, 0x2, 0x2, 0x4, 0x1000, 0x0, 0x1000, 0x0, 0x3, 0x200, 0x8, 0x3f, 0x40, 0x80, 0x2, 0xd00, 0x80000001, 0xfffffffd, 0x1f, 0x80000000, 0xfff, 0x3, 0x6, 0xfff, 0x4, 0x1, 0x4, 0x2, 0x1, 0x81, 0x6, 0x4, 0x40, 0x1, 0x80000009, 0x2, 0x6, 0x1f, 0x1, 0x8, 0x800, 0x5, 0x3800000, 0x0, 0x9, 0xaa, 0x800, 0x8, 0x2, 0x2, 0x6, 0x7, 0x7, 0x3, 0x5, 0x4, 0xcf, 0x80000001, 0x8, 0x8, 0x3, 0xc8c3, 0x6, 0x7, 0x40b5, 0x4, 0x7, 0x2, 0x1, 0xffffffff, 0xfffffffb, 0x4, 0x2ef, 0x5, 0x3ff, 0x80000000, 0x5, 0x9, 0x3, 0xb20c, 0x50b, 0xab1, 0x1, 0x9, 0xfffeffff, 0x6, 0x800, 0x2, 0x9, 0x80000000, 0x3, 0x7, 0x800, 0x400, 0x80000000, 0x80000001, 0x6, 0x0, 0x5, 0x3f, 0x80000000, 0x10001, 0x2, 0xffff0001, 0x0, 0x1, 0x9, 0x6, 0x4, 0x9, 0x118, 0x80000000, 0x1, 0x13, 0x20000000, 0x7fff, 0x0, 0x1, 0x400, 0x7fff, 0x35520af0, 0x4, 0x3, 0xc547, 0x9, 0x7, 0x56e6, 0x7, 0x5, 0x7, 0x7, 0x400000, 0x2, 0x6, 0x1000, 0x7a2, 0x0, 0x7fc, 0x9, 0xfffffffd, 0x4, 0x7, 0xfffffc01, 0x9d9f, 0x3, 0xf05, 0x2, 0x6, 0x3, 0x3, 0x10001, 0x1, 0xfffffff9, 0x74d0, 0x3, 0x2, 0x0, 0x7, 0x8001, 0x5, 0x100, 0x604c1f98, 0x2e356d87, 0xb93, 0x1ca7, 0xffff, 0x6, 0x8, 0xa26000, 0x5, 0x6, 0x1, 0x8, 0x3, 0x2, 0xfffffff9, 0x0, 0x7fff, 0x35c1, 0xffffffff, 0x0, 0x274, 0x8001, 0x5, 0x1, 0x5, 0x81, 0x97a2, 0x9, 0x0, 0x7, 0xffffffff, 0x0, 0x1, 0x1, 0xf5, 0x20, 0x3df5, 0x3, 0xfffffe01, 0x2, 0x9, 0x3, 0x9, 0xd6, 0x80000000, 0x8, 0x200, 0x8, 0x5, 0x1b1, 0x5, 0xdaf2, 0x800, 0x4, 0x80000001, 0x9, 0x1, 0x32b, 0x1, 0x3, 0x7, 0x0, 0x8, 0x6, 0x3, 0x7, 0x3, 0x10000, 0x20, 0xad, 0x4, 0x8, 0x6, 0x3, 0x0, 0x96c1, 0x7fffffff, 0x5, 0x0, 0x4, 0x2000000, 0xdaa, 0x5, 0xe000, 0x80000001, 0xec, 0x3, 0x1, 0xa1, 0x2, 0x3, 0x7fff, 0x2, 0x7, 0x8000, 0x200, 0x6, 0x3, 0x7, 0x3, 0x5, 0x2, 0x0, 0x4fc1, 0x7, 0x9, 0x3, 0x1f, 0x5672, 0x80000000, 0x1, 0x5, 0x8, 0x9, 0x5, 0xfffffffd, 0x19, 0x2, 0x7f, 0x1, 0x80000000, 0xe8, 0x92d, 0x0, 0x3, 0x6, 0x2, 0x472, 0x1, 0x83, 0x6, 0x7fffffff, 0xe1c, 0xff, 0x5, 0xffffffe0, 0x1, 0x101, 0x1, 0x5, 0x7, 0x90, 0x25, 0x3, 0x80000001, 0x9c45, 0x5, 0x7, 0x0, 0x75, 0xff, 0x0, 0x8, 0x5, 0x1000, 0x6, 0x9cb1, 0x2, 0x4, 0x8001, 0x8, 0x7f, 0x3, 0xfff, 0x9, 0x0, 0xffff, 0x400, 0x460000, 0x2, 0x8cf8, 0x0, 0x53, 0x7f, 0x1, 0x435e, 0x400, 0x148, 0x6, 0x5, 0x5, 0xfff, 0x4, 0x3, 0x5, 0xa5e0, 0xd5e, 0x7f, 0x81, 0x1, 0x3ff, 0x4, 0x401, 0x0, 0x1, 0x4, 0x138, 0x9f5e, 0x1]}) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f00000012c0)=0x1c) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000001300), 0x2, 0x0) bind$inet(r4, 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r1, &(0x7f0000000200)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_buf(r6, 0x0, 0x27, &(0x7f0000000140)="6ceceedb192a4545eae2c02d6328ffe8d7241b4bf48c300a07a4280adb5303f4b4c82e33d75905390670f712bd7de3c834cf1038d303fab0ffb59bce7701442a92c4c0ecda7cedec44d4e7c0ad179aca45751babaa805992e20ff9296b1d9878b64b67f553116857ecc01fb7cb09284e3b7cf72e2f8f938814e947518bceeeb00ae08849f740445b4d9ae57957079d287afe15fc9af95d10623331d547cb8089c0a228a64c1068f2fd9ebb45b8a68a3a", 0xb0) read$FUSE(r5, &(0x7f00000021c0)={0x2020}, 0x2020) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000001280)={0x1, 0x0, [{}]}) 09:59:14 executing program 0: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:14 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000003c0)=0x4000000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'sit0\x00', r0, 0x4, 0x8, 0x6, 0xe3, 0x5a, @remote, @private2, 0x7800, 0x8, 0x7, 0x8}}) 09:59:14 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) unshare(0x600) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 09:59:14 executing program 4: unshare(0x600) unshare(0x40030080) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) unshare(0x600) (async) unshare(0x40030080) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:59:14 executing program 1: mlockall(0x3) syz_clone(0x1f00, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:14 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$HIDIOCINITREPORT(0xffffffffffffffff, 0x4805, 0x0) 09:59:14 executing program 2: unshare(0x600) unshare(0x80080) pselect6(0x40, &(0x7f0000000180)={0xc67, 0x2, 0x0, 0x4000, 0x0, 0x2, 0x20000, 0x3}, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000000)={0x2}) 09:59:14 executing program 4: unshare(0x600) unshare(0x20000) pselect6(0x40, &(0x7f0000000180)={0x59, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0) r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0x3, 0x0) ioctl$HIDIOCSFLAG(r0, 0x4004480f, &(0x7f0000000040)=0x3) 09:59:14 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) ioctl$HIDIOCGUSAGES(r2, 0xd01c4813, &(0x7f0000000240)={{0x3, 0x0, 0x6, 0xe5, 0x401}, 0x1e, [0x2, 0x12, 0xcf13, 0x0, 0x7, 0x3, 0x5, 0x6, 0x7ff, 0x1f, 0x97, 0x11a56f8, 0xfff, 0x6, 0x5d, 0x93c, 0x4, 0x921, 0x8, 0x6, 0x0, 0x0, 0x8, 0x400, 0x8, 0x6, 0x9, 0x10001, 0x5, 0x2, 0x7, 0x200, 0xff, 0x81, 0x2800, 0x2, 0x0, 0xac, 0xffffffff, 0x8, 0x1, 0x0, 0x37, 0x9, 0x7, 0x7a6aa0e4, 0x2, 0x7ff, 0x98a, 0x6d, 0x101, 0x4, 0x1, 0xd56f, 0x2, 0x9, 0x54e, 0x401, 0xd7a, 0x4, 0x7f, 0xfffffffd, 0x0, 0x0, 0x3, 0xa1ac, 0x80000000, 0x9, 0x8c5, 0xffffff20, 0x4, 0x800000, 0x8, 0x7, 0x3, 0x8, 0x7ff, 0x4, 0x2, 0x800, 0x7, 0x800, 0x9, 0x1, 0x81, 0x1f, 0xbfb6, 0xfff, 0x7, 0x4, 0x59c4c7a2, 0xdc3d, 0x5, 0x158, 0x2, 0x5, 0x20, 0x2, 0x8cf, 0x164, 0x80000001, 0x2, 0x0, 0x10001, 0xd, 0x10001, 0x1000, 0x8, 0x9, 0x7, 0xff, 0x534b, 0x9, 0x8bf, 0xaee, 0x3, 0x9, 0x2, 0x4, 0x7, 0x3, 0x8961, 0xf61, 0xfffffffd, 0x6, 0x100, 0x101, 0xffffffff, 0x7, 0xd79, 0x7, 0x8, 0xffffffff, 0xfff, 0xa9, 0xca8, 0x1, 0x7fffffff, 0x5, 0x8, 0x5, 0x10001, 0xfffffc01, 0x7e, 0x1f, 0x2, 0x40, 0x7c, 0x9, 0x1, 0x7f, 0x7ff, 0x7f, 0x2, 0x4, 0x5, 0x3, 0xffff, 0x5, 0x9, 0x1, 0x1dcd, 0x1, 0x6, 0x400, 0x6, 0x2, 0x2, 0x142, 0x1efe, 0x8, 0xc36, 0x7, 0x4, 0x80000001, 0x0, 0x1, 0xfffffff7, 0xe17, 0x7, 0x10001, 0x2f, 0x5, 0x8, 0x7, 0x80000001, 0x38, 0x5936, 0x7fff, 0x9, 0x9, 0x1, 0x6, 0xd0f0, 0x2, 0x81, 0x2, 0x2, 0x3, 0x4, 0x10000, 0x9c8, 0x2, 0x80000000, 0x5, 0x1, 0x50, 0x5, 0xe9cc, 0x8, 0x3, 0xa8, 0x2, 0x6, 0x7, 0x5, 0x9, 0x6, 0x8, 0x10001, 0x4, 0xffffffe0, 0x9, 0xfd0, 0x7ff, 0x2, 0x0, 0x9, 0x7ef0, 0x4, 0x401, 0x3, 0x5, 0x4, 0x9, 0xdfff, 0xffff0, 0x487e, 0x81, 0x0, 0x7, 0xc397, 0x101, 0xfffffffb, 0x7fff, 0xec, 0x20, 0xfffffffe, 0x5, 0x800, 0x40a0, 0x7, 0x340, 0xffffffff, 0x4, 0x0, 0x8000, 0x4, 0x0, 0x8, 0x6, 0x7, 0x1, 0x0, 0x0, 0x800, 0x844, 0x5, 0xa5a4, 0x101, 0xba2d, 0x6, 0x80000000, 0x1, 0xff, 0x80000000, 0x7ff, 0x7, 0x7fff, 0x0, 0x1f, 0x4b0a, 0x81, 0x20, 0xba8, 0xe710, 0x2, 0x3ff, 0x8, 0x40, 0x4, 0x8001, 0x20, 0x80, 0x9, 0xc000, 0x9, 0x7f, 0x6, 0x80000000, 0x1, 0x8, 0x3, 0x0, 0x0, 0x80000001, 0x5, 0x3, 0x7fff, 0x85e0, 0xea28, 0x0, 0x1, 0x8, 0x6, 0x9, 0x1ff, 0x3, 0x3, 0x10000, 0x8b, 0x9, 0x7fffffff, 0x7, 0x4, 0x5, 0xfff, 0x6, 0x9ba, 0x569, 0x1, 0x4, 0xff, 0x2, 0x3b, 0x4, 0x9, 0x7, 0x7ff, 0x3, 0xf011, 0x6, 0x9a, 0x9, 0x1477, 0x8, 0x2, 0x8001, 0xed, 0x4, 0x800, 0x1, 0x52, 0x8, 0x81, 0x8001, 0xfffffffb, 0x5, 0x3f, 0x1, 0x7, 0xa499, 0xc1c7, 0x5, 0x5, 0x6, 0xc848, 0x4, 0x6a7, 0xfb2c, 0x8d2, 0x3, 0x1, 0x6c9e, 0x3f, 0x8, 0x3, 0x80000, 0x2, 0x9, 0x8, 0x100, 0x7fff, 0x5, 0x9, 0x4879, 0xffffffbc, 0xdf5, 0x2c41, 0x200040, 0x786, 0x5, 0x3, 0x7, 0x9, 0x4, 0xe0, 0xf7da, 0x80000000, 0x25, 0x7, 0x3, 0x4, 0x0, 0xc97, 0xfffff9bd, 0x1, 0x0, 0x364, 0x2, 0x200, 0xfffffff9, 0x9, 0x8, 0xff, 0x4, 0x8001, 0x0, 0x5, 0xff, 0x0, 0x0, 0x1a, 0xc6, 0x5, 0x0, 0x7, 0x2fa, 0x3ff, 0x4, 0xfa7, 0x3, 0x73e, 0x6, 0x8, 0x8000, 0x69, 0x7, 0x1, 0x7, 0xfffffffe, 0x1ff, 0xfffffe01, 0x7, 0x6d, 0x6, 0x8, 0x7fff, 0x6, 0x6, 0x8000, 0x5, 0x9, 0x5, 0x9, 0x2, 0x94, 0x0, 0x3, 0x40, 0x7, 0x0, 0x3, 0x7, 0x7, 0x8, 0x80000000, 0x6, 0xfffffff8, 0x1, 0x5, 0x2, 0x0, 0x389, 0x72, 0xa1, 0x3, 0xa70d, 0x80, 0x40, 0xb099, 0x3737, 0x9, 0xa8f3, 0x3, 0x3145aa13, 0x170, 0x8, 0x47a3, 0x1f, 0x6, 0x72805d78, 0xff, 0x560, 0x6f84a9e7, 0xf3, 0x5, 0x9, 0x4, 0x7fffffff, 0x4, 0x7, 0x6, 0xffffffff, 0x0, 0x3ff, 0x20, 0x64f, 0xf61, 0x3, 0x2dfc, 0x4, 0x1, 0x5, 0x0, 0x6, 0x5, 0x2f4, 0x7, 0x6, 0x8, 0xd8, 0xaa3, 0x4, 0x0, 0x7, 0x9dce, 0xffffffff, 0x1, 0x1, 0x4, 0x1ff, 0x9, 0x2, 0xc4, 0x5, 0x8000, 0x8, 0x2b5d51e, 0x6, 0xe600000, 0x0, 0x8, 0x3ff, 0xffffffff, 0x3, 0x6, 0x6, 0x6c, 0x30, 0x200, 0x400, 0x3a, 0xfffffff9, 0x7, 0x1, 0x401, 0x8001, 0x10, 0x5, 0xdd2, 0x4, 0xffff7fff, 0x94a4, 0x4, 0x6, 0x200, 0x7f, 0x40, 0x20, 0x5, 0x80000001, 0x0, 0x1, 0x80000000, 0x1, 0x400, 0x6, 0x8, 0x400, 0x8, 0xff, 0x9, 0x9, 0x20, 0x80000001, 0x1ff, 0x51, 0x5a6f, 0x43, 0x3, 0xfb0, 0x4d, 0x6, 0x80, 0x7, 0x7, 0x7f, 0x9, 0x3, 0x9, 0xfffffffe, 0x5, 0x390, 0x11, 0x40, 0x7, 0xff000000, 0x4, 0x2, 0x1f, 0x0, 0x8, 0x2021e924, 0x3, 0x6, 0xf7f, 0x401, 0x10000, 0x7fff, 0x8001, 0x400, 0xffff, 0x80, 0x200, 0x6, 0x400, 0x770, 0x9, 0x20, 0x2, 0x784b, 0x4, 0x71b, 0x5690, 0xfe, 0x3, 0xe16b, 0xfff, 0x6cb, 0x80000000, 0x0, 0x1, 0x66, 0x2, 0x0, 0x6, 0x400, 0x8001, 0x1, 0x6, 0x6712, 0xffffff7b, 0x7ff, 0x5, 0x6, 0x7fff, 0x1, 0x7, 0x1000, 0x5, 0xfce, 0x5, 0x3ff, 0x8, 0x2, 0x2, 0x4, 0x1000, 0x0, 0x1000, 0x0, 0x3, 0x200, 0x8, 0x3f, 0x40, 0x80, 0x2, 0xd00, 0x80000001, 0xfffffffd, 0x1f, 0x80000000, 0xfff, 0x3, 0x6, 0xfff, 0x4, 0x1, 0x4, 0x2, 0x1, 0x81, 0x6, 0x4, 0x40, 0x1, 0x80000009, 0x2, 0x6, 0x1f, 0x1, 0x8, 0x800, 0x5, 0x3800000, 0x0, 0x9, 0xaa, 0x800, 0x8, 0x2, 0x2, 0x6, 0x7, 0x7, 0x3, 0x5, 0x4, 0xcf, 0x80000001, 0x8, 0x8, 0x3, 0xc8c3, 0x6, 0x7, 0x40b5, 0x4, 0x7, 0x2, 0x1, 0xffffffff, 0xfffffffb, 0x4, 0x2ef, 0x5, 0x3ff, 0x80000000, 0x5, 0x9, 0x3, 0xb20c, 0x50b, 0xab1, 0x1, 0x9, 0xfffeffff, 0x6, 0x800, 0x2, 0x9, 0x80000000, 0x3, 0x7, 0x800, 0x400, 0x80000000, 0x80000001, 0x6, 0x0, 0x5, 0x3f, 0x80000000, 0x10001, 0x2, 0xffff0001, 0x0, 0x1, 0x9, 0x6, 0x4, 0x9, 0x118, 0x80000000, 0x1, 0x13, 0x20000000, 0x7fff, 0x0, 0x1, 0x400, 0x7fff, 0x35520af0, 0x4, 0x3, 0xc547, 0x9, 0x7, 0x56e6, 0x7, 0x5, 0x7, 0x7, 0x400000, 0x2, 0x6, 0x1000, 0x7a2, 0x0, 0x7fc, 0x9, 0xfffffffd, 0x4, 0x7, 0xfffffc01, 0x9d9f, 0x3, 0xf05, 0x2, 0x6, 0x3, 0x3, 0x10001, 0x1, 0xfffffff9, 0x74d0, 0x3, 0x2, 0x0, 0x7, 0x8001, 0x5, 0x100, 0x604c1f98, 0x2e356d87, 0xb93, 0x1ca7, 0xffff, 0x6, 0x8, 0xa26000, 0x5, 0x6, 0x1, 0x8, 0x3, 0x2, 0xfffffff9, 0x0, 0x7fff, 0x35c1, 0xffffffff, 0x0, 0x274, 0x8001, 0x5, 0x1, 0x5, 0x81, 0x97a2, 0x9, 0x0, 0x7, 0xffffffff, 0x0, 0x1, 0x1, 0xf5, 0x20, 0x3df5, 0x3, 0xfffffe01, 0x2, 0x9, 0x3, 0x9, 0xd6, 0x80000000, 0x8, 0x200, 0x8, 0x5, 0x1b1, 0x5, 0xdaf2, 0x800, 0x4, 0x80000001, 0x9, 0x1, 0x32b, 0x1, 0x3, 0x7, 0x0, 0x8, 0x6, 0x3, 0x7, 0x3, 0x10000, 0x20, 0xad, 0x4, 0x8, 0x6, 0x3, 0x0, 0x96c1, 0x7fffffff, 0x5, 0x0, 0x4, 0x2000000, 0xdaa, 0x5, 0xe000, 0x80000001, 0xec, 0x3, 0x1, 0xa1, 0x2, 0x3, 0x7fff, 0x2, 0x7, 0x8000, 0x200, 0x6, 0x3, 0x7, 0x3, 0x5, 0x2, 0x0, 0x4fc1, 0x7, 0x9, 0x3, 0x1f, 0x5672, 0x80000000, 0x1, 0x5, 0x8, 0x9, 0x5, 0xfffffffd, 0x19, 0x2, 0x7f, 0x1, 0x80000000, 0xe8, 0x92d, 0x0, 0x3, 0x6, 0x2, 0x472, 0x1, 0x83, 0x6, 0x7fffffff, 0xe1c, 0xff, 0x5, 0xffffffe0, 0x1, 0x101, 0x1, 0x5, 0x7, 0x90, 0x25, 0x3, 0x80000001, 0x9c45, 0x5, 0x7, 0x0, 0x75, 0xff, 0x0, 0x8, 0x5, 0x1000, 0x6, 0x9cb1, 0x2, 0x4, 0x8001, 0x8, 0x7f, 0x3, 0xfff, 0x9, 0x0, 0xffff, 0x400, 0x460000, 0x2, 0x8cf8, 0x0, 0x53, 0x7f, 0x1, 0x435e, 0x400, 0x148, 0x6, 0x5, 0x5, 0xfff, 0x4, 0x3, 0x5, 0xa5e0, 0xd5e, 0x7f, 0x81, 0x1, 0x3ff, 0x4, 0x401, 0x0, 0x1, 0x4, 0x138, 0x9f5e, 0x1]}) (async, rerun: 32) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 32) bind$inet(r3, 0x0, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f00000012c0)=0x1c) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000001300), 0x2, 0x0) (async) bind$inet(r4, 0x0, 0x0) (async) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) r6 = openat$cgroup_ro(r1, &(0x7f0000000200)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) setsockopt$inet_buf(r6, 0x0, 0x27, &(0x7f0000000140)="6ceceedb192a4545eae2c02d6328ffe8d7241b4bf48c300a07a4280adb5303f4b4c82e33d75905390670f712bd7de3c834cf1038d303fab0ffb59bce7701442a92c4c0ecda7cedec44d4e7c0ad179aca45751babaa805992e20ff9296b1d9878b64b67f553116857ecc01fb7cb09284e3b7cf72e2f8f938814e947518bceeeb00ae08849f740445b4d9ae57957079d287afe15fc9af95d10623331d547cb8089c0a228a64c1068f2fd9ebb45b8a68a3a", 0xb0) read$FUSE(r5, &(0x7f00000021c0)={0x2020}, 0x2020) (async) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000001280)={0x1, 0x0, [{}]}) 09:59:14 executing program 2: unshare(0x600) (async) unshare(0x80080) (async) pselect6(0x40, &(0x7f0000000180)={0xc67, 0x2, 0x0, 0x4000, 0x0, 0x2, 0x20000, 0x3}, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000000)={0x2}) 09:59:14 executing program 4: unshare(0x600) (async, rerun: 32) unshare(0x20000) (rerun: 32) pselect6(0x40, &(0x7f0000000180)={0x59, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0) (async, rerun: 32) r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0x3, 0x0) (rerun: 32) ioctl$HIDIOCSFLAG(r0, 0x4004480f, &(0x7f0000000040)=0x3) 09:59:14 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) 09:59:14 executing program 0: mlockall(0x3) syz_clone(0x1f00, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:14 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x4000, 0x0) ioctl$HIDIOCGUSAGES(r2, 0xd01c4813, &(0x7f0000000240)={{0x3, 0x0, 0x6, 0xe5, 0x401}, 0x1e, [0x2, 0x12, 0xcf13, 0x0, 0x7, 0x3, 0x5, 0x6, 0x7ff, 0x1f, 0x97, 0x11a56f8, 0xfff, 0x6, 0x5d, 0x93c, 0x4, 0x921, 0x8, 0x6, 0x0, 0x0, 0x8, 0x400, 0x8, 0x6, 0x9, 0x10001, 0x5, 0x2, 0x7, 0x200, 0xff, 0x81, 0x2800, 0x2, 0x0, 0xac, 0xffffffff, 0x8, 0x1, 0x0, 0x37, 0x9, 0x7, 0x7a6aa0e4, 0x2, 0x7ff, 0x98a, 0x6d, 0x101, 0x4, 0x1, 0xd56f, 0x2, 0x9, 0x54e, 0x401, 0xd7a, 0x4, 0x7f, 0xfffffffd, 0x0, 0x0, 0x3, 0xa1ac, 0x80000000, 0x9, 0x8c5, 0xffffff20, 0x4, 0x800000, 0x8, 0x7, 0x3, 0x8, 0x7ff, 0x4, 0x2, 0x800, 0x7, 0x800, 0x9, 0x1, 0x81, 0x1f, 0xbfb6, 0xfff, 0x7, 0x4, 0x59c4c7a2, 0xdc3d, 0x5, 0x158, 0x2, 0x5, 0x20, 0x2, 0x8cf, 0x164, 0x80000001, 0x2, 0x0, 0x10001, 0xd, 0x10001, 0x1000, 0x8, 0x9, 0x7, 0xff, 0x534b, 0x9, 0x8bf, 0xaee, 0x3, 0x9, 0x2, 0x4, 0x7, 0x3, 0x8961, 0xf61, 0xfffffffd, 0x6, 0x100, 0x101, 0xffffffff, 0x7, 0xd79, 0x7, 0x8, 0xffffffff, 0xfff, 0xa9, 0xca8, 0x1, 0x7fffffff, 0x5, 0x8, 0x5, 0x10001, 0xfffffc01, 0x7e, 0x1f, 0x2, 0x40, 0x7c, 0x9, 0x1, 0x7f, 0x7ff, 0x7f, 0x2, 0x4, 0x5, 0x3, 0xffff, 0x5, 0x9, 0x1, 0x1dcd, 0x1, 0x6, 0x400, 0x6, 0x2, 0x2, 0x142, 0x1efe, 0x8, 0xc36, 0x7, 0x4, 0x80000001, 0x0, 0x1, 0xfffffff7, 0xe17, 0x7, 0x10001, 0x2f, 0x5, 0x8, 0x7, 0x80000001, 0x38, 0x5936, 0x7fff, 0x9, 0x9, 0x1, 0x6, 0xd0f0, 0x2, 0x81, 0x2, 0x2, 0x3, 0x4, 0x10000, 0x9c8, 0x2, 0x80000000, 0x5, 0x1, 0x50, 0x5, 0xe9cc, 0x8, 0x3, 0xa8, 0x2, 0x6, 0x7, 0x5, 0x9, 0x6, 0x8, 0x10001, 0x4, 0xffffffe0, 0x9, 0xfd0, 0x7ff, 0x2, 0x0, 0x9, 0x7ef0, 0x4, 0x401, 0x3, 0x5, 0x4, 0x9, 0xdfff, 0xffff0, 0x487e, 0x81, 0x0, 0x7, 0xc397, 0x101, 0xfffffffb, 0x7fff, 0xec, 0x20, 0xfffffffe, 0x5, 0x800, 0x40a0, 0x7, 0x340, 0xffffffff, 0x4, 0x0, 0x8000, 0x4, 0x0, 0x8, 0x6, 0x7, 0x1, 0x0, 0x0, 0x800, 0x844, 0x5, 0xa5a4, 0x101, 0xba2d, 0x6, 0x80000000, 0x1, 0xff, 0x80000000, 0x7ff, 0x7, 0x7fff, 0x0, 0x1f, 0x4b0a, 0x81, 0x20, 0xba8, 0xe710, 0x2, 0x3ff, 0x8, 0x40, 0x4, 0x8001, 0x20, 0x80, 0x9, 0xc000, 0x9, 0x7f, 0x6, 0x80000000, 0x1, 0x8, 0x3, 0x0, 0x0, 0x80000001, 0x5, 0x3, 0x7fff, 0x85e0, 0xea28, 0x0, 0x1, 0x8, 0x6, 0x9, 0x1ff, 0x3, 0x3, 0x10000, 0x8b, 0x9, 0x7fffffff, 0x7, 0x4, 0x5, 0xfff, 0x6, 0x9ba, 0x569, 0x1, 0x4, 0xff, 0x2, 0x3b, 0x4, 0x9, 0x7, 0x7ff, 0x3, 0xf011, 0x6, 0x9a, 0x9, 0x1477, 0x8, 0x2, 0x8001, 0xed, 0x4, 0x800, 0x1, 0x52, 0x8, 0x81, 0x8001, 0xfffffffb, 0x5, 0x3f, 0x1, 0x7, 0xa499, 0xc1c7, 0x5, 0x5, 0x6, 0xc848, 0x4, 0x6a7, 0xfb2c, 0x8d2, 0x3, 0x1, 0x6c9e, 0x3f, 0x8, 0x3, 0x80000, 0x2, 0x9, 0x8, 0x100, 0x7fff, 0x5, 0x9, 0x4879, 0xffffffbc, 0xdf5, 0x2c41, 0x200040, 0x786, 0x5, 0x3, 0x7, 0x9, 0x4, 0xe0, 0xf7da, 0x80000000, 0x25, 0x7, 0x3, 0x4, 0x0, 0xc97, 0xfffff9bd, 0x1, 0x0, 0x364, 0x2, 0x200, 0xfffffff9, 0x9, 0x8, 0xff, 0x4, 0x8001, 0x0, 0x5, 0xff, 0x0, 0x0, 0x1a, 0xc6, 0x5, 0x0, 0x7, 0x2fa, 0x3ff, 0x4, 0xfa7, 0x3, 0x73e, 0x6, 0x8, 0x8000, 0x69, 0x7, 0x1, 0x7, 0xfffffffe, 0x1ff, 0xfffffe01, 0x7, 0x6d, 0x6, 0x8, 0x7fff, 0x6, 0x6, 0x8000, 0x5, 0x9, 0x5, 0x9, 0x2, 0x94, 0x0, 0x3, 0x40, 0x7, 0x0, 0x3, 0x7, 0x7, 0x8, 0x80000000, 0x6, 0xfffffff8, 0x1, 0x5, 0x2, 0x0, 0x389, 0x72, 0xa1, 0x3, 0xa70d, 0x80, 0x40, 0xb099, 0x3737, 0x9, 0xa8f3, 0x3, 0x3145aa13, 0x170, 0x8, 0x47a3, 0x1f, 0x6, 0x72805d78, 0xff, 0x560, 0x6f84a9e7, 0xf3, 0x5, 0x9, 0x4, 0x7fffffff, 0x4, 0x7, 0x6, 0xffffffff, 0x0, 0x3ff, 0x20, 0x64f, 0xf61, 0x3, 0x2dfc, 0x4, 0x1, 0x5, 0x0, 0x6, 0x5, 0x2f4, 0x7, 0x6, 0x8, 0xd8, 0xaa3, 0x4, 0x0, 0x7, 0x9dce, 0xffffffff, 0x1, 0x1, 0x4, 0x1ff, 0x9, 0x2, 0xc4, 0x5, 0x8000, 0x8, 0x2b5d51e, 0x6, 0xe600000, 0x0, 0x8, 0x3ff, 0xffffffff, 0x3, 0x6, 0x6, 0x6c, 0x30, 0x200, 0x400, 0x3a, 0xfffffff9, 0x7, 0x1, 0x401, 0x8001, 0x10, 0x5, 0xdd2, 0x4, 0xffff7fff, 0x94a4, 0x4, 0x6, 0x200, 0x7f, 0x40, 0x20, 0x5, 0x80000001, 0x0, 0x1, 0x80000000, 0x1, 0x400, 0x6, 0x8, 0x400, 0x8, 0xff, 0x9, 0x9, 0x20, 0x80000001, 0x1ff, 0x51, 0x5a6f, 0x43, 0x3, 0xfb0, 0x4d, 0x6, 0x80, 0x7, 0x7, 0x7f, 0x9, 0x3, 0x9, 0xfffffffe, 0x5, 0x390, 0x11, 0x40, 0x7, 0xff000000, 0x4, 0x2, 0x1f, 0x0, 0x8, 0x2021e924, 0x3, 0x6, 0xf7f, 0x401, 0x10000, 0x7fff, 0x8001, 0x400, 0xffff, 0x80, 0x200, 0x6, 0x400, 0x770, 0x9, 0x20, 0x2, 0x784b, 0x4, 0x71b, 0x5690, 0xfe, 0x3, 0xe16b, 0xfff, 0x6cb, 0x80000000, 0x0, 0x1, 0x66, 0x2, 0x0, 0x6, 0x400, 0x8001, 0x1, 0x6, 0x6712, 0xffffff7b, 0x7ff, 0x5, 0x6, 0x7fff, 0x1, 0x7, 0x1000, 0x5, 0xfce, 0x5, 0x3ff, 0x8, 0x2, 0x2, 0x4, 0x1000, 0x0, 0x1000, 0x0, 0x3, 0x200, 0x8, 0x3f, 0x40, 0x80, 0x2, 0xd00, 0x80000001, 0xfffffffd, 0x1f, 0x80000000, 0xfff, 0x3, 0x6, 0xfff, 0x4, 0x1, 0x4, 0x2, 0x1, 0x81, 0x6, 0x4, 0x40, 0x1, 0x80000009, 0x2, 0x6, 0x1f, 0x1, 0x8, 0x800, 0x5, 0x3800000, 0x0, 0x9, 0xaa, 0x800, 0x8, 0x2, 0x2, 0x6, 0x7, 0x7, 0x3, 0x5, 0x4, 0xcf, 0x80000001, 0x8, 0x8, 0x3, 0xc8c3, 0x6, 0x7, 0x40b5, 0x4, 0x7, 0x2, 0x1, 0xffffffff, 0xfffffffb, 0x4, 0x2ef, 0x5, 0x3ff, 0x80000000, 0x5, 0x9, 0x3, 0xb20c, 0x50b, 0xab1, 0x1, 0x9, 0xfffeffff, 0x6, 0x800, 0x2, 0x9, 0x80000000, 0x3, 0x7, 0x800, 0x400, 0x80000000, 0x80000001, 0x6, 0x0, 0x5, 0x3f, 0x80000000, 0x10001, 0x2, 0xffff0001, 0x0, 0x1, 0x9, 0x6, 0x4, 0x9, 0x118, 0x80000000, 0x1, 0x13, 0x20000000, 0x7fff, 0x0, 0x1, 0x400, 0x7fff, 0x35520af0, 0x4, 0x3, 0xc547, 0x9, 0x7, 0x56e6, 0x7, 0x5, 0x7, 0x7, 0x400000, 0x2, 0x6, 0x1000, 0x7a2, 0x0, 0x7fc, 0x9, 0xfffffffd, 0x4, 0x7, 0xfffffc01, 0x9d9f, 0x3, 0xf05, 0x2, 0x6, 0x3, 0x3, 0x10001, 0x1, 0xfffffff9, 0x74d0, 0x3, 0x2, 0x0, 0x7, 0x8001, 0x5, 0x100, 0x604c1f98, 0x2e356d87, 0xb93, 0x1ca7, 0xffff, 0x6, 0x8, 0xa26000, 0x5, 0x6, 0x1, 0x8, 0x3, 0x2, 0xfffffff9, 0x0, 0x7fff, 0x35c1, 0xffffffff, 0x0, 0x274, 0x8001, 0x5, 0x1, 0x5, 0x81, 0x97a2, 0x9, 0x0, 0x7, 0xffffffff, 0x0, 0x1, 0x1, 0xf5, 0x20, 0x3df5, 0x3, 0xfffffe01, 0x2, 0x9, 0x3, 0x9, 0xd6, 0x80000000, 0x8, 0x200, 0x8, 0x5, 0x1b1, 0x5, 0xdaf2, 0x800, 0x4, 0x80000001, 0x9, 0x1, 0x32b, 0x1, 0x3, 0x7, 0x0, 0x8, 0x6, 0x3, 0x7, 0x3, 0x10000, 0x20, 0xad, 0x4, 0x8, 0x6, 0x3, 0x0, 0x96c1, 0x7fffffff, 0x5, 0x0, 0x4, 0x2000000, 0xdaa, 0x5, 0xe000, 0x80000001, 0xec, 0x3, 0x1, 0xa1, 0x2, 0x3, 0x7fff, 0x2, 0x7, 0x8000, 0x200, 0x6, 0x3, 0x7, 0x3, 0x5, 0x2, 0x0, 0x4fc1, 0x7, 0x9, 0x3, 0x1f, 0x5672, 0x80000000, 0x1, 0x5, 0x8, 0x9, 0x5, 0xfffffffd, 0x19, 0x2, 0x7f, 0x1, 0x80000000, 0xe8, 0x92d, 0x0, 0x3, 0x6, 0x2, 0x472, 0x1, 0x83, 0x6, 0x7fffffff, 0xe1c, 0xff, 0x5, 0xffffffe0, 0x1, 0x101, 0x1, 0x5, 0x7, 0x90, 0x25, 0x3, 0x80000001, 0x9c45, 0x5, 0x7, 0x0, 0x75, 0xff, 0x0, 0x8, 0x5, 0x1000, 0x6, 0x9cb1, 0x2, 0x4, 0x8001, 0x8, 0x7f, 0x3, 0xfff, 0x9, 0x0, 0xffff, 0x400, 0x460000, 0x2, 0x8cf8, 0x0, 0x53, 0x7f, 0x1, 0x435e, 0x400, 0x148, 0x6, 0x5, 0x5, 0xfff, 0x4, 0x3, 0x5, 0xa5e0, 0xd5e, 0x7f, 0x81, 0x1, 0x3ff, 0x4, 0x401, 0x0, 0x1, 0x4, 0x138, 0x9f5e, 0x1]}) (async) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) (async) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f00000012c0)=0x1c) openat$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0), 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) openat$cgroup_freezer_state(r3, &(0x7f0000001300), 0x2, 0x0) (async, rerun: 64) bind$inet(r4, 0x0, 0x0) (async, rerun: 64) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) (async, rerun: 32) r6 = openat$cgroup_ro(r1, &(0x7f0000000200)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (rerun: 32) setsockopt$inet_buf(r6, 0x0, 0x27, &(0x7f0000000140)="6ceceedb192a4545eae2c02d6328ffe8d7241b4bf48c300a07a4280adb5303f4b4c82e33d75905390670f712bd7de3c834cf1038d303fab0ffb59bce7701442a92c4c0ecda7cedec44d4e7c0ad179aca45751babaa805992e20ff9296b1d9878b64b67f553116857ecc01fb7cb09284e3b7cf72e2f8f938814e947518bceeeb00ae08849f740445b4d9ae57957079d287afe15fc9af95d10623331d547cb8089c0a228a64c1068f2fd9ebb45b8a68a3a", 0xb0) (async) read$FUSE(r5, &(0x7f00000021c0)={0x2020}, 0x2020) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000001280)={0x1, 0x0, [{}]}) 09:59:14 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:14 executing program 2: unshare(0x600) unshare(0x80080) (async) pselect6(0x40, &(0x7f0000000180)={0xc67, 0x2, 0x0, 0x4000, 0x0, 0x2, 0x20000, 0x3}, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000000)={0x2}) 09:59:14 executing program 4: unshare(0x600) (async) unshare(0x20000) (async) pselect6(0x40, &(0x7f0000000180)={0x59, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0x0) (async) r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0x3, 0x0) ioctl$HIDIOCSFLAG(r0, 0x4004480f, &(0x7f0000000040)=0x3) 09:59:14 executing program 1: mlockall(0x3) syz_clone(0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:14 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:14 executing program 2: unshare(0x600) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @loopback}, &(0x7f0000000040)=0x8) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:14 executing program 4: ioctl$KVM_CAP_HYPERV_SYNIC2(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000000)) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1}, &(0x7f00000001c0)={0xa, 0xf21, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000240)) clock_gettime(0x0, &(0x7f00000002c0)) rt_sigtimedwait(&(0x7f0000000080)={[0xb7]}, &(0x7f00000000c0), &(0x7f0000000140), 0x8) syz_open_dev$hiddev(&(0x7f0000000280), 0x4, 0x2000) 09:59:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x802, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x4, 0xff, 0xff, 0x8, 0x2, @remote, @empty, 0x700, 0x7800, 0x7fffffff, 0xad1c}}) 09:59:14 executing program 2: unshare(0x600) (async) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @loopback}, &(0x7f0000000040)=0x8) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:14 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:14 executing program 0: mlockall(0x3) syz_clone(0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:14 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000400)={0x9, {{0x2, 0x4e23, @broadcast}}}, 0x88) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:14 executing program 4: ioctl$KVM_CAP_HYPERV_SYNIC2(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000000)) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1}, &(0x7f00000001c0)={0xa, 0xf21, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000200)) (async) clock_gettime(0x0, &(0x7f0000000240)) (async) clock_gettime(0x0, &(0x7f00000002c0)) rt_sigtimedwait(&(0x7f0000000080)={[0xb7]}, &(0x7f00000000c0), &(0x7f0000000140), 0x8) (async, rerun: 64) syz_open_dev$hiddev(&(0x7f0000000280), 0x4, 0x2000) (rerun: 64) 09:59:14 executing program 2: unshare(0x600) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @loopback}, &(0x7f0000000040)=0x8) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:14 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:14 executing program 1: mlockall(0x3) syz_clone(0x20010, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:14 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x180) unshare(0x8000000) 09:59:14 executing program 4: ioctl$KVM_CAP_HYPERV_SYNIC2(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000000)) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1}, &(0x7f00000001c0)={0xa, 0xf21, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f0000000200)) (async) clock_gettime(0x0, &(0x7f0000000240)) (async) clock_gettime(0x0, &(0x7f00000002c0)) (async) rt_sigtimedwait(&(0x7f0000000080)={[0xb7]}, &(0x7f00000000c0), &(0x7f0000000140), 0x8) (async) syz_open_dev$hiddev(&(0x7f0000000280), 0x4, 0x2000) 09:59:14 executing program 5: unshare(0x600) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000080), &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x802, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x4, 0xff, 0xff, 0x8, 0x2, @remote, @empty, 0x700, 0x7800, 0x7fffffff, 0xad1c}}) 09:59:15 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:15 executing program 4: unshare(0x20070700) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x80}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:15 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x180) unshare(0x8000000) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) unshare(0x180) (async) unshare(0x8000000) (async) 09:59:15 executing program 1: mlockall(0x3) syz_clone(0x20200, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:15 executing program 0: mlockall(0x3) syz_clone(0x20010, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:15 executing program 4: unshare(0x20070700) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x80}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) unshare(0x20070700) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x80}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) 09:59:15 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) unshare(0x180) (async, rerun: 64) unshare(0x8000000) 09:59:15 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:15 executing program 4: unshare(0x20070700) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x80}, &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:15 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:15 executing program 4: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000040), 0x0, 0x6000) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000080)={0x1, 0x8001, 0x10001, 0xfffffffa}) openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.1GB.max_usage_in_bytes\x00', 0x2, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000200)={0xa0, 0xfffffffffffffffe, 0x0, {{0x6, 0x0, 0x100000001, 0x401, 0x3, 0x6, {0x2, 0x800000000000, 0x80000000, 0x101, 0x7fffffff, 0x1, 0xa2, 0x9, 0x8001, 0xc000, 0x2c43, 0x0, 0x0, 0x8, 0xcfa}}}}, 0xa0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x802, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x4, 0xff, 0xff, 0x8, 0x2, @remote, @empty, 0x700, 0x7800, 0x7fffffff, 0xad1c}}) 09:59:16 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0xc3, "77865adc5e0bcd57f40de8b238268a21a4a013a51da910a601658a3e4635909d10a25a4247e2f9315796acd9b5aefe7061e421648504fa7ea5fbd84626b9ad323737f22537b4583c2ed07a33429dc082a0492678e7729bce5d9dfd046df4f68d287ca12819d33e8cad064eb64fcbd192eccfc3fe7176e25d078e30014e8237a5587417d8906f4956c26af9a864a9cee74846698152bc9df916854ad8b8444cba253aac764f6dfed115e1cbdaf2d180b309d0c3910d8c65d045bb69d05a8fc8e336507a"}, &(0x7f0000000100)=0xe7) socket$inet_icmp(0x2, 0x2, 0x1) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'vlan0\x00', 0x1}, 0x18) prctl$PR_SVE_SET_VL(0x32, 0x1ee74) 09:59:16 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:16 executing program 4: unshare(0x600) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) r1 = syz_open_dev$hiddev(&(0x7f0000000040), 0x0, 0x6000) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000080)={0x1, 0x8001, 0x10001, 0xfffffffa}) (async) openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.1GB.max_usage_in_bytes\x00', 0x2, 0x0) (async) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) (async) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000200)={0xa0, 0xfffffffffffffffe, 0x0, {{0x6, 0x0, 0x100000001, 0x401, 0x3, 0x6, {0x2, 0x800000000000, 0x80000000, 0x101, 0x7fffffff, 0x1, 0xa2, 0x9, 0x8001, 0xc000, 0x2c43, 0x0, 0x0, 0x8, 0xcfa}}}}, 0xa0) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:16 executing program 0: mlockall(0x3) syz_clone(0x20200, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:16 executing program 1: mlockall(0x3) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:16 executing program 5: unshare(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:16 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0xc3, "77865adc5e0bcd57f40de8b238268a21a4a013a51da910a601658a3e4635909d10a25a4247e2f9315796acd9b5aefe7061e421648504fa7ea5fbd84626b9ad323737f22537b4583c2ed07a33429dc082a0492678e7729bce5d9dfd046df4f68d287ca12819d33e8cad064eb64fcbd192eccfc3fe7176e25d078e30014e8237a5587417d8906f4956c26af9a864a9cee74846698152bc9df916854ad8b8444cba253aac764f6dfed115e1cbdaf2d180b309d0c3910d8c65d045bb69d05a8fc8e336507a"}, &(0x7f0000000100)=0xe7) socket$inet_icmp(0x2, 0x2, 0x1) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'vlan0\x00', 0x1}, 0x18) (async) prctl$PR_SVE_SET_VL(0x32, 0x1ee74) 09:59:16 executing program 4: unshare(0x600) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async, rerun: 32) r1 = syz_open_dev$hiddev(&(0x7f0000000040), 0x0, 0x6000) (rerun: 32) ioctl$HIDIOCGCOLLECTIONINFO(r1, 0xc0104811, &(0x7f0000000080)={0x1, 0x8001, 0x10001, 0xfffffffa}) openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.1GB.max_usage_in_bytes\x00', 0x2, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) (async) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000200)={0xa0, 0xfffffffffffffffe, 0x0, {{0x6, 0x0, 0x100000001, 0x401, 0x3, 0x6, {0x2, 0x800000000000, 0x80000000, 0x101, 0x7fffffff, 0x1, 0xa2, 0x9, 0x8001, 0xc000, 0x2c43, 0x0, 0x0, 0x8, 0xcfa}}}}, 0xa0) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:16 executing program 5: unshare(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:16 executing program 5: unshare(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:16 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0xc3, "77865adc5e0bcd57f40de8b238268a21a4a013a51da910a601658a3e4635909d10a25a4247e2f9315796acd9b5aefe7061e421648504fa7ea5fbd84626b9ad323737f22537b4583c2ed07a33429dc082a0492678e7729bce5d9dfd046df4f68d287ca12819d33e8cad064eb64fcbd192eccfc3fe7176e25d078e30014e8237a5587417d8906f4956c26af9a864a9cee74846698152bc9df916854ad8b8444cba253aac764f6dfed115e1cbdaf2d180b309d0c3910d8c65d045bb69d05a8fc8e336507a"}, &(0x7f0000000100)=0xe7) socket$inet_icmp(0x2, 0x2, 0x1) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'vlan0\x00', 0x1}, 0x18) prctl$PR_SVE_SET_VL(0x32, 0x1ee74) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0xc3, "77865adc5e0bcd57f40de8b238268a21a4a013a51da910a601658a3e4635909d10a25a4247e2f9315796acd9b5aefe7061e421648504fa7ea5fbd84626b9ad323737f22537b4583c2ed07a33429dc082a0492678e7729bce5d9dfd046df4f68d287ca12819d33e8cad064eb64fcbd192eccfc3fe7176e25d078e30014e8237a5587417d8906f4956c26af9a864a9cee74846698152bc9df916854ad8b8444cba253aac764f6dfed115e1cbdaf2d180b309d0c3910d8c65d045bb69d05a8fc8e336507a"}, &(0x7f0000000100)=0xe7) (async) socket$inet_icmp(0x2, 0x2, 0x1) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000140)={0x0, 'vlan0\x00', 0x1}, 0x18) (async) prctl$PR_SVE_SET_VL(0x32, 0x1ee74) (async) 09:59:17 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2058) 09:59:17 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x8000000000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x7b}, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad75, 0xfffffffffffffff8}, 0x0, 0x0, 0x0) 09:59:17 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:17 executing program 2: unshare(0x600) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f00000001c0)={0x1, 0x1, 0x2, 0xa, 0x3, 0xfffff801}) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/custom0\x00', 0x800, 0x0) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={0x77359400}, 0x8) rt_sigprocmask(0x1, &(0x7f0000000140)={[0x3]}, 0x0, 0x8) rt_sigprocmask(0x1, &(0x7f0000000200)={[0x200]}, &(0x7f0000000240), 0x8) 09:59:17 executing program 0: mlockall(0x3) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:17 executing program 1: mlockall(0x3) syz_clone(0x101000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:17 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x8000000000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x7b}, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad75, 0xfffffffffffffff8}, 0x0, 0x0, 0x0) 09:59:17 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:17 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2058) 09:59:17 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x8000000000000000, 0x0, 0xfffffffffffffffc, 0x0, 0x7b}, &(0x7f0000000000)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xad75, 0xfffffffffffffff8}, 0x0, 0x0, 0x0) 09:59:17 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2058) 09:59:17 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:17 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x8000]}, &(0x7f0000000040), 0x8) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) rt_sigprocmask(0x1, &(0x7f0000000140)={[0xe61a]}, &(0x7f0000000200), 0x8) 09:59:17 executing program 5: unshare(0x600) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:17 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x8000]}, &(0x7f0000000040), 0x8) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) rt_sigprocmask(0x1, &(0x7f0000000140)={[0xe61a]}, &(0x7f0000000200), 0x8) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) (async) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x8000]}, &(0x7f0000000040), 0x8) (async) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) (async) rt_sigprocmask(0x1, &(0x7f0000000140)={[0xe61a]}, &(0x7f0000000200), 0x8) (async) 09:59:18 executing program 2: unshare(0x600) (async) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f00000001c0)={0x1, 0x1, 0x2, 0xa, 0x3, 0xfffff801}) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0x0, 0x0) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/custom0\x00', 0x800, 0x0) (async) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={0x77359400}, 0x8) rt_sigprocmask(0x1, &(0x7f0000000140)={[0x3]}, 0x0, 0x8) rt_sigprocmask(0x1, &(0x7f0000000200)={[0x200]}, &(0x7f0000000240), 0x8) 09:59:18 executing program 5: unshare(0x600) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:18 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)={0x9}, 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x8000]}, &(0x7f0000000040), 0x8) (async) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) (async) rt_sigprocmask(0x1, &(0x7f0000000140)={[0xe61a]}, &(0x7f0000000200), 0x8) 09:59:18 executing program 1: mlockall(0x3) syz_clone(0xf0ff1f, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x1f, 0xb2, 0x74, @remote, @empty, 0x7800, 0x7800, 0x40, 0xdd0}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', &(0x7f00000021c0)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x1, 0x9, 0x4d, @remote, @empty, 0x7, 0x8, 0x2, 0xffffffff}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002240)={0x0, @rand_addr, @remote}, &(0x7f0000002280)=0xc) r5 = syz_open_dev$mouse(&(0x7f0000002c80), 0x0, 0x8040) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r5, 0x89f4, &(0x7f0000002d40)={'syztnl2\x00', &(0x7f0000002cc0)={'syztnl0\x00', 0x0, 0x4, 0x3f, 0x40, 0x40, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x700, 0xcb215387a406a188, 0x5, 0x200}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000002340)={'syztnl1\x00', &(0x7f00000022c0)={'ip6_vti0\x00', 0x0, 0x4, 0x3, 0x5, 0x3, 0x4, @private0, @mcast1, 0x10, 0x8, 0x3, 0x8000}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002380)={0x0, @empty, @empty}, &(0x7f00000023c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002400)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002c00)={&(0x7f0000003640)=ANY=[@ANYBLOB="b0070000", @ANYRES16=0x0, @ANYBLOB="000025bd7000fbdbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB="9000028054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002400040001000005000200003400040600100000ff03090601010000010059000300000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400ec0e000008000100", @ANYRES32=r1, @ANYBLOB="780002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004008000000008000100", @ANYRES32=0x0, @ANYBLOB="ac01028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e6365003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600f646326a59348538567351a7a45253d8996efc44635f5d8bab204846f64ae620c08881155661b91552d92bdfec70829e04a3e1c9f2a2201a95117b27c72c9c5a6e1e85636049810247c40013e20b47278ed5a225579a1eefe76e6ed215c191f95cb57fe1e365beeb0d375c13bf853bd9859545a983de99e04a42e13f8636c1094101e7cd9eafcc33f20db484f19d9b6ea297f743d600bb1f84c7f7cedbd9f31d0afe3cecfe83f1c97442289d1fe01e22de52af5dc0d72f7e9c93a4", @ANYRES32=r2, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700020000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000500000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000600000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r3, @ANYBLOB="080007000000000008000100", @ANYRES32=r4, @ANYBLOB="7400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000900000038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300edffffff0700040036030000080001005cce07eb49ca505f0ce9dda176b4e3ccf41c903d3be3e2c795f904000000f3a2627e05a3c019d7d54d5710bfe04f87509411fcf21fb7baa6064ad3785576eacc49d2459818", @ANYRES32=0x0, @ANYBLOB="a001028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="080007000000000064000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b00000034000400010080ff02000000010005ab03000000730dad8009000000b40007060700000002002080000400007d0040020500000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000900000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040020000000080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="0800070000000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400ace5000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="f001028038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000050003000300000008000400010000004c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000019000400686173685f746f5f706f72745f6d617070696e670000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r7, @ANYBLOB="080007000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e00003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="ac00028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004003f00000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ff00000038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040000000080"], 0x7b0}, 0x1, 0x0, 0x0, 0x400c850}, 0x4001) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:18 executing program 0: mlockall(0x3) syz_clone(0x101000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:18 executing program 5: unshare(0x600) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)=0x4000000) 09:59:18 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 09:59:18 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:18 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async, rerun: 32) socket$inet6_udp(0xa, 0x2, 0x0) (rerun: 32) 09:59:18 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:18 executing program 4: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) 09:59:18 executing program 2: unshare(0x600) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f00000001c0)={0x1, 0x1, 0x2, 0xa, 0x3, 0xfffff801}) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/custom0\x00', 0x800, 0x0) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={0x77359400}, 0x8) rt_sigprocmask(0x1, &(0x7f0000000140)={[0x3]}, 0x0, 0x8) rt_sigprocmask(0x1, &(0x7f0000000200)={[0x200]}, &(0x7f0000000240), 0x8) unshare(0x600) (async) ioctl$HIDIOCGCOLLECTIONINDEX(0xffffffffffffffff, 0x40184810, &(0x7f00000001c0)={0x1, 0x1, 0x2, 0xa, 0x3, 0xfffff801}) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0x0, 0x0) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/custom0\x00', 0x800, 0x0) (async) rt_sigtimedwait(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)={0x77359400}, 0x8) (async) rt_sigprocmask(0x1, &(0x7f0000000140)={[0x3]}, 0x0, 0x8) (async) rt_sigprocmask(0x1, &(0x7f0000000200)={[0x200]}, &(0x7f0000000240), 0x8) (async) 09:59:18 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:18 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r0, {0x101}}, 0x18) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) 09:59:18 executing program 0: mlockall(0x3) syz_clone(0xf0ff1f, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:18 executing program 1: mlockall(0x3) syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x1f, 0xb2, 0x74, @remote, @empty, 0x7800, 0x7800, 0x40, 0xdd0}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', &(0x7f00000021c0)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x1, 0x9, 0x4d, @remote, @empty, 0x7, 0x8, 0x2, 0xffffffff}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002240)={0x0, @rand_addr, @remote}, &(0x7f0000002280)=0xc) r5 = syz_open_dev$mouse(&(0x7f0000002c80), 0x0, 0x8040) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r5, 0x89f4, &(0x7f0000002d40)={'syztnl2\x00', &(0x7f0000002cc0)={'syztnl0\x00', 0x0, 0x4, 0x3f, 0x40, 0x40, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x700, 0xcb215387a406a188, 0x5, 0x200}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000002340)={'syztnl1\x00', &(0x7f00000022c0)={'ip6_vti0\x00', 0x0, 0x4, 0x3, 0x5, 0x3, 0x4, @private0, @mcast1, 0x10, 0x8, 0x3, 0x8000}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002380)={0x0, @empty, @empty}, &(0x7f00000023c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002400)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002c00)={&(0x7f0000003640)=ANY=[@ANYBLOB="b0070000", @ANYRES16=0x0, @ANYBLOB="000025bd7000fbdbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB="9000028054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002400040001000005000200003400040600100000ff03090601010000010059000300000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400ec0e000008000100", @ANYRES32=r1, @ANYBLOB="780002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004008000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700020000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000500000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000600000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r3, @ANYBLOB="080007000000000008000100", @ANYRES32=r4, @ANYBLOB="7400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000900000038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300edffffff0700040036030000080001005cce07eb49ca505f0ce9dda176b4e3ccf41c903d3be3e2c795f904000000f3a2627e05a3c019d7d54d5710bfe04f87509411fcf21fb7baa6064ad3785576eacc49d2459818", @ANYRES32=0x0, @ANYBLOB="a001028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0800070000000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400ace5000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="080007000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e00003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="ac00028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004003f00000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ff00000038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040000000080"], 0x7b0}, 0x1, 0x0, 0x0, 0x400c850}, 0x4001) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x1f, 0xb2, 0x74, @remote, @empty, 0x7800, 0x7800, 0x40, 0xdd0}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', &(0x7f00000021c0)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x1, 0x9, 0x4d, @remote, @empty, 0x7, 0x8, 0x2, 0xffffffff}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002240)={0x0, @rand_addr, @remote}, &(0x7f0000002280)=0xc) (async) syz_open_dev$mouse(&(0x7f0000002c80), 0x0, 0x8040) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r5, 0x89f4, &(0x7f0000002d40)={'syztnl2\x00', &(0x7f0000002cc0)={'syztnl0\x00', 0x0, 0x4, 0x3f, 0x40, 0x40, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x700, 0xcb215387a406a188, 0x5, 0x200}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000002340)={'syztnl1\x00', &(0x7f00000022c0)={'ip6_vti0\x00', 0x0, 0x4, 0x3, 0x5, 0x3, 0x4, @private0, @mcast1, 0x10, 0x8, 0x3, 0x8000}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002380)={0x0, @empty, @empty}, &(0x7f00000023c0)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002400)) (async) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002c00)={&(0x7f0000003640)=ANY=[@ANYBLOB="b0070000", @ANYRES16=0x0, @ANYBLOB="000025bd7000fbdbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB="9000028054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002400040001000005000200003400040600100000ff03090601010000010059000300000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400ec0e000008000100", @ANYRES32=r1, @ANYBLOB="780002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004008000000008000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700020000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000500000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000600000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r3, @ANYBLOB="080007000000000008000100", @ANYRES32=r4, @ANYBLOB="7400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000900000038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300edffffff0700040036030000080001005cce07eb49ca505f0ce9dda176b4e3ccf41c903d3be3e2c795f904000000f3a2627e05a3c019d7d54d5710bfe04f87509411fcf21fb7baa6064ad3785576eacc49d2459818", @ANYRES32=0x0, @ANYBLOB="a001028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0800070000000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400ace5000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="080007000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e00003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="ac00028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004003f00000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ff00000038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040000000080"], 0x7b0}, 0x1, 0x0, 0x0, 0x400c850}, 0x4001) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 09:59:18 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r0, {0x101}}, 0x18) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) (async) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r0, {0x101}}, 0x18) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) (async) 09:59:18 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:18 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:18 executing program 4: unshare(0x600) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r0, {0x101}}, 0x18) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000200)={0x2020}, 0x2020) (async) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x0, r0, {0x101}}, 0x18) (async) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) (async) 09:59:18 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:18 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x4, 0x1f, 0xb2, 0x74, @remote, @empty, 0x7800, 0x7800, 0x40, 0xdd0}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'sit0\x00', &(0x7f00000021c0)={'syztnl2\x00', 0x0, 0x29, 0x7, 0x1, 0x9, 0x4d, @remote, @empty, 0x7, 0x8, 0x2, 0xffffffff}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002240)={0x0, @rand_addr, @remote}, &(0x7f0000002280)=0xc) (async) r5 = syz_open_dev$mouse(&(0x7f0000002c80), 0x0, 0x8040) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r5, 0x89f4, &(0x7f0000002d40)={'syztnl2\x00', &(0x7f0000002cc0)={'syztnl0\x00', 0x0, 0x4, 0x3f, 0x40, 0x40, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, 0x700, 0xcb215387a406a188, 0x5, 0x200}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000002340)={'syztnl1\x00', &(0x7f00000022c0)={'ip6_vti0\x00', 0x0, 0x4, 0x3, 0x5, 0x3, 0x4, @private0, @mcast1, 0x10, 0x8, 0x3, 0x8000}}) (async, rerun: 32) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002380)={0x0, @empty, @empty}, &(0x7f00000023c0)=0xc) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002400)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002c00)={&(0x7f0000003640)=ANY=[@ANYBLOB="b0070000", @ANYRES16=0x0, @ANYBLOB="000025bd7000fbdbdf250100000008000100", @ANYRES32=0x0, @ANYBLOB="9000028054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000002400040001000005000200003400040600100000ff03090601010000010059000300000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400ec0e000008000100", @ANYRES32=r1, @ANYBLOB="780002803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004008000000008000100", @ANYRES32=0x0, @ANYBLOB="ac01028040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000500030005000000100004006c6f616462616c616e6365003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600f646326a59348538567351a7a45253d8996efc44635f5d8bab204846f64ae620c08881155661b91552d92bdfec70829e04a3e1c9f2a2201a95117b27c72c9c5a6e1e85636049810247c40013e20b47278ed5a225579a1eefe76e6ed215c191f95cb57fe1e365beeb0d375c13bf853bd9859545a983de99e04a42e13f8636c1094101e7cd9eafcc33f20db484f19d9b6ea297f743d600bb1f84c7f7cedbd9f31d0afe3cecfe83f1c97442289d1fe01e22de52af5dc0d72f7e9c93a4", @ANYRES32=r2, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700020000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000500000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000600000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r3, @ANYBLOB="080007000000000008000100", @ANYRES32=r4, @ANYBLOB="7400028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000900000038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300edffffff0700040036030000080001005cce07eb49ca505f0ce9dda176b4e3ccf41c903d3be3e2c795f904000000f3a2627e05a3c019d7d54d5710bfe04f87509411fcf21fb7baa6064ad3785576eacc49d2459818", @ANYRES32=0x0, @ANYBLOB="a001028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0800070000000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400ace5000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="080007000000000040000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e00003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="ac00028038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004003f00000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000050003000300000008000400ff00000038000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300030000000800040000000080"], 0x7b0}, 0x1, 0x0, 0x0, 0x400c850}, 0x4001) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:18 executing program 4: unshare(0x600) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:18 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:19 executing program 0: mlockall(0x3) syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:19 executing program 4: unshare(0x600) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000000)) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:19 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = getgid() getgroups(0x6, &(0x7f0000000000)=[0xffffffffffffffff, r0, 0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) 09:59:19 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:19 executing program 1: mlockall(0x3) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:19 executing program 5: unshare(0x600) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)) 09:59:19 executing program 4: unshare(0x600) (async) ioctl$VHOST_GET_VRING_BASE(0xffffffffffffffff, 0xc008af12, &(0x7f0000000000)) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7}, 0x0, 0x0, 0x0) 09:59:19 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) r0 = getgid() getgroups(0x6, &(0x7f0000000000)=[0xffffffffffffffff, r0, 0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) 09:59:19 executing program 4: unshare(0x600) unshare(0x10000000) socket$inet6_udplite(0xa, 0x2, 0x88) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x40}, 0x0, 0x0, 0x0) 09:59:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 09:59:19 executing program 5: unshare(0x600) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)) 09:59:19 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r0 = getgid() getgroups(0x6, &(0x7f0000000000)=[0xffffffffffffffff, r0, 0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) getgid() (async) getgroups(0x6, &(0x7f0000000000)=[0xffffffffffffffff, r0, 0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) (async) 09:59:19 executing program 4: unshare(0x600) unshare(0x10000000) socket$inet6_udplite(0xa, 0x2, 0x88) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x40}, 0x0, 0x0, 0x0) unshare(0x600) (async) unshare(0x10000000) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x40}, 0x0, 0x0, 0x0) (async) 09:59:19 executing program 1: mlockall(0x3) syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:19 executing program 0: mlockall(0x3) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:19 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @empty}, &(0x7f0000000080)=0x8) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x5, 0x6000}) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:19 executing program 5: unshare(0x600) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)) 09:59:19 executing program 4: unshare(0x600) unshare(0x10000000) socket$inet6_udplite(0xa, 0x2, 0x88) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x40}, 0x0, 0x0, 0x0) unshare(0x600) (async) unshare(0x10000000) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) pselect6(0x40, &(0x7f0000000180), &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x40}, 0x0, 0x0, 0x0) (async) 09:59:19 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:19 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @empty}, &(0x7f0000000080)=0x8) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x5, 0x6000}) (async) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:19 executing program 4: mlockall(0x3) syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 09:59:20 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:20 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @empty}, &(0x7f0000000080)=0x8) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x5, 0x6000}) (async) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:20 executing program 1: mlockall(0x3) syz_clone(0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:20 executing program 0: mlockall(0x3) syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:20 executing program 4: mlockall(0x3) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:20 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x2, 0x726, 0x7fffffffffffffff, 0x6ff5, 0x1, 0x9, 0x5933a7cc, 0xfffffffffffffffc}, &(0x7f0000000040)={0x0, 0x5, 0x1, 0x6, 0xdf6, 0x0, 0x7ff, 0x9}, &(0x7f0000000080)={0xfffffffffffffffb, 0x6, 0x7fffffffffffffff, 0x103, 0x2, 0x8, 0x15c}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0xb82c]}, 0x8}) 09:59:20 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:20 executing program 5: unshare(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:20 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000000)={0x2, 0x726, 0x7fffffffffffffff, 0x6ff5, 0x1, 0x9, 0x5933a7cc, 0xfffffffffffffffc}, &(0x7f0000000040)={0x0, 0x5, 0x1, 0x6, 0xdf6, 0x0, 0x7ff, 0x9}, &(0x7f0000000080)={0xfffffffffffffffb, 0x6, 0x7fffffffffffffff, 0x103, 0x2, 0x8, 0x15c}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0xb82c]}, 0x8}) 09:59:20 executing program 5: unshare(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:20 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000000)={0x2, 0x726, 0x7fffffffffffffff, 0x6ff5, 0x1, 0x9, 0x5933a7cc, 0xfffffffffffffffc}, &(0x7f0000000040)={0x0, 0x5, 0x1, 0x6, 0xdf6, 0x0, 0x7ff, 0x9}, &(0x7f0000000080)={0xfffffffffffffffb, 0x6, 0x7fffffffffffffff, 0x103, 0x2, 0x8, 0x15c}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0xb82c]}, 0x8}) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000000)={0x2, 0x726, 0x7fffffffffffffff, 0x6ff5, 0x1, 0x9, 0x5933a7cc, 0xfffffffffffffffc}, &(0x7f0000000040)={0x0, 0x5, 0x1, 0x6, 0xdf6, 0x0, 0x7ff, 0x9}, &(0x7f0000000080)={0xfffffffffffffffb, 0x6, 0x7fffffffffffffff, 0x103, 0x2, 0x8, 0x15c}, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0xb82c]}, 0x8}) (async) 09:59:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 09:59:21 executing program 5: unshare(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:21 executing program 2: unshare(0x600) r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x29, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'lblc\x00', 0x10, 0xffff, 0x3a}, {@empty, 0x4e24, 0x3, 0x6, 0xdcc, 0x1ff}}, 0x44) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:21 executing program 1: mlockall(0x3) syz_clone(0x1f000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:21 executing program 4: mlockall(0x3) syz_clone(0xf0ff1f, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:21 executing program 0: mlockall(0x3) syz_clone(0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:21 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:21 executing program 2: unshare(0x600) (async, rerun: 64) r0 = socket$inet_icmp(0x2, 0x2, 0x1) (rerun: 64) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x29, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'lblc\x00', 0x10, 0xffff, 0x3a}, {@empty, 0x4e24, 0x3, 0x6, 0xdcc, 0x1ff}}, 0x44) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:21 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:21 executing program 2: unshare(0x600) r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x29, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'lblc\x00', 0x10, 0xffff, 0x3a}, {@empty, 0x4e24, 0x3, 0x6, 0xdcc, 0x1ff}}, 0x44) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) socket$inet_icmp(0x2, 0x2, 0x1) (async) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000000)={{0x29, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'lblc\x00', 0x10, 0xffff, 0x3a}, {@empty, 0x4e24, 0x3, 0x6, 0xdcc, 0x1ff}}, 0x44) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:21 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000003c0)) 09:59:21 executing program 5: unshare(0x600) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)) 09:59:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, r1, {0xaebd}}, 0x18) 09:59:22 executing program 2: clock_gettime(0x4, &(0x7f0000000040)) nanosleep(&(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000058fbb893eb6d21b03a461e579ddb77a4f434030efbe6d222941bbba46fe130dbc8d2fd854326e240852eee2302ac5b8839c622e487724d9eb7dcc79b2b179196913fb35bfdc1cbed97d90737e3933a936b5b166dbc9c69f1e74cb9e03c81e12927fb83458fd66dc1caf7afa8ee307c64bf08dfec1faa8ff96823cd275626f42c9854db958559008cef1666716a5938b81d38bab55b98a68b16fa8ebe076b65109f2e377470a76dab526007d0eea206c13f5f00e54102c34a48ce2f002410795157e0cbb7a1b739c7334e666e1d52f05170abe8484c9badc357c924", @ANYRES16=0x0, @ANYBLOB="000329bd7000fedbdf250300000008000b00", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40000) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000140), &(0x7f00000001c0)) 09:59:22 executing program 5: unshare(0x600) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)) 09:59:22 executing program 4: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:22 executing program 0: mlockall(0x3) syz_clone(0x1f000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:22 executing program 1: mlockall(0x3) syz_clone(0x1ffff000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:22 executing program 4: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:22 executing program 2: clock_gettime(0x4, &(0x7f0000000040)) nanosleep(&(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000058fbb893eb6d21b03a461e579ddb77a4f434030efbe6d222941bbba46fe130dbc8d2fd854326e240852eee2302ac5b8839c622e487724d9eb7dcc79b2b179196913fb35bfdc1cbed97d90737e3933a936b5b166dbc9c69f1e74cb9e03c81e12927fb83458fd66dc1caf7afa8ee307c64bf08dfec1faa8ff96823cd275626f42c9854db958559008cef1666716a5938b81d38bab55b98a68b16fa8ebe076b65109f2e377470a76dab526007d0eea206c13f5f00e54102c34a48ce2f002410795157e0cbb7a1b739c7334e666e1d52f05170abe8484c9badc357c924", @ANYRES16=0x0, @ANYBLOB="000329bd7000fedbdf250300000008000b00", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40000) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000140), &(0x7f00000001c0)) 09:59:22 executing program 5: unshare(0x600) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f00000003c0)) 09:59:22 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:22 executing program 2: clock_gettime(0x4, &(0x7f0000000040)) (async) nanosleep(&(0x7f0000000080)={0x0, 0x989680}, &(0x7f0000000300)) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000058fbb893eb6d21b03a461e579ddb77a4f434030efbe6d222941bbba46fe130dbc8d2fd854326e240852eee2302ac5b8839c622e487724d9eb7dcc79b2b179196913fb35bfdc1cbed97d90737e3933a936b5b166dbc9c69f1e74cb9e03c81e12927fb83458fd66dc1caf7afa8ee307c64bf08dfec1faa8ff96823cd275626f42c9854db958559008cef1666716a5938b81d38bab55b98a68b16fa8ebe076b65109f2e377470a76dab526007d0eea206c13f5f00e54102c34a48ce2f002410795157e0cbb7a1b739c7334e666e1d52f05170abe8484c9badc357c924", @ANYRES16=0x0, @ANYBLOB="000329bd7000fedbdf250300000008000b00", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40000) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0) nanosleep(&(0x7f0000000140), &(0x7f00000001c0)) 09:59:22 executing program 4: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, r1, {0xaebd}}, 0x18) 09:59:23 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:23 executing program 4: unshare(0x600) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) 09:59:23 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x303}, 0x0, 0x0, 0x0, 0x0) 09:59:23 executing program 1: mlockall(0x3) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:23 executing program 0: mlockall(0x3) syz_clone(0x1ffff000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:23 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x303}, 0x0, 0x0, 0x0, 0x0) 09:59:23 executing program 4: unshare(0x600) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) 09:59:23 executing program 5: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:23 executing program 4: unshare(0x600) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) 09:59:23 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x303}, 0x0, 0x0, 0x0, 0x0) 09:59:23 executing program 5: mlockall(0x3) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, r1, {0xaebd}}, 0x18) 09:59:24 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:24 executing program 2: unshare(0x600) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, &(0x7f0000000000)={0x1, 0x1, 0x80000000, 0x6, 0xff800000, 0x400}) pselect6(0x40, &(0x7f0000000180)={0x3, 0x1f, 0x1c, 0x200, 0xfff, 0x6, 0x3}, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x29, 0x6, 0x0, 0x7fff, 0x2b, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1, 0x7, 0x6, 0x8000}}) 09:59:24 executing program 0: mlockall(0x3) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:24 executing program 1: mlockall(0x3) syz_clone(0x1b0df1f000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:24 executing program 5: mlockall(0x3) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:24 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:24 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:24 executing program 4: unshare(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:24 executing program 4: unshare(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:24 executing program 4: unshare(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:24 executing program 4: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) syz_open_dev$hiddev(&(0x7f0000000000), 0x8, 0x200) 09:59:24 executing program 4: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:24 executing program 1: mlockall(0x3) syz_clone(0x1263a550000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:24 executing program 0: mlockall(0x3) syz_clone(0x1b0dd1f000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:24 executing program 5: mlockall(0x3) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:24 executing program 2: unshare(0x600) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, &(0x7f0000000000)={0x1, 0x1, 0x80000000, 0x6, 0xff800000, 0x400}) pselect6(0x40, &(0x7f0000000180)={0x3, 0x1f, 0x1c, 0x200, 0xfff, 0x6, 0x3}, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x29, 0x6, 0x0, 0x7fff, 0x2b, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1, 0x7, 0x6, 0x8000}}) 09:59:24 executing program 4: unshare(0x600) r0 = openat$vhost_vsock(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 09:59:24 executing program 4: unshare(0x600) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) 09:59:24 executing program 4: unshare(0x600) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) 09:59:24 executing program 4: unshare(0x600) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, 0x0) 09:59:24 executing program 4: mlockall(0x3) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:25 executing program 1: mlockall(0x3) syz_clone(0x29e7cff5f000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) syz_open_dev$hiddev(&(0x7f0000000000), 0x8, 0x200) 09:59:25 executing program 0: mlockall(0x3) syz_clone(0x2a7e829b5000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:25 executing program 5: mlockall(0x3) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:25 executing program 4: mlockall(0x3) syz_clone(0x20200, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:25 executing program 1: mlockall(0x3) syz_clone(0x553a26010000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:25 executing program 2: unshare(0x600) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, &(0x7f0000000000)={0x1, 0x1, 0x80000000, 0x6, 0xff800000, 0x400}) pselect6(0x40, &(0x7f0000000180)={0x3, 0x1f, 0x1c, 0x200, 0xfff, 0x6, 0x3}, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x29, 0x6, 0x0, 0x7fff, 0x2b, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1, 0x7, 0x6, 0x8000}}) unshare(0x600) (async) ioctl$HIDIOCSUSAGE(0xffffffffffffffff, 0x4018480c, &(0x7f0000000000)={0x1, 0x1, 0x80000000, 0x6, 0xff800000, 0x400}) (async) pselect6(0x40, &(0x7f0000000180)={0x3, 0x1f, 0x1c, 0x200, 0xfff, 0x6, 0x3}, 0x0, 0x0, 0x0, 0x0) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x29, 0x6, 0x0, 0x7fff, 0x2b, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1, 0x7, 0x6, 0x8000}}) (async) 09:59:26 executing program 5: mlockall(0x3) syz_clone(0x4000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 0: mlockall(0x3) syz_clone(0x553a26478000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 1: mlockall(0x3) syz_clone(0x2001000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 4: mlockall(0x3) syz_clone(0x1f00, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 1: mlockall(0x3) syz_clone(0x2020000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 0: mlockall(0x3) syz_clone(0x2001000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) syz_open_dev$hiddev(&(0x7f0000000000), 0x8, 0x200) 09:59:26 executing program 4: mlockall(0x3) syz_clone(0x2001000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 2: ioctl$KVM_CAP_HYPERV_SYNIC(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000700)) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f00000006c0)={0x3, 0x5}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) getpgid(r0) r1 = socket(0xf, 0xa, 0x0) unshare(0x8010100) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x7, 0x7f, 0x1, 0x61, @private0, @rand_addr=' \x01\x00', 0x20, 0x10, 0x3, 0x7fff}}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f0000000280)={0x3bc, 0x0, 0x7a2, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0xfc, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "60547ec54c8752e7aa91f2fa529e25c3de8068c945bcf0326b9ef0fcda94c891"}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xa2}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @rand_addr=0x64010102}}]}, {0x4}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "2d3d1d0421f14c9431e6b9ba45cdf407301d0cf64101048541da6071b3f0f4fc"}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x34, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x8, @remote, 0x2}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x96}]}, {0x40, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @mcast1, 0x9db}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @local}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x22c, 0x8, 0x0, 0x1, [{0x110, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7f, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfffffffd}}, @WGPEER_A_ALLOWEDIPS={0xec, 0x9, 0x0, 0x1, [{0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7ff}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_FLAGS={0x8, 0x3, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @multicast2}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, {0x88, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x1000, @private2, 0x3}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @broadcast}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "85cceeb7958bcaa870474ff8b4a28faea944b5e3edae66f1b71ffa2eae58f7ed"}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x5}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xfff7}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FWMARK={0x8}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x4800}, 0x4000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) pselect6(0x40, &(0x7f0000000180)={0x300, 0x18, 0x0, 0x0, 0x98}, 0x0, 0x0, 0x0, 0x0) clock_getres(0x4, &(0x7f0000000000)) 09:59:26 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 2: ioctl$KVM_CAP_HYPERV_SYNIC(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000700)) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f00000006c0)={0x3, 0x5}) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) getpgid(r0) r1 = socket(0xf, 0xa, 0x0) unshare(0x8010100) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x7, 0x7f, 0x1, 0x61, @private0, @rand_addr=' \x01\x00', 0x20, 0x10, 0x3, 0x7fff}}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f0000000280)={0x3bc, 0x0, 0x7a2, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0xfc, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "60547ec54c8752e7aa91f2fa529e25c3de8068c945bcf0326b9ef0fcda94c891"}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xa2}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @rand_addr=0x64010102}}]}, {0x4}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "2d3d1d0421f14c9431e6b9ba45cdf407301d0cf64101048541da6071b3f0f4fc"}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x34, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x8, @remote, 0x2}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x96}]}, {0x40, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @mcast1, 0x9db}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @local}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x22c, 0x8, 0x0, 0x1, [{0x110, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7f, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfffffffd}}, @WGPEER_A_ALLOWEDIPS={0xec, 0x9, 0x0, 0x1, [{0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7ff}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_FLAGS={0x8, 0x3, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @multicast2}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, {0x88, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x1000, @private2, 0x3}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @broadcast}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "85cceeb7958bcaa870474ff8b4a28faea944b5e3edae66f1b71ffa2eae58f7ed"}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x5}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xfff7}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FWMARK={0x8}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x4800}, 0x4000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x18, 0x0, 0x0, 0x98}, 0x0, 0x0, 0x0, 0x0) (async) clock_getres(0x4, &(0x7f0000000000)) 09:59:26 executing program 2: ioctl$KVM_CAP_HYPERV_SYNIC(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000700)) (async, rerun: 32) ioctl$VHOST_SET_VRING_NUM(0xffffffffffffffff, 0x4008af10, &(0x7f00000006c0)={0x3, 0x5}) (rerun: 32) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) getpgid(r0) r1 = socket(0xf, 0xa, 0x0) unshare(0x8010100) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6_vti0\x00', 0x0, 0x2f, 0x7, 0x7f, 0x1, 0x61, @private0, @rand_addr=' \x01\x00', 0x20, 0x10, 0x3, 0x7fff}}) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f0000000280)={0x3bc, 0x0, 0x7a2, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0xfc, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "60547ec54c8752e7aa91f2fa529e25c3de8068c945bcf0326b9ef0fcda94c891"}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xa2}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @rand_addr=0x64010102}}]}, {0x4}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "2d3d1d0421f14c9431e6b9ba45cdf407301d0cf64101048541da6071b3f0f4fc"}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x34, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x8, @remote, 0x2}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x96}]}, {0x40, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x8, @mcast1, 0x9db}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @local}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}]}]}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x22c, 0x8, 0x0, 0x1, [{0x110, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7f, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfffffffd}}, @WGPEER_A_ALLOWEDIPS={0xec, 0x9, 0x0, 0x1, [{0xe8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}]}]}, {0x54, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7ff}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_FLAGS={0x8, 0x3, 0x5}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @multicast2}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, {0x88, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x1000, @private2, 0x3}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @broadcast}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "85cceeb7958bcaa870474ff8b4a28faea944b5e3edae66f1b71ffa2eae58f7ed"}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x5}]}, {0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xfff7}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FWMARK={0x8}]}, 0x3bc}, 0x1, 0x0, 0x0, 0x4800}, 0x4000) (async, rerun: 32) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0x4) (async, rerun: 32) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) pselect6(0x40, &(0x7f0000000180)={0x300, 0x18, 0x0, 0x0, 0x98}, 0x0, 0x0, 0x0, 0x0) (async) clock_getres(0x4, &(0x7f0000000000)) 09:59:26 executing program 2: unshare(0x600) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xac92}, [@map_fd={0x18, 0x8}, @ldst={0x2, 0x2, 0x1, 0x2, 0xb, 0x10, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0xd, 0xb, 0x8, 0x20, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0x1, 0x3, 0x7, 0x1, 0x100, 0xfffffffffffffffc}, @exit, @generic={0x0, 0xb, 0x4, 0x4, 0x9}, @call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f0000000080)='GPL\x00', 0x81, 0xe2, &(0x7f00000001c0)=""/226, 0x41000, 0x10, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xb, 0x3ff, 0x7ff}, 0x10, 0x1b7c1, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1, 0xffffffffffffffff, r0, 0x1, 0x1]}, 0x80) pselect6(0x40, &(0x7f0000000180)={0x300, 0x2, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 1: mlockall(0x3) syz_clone(0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 2: unshare(0x600) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xac92}, [@map_fd={0x18, 0x8}, @ldst={0x2, 0x2, 0x1, 0x2, 0xb, 0x10, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0xd, 0xb, 0x8, 0x20, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0x1, 0x3, 0x7, 0x1, 0x100, 0xfffffffffffffffc}, @exit, @generic={0x0, 0xb, 0x4, 0x4, 0x9}, @call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f0000000080)='GPL\x00', 0x81, 0xe2, &(0x7f00000001c0)=""/226, 0x41000, 0x10, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xb, 0x3ff, 0x7ff}, 0x10, 0x1b7c1, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1, 0xffffffffffffffff, r0, 0x1, 0x1]}, 0x80) pselect6(0x40, &(0x7f0000000180)={0x300, 0x2, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 0: mlockall(0x3) syz_clone(0x2020000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 2: unshare(0x600) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_sys\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0xac92}, [@map_fd={0x18, 0x8}, @ldst={0x2, 0x2, 0x1, 0x2, 0xb, 0x10, 0xfffffffffffffffc}, @jmp={0x5, 0x1, 0xd, 0xb, 0x8, 0x20, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0x1, 0x3, 0x7, 0x1, 0x100, 0xfffffffffffffffc}, @exit, @generic={0x0, 0xb, 0x4, 0x4, 0x9}, @call={0x85, 0x0, 0x0, 0x22}]}, &(0x7f0000000080)='GPL\x00', 0x81, 0xe2, &(0x7f00000001c0)=""/226, 0x41000, 0x10, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000100)={0x3, 0xb, 0x3ff, 0x7ff}, 0x10, 0x1b7c1, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[0x1, 0xffffffffffffffff, r0, 0x1, 0x1]}, 0x80) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x2, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0x0, 0x0) 09:59:26 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x400300, 0xffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000000000000}, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 4: mlockall(0x3) syz_clone(0x2020000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x400300, 0xffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000000000000}, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 1: mlockall(0x3) syz_clone(0x10100000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 0: mlockall(0x3) syz_clone(0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x400300, 0xffff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10000000000000}, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCSUSAGE(r0, 0x4018480c, &(0x7f0000000000)={0x1, 0x1, 0x2, 0x1, 0x3, 0x3f}) unshare(0x64030800) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) r2 = syz_open_dev$mouse(&(0x7f0000000000), 0x1000, 0x8a80) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000002380)={'ip6_vti0\x00', &(0x7f0000002300)={'sit0\x00', 0x0, 0x29, 0x7, 0x6, 0xfffffffa, 0x21, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, 0x700, 0x40, 0x3, 0xffffffff}}) r3 = syz_clone(0x200200, &(0x7f0000000040)="4c526b352b921d797234ddc0e994fa4e19774f1fb987ca5ad2216a71721257e1e756f00a5eae0e5a8715fa65ea79c05c9bcb325a886e0cc5dfbe92f1aaf13a1aca8911131f761df589422706f044123468c6d6d264987efdcc3193492c9a1347726604375ea1c8ba9171282b3483e3578c06845e0af5973e97e86675cd404de7cfa373ca29643396173178d9aafc804f437b2c283c23d709da0052854921ba05d2035ba9a554b3357a559b5e8e9ae260e0e279af18c2a16706657617bf798989491b17599dc7e1e32226bb8ca670370fb89852b9798218167a5357725e61c1da30d7ffdda968248e1b6dda5903", 0xed, &(0x7f0000000140), &(0x7f00000021c0), &(0x7f0000002200)="fe89d39b5545347b54092918d31e39d25dc69193de5d6a4b6e699c6fcfb524397d6f6cedc070420fd84cbc7f37f1fbf5123c3f87f6bf7de34a9a51f9e1dbd0c0c6bb6808ea3f7885df1798bb78028b88a28586e765b064bda7b59c4464f1380e611f669788a33e6338ca24ab8613ade8a4a02a63f1678f021456fe34e37365b595107ef03fcfb874633a5724") write$FUSE_LK(r2, &(0x7f00000022c0)={0x28, 0x0, r1, {{0x8, 0x2, 0x1, r3}}}, 0x28) 09:59:27 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCSUSAGE(r0, 0x4018480c, &(0x7f0000000000)={0x1, 0x1, 0x2, 0x1, 0x3, 0x3f}) (async) unshare(0x64030800) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCSUSAGE(r0, 0x4018480c, &(0x7f0000000000)={0x1, 0x1, 0x2, 0x1, 0x3, 0x3f}) unshare(0x64030800) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$HIDIOCSUSAGE(r0, 0x4018480c, &(0x7f0000000000)={0x1, 0x1, 0x2, 0x1, 0x3, 0x3f}) (async) unshare(0x64030800) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:27 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f00000000c0)={0xfffffffc, 0x3, 0xffff, 0x1, 0x8}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x80, 0x5, 0xfffff633, 0x12, @remote, @ipv4={'\x00', '\xff\xff', @empty}, 0x8000, 0x8000, 0x2, 0x6}}) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_queued\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000140), 0x2, 0x0) 09:59:27 executing program 2: unshare(0x600) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f00000000c0)={0xfffffffc, 0x3, 0xffff, 0x1, 0x8}) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x80, 0x5, 0xfffff633, 0x12, @remote, @ipv4={'\x00', '\xff\xff', @empty}, 0x8000, 0x8000, 0x2, 0x6}}) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_queued\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000140), 0x2, 0x0) 09:59:27 executing program 4: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f00000000c0)={0xfffffffc, 0x3, 0xffff, 0x1, 0x8}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x80, 0x5, 0xfffff633, 0x12, @remote, @ipv4={'\x00', '\xff\xff', @empty}, 0x8000, 0x8000, 0x2, 0x6}}) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_queued\x00', 0x0, 0x0) openat$cgroup_type(r2, &(0x7f0000000140), 0x2, 0x0) unshare(0x600) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f00000000c0)={0xfffffffc, 0x3, 0xffff, 0x1, 0x8}) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x29, 0x80, 0x5, 0xfffff633, 0x12, @remote, @ipv4={'\x00', '\xff\xff', @empty}, 0x8000, 0x8000, 0x2, 0x6}}) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000000100)='blkio.bfq.io_queued\x00', 0x0, 0x0) (async) openat$cgroup_type(r2, &(0x7f0000000140), 0x2, 0x0) (async) 09:59:27 executing program 0: mlockall(0x3) syz_clone(0x10100000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 1: mlockall(0x3) syz_clone(0xf0f10d1b000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:27 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) unshare(0x10000) pselect6(0x40, &(0x7f0000000000)={0x6, 0x3, 0x9, 0x3, 0x6, 0x4, 0x5, 0x1}, &(0x7f0000000040)={0x146ed1f, 0x1f, 0xffffffffffffffff, 0xfffffffffffffffb, 0x2a, 0xffffffff7fffffff, 0x7fff, 0x2}, &(0x7f0000000080)={0x0, 0xefd, 0x6, 0x59c, 0x100000001, 0xffffffffffff958c, 0x81, 0x1}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f00000001c0)={&(0x7f0000000140)={[0x6]}, 0x8}) unshare(0x600) 09:59:27 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) unshare(0x10000) (async) pselect6(0x40, &(0x7f0000000000)={0x6, 0x3, 0x9, 0x3, 0x6, 0x4, 0x5, 0x1}, &(0x7f0000000040)={0x146ed1f, 0x1f, 0xffffffffffffffff, 0xfffffffffffffffb, 0x2a, 0xffffffff7fffffff, 0x7fff, 0x2}, &(0x7f0000000080)={0x0, 0xefd, 0x6, 0x59c, 0x100000001, 0xffffffffffff958c, 0x81, 0x1}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f00000001c0)={&(0x7f0000000140)={[0x6]}, 0x8}) (async) unshare(0x600) 09:59:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 32) r2 = syz_open_dev$mouse(&(0x7f0000000000), 0x1000, 0x8a80) (rerun: 32) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000002380)={'ip6_vti0\x00', &(0x7f0000002300)={'sit0\x00', 0x0, 0x29, 0x7, 0x6, 0xfffffffa, 0x21, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, 0x700, 0x40, 0x3, 0xffffffff}}) (async) r3 = syz_clone(0x200200, &(0x7f0000000040)="4c526b352b921d797234ddc0e994fa4e19774f1fb987ca5ad2216a71721257e1e756f00a5eae0e5a8715fa65ea79c05c9bcb325a886e0cc5dfbe92f1aaf13a1aca8911131f761df589422706f044123468c6d6d264987efdcc3193492c9a1347726604375ea1c8ba9171282b3483e3578c06845e0af5973e97e86675cd404de7cfa373ca29643396173178d9aafc804f437b2c283c23d709da0052854921ba05d2035ba9a554b3357a559b5e8e9ae260e0e279af18c2a16706657617bf798989491b17599dc7e1e32226bb8ca670370fb89852b9798218167a5357725e61c1da30d7ffdda968248e1b6dda5903", 0xed, &(0x7f0000000140), &(0x7f00000021c0), &(0x7f0000002200)="fe89d39b5545347b54092918d31e39d25dc69193de5d6a4b6e699c6fcfb524397d6f6cedc070420fd84cbc7f37f1fbf5123c3f87f6bf7de34a9a51f9e1dbd0c0c6bb6808ea3f7885df1798bb78028b88a28586e765b064bda7b59c4464f1380e611f669788a33e6338ca24ab8613ade8a4a02a63f1678f021456fe34e37365b595107ef03fcfb874633a5724") write$FUSE_LK(r2, &(0x7f00000022c0)={0x28, 0x0, r1, {{0x8, 0x2, 0x1, r3}}}, 0x28) 09:59:28 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) unshare(0x10000) pselect6(0x40, &(0x7f0000000000)={0x6, 0x3, 0x9, 0x3, 0x6, 0x4, 0x5, 0x1}, &(0x7f0000000040)={0x146ed1f, 0x1f, 0xffffffffffffffff, 0xfffffffffffffffb, 0x2a, 0xffffffff7fffffff, 0x7fff, 0x2}, &(0x7f0000000080)={0x0, 0xefd, 0x6, 0x59c, 0x100000001, 0xffffffffffff958c, 0x81, 0x1}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f00000001c0)={&(0x7f0000000140)={[0x6]}, 0x8}) unshare(0x600) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) clock_gettime(0x0, &(0x7f00000000c0)) (async) unshare(0x10000) (async) pselect6(0x40, &(0x7f0000000000)={0x6, 0x3, 0x9, 0x3, 0x6, 0x4, 0x5, 0x1}, &(0x7f0000000040)={0x146ed1f, 0x1f, 0xffffffffffffffff, 0xfffffffffffffffb, 0x2a, 0xffffffff7fffffff, 0x7fff, 0x2}, &(0x7f0000000080)={0x0, 0xefd, 0x6, 0x59c, 0x100000001, 0xffffffffffff958c, 0x81, 0x1}, &(0x7f0000000100)={r0, r1+60000000}, &(0x7f00000001c0)={&(0x7f0000000140)={[0x6]}, 0x8}) (async) unshare(0x600) (async) 09:59:28 executing program 0: mlockall(0x3) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:28 executing program 1: mlockall(0x3) syz_clone(0xf0f5cfe7290000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:28 executing program 4: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:28 executing program 5: syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:28 executing program 2: unshare(0x600) r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0x4, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f0000000040)={0x2, 0x200, 0x1, 0x0, 0x3, 0x2}) r1 = socket(0x1, 0x3, 0x5) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x96, "9b9e337be520347dd455e37e341a554214f42629c197c35fba743b58d3490f7fdbe28c86ed38da9e84685ebfb46cdf321d4bbdf1bfea28290ebb39f2489150a33ed9e5361330981e390005870fc01024a6d3ad3f9e2f4c6f1425b5c930663eb232722fe34e0f7fc3b6715a05b3b06d425856b11e1775f6d7f5366694f25444ac41cf93f4db5c4c7ef3ae14c1fe1197768574f8c55802"}, &(0x7f0000000140)=0xba) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:28 executing program 5: syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:28 executing program 2: unshare(0x600) r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0x4, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f0000000040)={0x2, 0x200, 0x1, 0x0, 0x3, 0x2}) r1 = socket(0x1, 0x3, 0x5) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x96, "9b9e337be520347dd455e37e341a554214f42629c197c35fba743b58d3490f7fdbe28c86ed38da9e84685ebfb46cdf321d4bbdf1bfea28290ebb39f2489150a33ed9e5361330981e390005870fc01024a6d3ad3f9e2f4c6f1425b5c930663eb232722fe34e0f7fc3b6715a05b3b06d425856b11e1775f6d7f5366694f25444ac41cf93f4db5c4c7ef3ae14c1fe1197768574f8c55802"}, &(0x7f0000000140)=0xba) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) syz_open_dev$hiddev(&(0x7f0000000000), 0x4, 0x0) (async) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f0000000040)={0x2, 0x200, 0x1, 0x0, 0x3, 0x2}) (async) socket(0x1, 0x3, 0x5) (async) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x96, "9b9e337be520347dd455e37e341a554214f42629c197c35fba743b58d3490f7fdbe28c86ed38da9e84685ebfb46cdf321d4bbdf1bfea28290ebb39f2489150a33ed9e5361330981e390005870fc01024a6d3ad3f9e2f4c6f1425b5c930663eb232722fe34e0f7fc3b6715a05b3b06d425856b11e1775f6d7f5366694f25444ac41cf93f4db5c4c7ef3ae14c1fe1197768574f8c55802"}, &(0x7f0000000140)=0xba) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:28 executing program 5: syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:28 executing program 2: unshare(0x600) r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0x4, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f0000000040)={0x2, 0x200, 0x1, 0x0, 0x3, 0x2}) r1 = socket(0x1, 0x3, 0x5) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x96, "9b9e337be520347dd455e37e341a554214f42629c197c35fba743b58d3490f7fdbe28c86ed38da9e84685ebfb46cdf321d4bbdf1bfea28290ebb39f2489150a33ed9e5361330981e390005870fc01024a6d3ad3f9e2f4c6f1425b5c930663eb232722fe34e0f7fc3b6715a05b3b06d425856b11e1775f6d7f5366694f25444ac41cf93f4db5c4c7ef3ae14c1fe1197768574f8c55802"}, &(0x7f0000000140)=0xba) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) syz_open_dev$hiddev(&(0x7f0000000000), 0x4, 0x0) (async) ioctl$HIDIOCGCOLLECTIONINDEX(r0, 0x40184810, &(0x7f0000000040)={0x2, 0x200, 0x1, 0x0, 0x3, 0x2}) (async) socket(0x1, 0x3, 0x5) (async) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x96, "9b9e337be520347dd455e37e341a554214f42629c197c35fba743b58d3490f7fdbe28c86ed38da9e84685ebfb46cdf321d4bbdf1bfea28290ebb39f2489150a33ed9e5361330981e390005870fc01024a6d3ad3f9e2f4c6f1425b5c930663eb232722fe34e0f7fc3b6715a05b3b06d425856b11e1775f6d7f5366694f25444ac41cf93f4db5c4c7ef3ae14c1fe1197768574f8c55802"}, &(0x7f0000000140)=0xba) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:28 executing program 5: mlockall(0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) r2 = syz_open_dev$mouse(&(0x7f0000000000), 0x1000, 0x8a80) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000002380)={'ip6_vti0\x00', &(0x7f0000002300)={'sit0\x00', 0x0, 0x29, 0x7, 0x6, 0xfffffffa, 0x21, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, 0x700, 0x40, 0x3, 0xffffffff}}) r3 = syz_clone(0x200200, &(0x7f0000000040)="4c526b352b921d797234ddc0e994fa4e19774f1fb987ca5ad2216a71721257e1e756f00a5eae0e5a8715fa65ea79c05c9bcb325a886e0cc5dfbe92f1aaf13a1aca8911131f761df589422706f044123468c6d6d264987efdcc3193492c9a1347726604375ea1c8ba9171282b3483e3578c06845e0af5973e97e86675cd404de7cfa373ca29643396173178d9aafc804f437b2c283c23d709da0052854921ba05d2035ba9a554b3357a559b5e8e9ae260e0e279af18c2a16706657617bf798989491b17599dc7e1e32226bb8ca670370fb89852b9798218167a5357725e61c1da30d7ffdda968248e1b6dda5903", 0xed, &(0x7f0000000140), &(0x7f00000021c0), &(0x7f0000002200)="fe89d39b5545347b54092918d31e39d25dc69193de5d6a4b6e699c6fcfb524397d6f6cedc070420fd84cbc7f37f1fbf5123c3f87f6bf7de34a9a51f9e1dbd0c0c6bb6808ea3f7885df1798bb78028b88a28586e765b064bda7b59c4464f1380e611f669788a33e6338ca24ab8613ade8a4a02a63f1678f021456fe34e37365b595107ef03fcfb874633a5724") write$FUSE_LK(r2, &(0x7f00000022c0)={0x28, 0x0, r1, {{0x8, 0x2, 0x1, r3}}}, 0x28) socket$inet6_udp(0xa, 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) syz_open_dev$mouse(&(0x7f0000000000), 0x1000, 0x8a80) (async) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r2, 0x89fb, &(0x7f0000002380)={'ip6_vti0\x00', &(0x7f0000002300)={'sit0\x00', 0x0, 0x29, 0x7, 0x6, 0xfffffffa, 0x21, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, 0x700, 0x40, 0x3, 0xffffffff}}) (async) syz_clone(0x200200, &(0x7f0000000040)="4c526b352b921d797234ddc0e994fa4e19774f1fb987ca5ad2216a71721257e1e756f00a5eae0e5a8715fa65ea79c05c9bcb325a886e0cc5dfbe92f1aaf13a1aca8911131f761df589422706f044123468c6d6d264987efdcc3193492c9a1347726604375ea1c8ba9171282b3483e3578c06845e0af5973e97e86675cd404de7cfa373ca29643396173178d9aafc804f437b2c283c23d709da0052854921ba05d2035ba9a554b3357a559b5e8e9ae260e0e279af18c2a16706657617bf798989491b17599dc7e1e32226bb8ca670370fb89852b9798218167a5357725e61c1da30d7ffdda968248e1b6dda5903", 0xed, &(0x7f0000000140), &(0x7f00000021c0), &(0x7f0000002200)="fe89d39b5545347b54092918d31e39d25dc69193de5d6a4b6e699c6fcfb524397d6f6cedc070420fd84cbc7f37f1fbf5123c3f87f6bf7de34a9a51f9e1dbd0c0c6bb6808ea3f7885df1798bb78028b88a28586e765b064bda7b59c4464f1380e611f669788a33e6338ca24ab8613ade8a4a02a63f1678f021456fe34e37365b595107ef03fcfb874633a5724") (async) write$FUSE_LK(r2, &(0x7f00000022c0)={0x28, 0x0, r1, {{0x8, 0x2, 0x1, r3}}}, 0x28) (async) 09:59:29 executing program 5: mlockall(0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 1: mlockall(0x3) syz_clone(0xf0ff1f00000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 2: unshare(0x600) prctl$PR_GET_KEEPCAPS(0x7) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000380)={@private, @multicast2, 0x0}, &(0x7f00000003c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0xd137bbee33157ca1, 0x8000, 0x5, 0xff, {{0x12, 0x4, 0x1, 0x3a, 0x48, 0x64, 0x0, 0x1, 0x2f, 0x0, @broadcast, @multicast2, {[@noop, @timestamp_addr={0x44, 0xc, 0x6e, 0x1, 0x4, [{@multicast2, 0x7fffffff}]}, @generic={0x94, 0xd, "ce33c7f179ad57eb4923e8"}, @ssrr={0x89, 0x17, 0xfc, [@multicast2, @remote, @dev={0xac, 0x14, 0x14, 0x2a}, @remote, @loopback]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x5f, 0x457e57e9, 0x15, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x20, 0x8001, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x7, 0x7f, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x7, 0x7800, 0xfffff209, 0x2928}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000640)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x4, 0x521, 0x1c, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x40, 0x8000, 0xf8, 0x100}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'syztnl0\x00', &(0x7f0000000740)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x20, 0x5, 0x0, @local, @mcast1, 0x10, 0x700, 0x2, 0x7}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @multicast1}, &(0x7f0000000840)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000008c0)={'gretap0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x7800, 0x20, 0x8, 0x9, {{0x7, 0x4, 0x3, 0xf, 0x1c, 0x66, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000980)={'syztnl0\x00', &(0x7f0000000900)={'sit0\x00', 0x0, 0x29, 0x38, 0x1, 0x9, 0x31, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x700, 0x7, 0x51439d33, 0x7}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000f80)={&(0x7f00000009c0)={0x5b4, 0x0, 0x88c3e5d413e0a406, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x1ac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r0}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9ba4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xe41}}}]}}, {{0x8, 0x1, r4}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}]}}, {{0x8, 0x1, r8}, {0x13c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x0, 0x6, 0x3, 0x2}, {0x1, 0x81, 0x3f, 0x8}]}}}]}}, {{0x8}, {0x8c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5b4}}, 0x90) 09:59:29 executing program 0: mlockall(0x3) syz_clone(0x8047263a550000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 4: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 2: unshare(0x600) prctl$PR_GET_KEEPCAPS(0x7) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000380)={@private, @multicast2, 0x0}, &(0x7f00000003c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0xd137bbee33157ca1, 0x8000, 0x5, 0xff, {{0x12, 0x4, 0x1, 0x3a, 0x48, 0x64, 0x0, 0x1, 0x2f, 0x0, @broadcast, @multicast2, {[@noop, @timestamp_addr={0x44, 0xc, 0x6e, 0x1, 0x4, [{@multicast2, 0x7fffffff}]}, @generic={0x94, 0xd, "ce33c7f179ad57eb4923e8"}, @ssrr={0x89, 0x17, 0xfc, [@multicast2, @remote, @dev={0xac, 0x14, 0x14, 0x2a}, @remote, @loopback]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x5f, 0x457e57e9, 0x15, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x20, 0x8001, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x7, 0x7f, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x7, 0x7800, 0xfffff209, 0x2928}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000640)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x4, 0x521, 0x1c, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x40, 0x8000, 0xf8, 0x100}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'syztnl0\x00', &(0x7f0000000740)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x20, 0x5, 0x0, @local, @mcast1, 0x10, 0x700, 0x2, 0x7}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @multicast1}, &(0x7f0000000840)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000008c0)={'gretap0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x7800, 0x20, 0x8, 0x9, {{0x7, 0x4, 0x3, 0xf, 0x1c, 0x66, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000980)={'syztnl0\x00', &(0x7f0000000900)={'sit0\x00', 0x0, 0x29, 0x38, 0x1, 0x9, 0x31, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x700, 0x7, 0x51439d33, 0x7}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000f80)={&(0x7f00000009c0)={0x5b4, 0x0, 0x88c3e5d413e0a406, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x1ac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r0}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9ba4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xe41}}}]}}, {{0x8, 0x1, r4}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}]}}, {{0x8, 0x1, r8}, {0x13c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x0, 0x6, 0x3, 0x2}, {0x1, 0x81, 0x3f, 0x8}]}}}]}}, {{0x8}, {0x8c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5b4}}, 0x90) unshare(0x600) (async) prctl$PR_GET_KEEPCAPS(0x7) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0) (async) prctl$PR_CAPBSET_READ(0x17, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000380)={@private, @multicast2}, &(0x7f00000003c0)=0xc) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0xd137bbee33157ca1, 0x8000, 0x5, 0xff, {{0x12, 0x4, 0x1, 0x3a, 0x48, 0x64, 0x0, 0x1, 0x2f, 0x0, @broadcast, @multicast2, {[@noop, @timestamp_addr={0x44, 0xc, 0x6e, 0x1, 0x4, [{@multicast2, 0x7fffffff}]}, @generic={0x94, 0xd, "ce33c7f179ad57eb4923e8"}, @ssrr={0x89, 0x17, 0xfc, [@multicast2, @remote, @dev={0xac, 0x14, 0x14, 0x2a}, @remote, @loopback]}]}}}}}) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x5f, 0x457e57e9, 0x15, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x20, 0x8001, 0xffffffff}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x7, 0x7f, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x7, 0x7800, 0xfffff209, 0x2928}}) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000640)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x4, 0x521, 0x1c, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x40, 0x8000, 0xf8, 0x100}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'syztnl0\x00', &(0x7f0000000740)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x20, 0x5, 0x0, @local, @mcast1, 0x10, 0x700, 0x2, 0x7}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @multicast1}, &(0x7f0000000840)=0xc) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000008c0)={'gretap0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x7800, 0x20, 0x8, 0x9, {{0x7, 0x4, 0x3, 0xf, 0x1c, 0x66, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000980)={'syztnl0\x00', &(0x7f0000000900)={'sit0\x00', 0x0, 0x29, 0x38, 0x1, 0x9, 0x31, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x700, 0x7, 0x51439d33, 0x7}}) (async) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000f80)={&(0x7f00000009c0)={0x5b4, 0x0, 0x88c3e5d413e0a406, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x1ac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r0}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9ba4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xe41}}}]}}, {{0x8, 0x1, r4}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}]}}, {{0x8, 0x1, r8}, {0x13c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x0, 0x6, 0x3, 0x2}, {0x1, 0x81, 0x3f, 0x8}]}}}]}}, {{0x8}, {0x8c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5b4}}, 0x90) (async) 09:59:29 executing program 5: mlockall(0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 2: unshare(0x600) prctl$PR_GET_KEEPCAPS(0x7) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000380)={@private, @multicast2, 0x0}, &(0x7f00000003c0)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0xd137bbee33157ca1, 0x8000, 0x5, 0xff, {{0x12, 0x4, 0x1, 0x3a, 0x48, 0x64, 0x0, 0x1, 0x2f, 0x0, @broadcast, @multicast2, {[@noop, @timestamp_addr={0x44, 0xc, 0x6e, 0x1, 0x4, [{@multicast2, 0x7fffffff}]}, @generic={0x94, 0xd, "ce33c7f179ad57eb4923e8"}, @ssrr={0x89, 0x17, 0xfc, [@multicast2, @remote, @dev={0xac, 0x14, 0x14, 0x2a}, @remote, @loopback]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x5f, 0x457e57e9, 0x15, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x20, 0x8001, 0xffffffff}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x7, 0x7f, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x7, 0x7800, 0xfffff209, 0x2928}}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000640)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x4, 0x521, 0x1c, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x40, 0x8000, 0xf8, 0x100}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'syztnl0\x00', &(0x7f0000000740)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x20, 0x5, 0x0, @local, @mcast1, 0x10, 0x700, 0x2, 0x7}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @multicast1}, &(0x7f0000000840)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000008c0)={'gretap0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x7800, 0x20, 0x8, 0x9, {{0x7, 0x4, 0x3, 0xf, 0x1c, 0x66, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000980)={'syztnl0\x00', &(0x7f0000000900)={'sit0\x00', 0x0, 0x29, 0x38, 0x1, 0x9, 0x31, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x700, 0x7, 0x51439d33, 0x7}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000f80)={&(0x7f00000009c0)={0x5b4, 0x0, 0x88c3e5d413e0a406, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x1ac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r0}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9ba4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xe41}}}]}}, {{0x8, 0x1, r4}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}]}}, {{0x8, 0x1, r8}, {0x13c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x0, 0x6, 0x3, 0x2}, {0x1, 0x81, 0x3f, 0x8}]}}}]}}, {{0x8}, {0x8c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5b4}}, 0x90) unshare(0x600) (async) prctl$PR_GET_KEEPCAPS(0x7) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0x0, 0x0) (async) prctl$PR_CAPBSET_READ(0x17, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x3, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000100)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000140), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) (async) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000380)={@private, @multicast2}, &(0x7f00000003c0)=0xc) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000480)={'syztnl1\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0xd137bbee33157ca1, 0x8000, 0x5, 0xff, {{0x12, 0x4, 0x1, 0x3a, 0x48, 0x64, 0x0, 0x1, 0x2f, 0x0, @broadcast, @multicast2, {[@noop, @timestamp_addr={0x44, 0xc, 0x6e, 0x1, 0x4, [{@multicast2, 0x7fffffff}]}, @generic={0x94, 0xd, "ce33c7f179ad57eb4923e8"}, @ssrr={0x89, 0x17, 0xfc, [@multicast2, @remote, @dev={0xac, 0x14, 0x14, 0x2a}, @remote, @loopback]}]}}}}}) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000540)={'sit0\x00', &(0x7f00000004c0)={'syztnl0\x00', 0x0, 0x4, 0x2, 0x5f, 0x457e57e9, 0x15, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x20, 0x8001, 0xffffffff}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000600)={'syztnl0\x00', &(0x7f0000000580)={'syztnl1\x00', 0x0, 0x4, 0x81, 0x7, 0x7f, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x7, 0x7800, 0xfffff209, 0x2928}}) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000640)={'syztnl2\x00', 0x0, 0x2f, 0x40, 0x4, 0x521, 0x1c, @private0={0xfc, 0x0, '\x00', 0x1}, @private0, 0x40, 0x8000, 0xf8, 0x100}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000007c0)={'syztnl0\x00', &(0x7f0000000740)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x20, 0x5, 0x0, @local, @mcast1, 0x10, 0x700, 0x2, 0x7}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000800)={0x0, @multicast1}, &(0x7f0000000840)=0xc) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000008c0)={'gretap0\x00', &(0x7f0000000880)={'syztnl2\x00', 0x0, 0x7800, 0x20, 0x8, 0x9, {{0x7, 0x4, 0x3, 0xf, 0x1c, 0x66, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010101, {[@ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000980)={'syztnl0\x00', &(0x7f0000000900)={'sit0\x00', 0x0, 0x29, 0x38, 0x1, 0x9, 0x31, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, 0x700, 0x7, 0x51439d33, 0x7}}) (async) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000fc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000f80)={&(0x7f00000009c0)={0x5b4, 0x0, 0x88c3e5d413e0a406, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x1ac, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r0}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9ba4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xe41}}}]}}, {{0x8, 0x1, r4}, {0xb8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x800}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x100}}}]}}, {{0x8, 0x1, r8}, {0x13c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x0, 0x6, 0x3, 0x2}, {0x1, 0x81, 0x3f, 0x8}]}}}]}}, {{0x8}, {0x8c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5b4}}, 0x90) (async) 09:59:29 executing program 5: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight\x00', 0x2, 0x0) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x0, 0x0, 0x400000200000000, 0x0, 0x7fe}, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000040)={[0x2]}, &(0x7f0000000080), &(0x7f0000000100)={0x0, 0x989680}, 0x8) 09:59:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x3c, @private=0xa010100, 0x4e21, 0x1, 'dh\x00', 0x10, 0x7, 0x4c}, 0x2c) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syzkaller1\x00'}) 09:59:29 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight\x00', 0x2, 0x0) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x0, 0x0, 0x400000200000000, 0x0, 0x7fe}, 0x0, 0x0, 0x0, 0x0) (async) rt_sigtimedwait(&(0x7f0000000040)={[0x2]}, &(0x7f0000000080), &(0x7f0000000100)={0x0, 0x989680}, 0x8) 09:59:29 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight\x00', 0x2, 0x0) (async) unshare(0x600) (async, rerun: 32) pselect6(0x40, &(0x7f0000000180)={0x304, 0x0, 0x0, 0x0, 0x0, 0x400000200000000, 0x0, 0x7fe}, 0x0, 0x0, 0x0, 0x0) (rerun: 32) rt_sigtimedwait(&(0x7f0000000040)={[0x2]}, &(0x7f0000000080), &(0x7f0000000100)={0x0, 0x989680}, 0x8) 09:59:29 executing program 1: mlockall(0x3) syz_clone(0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 2: getgroups(0x3, &(0x7f0000000000)=[0xee01, 0xee01, 0x0]) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 0: mlockall(0x3) syz_clone(0xf0d10d1b000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 4: syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 2: getgroups(0x3, &(0x7f0000000000)=[0xee01, 0xee01, 0x0]) (async, rerun: 64) unshare(0x600) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 5: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 2: getgroups(0x3, &(0x7f0000000000)=[0xee01, 0xee01, 0x0]) unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) getgroups(0x3, &(0x7f0000000000)=[0xee01, 0xee01, 0x0]) (async) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:29 executing program 4: syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:29 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000000)={[0x1000]}, &(0x7f0000000040), 0x8) 09:59:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x3c, @private=0xa010100, 0x4e21, 0x1, 'dh\x00', 0x10, 0x7, 0x4c}, 0x2c) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syzkaller1\x00'}) socket$inet6_udp(0xa, 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x3c, @private=0xa010100, 0x4e21, 0x1, 'dh\x00', 0x10, 0x7, 0x4c}, 0x2c) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syzkaller1\x00'}) (async) 09:59:30 executing program 2: unshare(0x600) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) rt_sigprocmask(0x2, &(0x7f0000000000)={[0x1000]}, &(0x7f0000000040), 0x8) 09:59:30 executing program 4: syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 1: mlockall(0x3) syz_clone(0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 5: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 0: mlockall(0x3) syz_clone(0xf0ff1f00000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000000)={[0x1000]}, &(0x7f0000000040), 0x8) 09:59:30 executing program 4: mlockall(0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 4: mlockall(0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000)={0x3c, @private=0xa010100, 0x4e21, 0x1, 'dh\x00', 0x10, 0x7, 0x4c}, 0x2c) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syzkaller1\x00'}) 09:59:30 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x4, 0x7f, 0x9, 0x4, 0x57, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7, 0x1, 0x4}}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000200)={[0x1000]}, &(0x7f0000000240), 0x8) bind$inet(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="94000000", @ANYRES16=r1, @ANYBLOB="00042669000000dbdf25020000000500030000000000050003006c00000014000700fc0000000000000000000000000000000500040000000000050002000200000014000900fc0100000000000000000000000000001400090000000000000000000000ffffffffffff050004000200000006000a004e20000014000900fe8000000000000000000000000000bb"], 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) 09:59:30 executing program 4: mlockall(0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x4, 0x7f, 0x9, 0x4, 0x57, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7, 0x1, 0x4}}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000200)={[0x1000]}, &(0x7f0000000240), 0x8) bind$inet(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="94000000", @ANYRES16=r1, @ANYBLOB="00042669000000dbdf25020000000500030000000000050003006c00000014000700fc0000000000000000000000000000000500040000000000050002000200000014000900fc0100000000000000000000000000001400090000000000000000000000ffffffffffff050004000200000006000a004e20000014000900fe8000000000000000000000000000bb"], 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x4, 0x7f, 0x9, 0x4, 0x57, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7, 0x1, 0x4}}) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) rt_sigprocmask(0x2, &(0x7f0000000200)={[0x1000]}, &(0x7f0000000240), 0x8) (async) bind$inet(r0, 0x0, 0x0) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="94000000", @ANYRES16=r1, @ANYBLOB="00042669000000dbdf25020000000500030000000000050003006c00000014000700fc0000000000000000000000000000000500040000000000050002000200000014000900fc0100000000000000000000000000001400090000000000000000000000ffffffffffff050004000200000006000a004e20000014000900fe8000000000000000000000000000bb"], 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) (async) 09:59:30 executing program 4: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 2: unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x4, 0x7f, 0x9, 0x4, 0x57, @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7, 0x1, 0x4}}) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000200)={[0x1000]}, &(0x7f0000000240), 0x8) (async) bind$inet(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="94000000", @ANYRES16=r1, @ANYBLOB="00042669000000dbdf25020000000500030000000000050003006c00000014000700fc0000000000000000000000000000000500040000000000050002000200000014000900fc0100000000000000000000000000001400090000000000000000000000ffffffffffff050004000200000006000a004e20000014000900fe8000000000000000000000000000bb"], 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) 09:59:30 executing program 1: mlockall(0x3) syz_clone(0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 0: mlockall(0x3) syz_clone(0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 5: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:30 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:30 executing program 2: unshare(0x600) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) pselect6(0x40, &(0x7f0000000180)={0x300, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffd, 0x3}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0xb9f) 09:59:31 executing program 4: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 2: unshare(0x600) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x2, [{}, {}]}, 0x48) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 0: mlockall(0x3) syz_clone(0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 1: mlockall(0x3) syz_clone(0x1f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 5: mlockall(0x3) syz_clone(0xf0ff1f00000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 2: unshare(0x600) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x2, [{}, {}]}, 0x48) (async, rerun: 32) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (rerun: 32) 09:59:31 executing program 2: unshare(0x600) (async, rerun: 64) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x2, [{}, {}]}, 0x48) (async, rerun: 64) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x7) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x78, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630f, 0x1}, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd={0x66642a85, 0x0, r1}, @fda={0x66646185, 0x5, 0x1, 0x4}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @increfs={0x40046304, 0x1}, @decrefs={0x40046307, 0x3}, @free_buffer={0x40086303, r3}, @release={0x40046306, 0x1}], 0x61, 0x0, &(0x7f00000001c0)="6caf7fc8e0af0cf923ee1c74ae56e274416ba3b4951c060f370fb6e82a6ddf1984716687b01fd4bba70a441eb86b99165f8466ac8064c71dabf020759bc54362c9dee397c126167501ef2da42cc6ba203c9a49293fc00848fc96a7b9f4a3aaae38"}) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 2: unshare(0x600) (async, rerun: 64) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 64) bind$inet(r0, 0x0, 0x0) (async) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) (async) r3 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x7) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x78, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630f, 0x1}, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd={0x66642a85, 0x0, r1}, @fda={0x66646185, 0x5, 0x1, 0x4}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @increfs={0x40046304, 0x1}, @decrefs={0x40046307, 0x3}, @free_buffer={0x40086303, r3}, @release={0x40046306, 0x1}], 0x61, 0x0, &(0x7f00000001c0)="6caf7fc8e0af0cf923ee1c74ae56e274416ba3b4951c060f370fb6e82a6ddf1984716687b01fd4bba70a441eb86b99165f8466ac8064c71dabf020759bc54362c9dee397c126167501ef2da42cc6ba203c9a49293fc00848fc96a7b9f4a3aaae38"}) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 2: unshare(0x600) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x7) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x78, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630f, 0x1}, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd={0x66642a85, 0x0, r1}, @fda={0x66646185, 0x5, 0x1, 0x4}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @increfs={0x40046304, 0x1}, @decrefs={0x40046307, 0x3}, @free_buffer={0x40086303, r3}, @release={0x40046306, 0x1}], 0x61, 0x0, &(0x7f00000001c0)="6caf7fc8e0af0cf923ee1c74ae56e274416ba3b4951c060f370fb6e82a6ddf1984716687b01fd4bba70a441eb86b99165f8466ac8064c71dabf020759bc54362c9dee397c126167501ef2da42cc6ba203c9a49293fc00848fc96a7b9f4a3aaae38"}) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) unshare(0x600) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r2, 0x0, 0x0) (async) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, 0xffffffffffffffff, 0x7) (async) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x78, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630f, 0x1}, @reply={0x40406301, {0x1, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd={0x66642a85, 0x0, r1}, @fda={0x66646185, 0x5, 0x1, 0x4}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @increfs={0x40046304, 0x1}, @decrefs={0x40046307, 0x3}, @free_buffer={0x40086303, r3}, @release={0x40046306, 0x1}], 0x61, 0x0, &(0x7f00000001c0)="6caf7fc8e0af0cf923ee1c74ae56e274416ba3b4951c060f370fb6e82a6ddf1984716687b01fd4bba70a441eb86b99165f8466ac8064c71dabf020759bc54362c9dee397c126167501ef2da42cc6ba203c9a49293fc00848fc96a7b9f4a3aaae38"}) (async) pselect6(0x40, &(0x7f0000000180)={0x300}, 0x0, 0x0, 0x0, 0x0) (async) 09:59:31 executing program 2: mlockall(0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0xb9f) 09:59:31 executing program 2: mlockall(0x3) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 4: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 0: mlockall(0x3) syz_clone(0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 1: mlockall(0x3) syz_clone(0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:31 executing program 5: mlockall(0x3) syz_clone(0x1f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:32 executing program 0: mlockall(0x3) syz_clone(0x1f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:32 executing program 4: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:32 executing program 1: mlockall(0x3) syz_clone(0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:32 executing program 5: mlockall(0x3) syz_clone(0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:32 executing program 2: mlockall(0x3) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:32 executing program 0: mlockall(0x3) syz_clone(0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0xb9f) socket$inet6_udp(0xa, 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0xb9f) (async) 09:59:32 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x8, 0x0, 0x0, 0x0) 09:59:32 executing program 5: mlockall(0x3) syz_clone(0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:32 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x24040400) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, 0x0) unshare(0x22000000) personality(0x40000) read$FUSE(r0, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_setattr(r2, &(0x7f0000002040)={0x38}, 0x0) 09:59:32 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x24040400) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, 0x0) unshare(0x22000000) personality(0x40000) read$FUSE(r0, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_setattr(r2, &(0x7f0000002040)={0x38}, 0x0) 09:59:32 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x24040400) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, 0x0) unshare(0x22000000) personality(0x40000) read$FUSE(r0, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) sched_setattr(r2, &(0x7f0000002040)={0x38}, 0x0) 09:59:33 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x24040400) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, 0x0) unshare(0x22000000) personality(0x40000) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 09:59:33 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x24040400) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, 0x0) unshare(0x22000000) personality(0x40000) 09:59:33 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x24040400) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, 0x0) unshare(0x22000000) 09:59:33 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x24040400) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) unshare(0x22000000) 09:59:33 executing program 2: mlockall(0x3) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:33 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x24040400) unshare(0x22000000) 09:59:33 executing program 3: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x28}, 0x4) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) r0 = socket(0x1f, 0xc, 0x8dbb) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @multicast1}, &(0x7f0000000080)=0xc) 09:59:33 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x10, 0x0, 0x0, 0x0) 09:59:33 executing program 0: mlockall(0x3) syz_clone(0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:33 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x22000000) 09:59:33 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002180), 0x100, 0x0) openat$cgroup_pressure(r2, &(0x7f00000021c0)='io.pressure\x00', 0x2, 0x0) sched_setattr(r1, &(0x7f0000002040)={0x38}, 0x0) r3 = getpgid(0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r2, 0x4068aea3, &(0x7f0000002240)) openat$cgroup_subtree(r2, &(0x7f0000002200), 0x2, 0x0) r4 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x0, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000022c0)={0x0}, &(0x7f00000020c0)=0xc) sched_setattr(r5, &(0x7f0000002140)={0x38, 0x3, 0x46, 0x0, 0x7, 0x6, 0x3, 0x5b, 0x3, 0x80000001}, 0x0) ptrace$getenv(0x4201, r3, 0x2, &(0x7f0000002080)) 09:59:33 executing program 2: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:33 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 09:59:33 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:33 executing program 3: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x28}, 0x4) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) r0 = socket(0x1f, 0xc, 0x8dbb) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @multicast1}, &(0x7f0000000080)=0xc) 09:59:33 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x22000000) 09:59:33 executing program 3: setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000)={0x28}, 0x4) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) (async) r0 = socket(0x1f, 0xc, 0x8dbb) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @multicast1}, &(0x7f0000000080)=0xc) 09:59:33 executing program 4: openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x22000000) 09:59:33 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2797.658379][T26379] FAULT_INJECTION: forcing a failure. [ 2797.658379][T26379] name failslab, interval 1, probability 0, space 0, times 0 [ 2797.671024][T26379] CPU: 0 PID: 26379 Comm: syz-executor.5 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2797.681237][T26379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2797.691279][T26379] Call Trace: [ 2797.694565][T26379] dump_stack+0x18e/0x1d5 [ 2797.698885][T26379] should_fail+0x604/0x770 [ 2797.703290][T26379] ? dup_task_struct+0x4f/0x5a0 [ 2797.708122][T26379] should_failslab+0x5/0x20 [ 2797.712613][T26379] kmem_cache_alloc+0x24/0x210 [ 2797.717367][T26379] dup_task_struct+0x4f/0x5a0 [ 2797.722032][T26379] copy_process+0x4c3/0x3220 [ 2797.726606][T26379] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2797.732749][T26379] ? proc_fail_nth_read+0x150/0x150 [ 2797.737926][T26379] ? proc_fail_nth_write+0x157/0x1c0 [ 2797.743179][T26379] ? fsnotify+0x10fc/0x11b0 [ 2797.747655][T26379] _do_fork+0x142/0x730 [ 2797.751783][T26379] __x64_sys_clone+0x213/0x260 [ 2797.756519][T26379] do_syscall_64+0xcb/0x1c0 [ 2797.760995][T26379] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2797.766857][T26379] RIP: 0033:0x7f2c718be0e9 [ 2797.771238][T26379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2797.790829][T26379] RSP: 002b:00007f2c70a13118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2797.799208][T26379] RAX: ffffffffffffffda RBX: 00007f2c719d1030 RCX: 00007f2c718be0e9 09:59:34 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x11, 0x0, 0x0, 0x0) 09:59:34 executing program 4: unshare(0x24040400) unshare(0x22000000) 09:59:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000080)={0x1, 0x29, 0x3}, 0xc) bind$inet(r2, 0x0, 0x0) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0x0, r1, {0x388}}, 0x18) socket$inet(0x2, 0x2, 0x201) 09:59:34 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:34 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x8, 0x0, 0x0, 0x0) [ 2797.807151][T26379] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2797.815088][T26379] RBP: 00007f2c70a131d0 R08: 0000000000000000 R09: 0000000000000000 [ 2797.823025][T26379] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2797.830962][T26379] R13: 00007ffec66a149f R14: 00007f2c70a13300 R15: 0000000000022000 09:59:34 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 09:59:34 executing program 4: unshare(0x0) unshare(0x22000000) 09:59:34 executing program 2: mlockall(0x3) syz_clone(0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:34 executing program 4: unshare(0x0) unshare(0x22000000) 09:59:34 executing program 4: unshare(0x0) unshare(0x22000000) 09:59:34 executing program 4: unshare(0x24040400) unshare(0x0) 09:59:34 executing program 4: unshare(0x24040400) unshare(0x0) [ 2798.188909][T26410] FAULT_INJECTION: forcing a failure. [ 2798.188909][T26410] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2798.203836][T26410] CPU: 0 PID: 26410 Comm: syz-executor.5 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2798.214070][T26410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2798.224110][T26410] Call Trace: [ 2798.227388][T26410] dump_stack+0x18e/0x1d5 [ 2798.231709][T26410] should_fail+0x604/0x770 [ 2798.236119][T26410] __alloc_pages_nodemask+0x12a/0x6f0 [ 2798.241483][T26410] dup_task_struct+0x85/0x5a0 [ 2798.246149][T26410] copy_process+0x4c3/0x3220 [ 2798.250730][T26410] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2798.256879][T26410] ? proc_fail_nth_read+0x150/0x150 [ 2798.262066][T26410] ? proc_fail_nth_write+0x157/0x1c0 [ 2798.267337][T26410] ? fsnotify+0x10fc/0x11b0 [ 2798.271823][T26410] _do_fork+0x142/0x730 [ 2798.275965][T26410] __x64_sys_clone+0x213/0x260 [ 2798.280711][T26410] do_syscall_64+0xcb/0x1c0 [ 2798.285195][T26410] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2798.291067][T26410] RIP: 0033:0x7f2c718be0e9 [ 2798.295463][T26410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2798.315067][T26410] RSP: 002b:00007f2c70a13118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2798.323449][T26410] RAX: ffffffffffffffda RBX: 00007f2c719d1030 RCX: 00007f2c718be0e9 [ 2798.331404][T26410] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 09:59:34 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1100, 0x0, 0x0, 0x0) 09:59:34 executing program 4: unshare(0x24040400) unshare(0x0) [ 2798.339355][T26410] RBP: 00007f2c70a131d0 R08: 0000000000000000 R09: 0000000000000000 [ 2798.347295][T26410] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2798.355233][T26410] R13: 00007ffec66a149f R14: 00007f2c70a13300 R15: 0000000000022000 09:59:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000080)={0x1, 0x29, 0x3}, 0xc) bind$inet(r2, 0x0, 0x0) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0x0, r1, {0x388}}, 0x18) socket$inet(0x2, 0x2, 0x201) 09:59:34 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x10, 0x0, 0x0, 0x0) 09:59:34 executing program 2: mlockall(0x3) syz_clone(0x0, 0x0, 0x8, 0x0, 0x0, 0x0) 09:59:34 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:34 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 09:59:34 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1f00, 0x0, 0x0, 0x0) 09:59:34 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:35 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:35 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:35 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:35 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:35 executing program 4: mlockall(0x3) syz_clone(0x0, 0x0, 0x1100, 0x0, 0x0, 0x0) [ 2799.006018][T26452] FAULT_INJECTION: forcing a failure. [ 2799.006018][T26452] name failslab, interval 1, probability 0, space 0, times 0 [ 2799.038367][T26452] CPU: 1 PID: 26452 Comm: syz-executor.5 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2799.048612][T26452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2799.058655][T26452] Call Trace: [ 2799.061942][T26452] dump_stack+0x18e/0x1d5 [ 2799.066264][T26452] should_fail+0x604/0x770 [ 2799.070670][T26452] ? prepare_creds+0x29/0x370 [ 2799.075338][T26452] should_failslab+0x5/0x20 [ 2799.079825][T26452] kmem_cache_alloc+0x24/0x210 [ 2799.084572][T26452] prepare_creds+0x29/0x370 [ 2799.089057][T26452] copy_creds+0xd9/0x450 [ 2799.093286][T26452] copy_process+0x7d5/0x3220 [ 2799.097858][T26452] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2799.103996][T26452] ? proc_fail_nth_read+0x150/0x150 [ 2799.109177][T26452] ? proc_fail_nth_write+0x157/0x1c0 [ 2799.114451][T26452] ? fsnotify+0x10fc/0x11b0 [ 2799.118940][T26452] _do_fork+0x142/0x730 [ 2799.123084][T26452] __x64_sys_clone+0x213/0x260 [ 2799.127835][T26452] do_syscall_64+0xcb/0x1c0 [ 2799.132323][T26452] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2799.138201][T26452] RIP: 0033:0x7f2c718be0e9 [ 2799.142599][T26452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2799.162186][T26452] RSP: 002b:00007f2c70a13118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2799.170583][T26452] RAX: ffffffffffffffda RBX: 00007f2c719d1030 RCX: 00007f2c718be0e9 [ 2799.178540][T26452] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2799.186496][T26452] RBP: 00007f2c70a131d0 R08: 0000000000000000 R09: 0000000000000000 [ 2799.194454][T26452] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2799.202412][T26452] R13: 00007ffec66a149f R14: 00007f2c70a13300 R15: 0000000000022000 09:59:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r3, 0x0, 0x48a, &(0x7f0000000080)={0x1, 0x29, 0x3}, 0xc) bind$inet(r2, 0x0, 0x0) (async) write$FUSE_POLL(r2, &(0x7f0000000000)={0x18, 0x0, r1, {0x388}}, 0x18) socket$inet(0x2, 0x2, 0x201) 09:59:35 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x11, 0x0, 0x0, 0x0) 09:59:35 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x4000, 0x0, 0x0, 0x0) 09:59:35 executing program 2: mlockall(0x3) syz_clone(0x0, 0x0, 0x1f00, 0x0, 0x0, 0x0) 09:59:35 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 09:59:35 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) [ 2799.554783][T26467] FAULT_INJECTION: forcing a failure. [ 2799.554783][T26467] name failslab, interval 1, probability 0, space 0, times 0 [ 2799.594646][T26467] CPU: 0 PID: 26467 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2799.604984][T26467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2799.615021][T26467] Call Trace: [ 2799.618303][T26467] dump_stack+0x18e/0x1d5 [ 2799.622621][T26467] should_fail+0x604/0x770 [ 2799.627024][T26467] ? dup_task_struct+0x4f/0x5a0 [ 2799.631859][T26467] should_failslab+0x5/0x20 [ 2799.636347][T26467] kmem_cache_alloc+0x24/0x210 [ 2799.641094][T26467] dup_task_struct+0x4f/0x5a0 [ 2799.645753][T26467] copy_process+0x4c3/0x3220 [ 2799.650323][T26467] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2799.656461][T26467] ? proc_fail_nth_read+0x150/0x150 [ 2799.661639][T26467] ? proc_fail_nth_write+0x157/0x1c0 [ 2799.666904][T26467] ? fsnotify+0x10fc/0x11b0 [ 2799.671396][T26467] _do_fork+0x142/0x730 [ 2799.675536][T26467] __x64_sys_clone+0x213/0x260 [ 2799.680282][T26467] do_syscall_64+0xcb/0x1c0 [ 2799.684767][T26467] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2799.690637][T26467] RIP: 0033:0x7f94bd2630e9 [ 2799.695034][T26467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2799.714615][T26467] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2799.723005][T26467] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2799.730963][T26467] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2799.738922][T26467] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2799.746880][T26467] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2799.754835][T26467] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 09:59:36 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x20010, 0x0, 0x0, 0x0) 09:59:36 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x1100, 0x0, 0x0, 0x0) [ 2799.937974][T26476] FAULT_INJECTION: forcing a failure. [ 2799.937974][T26476] name failslab, interval 1, probability 0, space 0, times 0 [ 2799.965819][T26476] CPU: 1 PID: 26476 Comm: syz-executor.5 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2799.976058][T26476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2799.986106][T26476] Call Trace: [ 2799.989389][T26476] dump_stack+0x18e/0x1d5 [ 2799.993710][T26476] should_fail+0x604/0x770 [ 2799.998114][T26476] ? security_prepare_creds+0x48/0x140 [ 2800.003557][T26476] should_failslab+0x5/0x20 [ 2800.008041][T26476] __kmalloc+0x51/0x2b0 [ 2800.012183][T26476] security_prepare_creds+0x48/0x140 [ 2800.017449][T26476] prepare_creds+0x27b/0x370 [ 2800.022018][T26476] copy_creds+0xd9/0x450 [ 2800.026253][T26476] copy_process+0x7d5/0x3220 [ 2800.030827][T26476] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2800.036964][T26476] ? proc_fail_nth_read+0x150/0x150 [ 2800.042144][T26476] ? proc_fail_nth_write+0x157/0x1c0 [ 2800.047415][T26476] ? fsnotify+0x10fc/0x11b0 [ 2800.051901][T26476] _do_fork+0x142/0x730 [ 2800.056043][T26476] __x64_sys_clone+0x213/0x260 [ 2800.060795][T26476] do_syscall_64+0xcb/0x1c0 [ 2800.065280][T26476] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2800.071156][T26476] RIP: 0033:0x7f2c718be0e9 [ 2800.075553][T26476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2800.095138][T26476] RSP: 002b:00007f2c70a13118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2800.103531][T26476] RAX: ffffffffffffffda RBX: 00007f2c719d1030 RCX: 00007f2c718be0e9 [ 2800.111484][T26476] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2800.119438][T26476] RBP: 00007f2c70a131d0 R08: 0000000000000000 R09: 0000000000000000 [ 2800.127393][T26476] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 09:59:36 executing program 2: mlockall(0x3) syz_clone(0x0, 0x0, 0x4000, 0x0, 0x0, 0x0) 09:59:36 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) [ 2800.135347][T26476] R13: 00007ffec66a149f R14: 00007f2c70a13300 R15: 0000000000022000 [ 2800.164449][T26483] FAULT_INJECTION: forcing a failure. [ 2800.164449][T26483] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2800.189713][T26483] CPU: 1 PID: 26483 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2800.199946][T26483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2800.209983][T26483] Call Trace: [ 2800.213265][T26483] dump_stack+0x18e/0x1d5 [ 2800.217581][T26483] should_fail+0x604/0x770 [ 2800.221985][T26483] __alloc_pages_nodemask+0x12a/0x6f0 [ 2800.227343][T26483] dup_task_struct+0x85/0x5a0 [ 2800.232005][T26483] copy_process+0x4c3/0x3220 [ 2800.236577][T26483] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2800.242716][T26483] ? proc_fail_nth_read+0x150/0x150 [ 2800.247901][T26483] ? proc_fail_nth_write+0x157/0x1c0 [ 2800.253169][T26483] ? fsnotify+0x10fc/0x11b0 [ 2800.257659][T26483] _do_fork+0x142/0x730 [ 2800.261802][T26483] __x64_sys_clone+0x213/0x260 [ 2800.266553][T26483] do_syscall_64+0xcb/0x1c0 [ 2800.271042][T26483] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2800.276923][T26483] RIP: 0033:0x7f94bd2630e9 [ 2800.281323][T26483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2800.300909][T26483] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 09:59:36 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x1f00, 0x0, 0x0, 0x0) 09:59:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) r3 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x0, 0x0) write$FUSE_LK(r1, &(0x7f0000000000)={0x28, 0xfffffffffffffffe, r2, {{0x5, 0x9fc, 0x2, r3}}}, 0x28) r4 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x0, 0x0) sched_setattr(r4, &(0x7f0000000040)={0x38, 0x5, 0x10, 0x80, 0x400, 0x7, 0x6, 0x100, 0x7e, 0x34}, 0x0) [ 2800.309305][T26483] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2800.317255][T26483] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2800.325217][T26483] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2800.333172][T26483] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2800.341128][T26483] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 09:59:36 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) 09:59:36 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) [ 2800.474457][T26497] FAULT_INJECTION: forcing a failure. [ 2800.474457][T26497] name failslab, interval 1, probability 0, space 0, times 0 [ 2800.512572][T26497] CPU: 0 PID: 26497 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2800.522814][T26497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2800.532851][T26497] Call Trace: [ 2800.536127][T26497] dump_stack+0x18e/0x1d5 [ 2800.540445][T26497] should_fail+0x604/0x770 [ 2800.544848][T26497] ? prepare_creds+0x29/0x370 [ 2800.549511][T26497] should_failslab+0x5/0x20 [ 2800.554001][T26497] kmem_cache_alloc+0x24/0x210 [ 2800.558760][T26497] prepare_creds+0x29/0x370 [ 2800.563245][T26497] copy_creds+0xd9/0x450 [ 2800.567474][T26497] copy_process+0x7d5/0x3220 [ 2800.572045][T26497] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2800.578186][T26497] ? proc_fail_nth_read+0x150/0x150 [ 2800.583366][T26497] ? proc_fail_nth_write+0x157/0x1c0 [ 2800.588635][T26497] ? fsnotify+0x10fc/0x11b0 [ 2800.593124][T26497] _do_fork+0x142/0x730 [ 2800.597263][T26497] __x64_sys_clone+0x213/0x260 [ 2800.602013][T26497] do_syscall_64+0xcb/0x1c0 [ 2800.606500][T26497] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2800.612382][T26497] RIP: 0033:0x7f94bd2630e9 [ 2800.616778][T26497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2800.636362][T26497] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2800.644755][T26497] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2800.652709][T26497] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2800.660665][T26497] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 09:59:36 executing program 2: unshare(0x24040400) unshare(0x22000000) (fail_nth: 1) 09:59:36 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x20200, 0x0, 0x0, 0x0) [ 2800.668616][T26497] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2800.676571][T26497] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2800.688950][T26496] FAULT_INJECTION: forcing a failure. [ 2800.688950][T26496] name failslab, interval 1, probability 0, space 0, times 0 [ 2800.690374][T26500] FAULT_INJECTION: forcing a failure. [ 2800.690374][T26500] name failslab, interval 1, probability 0, space 0, times 0 [ 2800.715834][T26496] CPU: 1 PID: 26496 Comm: syz-executor.5 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2800.726057][T26496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2800.736086][T26496] Call Trace: [ 2800.739359][T26496] dump_stack+0x18e/0x1d5 [ 2800.743668][T26496] should_fail+0x604/0x770 [ 2800.748063][T26496] ? __delayacct_tsk_init+0x28/0x90 [ 2800.753233][T26496] should_failslab+0x5/0x20 [ 2800.757720][T26496] kmem_cache_alloc+0x24/0x210 [ 2800.762467][T26496] __delayacct_tsk_init+0x28/0x90 [ 2800.767469][T26496] copy_process+0x87d/0x3220 [ 2800.772035][T26496] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2800.778173][T26496] ? proc_fail_nth_write+0x157/0x1c0 [ 2800.783445][T26496] ? fsnotify+0x10fc/0x11b0 [ 2800.787927][T26496] _do_fork+0x142/0x730 [ 2800.792060][T26496] __x64_sys_clone+0x213/0x260 [ 2800.796802][T26496] do_syscall_64+0xcb/0x1c0 [ 2800.801282][T26496] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2800.807146][T26496] RIP: 0033:0x7f2c718be0e9 [ 2800.811535][T26496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2800.831114][T26496] RSP: 002b:00007f2c70a34118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2800.839502][T26496] RAX: ffffffffffffffda RBX: 00007f2c719d0f60 RCX: 00007f2c718be0e9 [ 2800.847449][T26496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2800.855399][T26496] RBP: 00007f2c70a341d0 R08: 0000000000000000 R09: 0000000000000000 [ 2800.863354][T26496] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2800.871300][T26496] R13: 00007ffec66a149f R14: 00007f2c70a34300 R15: 0000000000022000 [ 2800.879254][T26500] CPU: 0 PID: 26500 Comm: syz-executor.2 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2800.889477][T26500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2800.899514][T26500] Call Trace: [ 2800.902801][T26500] dump_stack+0x18e/0x1d5 [ 2800.907123][T26500] should_fail+0x604/0x770 [ 2800.911530][T26500] ? create_new_namespaces+0x34/0x5e0 [ 2800.916882][T26500] should_failslab+0x5/0x20 [ 2800.921368][T26500] kmem_cache_alloc+0x24/0x210 [ 2800.926115][T26500] create_new_namespaces+0x34/0x5e0 [ 2800.931294][T26500] ? security_capable+0xb1/0xd0 [ 2800.936126][T26500] unshare_nsproxy_namespaces+0x11e/0x180 [ 2800.941828][T26500] ksys_unshare+0x484/0x890 [ 2800.946318][T26500] __x64_sys_unshare+0x34/0x40 [ 2800.951061][T26500] do_syscall_64+0xcb/0x1c0 [ 2800.955546][T26500] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2800.961418][T26500] RIP: 0033:0x7fab9e81f0e9 [ 2800.965817][T26500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2800.985401][T26500] RSP: 002b:00007fab9d995168 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 2800.993797][T26500] RAX: ffffffffffffffda RBX: 00007fab9e931f60 RCX: 00007fab9e81f0e9 [ 2801.001752][T26500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022000000 [ 2801.009707][T26500] RBP: 00007fab9d9951d0 R08: 0000000000000000 R09: 0000000000000000 [ 2801.017661][T26500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 09:59:37 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x4000, 0x0, 0x0, 0x0) 09:59:37 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 09:59:37 executing program 2: unshare(0x24040400) unshare(0x22000000) (fail_nth: 2) [ 2801.025617][T26500] R13: 00007fff0b404b9f R14: 00007fab9d995300 R15: 0000000000022000 [ 2801.055989][T26508] FAULT_INJECTION: forcing a failure. [ 2801.055989][T26508] name failslab, interval 1, probability 0, space 0, times 0 [ 2801.069152][T26508] CPU: 0 PID: 26508 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2801.079378][T26508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2801.089419][T26508] Call Trace: [ 2801.092701][T26508] dump_stack+0x18e/0x1d5 [ 2801.097025][T26508] should_fail+0x604/0x770 [ 2801.101433][T26508] ? security_prepare_creds+0x48/0x140 [ 2801.106880][T26508] should_failslab+0x5/0x20 [ 2801.111371][T26508] __kmalloc+0x51/0x2b0 [ 2801.115514][T26508] security_prepare_creds+0x48/0x140 [ 2801.120780][T26508] prepare_creds+0x27b/0x370 [ 2801.125359][T26508] copy_creds+0xd9/0x450 [ 2801.129590][T26508] copy_process+0x7d5/0x3220 [ 2801.134162][T26508] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2801.140301][T26508] ? proc_fail_nth_read+0x150/0x150 [ 2801.145480][T26508] ? proc_fail_nth_write+0x157/0x1c0 [ 2801.150747][T26508] ? fsnotify+0x10fc/0x11b0 [ 2801.155243][T26508] _do_fork+0x142/0x730 [ 2801.159393][T26508] __x64_sys_clone+0x213/0x260 [ 2801.164140][T26508] do_syscall_64+0xcb/0x1c0 [ 2801.168628][T26508] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2801.174506][T26508] RIP: 0033:0x7f94bd2630e9 [ 2801.178902][T26508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2801.198486][T26508] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2801.206881][T26508] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2801.214833][T26508] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 09:59:37 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x20010, 0x0, 0x0, 0x0) 09:59:37 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) (async) r3 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x0, 0x0) (async) write$FUSE_LK(r1, &(0x7f0000000000)={0x28, 0xfffffffffffffffe, r2, {{0x5, 0x9fc, 0x2, r3}}}, 0x28) r4 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x0, 0x0) (async) sched_setattr(r4, &(0x7f0000000040)={0x38, 0x5, 0x10, 0x80, 0x400, 0x7, 0x6, 0x100, 0x7e, 0x34}, 0x0) 09:59:37 executing program 2: unshare(0x24040400) unshare(0x22000000) 09:59:37 executing program 2: unshare(0x24040400) unshare(0x22004000) [ 2801.222789][T26508] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2801.230752][T26508] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2801.238704][T26508] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 09:59:37 executing program 2: unshare(0x24040400) 09:59:37 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) 09:59:37 executing program 2: unshare(0x24040400) 09:59:37 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x80000, 0x0, 0x0, 0x0) 09:59:37 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) 09:59:37 executing program 2: unshare(0x24040400) [ 2801.414789][T26535] FAULT_INJECTION: forcing a failure. [ 2801.414789][T26535] name failslab, interval 1, probability 0, space 0, times 0 [ 2801.431648][T26535] CPU: 0 PID: 26535 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2801.441880][T26535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2801.451922][T26535] Call Trace: [ 2801.455199][T26535] dump_stack+0x18e/0x1d5 [ 2801.459516][T26535] should_fail+0x604/0x770 09:59:37 executing program 2: unshare(0x40e00) unshare(0x22000000) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) [ 2801.463920][T26535] ? create_user_ns+0x4cb/0x1570 [ 2801.468853][T26535] should_failslab+0x5/0x20 [ 2801.473342][T26535] kmem_cache_alloc+0x24/0x210 [ 2801.478096][T26535] create_user_ns+0x4cb/0x1570 [ 2801.482843][T26535] copy_creds+0x219/0x450 [ 2801.487154][T26535] copy_process+0x7d5/0x3220 [ 2801.491727][T26535] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2801.497864][T26535] ? proc_fail_nth_read+0x150/0x150 [ 2801.503046][T26535] ? proc_fail_nth_write+0x157/0x1c0 [ 2801.508319][T26535] ? fsnotify+0x10fc/0x11b0 [ 2801.512807][T26535] _do_fork+0x142/0x730 [ 2801.516950][T26535] __x64_sys_clone+0x213/0x260 [ 2801.521704][T26535] do_syscall_64+0xcb/0x1c0 [ 2801.526193][T26535] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2801.532062][T26535] RIP: 0033:0x7f94bd2630e9 [ 2801.536463][T26535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2801.556049][T26535] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 09:59:37 executing program 2: unshare(0x40e00) unshare(0x22000000) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) unshare(0x40e00) (async) unshare(0x22000000) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) (async) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) (async) [ 2801.564449][T26535] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2801.572402][T26535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2801.580358][T26535] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2801.588315][T26535] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2801.596270][T26535] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2801.647403][T26550] FAULT_INJECTION: forcing a failure. [ 2801.647403][T26550] name failslab, interval 1, probability 0, space 0, times 0 [ 2801.677050][T26550] CPU: 0 PID: 26550 Comm: syz-executor.5 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2801.687282][T26550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 09:59:37 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x20200, 0x0, 0x0, 0x0) [ 2801.697324][T26550] Call Trace: [ 2801.700602][T26550] dump_stack+0x18e/0x1d5 [ 2801.704920][T26550] should_fail+0x604/0x770 [ 2801.709328][T26550] ? dup_fd+0x6c/0xa30 [ 2801.713380][T26550] should_failslab+0x5/0x20 [ 2801.717868][T26550] kmem_cache_alloc+0x24/0x210 [ 2801.722614][T26550] dup_fd+0x6c/0xa30 [ 2801.726496][T26550] ? avc_has_perm+0x7c/0x1c0 [ 2801.731067][T26550] ? avc_has_perm+0xfd/0x1c0 [ 2801.735644][T26550] copy_files+0xa6/0x1a0 [ 2801.739876][T26550] copy_process+0xfa2/0x3220 [ 2801.744451][T26550] ? proc_fail_nth_write+0x157/0x1c0 [ 2801.749725][T26550] _do_fork+0x142/0x730 [ 2801.753866][T26550] __x64_sys_clone+0x213/0x260 [ 2801.758616][T26550] do_syscall_64+0xcb/0x1c0 [ 2801.763103][T26550] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2801.768975][T26550] RIP: 0033:0x7f2c718be0e9 [ 2801.773372][T26550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2801.792959][T26550] RSP: 002b:00007f2c70a13118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2801.801358][T26550] RAX: ffffffffffffffda RBX: 00007f2c719d1030 RCX: 00007f2c718be0e9 [ 2801.809313][T26550] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2801.817265][T26550] RBP: 00007f2c70a131d0 R08: 0000000000000000 R09: 0000000000000000 [ 2801.825215][T26550] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2801.833169][T26550] R13: 00007ffec66a149f R14: 00007f2c70a13300 R15: 0000000000022000 09:59:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) r3 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x0, 0x0) write$FUSE_LK(r1, &(0x7f0000000000)={0x28, 0xfffffffffffffffe, r2, {{0x5, 0x9fc, 0x2, r3}}}, 0x28) r4 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x0, 0x0) sched_setattr(r4, &(0x7f0000000040)={0x38, 0x5, 0x10, 0x80, 0x400, 0x7, 0x6, 0x100, 0x7e, 0x34}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020}, 0x2020) (async) getpgid(0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x0, 0x0) (async) write$FUSE_LK(r1, &(0x7f0000000000)={0x28, 0xfffffffffffffffe, r2, {{0x5, 0x9fc, 0x2, r3}}}, 0x28) (async) getpgid(0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x0, 0x0) (async) sched_setattr(r4, &(0x7f0000000040)={0x38, 0x5, 0x10, 0x80, 0x400, 0x7, 0x6, 0x100, 0x7e, 0x34}, 0x0) (async) 09:59:38 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) 09:59:38 executing program 2: unshare(0x40e00) unshare(0x22000000) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) unshare(0x40e00) (async) unshare(0x22000000) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.dequeue\x00', 0x0, 0x0) (async) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) (async) 09:59:38 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x101000, 0x0, 0x0, 0x0) 09:59:38 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) 09:59:38 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x80000, 0x0, 0x0, 0x0) 09:59:38 executing program 2: unshare(0x24040500) unshare(0x22000000) 09:59:38 executing program 2: unshare(0x24040500) unshare(0x22000000) [ 2802.117051][T26569] FAULT_INJECTION: forcing a failure. [ 2802.117051][T26569] name failslab, interval 1, probability 0, space 0, times 0 [ 2802.166193][T26569] CPU: 0 PID: 26569 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2802.176434][T26569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.186471][T26569] Call Trace: [ 2802.189754][T26569] dump_stack+0x18e/0x1d5 [ 2802.194074][T26569] should_fail+0x604/0x770 [ 2802.198477][T26569] ? setup_userns_sysctls+0x50/0x270 [ 2802.203749][T26569] should_failslab+0x5/0x20 [ 2802.208240][T26569] __kmalloc_track_caller+0x4f/0x280 [ 2802.213512][T26569] kmemdup+0x21/0x50 [ 2802.217392][T26569] setup_userns_sysctls+0x50/0x270 [ 2802.222486][T26569] create_user_ns+0xc0f/0x1570 [ 2802.227237][T26569] copy_creds+0x219/0x450 [ 2802.231552][T26569] copy_process+0x7d5/0x3220 [ 2802.236124][T26569] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2802.242264][T26569] ? proc_fail_nth_read+0x150/0x150 [ 2802.247447][T26569] ? proc_fail_nth_write+0x157/0x1c0 [ 2802.252716][T26569] ? fsnotify+0x10fc/0x11b0 [ 2802.257206][T26569] _do_fork+0x142/0x730 [ 2802.261347][T26569] ? __x64_sys_clone+0x1ed/0x260 [ 2802.266273][T26569] ? __x64_sys_clone+0x209/0x260 [ 2802.271194][T26569] __x64_sys_clone+0x213/0x260 [ 2802.275941][T26569] do_syscall_64+0xcb/0x1c0 [ 2802.280428][T26569] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2802.286299][T26569] RIP: 0033:0x7f94bd2630e9 [ 2802.290696][T26569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 09:59:38 executing program 2: unshare(0x24040500) unshare(0x22000000) unshare(0x24040500) (async) unshare(0x22000000) (async) [ 2802.310280][T26569] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2802.318671][T26569] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2802.326621][T26569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2802.334575][T26569] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2802.342528][T26569] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2802.350482][T26569] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2802.361109][T26587] FAULT_INJECTION: forcing a failure. 09:59:38 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2031) 09:59:38 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) 09:59:38 executing program 2: unshare(0x24040400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @loopback}, &(0x7f0000000080)=0xc) unshare(0x22000000) [ 2802.361109][T26587] name failslab, interval 1, probability 0, space 0, times 0 [ 2802.401398][T26587] CPU: 1 PID: 26587 Comm: syz-executor.5 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 09:59:38 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) 09:59:38 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9) [ 2802.411644][T26587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.411648][T26587] Call Trace: [ 2802.411666][T26587] dump_stack+0x18e/0x1d5 09:59:38 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) [ 2802.411679][T26587] should_fail+0x604/0x770 [ 2802.411690][T26587] ? alloc_fdtable+0x93/0x260 [ 2802.411698][T26587] should_failslab+0x5/0x20 [ 2802.411710][T26587] kmem_cache_alloc_trace+0x28/0x240 09:59:38 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) [ 2802.411719][T26587] alloc_fdtable+0x93/0x260 [ 2802.411727][T26587] ? _raw_spin_lock+0x6c/0x170 [ 2802.411736][T26587] dup_fd+0x6f8/0xa30 [ 2802.411749][T26587] copy_files+0xa6/0x1a0 [ 2802.411759][T26587] copy_process+0xfa2/0x3220 [ 2802.411771][T26587] ? proc_fail_nth_write+0x157/0x1c0 [ 2802.411783][T26587] _do_fork+0x142/0x730 [ 2802.411794][T26587] __x64_sys_clone+0x213/0x260 [ 2802.411805][T26587] do_syscall_64+0xcb/0x1c0 [ 2802.411815][T26587] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2802.411823][T26587] RIP: 0033:0x7f2c718be0e9 [ 2802.411832][T26587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2802.411836][T26587] RSP: 002b:00007f2c70a13118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 09:59:38 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) 09:59:38 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11) 09:59:38 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x101000, 0x0, 0x0, 0x0) 09:59:38 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12) [ 2802.411845][T26587] RAX: ffffffffffffffda RBX: 00007f2c719d1030 RCX: 00007f2c718be0e9 [ 2802.411850][T26587] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2802.411855][T26587] RBP: 00007f2c70a131d0 R08: 0000000000000000 R09: 0000000000000000 [ 2802.411860][T26587] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2802.411865][T26587] R13: 00007ffec66a149f R14: 00007f2c70a13300 R15: 0000000000022000 [ 2802.412340][T26596] FAULT_INJECTION: forcing a failure. [ 2802.412340][T26596] name failslab, interval 1, probability 0, space 0, times 0 [ 2802.412351][T26596] CPU: 1 PID: 26596 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2802.412356][T26596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.412358][T26596] Call Trace: [ 2802.412370][T26596] dump_stack+0x18e/0x1d5 [ 2802.412391][T26596] should_fail+0x604/0x770 [ 2802.412402][T26596] ? __register_sysctl_table+0xe7/0x11c0 [ 2802.412409][T26596] should_failslab+0x5/0x20 [ 2802.412418][T26596] __kmalloc+0x51/0x2b0 [ 2802.412432][T26596] __register_sysctl_table+0xe7/0x11c0 [ 2802.412444][T26596] ? memcpy+0x38/0x50 [ 2802.412456][T26596] setup_userns_sysctls+0x1e1/0x270 09:59:39 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2031) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2031) (async) [ 2802.412469][T26596] create_user_ns+0xc0f/0x1570 [ 2802.412479][T26596] copy_creds+0x219/0x450 [ 2802.412491][T26596] copy_process+0x7d5/0x3220 [ 2802.412501][T26596] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2802.412514][T26596] ? proc_fail_nth_read+0x150/0x150 [ 2802.412525][T26596] ? proc_fail_nth_write+0x157/0x1c0 [ 2802.412536][T26596] ? fsnotify+0x10fc/0x11b0 [ 2802.412548][T26596] _do_fork+0x142/0x730 [ 2802.412559][T26596] __x64_sys_clone+0x213/0x260 [ 2802.412570][T26596] do_syscall_64+0xcb/0x1c0 [ 2802.412581][T26596] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2802.412590][T26596] RIP: 0033:0x7f94bd2630e9 [ 2802.412600][T26596] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2802.412608][T26596] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2802.412620][T26596] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2802.412623][T26596] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2802.412627][T26596] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2802.412630][T26596] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2802.412634][T26596] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2802.447993][T26600] FAULT_INJECTION: forcing a failure. [ 2802.447993][T26600] name failslab, interval 1, probability 0, space 0, times 0 [ 2802.448006][T26600] CPU: 0 PID: 26600 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2802.448011][T26600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.448014][T26600] Call Trace: [ 2802.448029][T26600] dump_stack+0x18e/0x1d5 [ 2802.448041][T26600] should_fail+0x604/0x770 [ 2802.448054][T26600] ? __register_sysctl_table+0x957/0x11c0 [ 2802.448062][T26600] should_failslab+0x5/0x20 [ 2802.448072][T26600] __kmalloc+0x51/0x2b0 [ 2802.448081][T26600] ? _raw_spin_lock+0x6c/0x170 [ 2802.448091][T26600] __register_sysctl_table+0x957/0x11c0 [ 2802.448100][T26600] ? memcpy+0x38/0x50 [ 2802.448111][T26600] setup_userns_sysctls+0x1e1/0x270 [ 2802.448121][T26600] create_user_ns+0xc0f/0x1570 [ 2802.448131][T26600] copy_creds+0x219/0x450 [ 2802.448142][T26600] copy_process+0x7d5/0x3220 [ 2802.448151][T26600] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2802.448162][T26600] ? proc_fail_nth_read+0x150/0x150 [ 2802.448171][T26600] ? proc_fail_nth_write+0x157/0x1c0 [ 2802.448182][T26600] ? fsnotify+0x10fc/0x11b0 [ 2802.448193][T26600] _do_fork+0x142/0x730 [ 2802.448204][T26600] __x64_sys_clone+0x213/0x260 [ 2802.448215][T26600] do_syscall_64+0xcb/0x1c0 [ 2802.448225][T26600] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2802.448233][T26600] RIP: 0033:0x7f94bd2630e9 [ 2802.448241][T26600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2802.448246][T26600] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2802.448256][T26600] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2802.448261][T26600] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2802.448266][T26600] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2802.448271][T26600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2802.448276][T26600] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2802.448283][T26600] sysctl could not get directory: //user -12 [ 2802.448304][T26600] CPU: 0 PID: 26600 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2802.448308][T26600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.448311][T26600] Call Trace: [ 2802.448320][T26600] dump_stack+0x18e/0x1d5 [ 2802.448327][T26600] ? kfree+0xc6/0x260 [ 2802.448337][T26600] __register_sysctl_table+0x113a/0x11c0 [ 2802.448345][T26600] ? memcpy+0x38/0x50 [ 2802.448356][T26600] setup_userns_sysctls+0x1e1/0x270 [ 2802.448365][T26600] create_user_ns+0xc0f/0x1570 [ 2802.448378][T26600] copy_creds+0x219/0x450 [ 2802.448388][T26600] copy_process+0x7d5/0x3220 [ 2802.448397][T26600] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2802.448408][T26600] ? proc_fail_nth_read+0x150/0x150 [ 2802.448417][T26600] ? proc_fail_nth_write+0x157/0x1c0 [ 2802.448427][T26600] ? fsnotify+0x10fc/0x11b0 [ 2802.448438][T26600] _do_fork+0x142/0x730 [ 2802.448449][T26600] __x64_sys_clone+0x213/0x260 [ 2802.448460][T26600] do_syscall_64+0xcb/0x1c0 [ 2802.448470][T26600] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2802.448476][T26600] RIP: 0033:0x7f94bd2630e9 [ 2802.448483][T26600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2802.448488][T26600] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2802.448496][T26600] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2802.448501][T26600] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2802.448506][T26600] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2802.448511][T26600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2802.448516][T26600] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2802.486583][T26603] FAULT_INJECTION: forcing a failure. [ 2802.486583][T26603] name failslab, interval 1, probability 0, space 0, times 0 [ 2802.486594][T26603] CPU: 0 PID: 26603 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2802.486599][T26603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.486602][T26603] Call Trace: [ 2802.486616][T26603] dump_stack+0x18e/0x1d5 [ 2802.486629][T26603] should_fail+0x604/0x770 [ 2802.486641][T26603] ? __delayacct_tsk_init+0x28/0x90 [ 2802.486649][T26603] should_failslab+0x5/0x20 [ 2802.486659][T26603] kmem_cache_alloc+0x24/0x210 [ 2802.486669][T26603] __delayacct_tsk_init+0x28/0x90 [ 2802.486680][T26603] copy_process+0x87d/0x3220 [ 2802.486689][T26603] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2802.486700][T26603] ? proc_fail_nth_write+0x157/0x1c0 [ 2802.486710][T26603] ? fsnotify+0x10fc/0x11b0 [ 2802.486721][T26603] _do_fork+0x142/0x730 [ 2802.486732][T26603] __x64_sys_clone+0x213/0x260 [ 2802.486743][T26603] do_syscall_64+0xcb/0x1c0 [ 2802.486753][T26603] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2802.486761][T26603] RIP: 0033:0x7f94bd2630e9 [ 2802.486769][T26603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2802.486774][T26603] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2802.486782][T26603] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2802.486787][T26603] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2802.486792][T26603] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2802.486797][T26603] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2802.486803][T26603] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2802.532792][T26606] FAULT_INJECTION: forcing a failure. [ 2802.532792][T26606] name failslab, interval 1, probability 0, space 0, times 0 [ 2802.532804][T26606] CPU: 1 PID: 26606 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2802.532809][T26606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.532812][T26606] Call Trace: [ 2802.532828][T26606] dump_stack+0x18e/0x1d5 [ 2802.532841][T26606] should_fail+0x604/0x770 [ 2802.532854][T26606] ? __delayacct_tsk_init+0x28/0x90 [ 2802.532862][T26606] should_failslab+0x5/0x20 [ 2802.532872][T26606] kmem_cache_alloc+0x24/0x210 [ 2802.532882][T26606] __delayacct_tsk_init+0x28/0x90 [ 2802.532893][T26606] copy_process+0x87d/0x3220 [ 2802.532903][T26606] ? refcount_inc_not_zero_checked+0x14e/0x210 [ 2802.532914][T26606] ? proc_fail_nth_write+0x157/0x1c0 [ 2802.532926][T26606] ? fsnotify+0x10fc/0x11b0 [ 2802.532937][T26606] _do_fork+0x142/0x730 [ 2802.532949][T26606] __x64_sys_clone+0x213/0x260 [ 2802.532961][T26606] do_syscall_64+0xcb/0x1c0 [ 2802.532971][T26606] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2802.532979][T26606] RIP: 0033:0x7f94bd2630e9 [ 2802.532988][T26606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2802.532993][T26606] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2802.533002][T26606] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2802.533007][T26606] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2802.533012][T26606] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2802.533017][T26606] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2802.533023][T26606] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2802.662957][T26613] FAULT_INJECTION: forcing a failure. [ 2802.662957][T26613] name failslab, interval 1, probability 0, space 0, times 0 [ 2802.662969][T26613] CPU: 1 PID: 26613 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2802.662974][T26613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2802.662977][T26613] Call Trace: [ 2802.662991][T26613] dump_stack+0x18e/0x1d5 [ 2802.663004][T26613] should_fail+0x604/0x770 [ 2802.663016][T26613] ? alloc_fdtable+0x93/0x260 [ 2802.663024][T26613] should_failslab+0x5/0x20 [ 2802.663035][T26613] kmem_cache_alloc_trace+0x28/0x240 [ 2802.663045][T26613] alloc_fdtable+0x93/0x260 [ 2802.663053][T26613] ? _raw_spin_lock+0x6c/0x170 [ 2802.663061][T26613] dup_fd+0x6f8/0xa30 [ 2802.663073][T26613] copy_files+0xa6/0x1a0 [ 2802.663083][T26613] copy_process+0xfa2/0x3220 [ 2802.663094][T26613] ? proc_fail_nth_write+0x157/0x1c0 [ 2802.663105][T26613] _do_fork+0x142/0x730 [ 2802.663116][T26613] __x64_sys_clone+0x213/0x260 [ 2802.663127][T26613] do_syscall_64+0xcb/0x1c0 [ 2802.663137][T26613] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2802.663145][T26613] RIP: 0033:0x7f94bd2630e9 [ 2802.663153][T26613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2802.663157][T26613] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2802.663165][T26613] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2802.663170][T26613] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2802.663175][T26613] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2802.663179][T26613] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2802.663184][T26613] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2802.695193][T26616] FAULT_INJECTION: forcing a failure. [ 2802.695193][T26616] name failslab, interval 1, probability 0, space 0, times 0 [ 2802.777157][T26617] FAULT_INJECTION: forcing a failure. [ 2802.777157][T26617] name failslab, interval 1, probability 0, space 0, times 0 [ 2802.894372][T26616] CPU: 0 PID: 26616 Comm: syz-executor.4 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2803.845737][T26616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2803.845742][T26616] Call Trace: [ 2803.845759][T26616] dump_stack+0x18e/0x1d5 [ 2803.845770][T26616] should_fail+0x604/0x770 [ 2803.845779][T26616] ? kvmalloc_node+0x7e/0xf0 09:59:40 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2803.845785][T26616] should_failslab+0x5/0x20 [ 2803.845794][T26616] __kmalloc+0x51/0x2b0 [ 2803.845801][T26616] kvmalloc_node+0x7e/0xf0 [ 2803.845810][T26616] alloc_fdtable+0xcf/0x260 [ 2803.845817][T26616] ? _raw_spin_lock+0x6c/0x170 [ 2803.845824][T26616] dup_fd+0x6f8/0xa30 [ 2803.845834][T26616] copy_files+0xa6/0x1a0 [ 2803.845843][T26616] copy_process+0xfa2/0x3220 09:59:40 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) [ 2803.845853][T26616] ? proc_fail_nth_write+0x157/0x1c0 [ 2803.845863][T26616] _do_fork+0x142/0x730 [ 2803.845872][T26616] __x64_sys_clone+0x213/0x260 [ 2803.845882][T26616] do_syscall_64+0xcb/0x1c0 [ 2803.845890][T26616] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2803.845898][T26616] RIP: 0033:0x7f94bd2630e9 [ 2803.845907][T26616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2803.845911][T26616] RSP: 002b:00007f94bc3d9118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2803.845918][T26616] RAX: ffffffffffffffda RBX: 00007f94bd375f60 RCX: 00007f94bd2630e9 [ 2803.845923][T26616] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00509b827e2a0000 [ 2803.845927][T26616] RBP: 00007f94bc3d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 2803.845931][T26616] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 2803.845935][T26616] R13: 00007ffe3851453f R14: 00007f94bc3d9300 R15: 0000000000022000 [ 2803.847799][T26617] CPU: 1 PID: 26617 Comm: syz-executor.5 Not tainted 5.4.180-syzkaller-00002-gb730087e9a5d #0 [ 2803.847806][T26617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2803.847809][T26617] Call Trace: [ 2803.847827][T26617] dump_stack+0x18e/0x1d5 [ 2803.847841][T26617] should_fail+0x604/0x770 [ 2803.847851][T26617] ? kvmalloc_node+0x7e/0xf0 [ 2803.847859][T26617] should_failslab+0x5/0x20 [ 2803.847869][T26617] __kmalloc+0x51/0x2b0 [ 2803.847878][T26617] kvmalloc_node+0x7e/0xf0 [ 2803.847888][T26617] alloc_fdtable+0xcf/0x260 [ 2803.847896][T26617] ? _raw_spin_lock+0x6c/0x170 [ 2803.847905][T26617] dup_fd+0x6f8/0xa30 [ 2803.847918][T26617] copy_files+0xa6/0x1a0 [ 2803.847928][T26617] copy_process+0xfa2/0x3220 [ 2803.847940][T26617] ? proc_fail_nth_write+0x157/0x1c0 [ 2803.847953][T26617] _do_fork+0x142/0x730 [ 2803.847965][T26617] __x64_sys_clone+0x213/0x260 [ 2803.847977][T26617] do_syscall_64+0xcb/0x1c0 [ 2803.847987][T26617] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2803.847995][T26617] RIP: 0033:0x7f2c718be0e9 [ 2803.848004][T26617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 09:59:40 executing program 2: unshare(0x24040400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @loopback}, &(0x7f0000000080)=0xc) unshare(0x22000000) 09:59:40 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 09:59:40 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:40 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 09:59:40 executing program 5: mlockall(0x3) syz_clone(0x1110, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:40 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2031) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2031) (async) 09:59:40 executing program 2: unshare(0x24040400) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000000)={0x0, @empty, @loopback}, &(0x7f0000000080)=0xc) (async, rerun: 32) unshare(0x22000000) (rerun: 32) [ 2803.848009][T26617] RSP: 002b:00007f2c70a13118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2803.848019][T26617] RAX: ffffffffffffffda RBX: 00007f2c719d1030 RCX: 00007f2c718be0e9 [ 2803.848024][T26617] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 2803.848029][T26617] RBP: 00007f2c70a131d0 R08: 0000000000000000 R09: 0000000000000000 [ 2803.848034][T26617] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2803.848040][T26617] R13: 00007ffec66a149f R14: 00007f2c70a13300 R15: 0000000000022000 09:59:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000040)={@broadcast, @empty, @private=0xa010101}, 0xc) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) read$FUSE(r1, &(0x7f0000004200)={0x2020, 0x0, 0x0}, 0x2020) r3 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x0, 0x0) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, r2, {{0x2, 0xb378, 0x2, r3}}}, 0x28) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010102}, 0x10) read$FUSE(r1, &(0x7f00000021c0)={0x2020}, 0x2020) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)) 09:59:40 executing program 4: syz_clone(0x509b827e2a0002, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:40 executing program 2: unshare(0x800) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000080)={0x32, @remote, 0x4e21, 0x3, 'wlc\x00', 0x4, 0x7, 0x72}, 0x2c) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x6, @multicast2, 0x4e20, 0x2, 'lblc\x00', 0x20, 0xfffffa29, 0x3f}, {@multicast1, 0x4e23, 0x0, 0x45a, 0xb5}}, 0x44) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=0x11e) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000280)={'filter\x00', 0x7, 0x4, 0x3f0, 0x110, 0x110, 0x0, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000240), {[{{@arp={@multicast2, @dev={0xac, 0x14, 0x14, 0x37}, 0xffffff00, 0x0, 0x0, 0xd, {@empty, {[0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0x0, 0x7e550742b0b32f16, 0x0, 0xff]}}, 0x8000, 0x9, 0x0, 0x5, 0x1000, 0x5, 'veth0_to_hsr\x00', 'xfrm0\x00', {}, {0xff}, 0x0, 0x3}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @remote, @local, 0x1}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @dev={0xac, 0x14, 0x14, 0xc}, 0x2}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) unshare(0x22000000) 09:59:40 executing program 2: unshare(0x800) r0 = socket$inet_udp(0x2, 0x2, 0x0) (async, rerun: 32) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000080)={0x32, @remote, 0x4e21, 0x3, 'wlc\x00', 0x4, 0x7, 0x72}, 0x2c) (rerun: 32) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x6, @multicast2, 0x4e20, 0x2, 'lblc\x00', 0x20, 0xfffffa29, 0x3f}, {@multicast1, 0x4e23, 0x0, 0x45a, 0xb5}}, 0x44) (async) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=0x11e) (async, rerun: 64) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 64) bind$inet(r1, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000280)={'filter\x00', 0x7, 0x4, 0x3f0, 0x110, 0x110, 0x0, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000240), {[{{@arp={@multicast2, @dev={0xac, 0x14, 0x14, 0x37}, 0xffffff00, 0x0, 0x0, 0xd, {@empty, {[0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0x0, 0x7e550742b0b32f16, 0x0, 0xff]}}, 0x8000, 0x9, 0x0, 0x5, 0x1000, 0x5, 'veth0_to_hsr\x00', 'xfrm0\x00', {}, {0xff}, 0x0, 0x3}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @remote, @local, 0x1}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @dev={0xac, 0x14, 0x14, 0xc}, 0x2}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) unshare(0x22000000) 09:59:40 executing program 4: syz_clone(0x509b827e2a0004, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:40 executing program 2: unshare(0x800) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000080)={0x32, @remote, 0x4e21, 0x3, 'wlc\x00', 0x4, 0x7, 0x72}, 0x2c) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x6, @multicast2, 0x4e20, 0x2, 'lblc\x00', 0x20, 0xfffffa29, 0x3f}, {@multicast1, 0x4e23, 0x0, 0x45a, 0xb5}}, 0x44) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=0x11e) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000280)={'filter\x00', 0x7, 0x4, 0x3f0, 0x110, 0x110, 0x0, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000240), {[{{@arp={@multicast2, @dev={0xac, 0x14, 0x14, 0x37}, 0xffffff00, 0x0, 0x0, 0xd, {@empty, {[0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0x0, 0x7e550742b0b32f16, 0x0, 0xff]}}, 0x8000, 0x9, 0x0, 0x5, 0x1000, 0x5, 'veth0_to_hsr\x00', 'xfrm0\x00', {}, {0xff}, 0x0, 0x3}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @remote, @local, 0x1}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @dev={0xac, 0x14, 0x14, 0xc}, 0x2}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) unshare(0x22000000) unshare(0x800) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000080)={0x32, @remote, 0x4e21, 0x3, 'wlc\x00', 0x4, 0x7, 0x72}, 0x2c) (async) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x6, @multicast2, 0x4e20, 0x2, 'lblc\x00', 0x20, 0xfffffa29, 0x3f}, {@multicast1, 0x4e23, 0x0, 0x45a, 0xb5}}, 0x44) (async) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=0x11e) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000280)={'filter\x00', 0x7, 0x4, 0x3f0, 0x110, 0x110, 0x0, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000240), {[{{@arp={@multicast2, @dev={0xac, 0x14, 0x14, 0x37}, 0xffffff00, 0x0, 0x0, 0xd, {@empty, {[0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0xff, 0xff, 0x0, 0x7e550742b0b32f16, 0x0, 0xff]}}, 0x8000, 0x9, 0x0, 0x5, 0x1000, 0x5, 'veth0_to_hsr\x00', 'xfrm0\x00', {}, {0xff}, 0x0, 0x3}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @remote, @local, 0x1}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @dev={0xac, 0x14, 0x14, 0xc}, 0x2}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) (async) unshare(0x22000000) (async) 09:59:41 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0) 09:59:41 executing program 4: syz_clone(0x509b827e2a0008, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:41 executing program 2: unshare(0x24040140) unshare(0x22000000) 09:59:41 executing program 5: mlockall(0x3) syz_clone(0x1111, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:41 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0) 09:59:41 executing program 2: unshare(0x24040140) (async) unshare(0x22000000) 09:59:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000040)={@broadcast, @empty, @private=0xa010101}, 0xc) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) read$FUSE(r1, &(0x7f0000004200)={0x2020, 0x0, 0x0}, 0x2020) r3 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x0, 0x0) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, r2, {{0x2, 0xb378, 0x2, r3}}}, 0x28) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010102}, 0x10) read$FUSE(r1, &(0x7f00000021c0)={0x2020}, 0x2020) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000040)={@broadcast, @empty, @private=0xa010101}, 0xc) (async) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000004200)={0x2020}, 0x2020) (async) getpgid(0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x0, 0x0) (async) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, r2, {{0x2, 0xb378, 0x2, r3}}}, 0x28) (async) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010102}, 0x10) (async) read$FUSE(r1, &(0x7f00000021c0)={0x2020}, 0x2020) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)) (async) 09:59:41 executing program 4: syz_clone(0x509b827e2a0010, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:41 executing program 2: unshare(0x24040140) (async) unshare(0x22000000) 09:59:41 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x10000200, 0x0, 0x0, 0x0) 09:59:41 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x8, 0x0, 0x0, 0x0) 09:59:41 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x10000200, 0x0, 0x0, 0x0) 09:59:41 executing program 2: unshare(0x0) unshare(0x20000080) 09:59:41 executing program 4: syz_clone(0x509b827e2a0011, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:41 executing program 2: unshare(0x0) unshare(0x20000080) unshare(0x0) (async) unshare(0x20000080) (async) 09:59:41 executing program 4: syz_clone(0x509b827e2a00e0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:41 executing program 2: unshare(0x0) (async) unshare(0x20000080) 09:59:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000040)={@broadcast, @empty, @private=0xa010101}, 0xc) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) read$FUSE(r1, &(0x7f0000004200)={0x2020, 0x0, 0x0}, 0x2020) r3 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x0, 0x0) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, r2, {{0x2, 0xb378, 0x2, r3}}}, 0x28) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010102}, 0x10) read$FUSE(r1, &(0x7f00000021c0)={0x2020}, 0x2020) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) setsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f0000000040)={@broadcast, @empty, @private=0xa010101}, 0xc) (async) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000000)=0x1) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) read$FUSE(r1, &(0x7f0000004200)={0x2020}, 0x2020) (async) getpgid(0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x0, 0x0) (async) write$FUSE_LK(r1, &(0x7f0000000100)={0x28, 0x0, r2, {{0x2, 0xb378, 0x2, r3}}}, 0x28) (async) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @private=0xa010102}, 0x10) (async) read$FUSE(r1, &(0x7f00000021c0)={0x2020}, 0x2020) (async) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)) (async) 09:59:41 executing program 4: syz_clone(0x509b827e2a1100, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:41 executing program 2: unshare(0x24040400) unshare(0x22000000) unshare(0x10c00) 09:59:41 executing program 4: syz_clone(0x509b827e2a1f00, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:41 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x11000000, 0x0, 0x0, 0x0) 09:59:42 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x10, 0x0, 0x0, 0x0) 09:59:42 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) (async, rerun: 32) unshare(0x10c00) (rerun: 32) 09:59:42 executing program 4: syz_clone(0x509b827e2a2000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:42 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x11000000, 0x0, 0x0, 0x0) 09:59:42 executing program 2: unshare(0x24040400) (async, rerun: 32) unshare(0x22000000) (async, rerun: 32) unshare(0x10c00) 09:59:42 executing program 4: syz_clone(0x509b827e2a3582, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:42 executing program 2: unshare(0x24040400) unshare(0x42030900) unshare(0x22000000) 09:59:42 executing program 4: syz_clone(0x509b827e2a3f00, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:42 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000002140)=0x4, 0x4) getgroups(0x1, &(0x7f0000002100)=[0xee00]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000002280)={'ip6gre0\x00', &(0x7f0000002200)={'ip6gre0\x00', 0x0, 0x2f, 0x20, 0x33, 0x8, 0x4, @local, @loopback, 0x80, 0x10, 0x80000001, 0xff}}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000022c0)={0x0, @multicast2, @broadcast}, &(0x7f0000002300)=0xc) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000023c0)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', 0x0, 0x29, 0xea, 0x40, 0xd8, 0x2, @local, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, 0x0, 0x700, 0x9, 0x9}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000002480)={'ip6_vti0\x00', &(0x7f0000002400)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x20, 0x1, 0x20, @remote, @loopback, 0x10, 0x80, 0x8, 0xe1b6}}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000024c0)={0x0, @empty, @multicast2}, &(0x7f0000002500)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000002f00)={&(0x7f00000021c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002f40)={0x950, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0xe, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5b}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff70b4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xec, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x66de}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1800000}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0xf0}}, {{0x8}, {0x124, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x34, 0x1, @lb_tx_method={{}, {}, {0x0, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x1f0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xc63}}, {0x8}}}]}}]}, 0x950}, 0x1, 0x0, 0x0, 0x20000000}, 0x2000008) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000020c0)={'syztnl2\x00', &(0x7f0000002040)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x8, 0x1, 0x8, @loopback, @rand_addr=' \x01\x00', 0x8000, 0x700, 0x8, 0x7f}}) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r7, 0x0, 0x0) bind$inet(r7, &(0x7f0000002180)={0x2, 0x4e21, @loopback}, 0x10) bind$inet(r6, 0x0, 0x0) read$FUSE(r6, &(0x7f0000000000)={0x2020}, 0x2020) 09:59:42 executing program 2: unshare(0x24040400) unshare(0x42030900) unshare(0x22000000) unshare(0x24040400) (async) unshare(0x42030900) (async) unshare(0x22000000) (async) 09:59:42 executing program 4: syz_clone(0x509b827e2a4000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:42 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1f000000, 0x0, 0x0, 0x0) 09:59:42 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x11, 0x0, 0x0, 0x0) 09:59:42 executing program 2: unshare(0x24040400) unshare(0x42030900) unshare(0x22000000) unshare(0x24040400) (async) unshare(0x42030900) (async) unshare(0x22000000) (async) 09:59:42 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000002140)=0x4, 0x4) getgroups(0x1, &(0x7f0000002100)=[0xee00]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000002280)={'ip6gre0\x00', &(0x7f0000002200)={'ip6gre0\x00', 0x0, 0x2f, 0x20, 0x33, 0x8, 0x4, @local, @loopback, 0x80, 0x10, 0x80000001, 0xff}}) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000022c0)={0x0, @multicast2, @broadcast}, &(0x7f0000002300)=0xc) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000023c0)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', 0x0, 0x29, 0xea, 0x40, 0xd8, 0x2, @local, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, 0x0, 0x700, 0x9, 0x9}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000002480)={'ip6_vti0\x00', &(0x7f0000002400)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x20, 0x1, 0x20, @remote, @loopback, 0x10, 0x80, 0x8, 0xe1b6}}) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000024c0)={0x0, @empty, @multicast2}, &(0x7f0000002500)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000002f00)={&(0x7f00000021c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002f40)={0x950, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0xe, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5b}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff70b4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xec, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x66de}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1800000}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0xf0}}, {{0x8}, {0x124, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x34, 0x1, @lb_tx_method={{}, {}, {0x0, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x1f0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xc63}}, {0x8}}}]}}]}, 0x950}, 0x1, 0x0, 0x0, 0x20000000}, 0x2000008) (async) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000020c0)={'syztnl2\x00', &(0x7f0000002040)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x8, 0x1, 0x8, @loopback, @rand_addr=' \x01\x00', 0x8000, 0x700, 0x8, 0x7f}}) (async) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r7, 0x0, 0x0) bind$inet(r7, &(0x7f0000002180)={0x2, 0x4e21, @loopback}, 0x10) (async) bind$inet(r6, 0x0, 0x0) read$FUSE(r6, &(0x7f0000000000)={0x2020}, 0x2020) 09:59:42 executing program 4: syz_clone(0x509b827e2a8235, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:42 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x1f000000, 0x0, 0x0, 0x0) 09:59:42 executing program 4: syz_clone(0x509b827e2ae000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:42 executing program 2: unshare(0x24040400) unshare(0x22000000) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x4}}, 0x20) 09:59:42 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000002140)=0x4, 0x4) getgroups(0x1, &(0x7f0000002100)=[0xee00]) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000002280)={'ip6gre0\x00', &(0x7f0000002200)={'ip6gre0\x00', 0x0, 0x2f, 0x20, 0x33, 0x8, 0x4, @local, @loopback, 0x80, 0x10, 0x80000001, 0xff}}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000022c0)={0x0, @multicast2, @broadcast}, &(0x7f0000002300)=0xc) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000023c0)={'ip6_vti0\x00', &(0x7f0000002340)={'syztnl0\x00', 0x0, 0x29, 0xea, 0x40, 0xd8, 0x2, @local, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x22}}, 0x0, 0x700, 0x9, 0x9}}) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000002480)={'ip6_vti0\x00', &(0x7f0000002400)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x20, 0x1, 0x20, @remote, @loopback, 0x10, 0x80, 0x8, 0xe1b6}}) (async) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000024c0)={0x0, @empty, @multicast2}, &(0x7f0000002500)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000002f00)={&(0x7f00000021c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000002ec0)={&(0x7f0000002f40)={0x950, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [{{0x8, 0x1, r2}, {0x134, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0xe, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}]}}, {{0x8}, {0x128, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5b}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xffff70b4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0xec, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x401}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x66de}}}]}}, {{0x8}, {0x1b8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1800000}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0xf0}}, {{0x8}, {0x124, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x34, 0x1, @lb_tx_method={{}, {}, {0x0, 0x4, 'hash\x00'}}}]}}, {{0x8}, {0x1f0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xc63}}, {0x8}}}]}}]}, 0x950}, 0x1, 0x0, 0x0, 0x20000000}, 0x2000008) (async) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f00000020c0)={'syztnl2\x00', &(0x7f0000002040)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x8, 0x1, 0x8, @loopback, @rand_addr=' \x01\x00', 0x8000, 0x700, 0x8, 0x7f}}) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r7, 0x0, 0x0) (async) bind$inet(r7, &(0x7f0000002180)={0x2, 0x4e21, @loopback}, 0x10) bind$inet(r6, 0x0, 0x0) read$FUSE(r6, &(0x7f0000000000)={0x2020}, 0x2020) 09:59:42 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x2, 0x0, 0x0, 0x0) 09:59:42 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x4}}, 0x20) 09:59:42 executing program 3: r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x6, 0x54, 0xff, 0xfff, 0xffffffffffff8000, 0x0, 0x7fff, 0x8, 0x3}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, r1}, 0x10) 09:59:42 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) 09:59:42 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x1100, 0x0, 0x0, 0x0) 09:59:42 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x4, 0x0, 0x0, 0x0) 09:59:42 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) (async, rerun: 32) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000040)={0x20, 0xfffffffffffffff5, 0x0, {0x0, 0x4}}, 0x20) (rerun: 32) 09:59:42 executing program 3: r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x6, 0x54, 0xff, 0xfff, 0xffffffffffff8000, 0x0, 0x7fff, 0x8, 0x3}, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, r1}, 0x10) 09:59:42 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) 09:59:42 executing program 3: r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000080)={0x38, 0x6, 0x54, 0xff, 0xfff, 0xffffffffffff8000, 0x0, 0x7fff, 0x8, 0x3}, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 64) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) write$FUSE_INTERRUPT(r2, &(0x7f0000000040)={0x10, 0x0, r1}, 0x10) 09:59:42 executing program 2: unshare(0x24040400) unshare(0x36000000) 09:59:42 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x8, 0x0, 0x0, 0x0) 09:59:42 executing program 2: unshare(0x24040400) unshare(0x36000000) 09:59:42 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x10, 0x0, 0x0, 0x0) 09:59:42 executing program 2: unshare(0x24040400) (async) unshare(0x36000000) 09:59:43 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0) 09:59:43 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x11, 0x0, 0x0, 0x0) 09:59:43 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x1f00, 0x0, 0x0, 0x0) 09:59:43 executing program 2: unshare(0x24040400) setresgid(0x0, 0xee01, 0xee01) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x8300, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) unshare(0x22000000) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100000000000000c79cd356f43841f11404e201a0d7dfddea54801f1effe307e1e890d54b7a8fba24d0b9f96b3c2ce839f70255a94dcdd4eea3618def273cc673cd26f6d15955e5b4d2dbb16735cf3b24b7bf55f0c2ac03ac22274a90d6d9063de735b190faac69611feefc0c6c76a0f80536e70e8434442396bb91debfb9ace5f83be8bc6e183c41ad23d4a60a2e8d481f997aa49925bfd8bc701ea572c05170ee349d8fd8c47a34d5a96f5efb29886bb684dc39e9fbe9e0ee1aa004a27ae3578a74fa250c0d6003e523542176a26fc0de077af9"]) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000100)) 09:59:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) r4 = getegid() r5 = getuid() read$FUSE(0xffffffffffffffff, &(0x7f0000004200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) r7 = getuid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000006240)={0x3c8, 0x0, r3, [{{0x4, 0x3, 0x3, 0x5, 0x0, 0xffffffff, {0x5, 0x4, 0xfffffffffffff801, 0x2, 0x2, 0xea, 0x7ff, 0x401, 0x0, 0x1000, 0x400, r1, r4, 0x200, 0xa2}}, {0x1, 0x20, 0x0, 0x11b}}, {{0x2, 0x3, 0x21d, 0x4, 0x200, 0xfffffffd, {0x4, 0x6, 0x7fffffffffffffff, 0x3b46800, 0x7, 0xffffffffffffffff, 0x2, 0x2, 0xffff, 0x4000, 0x9e, r5, r6, 0x9, 0x7}}, {0x3, 0x100000001, 0x0, 0x5}}, {{0x1, 0x1, 0x0, 0x650a, 0x1, 0xd2f, {0x1, 0x3, 0xffffffffffffffff, 0xc52, 0xa2, 0xa4, 0x2e, 0x7, 0x4, 0xc000, 0x6, r1, r2, 0xff, 0x6}}, {0x5, 0x0, 0x2, 0x80000000, ':-'}}, {{0x6, 0x0, 0x7ff, 0x8, 0xa0bc, 0x0, {0x0, 0x20, 0x1f, 0x1f, 0x1000, 0x1ff, 0x6, 0x6, 0x4, 0x8000, 0x8, r1, r2, 0x5e, 0x81}}, {0x5, 0x2, 0x1, 0xfffffffe, '!'}}, {{0x0, 0x0, 0x1, 0x7f, 0x8, 0x6, {0x1, 0x8, 0x7, 0x2, 0x5, 0x1, 0x8, 0x36b0, 0x3f, 0x0, 0x7, r1, r2, 0x6, 0x7}}, {0x3, 0x0, 0x1, 0x1f, '}'}}, {{0x1, 0x1, 0x7, 0x8001, 0xfffffffe, 0x156, {0x0, 0x2, 0x8000, 0x800, 0x1, 0x7, 0x0, 0x744, 0xbfa2, 0x8000, 0x2, r7, r2, 0xee, 0x4}}, {0x3, 0x8000, 0xb, 0x6, '(&.[&}\\\\![,'}}]}, 0x3c8) 09:59:43 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0) 09:59:43 executing program 2: unshare(0x24040400) setresgid(0x0, 0xee01, 0xee01) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x8300, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) (async) unshare(0x22000000) (async) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100000000000000c79cd356f43841f11404e201a0d7dfddea54801f1effe307e1e890d54b7a8fba24d0b9f96b3c2ce839f70255a94dcdd4eea3618def273cc673cd26f6d15955e5b4d2dbb16735cf3b24b7bf55f0c2ac03ac22274a90d6d9063de735b190faac69611feefc0c6c76a0f80536e70e8434442396bb91debfb9ace5f83be8bc6e183c41ad23d4a60a2e8d481f997aa49925bfd8bc701ea572c05170ee349d8fd8c47a34d5a96f5efb29886bb684dc39e9fbe9e0ee1aa004a27ae3578a74fa250c0d6003e523542176a26fc0de077af9"]) (async) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000100)) 09:59:43 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xe0, 0x0, 0x0, 0x0) 09:59:43 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x1100, 0x0, 0x0, 0x0) 09:59:43 executing program 2: unshare(0x24040400) (async) setresgid(0x0, 0xee01, 0xee01) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x8300, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) (async) unshare(0x22000000) (async) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f00000001c0)=ANY=[@ANYBLOB="0100000000000000c79cd356f43841f11404e201a0d7dfddea54801f1effe307e1e890d54b7a8fba24d0b9f96b3c2ce839f70255a94dcdd4eea3618def273cc673cd26f6d15955e5b4d2dbb16735cf3b24b7bf55f0c2ac03ac22274a90d6d9063de735b190faac69611feefc0c6c76a0f80536e70e8434442396bb91debfb9ace5f83be8bc6e183c41ad23d4a60a2e8d481f997aa49925bfd8bc701ea572c05170ee349d8fd8c47a34d5a96f5efb29886bb684dc39e9fbe9e0ee1aa004a27ae3578a74fa250c0d6003e523542176a26fc0de077af9"]) (async) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000100)) 09:59:43 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x1f00, 0x0, 0x0, 0x0) 09:59:43 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1b0df1f000, 0x0, 0x0, 0x0) 09:59:43 executing program 2: unshare(0x24040400) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x6c}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24008045}, 0x4000804) unshare(0x22000000) unshare(0x400) 09:59:43 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x2000, 0x0, 0x0, 0x0) 09:59:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) (async) r4 = getegid() (async) r5 = getuid() read$FUSE(0xffffffffffffffff, &(0x7f0000004200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) r7 = getuid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000006240)={0x3c8, 0x0, r3, [{{0x4, 0x3, 0x3, 0x5, 0x0, 0xffffffff, {0x5, 0x4, 0xfffffffffffff801, 0x2, 0x2, 0xea, 0x7ff, 0x401, 0x0, 0x1000, 0x400, r1, r4, 0x200, 0xa2}}, {0x1, 0x20, 0x0, 0x11b}}, {{0x2, 0x3, 0x21d, 0x4, 0x200, 0xfffffffd, {0x4, 0x6, 0x7fffffffffffffff, 0x3b46800, 0x7, 0xffffffffffffffff, 0x2, 0x2, 0xffff, 0x4000, 0x9e, r5, r6, 0x9, 0x7}}, {0x3, 0x100000001, 0x0, 0x5}}, {{0x1, 0x1, 0x0, 0x650a, 0x1, 0xd2f, {0x1, 0x3, 0xffffffffffffffff, 0xc52, 0xa2, 0xa4, 0x2e, 0x7, 0x4, 0xc000, 0x6, r1, r2, 0xff, 0x6}}, {0x5, 0x0, 0x2, 0x80000000, ':-'}}, {{0x6, 0x0, 0x7ff, 0x8, 0xa0bc, 0x0, {0x0, 0x20, 0x1f, 0x1f, 0x1000, 0x1ff, 0x6, 0x6, 0x4, 0x8000, 0x8, r1, r2, 0x5e, 0x81}}, {0x5, 0x2, 0x1, 0xfffffffe, '!'}}, {{0x0, 0x0, 0x1, 0x7f, 0x8, 0x6, {0x1, 0x8, 0x7, 0x2, 0x5, 0x1, 0x8, 0x36b0, 0x3f, 0x0, 0x7, r1, r2, 0x6, 0x7}}, {0x3, 0x0, 0x1, 0x1f, '}'}}, {{0x1, 0x1, 0x7, 0x8001, 0xfffffffe, 0x156, {0x0, 0x2, 0x8000, 0x800, 0x1, 0x7, 0x0, 0x744, 0xbfa2, 0x8000, 0x2, r7, r2, 0xee, 0x4}}, {0x3, 0x8000, 0xb, 0x6, '(&.[&}\\\\![,'}}]}, 0x3c8) 09:59:43 executing program 2: unshare(0x24040400) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x6c}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24008045}, 0x4000804) unshare(0x22000000) unshare(0x400) unshare(0x24040400) (async) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x6c}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24008045}, 0x4000804) (async) unshare(0x22000000) (async) unshare(0x400) (async) 09:59:43 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x3582, 0x0, 0x0, 0x0) 09:59:43 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x4000, 0x0, 0x0, 0x0) 09:59:43 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x1b0dd1f000, 0x0, 0x0, 0x0) 09:59:43 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1263a550000, 0x0, 0x0, 0x0) 09:59:43 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x3f00, 0x0, 0x0, 0x0) 09:59:43 executing program 2: unshare(0x24040400) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x6c}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_TYPE={0x5, 0x4, 0x2}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x5c}, 0x1, 0x0, 0x0, 0x24008045}, 0x4000804) unshare(0x22000000) (async) unshare(0x400) 09:59:44 executing program 2: unshare(0x24040400) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001200)={0x4, 0x0, [{0x4, 0x73, &(0x7f0000000040)=""/115}, {0x3000, 0x4, &(0x7f00000000c0)=""/4}, {0xa000, 0xde, &(0x7f0000000100)=""/222}, {0x1f004, 0x1000, &(0x7f0000000200)=""/4096}]}) unshare(0x22000000) unshare(0x50000000) r1 = syz_open_dev$mouse(&(0x7f00000012c0), 0x4, 0x20000) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000001500)={0x2, 0x0, &(0x7f0000001300)=""/83, &(0x7f0000001380)=""/146, &(0x7f0000001440)=""/181, 0xf000}) 09:59:44 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x4000, 0x0, 0x0, 0x0) 09:59:44 executing program 2: unshare(0x24040400) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001200)={0x4, 0x0, [{0x4, 0x73, &(0x7f0000000040)=""/115}, {0x3000, 0x4, &(0x7f00000000c0)=""/4}, {0xa000, 0xde, &(0x7f0000000100)=""/222}, {0x1f004, 0x1000, &(0x7f0000000200)=""/4096}]}) unshare(0x22000000) unshare(0x50000000) r1 = syz_open_dev$mouse(&(0x7f00000012c0), 0x4, 0x20000) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000001500)={0x2, 0x0, &(0x7f0000001300)=""/83, &(0x7f0000001380)=""/146, &(0x7f0000001440)=""/181, 0xf000}) unshare(0x24040400) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001200)={0x4, 0x0, [{0x4, 0x73, &(0x7f0000000040)=""/115}, {0x3000, 0x4, &(0x7f00000000c0)=""/4}, {0xa000, 0xde, &(0x7f0000000100)=""/222}, {0x1f004, 0x1000, &(0x7f0000000200)=""/4096}]}) (async) unshare(0x22000000) (async) unshare(0x50000000) (async) syz_open_dev$mouse(&(0x7f00000012c0), 0x4, 0x20000) (async) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000001500)={0x2, 0x0, &(0x7f0000001300)=""/83, &(0x7f0000001380)=""/146, &(0x7f0000001440)=""/181, 0xf000}) (async) 09:59:44 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x8235, 0x0, 0x0, 0x0) 09:59:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (async) read$FUSE(0xffffffffffffffff, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) (async, rerun: 32) r4 = getegid() (async, rerun: 32) r5 = getuid() (async, rerun: 32) read$FUSE(0xffffffffffffffff, &(0x7f0000004200)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) (rerun: 32) r7 = getuid() write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000006240)={0x3c8, 0x0, r3, [{{0x4, 0x3, 0x3, 0x5, 0x0, 0xffffffff, {0x5, 0x4, 0xfffffffffffff801, 0x2, 0x2, 0xea, 0x7ff, 0x401, 0x0, 0x1000, 0x400, r1, r4, 0x200, 0xa2}}, {0x1, 0x20, 0x0, 0x11b}}, {{0x2, 0x3, 0x21d, 0x4, 0x200, 0xfffffffd, {0x4, 0x6, 0x7fffffffffffffff, 0x3b46800, 0x7, 0xffffffffffffffff, 0x2, 0x2, 0xffff, 0x4000, 0x9e, r5, r6, 0x9, 0x7}}, {0x3, 0x100000001, 0x0, 0x5}}, {{0x1, 0x1, 0x0, 0x650a, 0x1, 0xd2f, {0x1, 0x3, 0xffffffffffffffff, 0xc52, 0xa2, 0xa4, 0x2e, 0x7, 0x4, 0xc000, 0x6, r1, r2, 0xff, 0x6}}, {0x5, 0x0, 0x2, 0x80000000, ':-'}}, {{0x6, 0x0, 0x7ff, 0x8, 0xa0bc, 0x0, {0x0, 0x20, 0x1f, 0x1f, 0x1000, 0x1ff, 0x6, 0x6, 0x4, 0x8000, 0x8, r1, r2, 0x5e, 0x81}}, {0x5, 0x2, 0x1, 0xfffffffe, '!'}}, {{0x0, 0x0, 0x1, 0x7f, 0x8, 0x6, {0x1, 0x8, 0x7, 0x2, 0x5, 0x1, 0x8, 0x36b0, 0x3f, 0x0, 0x7, r1, r2, 0x6, 0x7}}, {0x3, 0x0, 0x1, 0x1f, '}'}}, {{0x1, 0x1, 0x7, 0x8001, 0xfffffffe, 0x156, {0x0, 0x2, 0x8000, 0x800, 0x1, 0x7, 0x0, 0x744, 0xbfa2, 0x8000, 0x2, r7, r2, 0xee, 0x4}}, {0x3, 0x8000, 0xb, 0x6, '(&.[&}\\\\![,'}}]}, 0x3c8) 09:59:44 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xe000, 0x0, 0x0, 0x0) 09:59:44 executing program 2: unshare(0x24040400) (async) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001200)={0x4, 0x0, [{0x4, 0x73, &(0x7f0000000040)=""/115}, {0x3000, 0x4, &(0x7f00000000c0)=""/4}, {0xa000, 0xde, &(0x7f0000000100)=""/222}, {0x1f004, 0x1000, &(0x7f0000000200)=""/4096}]}) (async) unshare(0x22000000) (async) unshare(0x50000000) r1 = syz_open_dev$mouse(&(0x7f00000012c0), 0x4, 0x20000) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000001500)={0x2, 0x0, &(0x7f0000001300)=""/83, &(0x7f0000001380)=""/146, &(0x7f0000001440)=""/181, 0xf000}) 09:59:44 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x29e7cff5f000, 0x0, 0x0, 0x0) 09:59:44 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x2a7e829b5000, 0x0, 0x0, 0x0) 09:59:44 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x20010, 0x0, 0x0, 0x0) 09:59:44 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x3ffff, 0x0, 0x0, 0x0) 09:59:44 executing program 2: unshare(0x24040400) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x12, 0x0, 0x13e, &(0x7f0000000000)=[0x0], 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_pressure(r0, &(0x7f00000000c0)='cpu.pressure\x00', 0x2, 0x0) unshare(0x22000000) 09:59:44 executing program 2: unshare(0x24040400) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x12, 0x0, 0x13e, &(0x7f0000000000)=[0x0], 0x1}, 0x20) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_pressure(r0, &(0x7f00000000c0)='cpu.pressure\x00', 0x2, 0x0) (async) unshare(0x22000000) 09:59:44 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x40000, 0x0, 0x0, 0x0) 09:59:44 executing program 2: unshare(0x24040400) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x12, 0x0, 0x13e, &(0x7f0000000000)=[0x0], 0x1}, 0x20) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_pressure(r0, &(0x7f00000000c0)='cpu.pressure\x00', 0x2, 0x0) (async) unshare(0x22000000) 09:59:44 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x80000, 0x0, 0x0, 0x0) 09:59:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) 09:59:45 executing program 2: unshare(0x22060300) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)) unshare(0x22000000) 09:59:45 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x100000, 0x0, 0x0, 0x0) 09:59:45 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x553a26010000, 0x0, 0x0, 0x0) 09:59:45 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x20200, 0x0, 0x0, 0x0) 09:59:45 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x553a26478000, 0x0, 0x0, 0x0) 09:59:45 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x101000, 0x0, 0x0, 0x0) 09:59:45 executing program 2: unshare(0x22060300) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)) (async, rerun: 64) unshare(0x22000000) (rerun: 64) 09:59:45 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xe00000, 0x0, 0x0, 0x0) 09:59:45 executing program 2: unshare(0x22060300) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)) unshare(0x22000000) unshare(0x22060300) (async) ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)) (async) unshare(0x22000000) (async) 09:59:45 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) 09:59:45 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x20, 0x0, 0x0) unshare(0x24040400) unshare(0x4010280) 09:59:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async, rerun: 32) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 32) bind$inet(r1, 0x0, 0x0) (async) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) socket$inet6_udp(0xa, 0x2, 0x0) 09:59:46 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x1000000, 0x0, 0x0, 0x0) 09:59:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x20, 0x0, 0x0) unshare(0x24040400) unshare(0x4010280) socket$inet_udp(0x2, 0x2, 0x0) (async) setsockopt$inet_buf(r0, 0x0, 0x20, 0x0, 0x0) (async) unshare(0x24040400) (async) unshare(0x4010280) (async) 09:59:46 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x80000, 0x0, 0x0, 0x0) 09:59:46 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) 09:59:46 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) 09:59:46 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x2000000, 0x0, 0x0, 0x0) 09:59:46 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x20, 0x0, 0x0) unshare(0x24040400) unshare(0x4010280) 09:59:46 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x10000000, 0x0, 0x0, 0x0) 09:59:46 executing program 2: r0 = socket(0x22, 0x6, 0x1) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x29, 0x5, 0x4, 0xffffffff, 0x0, @private1, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x80, 0x8, 0xff3e53d9, 0x10001}}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x218, r1, 0x100, 0x70bd28, 0x25dfdbfd, {}, [{{0x8}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff8001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x104, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x9, 0x76, 0x5, 0x5}, {0x8, 0x0, 0x80}, {0x400, 0x7, 0xf2, 0x2}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}]}, 0x218}, 0x1, 0x0, 0x0, 0x44}, 0x40000) unshare(0x24040400) unshare(0x22000000) modify_ldt$write2(0x11, &(0x7f0000000000)={0x6, 0xffffffffffffffff, 0x0, 0x1, 0x3, 0x0, 0x1}, 0x10) 09:59:46 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x11000000, 0x0, 0x0, 0x0) 09:59:46 executing program 2: r0 = socket(0x22, 0x6, 0x1) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x29, 0x5, 0x4, 0xffffffff, 0x0, @private1, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x80, 0x8, 0xff3e53d9, 0x10001}}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x218, r1, 0x100, 0x70bd28, 0x25dfdbfd, {}, [{{0x8}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff8001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x104, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x9, 0x76, 0x5, 0x5}, {0x8, 0x0, 0x80}, {0x400, 0x7, 0xf2, 0x2}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}]}, 0x218}, 0x1, 0x0, 0x0, 0x44}, 0x40000) unshare(0x24040400) unshare(0x22000000) modify_ldt$write2(0x11, &(0x7f0000000000)={0x6, 0xffffffffffffffff, 0x0, 0x1, 0x3, 0x0, 0x1}, 0x10) socket(0x22, 0x6, 0x1) (async) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x29, 0x5, 0x4, 0xffffffff, 0x0, @private1, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x80, 0x8, 0xff3e53d9, 0x10001}}) (async) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x218, r1, 0x100, 0x70bd28, 0x25dfdbfd, {}, [{{0x8}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff8001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x104, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x9, 0x76, 0x5, 0x5}, {0x8, 0x0, 0x80}, {0x400, 0x7, 0xf2, 0x2}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}]}, 0x218}, 0x1, 0x0, 0x0, 0x44}, 0x40000) (async) unshare(0x24040400) (async) unshare(0x22000000) (async) modify_ldt$write2(0x11, &(0x7f0000000000)={0x6, 0xffffffffffffffff, 0x0, 0x1, 0x3, 0x0, 0x1}, 0x10) (async) 09:59:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) 09:59:47 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x1f000000, 0x0, 0x0, 0x0) 09:59:47 executing program 2: r0 = socket(0x22, 0x6, 0x1) (async, rerun: 64) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000140)={'ip6_vti0\x00', &(0x7f00000000c0)={'sit0\x00', 0x0, 0x29, 0x5, 0x4, 0xffffffff, 0x0, @private1, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x80, 0x8, 0xff3e53d9, 0x10001}}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x218, r1, 0x100, 0x70bd28, 0x25dfdbfd, {}, [{{0x8}, {0xf0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff8001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x104, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x9, 0x76, 0x5, 0x5}, {0x8, 0x0, 0x80}, {0x400, 0x7, 0xf2, 0x2}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}]}, 0x218}, 0x1, 0x0, 0x0, 0x44}, 0x40000) unshare(0x24040400) (async, rerun: 32) unshare(0x22000000) (rerun: 32) modify_ldt$write2(0x11, &(0x7f0000000000)={0x6, 0xffffffffffffffff, 0x0, 0x1, 0x3, 0x0, 0x1}, 0x10) 09:59:47 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) 09:59:47 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) 09:59:47 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) 09:59:47 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) 09:59:47 executing program 2: unshare(0x24040400) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000000)="6acafebc8e13bb020210bc7c067ee73217e5fdbf912ca336d6b547d7196c7ed363d30ada9b8d5446f623c3b0ce50103bebbe96cec5790a6412f4b180f2be52942df5b1193f86a6a838c50b5c489b10ec91068b65e51983f82fd14f0e754dcbfb50932b2ab139464f3f54f99ca683d201933f8ecb370b090af5688a3ffea5a431dd568fb174c813093c584f2840793373139cf0b47e29001d97aa7063e687d3caa32342382e8ef5edc215ab07a7c6af9639acb1cfb144bf8f311e33c88de1eac4", 0xc0) unshare(0x22000000) 09:59:47 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x20000000, 0x0, 0x0, 0x0) 09:59:47 executing program 2: unshare(0x24040400) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000000)="6acafebc8e13bb020210bc7c067ee73217e5fdbf912ca336d6b547d7196c7ed363d30ada9b8d5446f623c3b0ce50103bebbe96cec5790a6412f4b180f2be52942df5b1193f86a6a838c50b5c489b10ec91068b65e51983f82fd14f0e754dcbfb50932b2ab139464f3f54f99ca683d201933f8ecb370b090af5688a3ffea5a431dd568fb174c813093c584f2840793373139cf0b47e29001d97aa7063e687d3caa32342382e8ef5edc215ab07a7c6af9639acb1cfb144bf8f311e33c88de1eac4", 0xc0) (async) unshare(0x22000000) 09:59:47 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x3f000000, 0x0, 0x0, 0x0) 09:59:47 executing program 2: unshare(0x24040400) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000000)="6acafebc8e13bb020210bc7c067ee73217e5fdbf912ca336d6b547d7196c7ed363d30ada9b8d5446f623c3b0ce50103bebbe96cec5790a6412f4b180f2be52942df5b1193f86a6a838c50b5c489b10ec91068b65e51983f82fd14f0e754dcbfb50932b2ab139464f3f54f99ca683d201933f8ecb370b090af5688a3ffea5a431dd568fb174c813093c584f2840793373139cf0b47e29001d97aa7063e687d3caa32342382e8ef5edc215ab07a7c6af9639acb1cfb144bf8f311e33c88de1eac4", 0xc0) unshare(0x22000000) unshare(0x24040400) (async) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x25, &(0x7f0000000000)="6acafebc8e13bb020210bc7c067ee73217e5fdbf912ca336d6b547d7196c7ed363d30ada9b8d5446f623c3b0ce50103bebbe96cec5790a6412f4b180f2be52942df5b1193f86a6a838c50b5c489b10ec91068b65e51983f82fd14f0e754dcbfb50932b2ab139464f3f54f99ca683d201933f8ecb370b090af5688a3ffea5a431dd568fb174c813093c584f2840793373139cf0b47e29001d97aa7063e687d3caa32342382e8ef5edc215ab07a7c6af9639acb1cfb144bf8f311e33c88de1eac4", 0xc0) (async) unshare(0x22000000) (async) 09:59:47 executing program 2: unshare(0x24040400) unshare(0x22000000) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'vxcan1\x00', 0x2}, 0x18) pselect6(0x40, &(0x7f0000000040)={0x3f, 0x9, 0x8001, 0xfff, 0xe65, 0x8, 0x8, 0x4}, &(0x7f0000000080)={0x7, 0x9, 0x3e00, 0x8, 0xb9, 0x0, 0x0, 0x6}, &(0x7f00000000c0)={0xfffffffffffffffa, 0xd9b5, 0x8, 0xfb87, 0x81, 0x80000002, 0x3, 0x4}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8250]}, 0x8}) 09:59:47 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x40000000, 0x0, 0x0, 0x0) 09:59:47 executing program 2: unshare(0x24040400) unshare(0x22000000) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'vxcan1\x00', 0x2}, 0x18) pselect6(0x40, &(0x7f0000000040)={0x3f, 0x9, 0x8001, 0xfff, 0xe65, 0x8, 0x8, 0x4}, &(0x7f0000000080)={0x7, 0x9, 0x3e00, 0x8, 0xb9, 0x0, 0x0, 0x6}, &(0x7f00000000c0)={0xfffffffffffffffa, 0xd9b5, 0x8, 0xfb87, 0x81, 0x80000002, 0x3, 0x4}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8250]}, 0x8}) unshare(0x24040400) (async) unshare(0x22000000) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'vxcan1\x00', 0x2}, 0x18) (async) pselect6(0x40, &(0x7f0000000040)={0x3f, 0x9, 0x8001, 0xfff, 0xe65, 0x8, 0x8, 0x4}, &(0x7f0000000080)={0x7, 0x9, 0x3e00, 0x8, 0xb9, 0x0, 0x0, 0x6}, &(0x7f00000000c0)={0xfffffffffffffffa, 0xd9b5, 0x8, 0xfb87, 0x81, 0x80000002, 0x3, 0x4}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8250]}, 0x8}) (async) 09:59:47 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) 09:59:47 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) 09:59:47 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x1000000, 0x0, 0x0, 0x0) 09:59:47 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x82350000, 0x0, 0x0, 0x0) 09:59:47 executing program 2: unshare(0x24040400) unshare(0x22000000) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'vxcan1\x00', 0x2}, 0x18) pselect6(0x40, &(0x7f0000000040)={0x3f, 0x9, 0x8001, 0xfff, 0xe65, 0x8, 0x8, 0x4}, &(0x7f0000000080)={0x7, 0x9, 0x3e00, 0x8, 0xb9, 0x0, 0x0, 0x6}, &(0x7f00000000c0)={0xfffffffffffffffa, 0xd9b5, 0x8, 0xfb87, 0x81, 0x80000002, 0x3, 0x4}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8250]}, 0x8}) unshare(0x24040400) (async) unshare(0x22000000) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'vxcan1\x00', 0x2}, 0x18) (async) pselect6(0x40, &(0x7f0000000040)={0x3f, 0x9, 0x8001, 0xfff, 0xe65, 0x8, 0x8, 0x4}, &(0x7f0000000080)={0x7, 0x9, 0x3e00, 0x8, 0xb9, 0x0, 0x0, 0x6}, &(0x7f00000000c0)={0xfffffffffffffffa, 0xd9b5, 0x8, 0xfb87, 0x81, 0x80000002, 0x3, 0x4}, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0x8250]}, 0x8}) (async) 09:59:47 executing program 2: unshare(0x22010500) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 09:59:47 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xfeffffff, 0x0, 0x0, 0x0) 09:59:47 executing program 2: unshare(0x22010500) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) unshare(0x22010500) (async) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) (async) 09:59:47 executing program 2: unshare(0x22010500) (async) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) 09:59:47 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xffff0300, 0x0, 0x0, 0x0) 09:59:47 executing program 2: unshare(0x24040400) unshare(0x22000000) unshare(0x4000080) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000000)={0x0, {0x2, 0x4e20, @loopback}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}, {0x2, 0x4e24, @private=0xa010102}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x80000000, 0x0, 0xe4}) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) prctl$PR_PAC_RESET_KEYS(0x36, 0xa) 09:59:48 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xfffffffe, 0x0, 0x0, 0x0) 09:59:48 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x10100000000000, 0x0, 0x0, 0x0) 09:59:48 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x10100000000000, 0x0, 0x0, 0x0) 09:59:48 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) unshare(0x4000080) (async) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000000)={0x0, {0x2, 0x4e20, @loopback}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}, {0x2, 0x4e24, @private=0xa010102}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x80000000, 0x0, 0xe4}) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) (async) prctl$PR_PAC_RESET_KEYS(0x36, 0xa) 09:59:48 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x1b0db1f000, 0x0, 0x0, 0x0) 09:59:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x5, 0xfffff803, 0x78, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20, 0x7800, 0x8, 0x8001}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @empty, @broadcast}, &(0x7f00000021c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002200)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000022c0)={'syztnl0\x00', &(0x7f0000002240)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0xfb, 0x0, 0x60, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8000, 0x8, 0x20, 0x8}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002300)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000023c0)={'syztnl0\x00', &(0x7f0000002340)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x0, 0x6, 0x10, @local, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10, 0x8, 0xaf24a01, 0x401}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000002480)={'syztnl2\x00', &(0x7f0000002400)={'ip6gre0\x00', 0x0, 0x4, 0x2, 0x35, 0x1, 0x6c, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x8000, 0x1000, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000002540)={'ip6_vti0\x00', &(0x7f00000024c0)={'sit0\x00', 0x0, 0x4, 0x7f, 0xff, 0x514991da, 0x50, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x7, 0x700, 0x4, 0x8001}}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000035c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003580)={&(0x7f0000002580)={0xfd4, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xc19}}, {0x8, 0x6, r1}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x4, 0x20, 0x2, 0x6}, {0x4, 0x3, 0x4, 0x1f}, {0x4, 0x9, 0xb3, 0x10001}]}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8}, {0x1fc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffae}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x4c0, 0x0, 0x0, 0x1}, {0x1cd3, 0x40, 0x1f, 0x8}, {0x7ff, 0x81, 0x7, 0x34}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x1f0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x803}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x92fc}}, {0x8}}}]}}, {{0x8}, {0x254, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x50c5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xff, 0xee, 0x7, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3c9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x8, 0x8, 0x59, 0x930}, {0x6, 0x8, 0x81, 0x8}, {0x9, 0x20, 0x0, 0x4}, {0x5, 0x40, 0x6, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x32}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8}, {0x194, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x0, 0x9, 0x9, 0xa2}, {0x2, 0x8, 0x2, 0x9}, {0x8001, 0x9, 0x7d, 0x2}, {0xffff, 0x70, 0x0, 0x3}, {0x100, 0x81, 0x1, 0x5}, {0x8, 0x80, 0x1, 0x4}, {0x7ff, 0x80, 0x1f, 0x2}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xf3}}}]}}]}, 0xfd4}, 0x1, 0x0, 0x0, 0x20000011}, 0x24040000) 09:59:48 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x10000000, 0x0, 0x0, 0x0) 09:59:48 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) (async) unshare(0x4000080) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000000)={0x0, {0x2, 0x4e20, @loopback}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x11}}, {0x2, 0x4e24, @private=0xa010102}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x80000000, 0x0, 0xe4}) (async) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) (async) prctl$PR_PAC_RESET_KEYS(0x36, 0xa) 09:59:48 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x697a13f000, 0x0, 0x0, 0x0) 09:59:48 executing program 2: ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000000)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r0, 0x4068aea3, &(0x7f0000000140)) unshare(0x24040080) unshare(0x7a000100) 09:59:48 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x2a3f657fa000, 0x0, 0x0, 0x0) 09:59:48 executing program 2: ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000000)) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_CAP_HYPERV_SYNIC2(r0, 0x4068aea3, &(0x7f0000000140)) unshare(0x24040080) unshare(0x7a000100) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000000)) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_CAP_HYPERV_SYNIC2(r0, 0x4068aea3, &(0x7f0000000140)) (async) unshare(0x24040080) (async) unshare(0x7a000100) (async) 09:59:48 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x553a2727d000, 0x0, 0x0, 0x0) 09:59:48 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0xf0f10d1b000000, 0x0, 0x0, 0x0) 09:59:48 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x509b827e2a0000, 0x0, 0x0, 0x0) 09:59:48 executing program 2: ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000000)) (async, rerun: 64) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 64) bind$inet(r0, 0x0, 0x0) (async, rerun: 64) ioctl$KVM_CAP_HYPERV_SYNIC2(r0, 0x4068aea3, &(0x7f0000000140)) (rerun: 64) unshare(0x24040080) (async) unshare(0x7a000100) 09:59:48 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x4000000000000, 0x0, 0x0, 0x0) 09:59:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x5, 0xfffff803, 0x78, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20, 0x7800, 0x8, 0x8001}}) (async, rerun: 32) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @empty, @broadcast}, &(0x7f00000021c0)=0xc) (rerun: 32) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002200)={'team0\x00', 0x0}) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000022c0)={'syztnl0\x00', &(0x7f0000002240)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0xfb, 0x0, 0x60, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8000, 0x8, 0x20, 0x8}}) (rerun: 64) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002300)={'team0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000023c0)={'syztnl0\x00', &(0x7f0000002340)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x0, 0x6, 0x10, @local, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10, 0x8, 0xaf24a01, 0x401}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000002480)={'syztnl2\x00', &(0x7f0000002400)={'ip6gre0\x00', 0x0, 0x4, 0x2, 0x35, 0x1, 0x6c, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x8000, 0x1000, 0x6}}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000002540)={'ip6_vti0\x00', &(0x7f00000024c0)={'sit0\x00', 0x0, 0x4, 0x7f, 0xff, 0x514991da, 0x50, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x7, 0x700, 0x4, 0x8001}}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000035c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003580)={&(0x7f0000002580)={0xfd4, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xc19}}, {0x8, 0x6, r1}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x4, 0x20, 0x2, 0x6}, {0x4, 0x3, 0x4, 0x1f}, {0x4, 0x9, 0xb3, 0x10001}]}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8}, {0x1fc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffae}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x4c0, 0x0, 0x0, 0x1}, {0x1cd3, 0x40, 0x1f, 0x8}, {0x7ff, 0x81, 0x7, 0x34}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x1f0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x803}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x92fc}}, {0x8}}}]}}, {{0x8}, {0x254, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x50c5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xff, 0xee, 0x7, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3c9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x8, 0x8, 0x59, 0x930}, {0x6, 0x8, 0x81, 0x8}, {0x9, 0x20, 0x0, 0x4}, {0x5, 0x40, 0x6, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x32}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8}, {0x194, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x0, 0x9, 0x9, 0xa2}, {0x2, 0x8, 0x2, 0x9}, {0x8001, 0x9, 0x7d, 0x2}, {0xffff, 0x70, 0x0, 0x3}, {0x100, 0x81, 0x1, 0x5}, {0x8, 0x80, 0x1, 0x4}, {0x7ff, 0x80, 0x1f, 0x2}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xf3}}}]}}]}, 0xfd4}, 0x1, 0x0, 0x0, 0x20000011}, 0x24040000) 09:59:49 executing program 2: unshare(0x24040400) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000004c0)={0xe8, 0x0, &(0x7f0000000300)=[@release={0x40046306, 0x2}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd, @fda={0x66646185, 0x1, 0x0, 0x25}, @flat=@handle={0x73682a85, 0x1000}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @acquire_done={0x40106309, 0x1}, @acquire_done={0x40106309, 0x1}, @register_looper, @increfs_done={0x40106308, 0x2}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x18, &(0x7f0000000240)={@ptr={0x70742a85, 0x0, &(0x7f00000000c0)=""/195, 0xc3, 0x0, 0x1c}, @ptr={0x70742a85, 0x1, &(0x7f00000001c0)=""/91, 0x5b, 0x0, 0x2b}, @fda={0x66646185, 0x2, 0x2, 0x3f}}, &(0x7f00000002c0)={0x0, 0x28, 0x50}}}, @register_looper, @acquire_done={0x40106309, 0x1}], 0xbe, 0x0, &(0x7f0000000400)="92cf87504c8ff34b80c9fa5dfcfeaf494fabdfb3aa29c4cd389e55e107b26f7abe641620d0d0acba04ed78e6d774a99efba387cb8e5d78be0dc22eaa31b4f5e8a8a768135866759824dab8c2373223709fec723639fb43905c24573cae21f63a811683b4a3fdaaf464aed0ed0357882ed2498cdaec5406fa6ed5429764910a78c0fa756a56cbea04a316bdd6d5e84becca72766a5460d6cc18b813476ac2f8ed132d071017643d156c6ad660c3a560f1e51191937d7ff52516bdbeb17717"}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) unshare(0x22000000) 09:59:49 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) 09:59:49 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x10000200, 0x0, 0x0, 0x0) 09:59:49 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0xf0f5cfe7290000, 0x0, 0x0, 0x0) 09:59:49 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x8047263a550000, 0x0, 0x0, 0x0) 09:59:49 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x10000000000000, 0x0, 0x0, 0x0) 09:59:49 executing program 2: unshare(0x24040400) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000004c0)={0xe8, 0x0, &(0x7f0000000300)=[@release={0x40046306, 0x2}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd, @fda={0x66646185, 0x1, 0x0, 0x25}, @flat=@handle={0x73682a85, 0x1000}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @acquire_done={0x40106309, 0x1}, @acquire_done={0x40106309, 0x1}, @register_looper, @increfs_done={0x40106308, 0x2}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x18, &(0x7f0000000240)={@ptr={0x70742a85, 0x0, &(0x7f00000000c0)=""/195, 0xc3, 0x0, 0x1c}, @ptr={0x70742a85, 0x1, &(0x7f00000001c0)=""/91, 0x5b, 0x0, 0x2b}, @fda={0x66646185, 0x2, 0x2, 0x3f}}, &(0x7f00000002c0)={0x0, 0x28, 0x50}}}, @register_looper, @acquire_done={0x40106309, 0x1}], 0xbe, 0x0, &(0x7f0000000400)="92cf87504c8ff34b80c9fa5dfcfeaf494fabdfb3aa29c4cd389e55e107b26f7abe641620d0d0acba04ed78e6d774a99efba387cb8e5d78be0dc22eaa31b4f5e8a8a768135866759824dab8c2373223709fec723639fb43905c24573cae21f63a811683b4a3fdaaf464aed0ed0357882ed2498cdaec5406fa6ed5429764910a78c0fa756a56cbea04a316bdd6d5e84becca72766a5460d6cc18b813476ac2f8ed132d071017643d156c6ad660c3a560f1e51191937d7ff52516bdbeb17717"}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) unshare(0x22000000) unshare(0x24040400) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000004c0)={0xe8, 0x0, &(0x7f0000000300)=[@release={0x40046306, 0x2}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd, @fda={0x66646185, 0x1, 0x0, 0x25}, @flat=@handle={0x73682a85, 0x1000}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @acquire_done={0x40106309, 0x1}, @acquire_done={0x40106309, 0x1}, @register_looper, @increfs_done={0x40106308, 0x2}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x18, &(0x7f0000000240)={@ptr={0x70742a85, 0x0, &(0x7f00000000c0)=""/195, 0xc3, 0x0, 0x1c}, @ptr={0x70742a85, 0x1, &(0x7f00000001c0)=""/91, 0x5b, 0x0, 0x2b}, @fda={0x66646185, 0x2, 0x2, 0x3f}}, &(0x7f00000002c0)={0x0, 0x28, 0x50}}}, @register_looper, @acquire_done={0x40106309, 0x1}], 0xbe, 0x0, &(0x7f0000000400)="92cf87504c8ff34b80c9fa5dfcfeaf494fabdfb3aa29c4cd389e55e107b26f7abe641620d0d0acba04ed78e6d774a99efba387cb8e5d78be0dc22eaa31b4f5e8a8a768135866759824dab8c2373223709fec723639fb43905c24573cae21f63a811683b4a3fdaaf464aed0ed0357882ed2498cdaec5406fa6ed5429764910a78c0fa756a56cbea04a316bdd6d5e84becca72766a5460d6cc18b813476ac2f8ed132d071017643d156c6ad660c3a560f1e51191937d7ff52516bdbeb17717"}) (async) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) (async) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) (async) unshare(0x22000000) (async) 09:59:49 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x10100000000000, 0x0, 0x0, 0x0) 09:59:49 executing program 2: unshare(0x24040400) (async) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000004c0)={0xe8, 0x0, &(0x7f0000000300)=[@release={0x40046306, 0x2}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000000)={@fd, @fda={0x66646185, 0x1, 0x0, 0x25}, @flat=@handle={0x73682a85, 0x1000}}, &(0x7f0000000080)={0x0, 0x18, 0x38}}}, @acquire_done={0x40106309, 0x1}, @acquire_done={0x40106309, 0x1}, @register_looper, @increfs_done={0x40106308, 0x2}, @transaction={0x40406300, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x18, &(0x7f0000000240)={@ptr={0x70742a85, 0x0, &(0x7f00000000c0)=""/195, 0xc3, 0x0, 0x1c}, @ptr={0x70742a85, 0x1, &(0x7f00000001c0)=""/91, 0x5b, 0x0, 0x2b}, @fda={0x66646185, 0x2, 0x2, 0x3f}}, &(0x7f00000002c0)={0x0, 0x28, 0x50}}}, @register_looper, @acquire_done={0x40106309, 0x1}], 0xbe, 0x0, &(0x7f0000000400)="92cf87504c8ff34b80c9fa5dfcfeaf494fabdfb3aa29c4cd389e55e107b26f7abe641620d0d0acba04ed78e6d774a99efba387cb8e5d78be0dc22eaa31b4f5e8a8a768135866759824dab8c2373223709fec723639fb43905c24573cae21f63a811683b4a3fdaaf464aed0ed0357882ed2498cdaec5406fa6ed5429764910a78c0fa756a56cbea04a316bdd6d5e84becca72766a5460d6cc18b813476ac2f8ed132d071017643d156c6ad660c3a560f1e51191937d7ff52516bdbeb17717"}) (async) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) (async) unshare(0x22000000) 09:59:49 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xa07f653f2a0000, 0x0, 0x0, 0x0) 09:59:49 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xd027273a550000, 0x0, 0x0, 0x0) 09:59:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'syztnl0\x00', 0x0, 0x4, 0x8, 0x5, 0xfffff803, 0x78, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20, 0x7800, 0x8, 0x8001}}) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @empty, @broadcast}, &(0x7f00000021c0)=0xc) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002200)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000022c0)={'syztnl0\x00', &(0x7f0000002240)={'ip6_vti0\x00', 0x0, 0x4, 0x4, 0xfb, 0x0, 0x60, @private0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8000, 0x8, 0x20, 0x8}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000002300)={'team0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000023c0)={'syztnl0\x00', &(0x7f0000002340)={'syztnl0\x00', 0x0, 0x2f, 0x9, 0x0, 0x6, 0x10, @local, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10, 0x8, 0xaf24a01, 0x401}}) (async) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000002480)={'syztnl2\x00', &(0x7f0000002400)={'ip6gre0\x00', 0x0, 0x4, 0x2, 0x35, 0x1, 0x6c, @private1={0xfc, 0x1, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @empty}, 0x10, 0x8000, 0x1000, 0x6}}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000002540)={'ip6_vti0\x00', &(0x7f00000024c0)={'sit0\x00', 0x0, 0x4, 0x7f, 0xff, 0x514991da, 0x50, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback, 0x7, 0x700, 0x4, 0x8001}}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000035c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000003580)={&(0x7f0000002580)={0xfd4, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xc19}}, {0x8, 0x6, r1}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x4, 0x20, 0x2, 0x6}, {0x4, 0x3, 0x4, 0x1f}, {0x4, 0x9, 0xb3, 0x10001}]}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}]}}, {{0x8, 0x1, r2}, {0x168, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0xf8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x81}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}]}}, {{0x8}, {0x1fc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffae}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0x4c0, 0x0, 0x0, 0x1}, {0x1cd3, 0x40, 0x1f, 0x8}, {0x7ff, 0x81, 0x7, 0x34}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x1f0, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffffc}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}, {{0x8}, {0x1e0, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x803}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x92fc}}, {0x8}}}]}}, {{0x8}, {0x254, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x50c5}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xff, 0xee, 0x7, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3c9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0x184, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x8, 0x8, 0x59, 0x930}, {0x6, 0x8, 0x81, 0x8}, {0x9, 0x20, 0x0, 0x4}, {0x5, 0x40, 0x6, 0x1}]}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x32}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8}, {0x194, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x0, 0x9, 0x9, 0xa2}, {0x2, 0x8, 0x2, 0x9}, {0x8001, 0x9, 0x7d, 0x2}, {0xffff, 0x70, 0x0, 0x3}, {0x100, 0x81, 0x1, 0x5}, {0x8, 0x80, 0x1, 0x4}, {0x7ff, 0x80, 0x1f, 0x2}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xf3}}}]}}]}, 0xfd4}, 0x1, 0x0, 0x0, 0x20000011}, 0x24040000) 09:59:49 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xe0000000000000, 0x0, 0x0, 0x0) 09:59:49 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0xf0d10d1b000000, 0x0, 0x0, 0x0) 09:59:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r1, 0x40184810, &(0x7f00000024c0)={0x2, 0x202, 0x2, 0x101, 0x1ff, 0x1f}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001f40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20844010}, 0xc, &(0x7f0000001f00)={&(0x7f00000003c0)={0x1b2c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0xe3c, 0x8, 0x0, 0x1, [{0x790, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xfffffff9, @private2, 0x8d}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x6a8, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x9}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x25}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x17}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x41}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xfffffff9, @empty, 0x3ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}]}, {0x68, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x0, @empty, 0x7}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x41c2}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "96756dcf62709d7f47167479420631a1777942c9bf666150ec222e2cbd2e32ad"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "27d1ddb0959b328fddbcb10d90fd50f94f7972c146dabae653499fc20dfbe69e"}]}, {0x80, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @loopback}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x1, @private0, 0x4}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x40}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x4a4, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x418, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x42}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2b}}}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7c02, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x7, @private0, 0x9}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @loopback}}]}, {0x88, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x80}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7f}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, '\x00', 0x22}, 0x6}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x81}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x9, @remote, 0x8}}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x10000}, @WGDEVICE_A_PEERS={0xc88, 0x8, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fe0}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x3f, @private2, 0x1}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x68, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x43}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d22474b7dcc959d15abd794b73c5534451ab015f9ca6aedbda103bfdc43dfa5c"}]}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x40, @local}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0xbeb, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4, @local}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x31}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7d5518e6db36cc945adad0ef9d69048ceb9c8266e5e439d7142d60f2b505d6ca"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "78932951c7a0d378718c85e528738a60b37127d5cb2db46c5e98ff094890e9d6"}]}, {0x74, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x7, @private0, 0x5}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "903c7cfa28f67be572986096b58e39870bfa7e78248733fd87c24c7e2b7af04f"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x63c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x0, @remote, 0x1ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ALLOWEDIPS={0x4c8, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x43}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x14}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x31}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, {0x5, 0x3, 0x3}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3c}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xc}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_ALLOWEDIPS={0x108, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}]}, {0x3cc, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x394, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x27}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x32}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "acc8c7ec2451d78b2107f7af5bf6749ed42d30fde738ce2b2e3f9ae67aa38492"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xffff}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x101}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xa2b, @mcast2, 0x1ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7568}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xfffffffc}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x1b2c}, 0x1, 0x0, 0x0, 0x40800}, 0x40088c4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000002080)={'syztnl0\x00', &(0x7f0000002000)={'ip6gre0\x00', r2, 0x2f, 0xff, 0x89, 0xf37, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, 0x80, 0x8801, 0x20, 0x7fff}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000020c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002100)={'wg1\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002480)={&(0x7f0000001f80)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002440)={&(0x7f0000002140)={0x2c8, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1b11}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r5}, {0x1e4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x500}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) unshare(0x24040400) unshare(0x22000000) 09:59:49 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x11000000, 0x0, 0x0, 0x0) 09:59:49 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 09:59:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) ioctl$HIDIOCGCOLLECTIONINDEX(r1, 0x40184810, &(0x7f00000024c0)={0x2, 0x202, 0x2, 0x101, 0x1ff, 0x1f}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001f40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20844010}, 0xc, &(0x7f0000001f00)={&(0x7f00000003c0)={0x1b2c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0xe3c, 0x8, 0x0, 0x1, [{0x790, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xfffffff9, @private2, 0x8d}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x6a8, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x9}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x25}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x17}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x41}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xfffffff9, @empty, 0x3ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}]}, {0x68, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x0, @empty, 0x7}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x41c2}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "96756dcf62709d7f47167479420631a1777942c9bf666150ec222e2cbd2e32ad"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "27d1ddb0959b328fddbcb10d90fd50f94f7972c146dabae653499fc20dfbe69e"}]}, {0x80, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @loopback}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x1, @private0, 0x4}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x40}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x4a4, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x418, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x42}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2b}}}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7c02, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x7, @private0, 0x9}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @loopback}}]}, {0x88, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x80}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7f}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, '\x00', 0x22}, 0x6}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x81}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x9, @remote, 0x8}}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x10000}, @WGDEVICE_A_PEERS={0xc88, 0x8, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fe0}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x3f, @private2, 0x1}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x68, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x43}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d22474b7dcc959d15abd794b73c5534451ab015f9ca6aedbda103bfdc43dfa5c"}]}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x40, @local}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0xbeb, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4, @local}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x31}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7d5518e6db36cc945adad0ef9d69048ceb9c8266e5e439d7142d60f2b505d6ca"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "78932951c7a0d378718c85e528738a60b37127d5cb2db46c5e98ff094890e9d6"}]}, {0x74, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x7, @private0, 0x5}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "903c7cfa28f67be572986096b58e39870bfa7e78248733fd87c24c7e2b7af04f"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x63c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x0, @remote, 0x1ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ALLOWEDIPS={0x4c8, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x43}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x14}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x31}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, {0x5, 0x3, 0x3}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3c}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xc}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_ALLOWEDIPS={0x108, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}]}, {0x3cc, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x394, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x27}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x32}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "acc8c7ec2451d78b2107f7af5bf6749ed42d30fde738ce2b2e3f9ae67aa38492"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xffff}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x101}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xa2b, @mcast2, 0x1ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7568}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xfffffffc}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x1b2c}, 0x1, 0x0, 0x0, 0x40800}, 0x40088c4) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)={'team0\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000002080)={'syztnl0\x00', &(0x7f0000002000)={'ip6gre0\x00', r2, 0x2f, 0xff, 0x89, 0xf37, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, 0x80, 0x8801, 0x20, 0x7fff}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000020c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002100)={'wg1\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002480)={&(0x7f0000001f80)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002440)={&(0x7f0000002140)={0x2c8, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1b11}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r5}, {0x1e4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x500}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) (async) unshare(0x24040400) (async) unshare(0x22000000) 09:59:49 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xf0137a69000000, 0x0, 0x0, 0x0) 09:59:50 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xf0b10d1b000000, 0x0, 0x0, 0x0) 09:59:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$HIDIOCGCOLLECTIONINDEX(r1, 0x40184810, &(0x7f00000024c0)={0x2, 0x202, 0x2, 0x101, 0x1ff, 0x1f}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001f40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20844010}, 0xc, &(0x7f0000001f00)={&(0x7f00000003c0)={0x1b2c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0xe3c, 0x8, 0x0, 0x1, [{0x790, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xfffffff9, @private2, 0x8d}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x6a8, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x9}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x25}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x17}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x41}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xfffffff9, @empty, 0x3ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}]}, {0x68, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x0, @empty, 0x7}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x41c2}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "96756dcf62709d7f47167479420631a1777942c9bf666150ec222e2cbd2e32ad"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "27d1ddb0959b328fddbcb10d90fd50f94f7972c146dabae653499fc20dfbe69e"}]}, {0x80, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @loopback}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x1, @private0, 0x4}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x40}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x4a4, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x418, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x42}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2b}}}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7c02, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x7, @private0, 0x9}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @loopback}}]}, {0x88, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x80}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7f}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, '\x00', 0x22}, 0x6}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x81}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x9, @remote, 0x8}}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x10000}, @WGDEVICE_A_PEERS={0xc88, 0x8, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fe0}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x3f, @private2, 0x1}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x68, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x43}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d22474b7dcc959d15abd794b73c5534451ab015f9ca6aedbda103bfdc43dfa5c"}]}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x40, @local}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0xbeb, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4, @local}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x31}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7d5518e6db36cc945adad0ef9d69048ceb9c8266e5e439d7142d60f2b505d6ca"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "78932951c7a0d378718c85e528738a60b37127d5cb2db46c5e98ff094890e9d6"}]}, {0x74, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x7, @private0, 0x5}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "903c7cfa28f67be572986096b58e39870bfa7e78248733fd87c24c7e2b7af04f"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x63c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x0, @remote, 0x1ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ALLOWEDIPS={0x4c8, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x43}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x14}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x31}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, {0x5, 0x3, 0x3}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3c}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xc}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_ALLOWEDIPS={0x108, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}]}, {0x3cc, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x394, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x27}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x32}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "acc8c7ec2451d78b2107f7af5bf6749ed42d30fde738ce2b2e3f9ae67aa38492"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xffff}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x101}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xa2b, @mcast2, 0x1ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7568}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xfffffffc}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x1b2c}, 0x1, 0x0, 0x0, 0x40800}, 0x40088c4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000002080)={'syztnl0\x00', &(0x7f0000002000)={'ip6gre0\x00', r2, 0x2f, 0xff, 0x89, 0xf37, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, 0x80, 0x8801, 0x20, 0x7fff}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000020c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002100)={'wg1\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002480)={&(0x7f0000001f80)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002440)={&(0x7f0000002140)={0x2c8, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1b11}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r5}, {0x1e4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x500}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) unshare(0x24040400) unshare(0x22000000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$HIDIOCGCOLLECTIONINDEX(r1, 0x40184810, &(0x7f00000024c0)={0x2, 0x202, 0x2, 0x101, 0x1ff, 0x1f}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) (async) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000001f40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20844010}, 0xc, &(0x7f0000001f00)={&(0x7f00000003c0)={0x1b2c, 0x0, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0xe3c, 0x8, 0x0, 0x1, [{0x790, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xfffffff9, @private2, 0x8d}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x6a8, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x9}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x25}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x17}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x41}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xfffffff9, @empty, 0x3ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24}]}, {0x68, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x0, @empty, 0x7}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xffff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x41c2}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "96756dcf62709d7f47167479420631a1777942c9bf666150ec222e2cbd2e32ad"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "27d1ddb0959b328fddbcb10d90fd50f94f7972c146dabae653499fc20dfbe69e"}]}, {0x80, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @loopback}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x1, @private0, 0x4}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x40}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x4a4, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x418, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}]}, {0x10c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010101}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x34}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x42}}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x2b}}}, {0x5, 0x3, 0x1}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7c02, @private2={0xfc, 0x2, '\x00', 0x1}, 0x6}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x7, @private0, 0x9}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @loopback}}]}, {0x88, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x80}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7f}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, '\x00', 0x22}, 0x6}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x81}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x9, @remote, 0x8}}]}]}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x10000}, @WGDEVICE_A_PEERS={0xc88, 0x8, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7fe0}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x3f, @private2, 0x1}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x68, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x6}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x43}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d22474b7dcc959d15abd794b73c5534451ab015f9ca6aedbda103bfdc43dfa5c"}]}, {0x58, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x40, @local}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0xbeb, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4, @local}}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x31}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "7d5518e6db36cc945adad0ef9d69048ceb9c8266e5e439d7142d60f2b505d6ca"}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "78932951c7a0d378718c85e528738a60b37127d5cb2db46c5e98ff094890e9d6"}]}, {0x74, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x7, @private0, 0x5}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x5}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "903c7cfa28f67be572986096b58e39870bfa7e78248733fd87c24c7e2b7af04f"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x63c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x0, @remote, 0x1ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ALLOWEDIPS={0x4c8, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x43}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x14}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x31}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x13}}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @private=0xa010100}}, {0x5, 0x3, 0x3}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3c}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xc}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_ALLOWEDIPS={0x108, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}]}, {0x3cc, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x394, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x27}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x2}}]}, {0x7c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x32}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "acc8c7ec2451d78b2107f7af5bf6749ed42d30fde738ce2b2e3f9ae67aa38492"}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xffff}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x101}]}, {0x60, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xa2b, @mcast2, 0x1ff}}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7568}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xfffffffc}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r2}]}, 0x1b2c}, 0x1, 0x0, 0x0, 0x40800}, 0x40088c4) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001fc0)) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000002080)={'syztnl0\x00', &(0x7f0000002000)={'ip6gre0\x00', r2, 0x2f, 0xff, 0x89, 0xf37, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, 0x80, 0x8801, 0x20, 0x7fff}}) (async) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000020c0)) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000002100)={'wg1\x00'}) (async) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000002480)={&(0x7f0000001f80)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002440)={&(0x7f0000002140)={0x2c8, 0x0, 0x4, 0x70bd2d, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0xc0, 0x2, 0x0, 0x1, [{0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1b11}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r5}, {0x1e4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfff}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x500}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x2c8}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) (async) unshare(0x24040400) (async) unshare(0x22000000) (async) 09:59:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x16, 0x8e, 0x40, 0x6, 0x24, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7800, 0x8000, 0x4559, 0x6}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:50 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 09:59:50 executing program 2: unshare(0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0x9, 0x7ff}) unshare(0x22000000) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) unshare(0x400) 09:59:50 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 09:59:50 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 09:59:50 executing program 2: unshare(0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0x9, 0x7ff}) unshare(0x22000000) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) unshare(0x400) unshare(0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0x9, 0x7ff}) (async) unshare(0x22000000) (async) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) (async) unshare(0x400) (async) 09:59:50 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x1f000000, 0x0, 0x0, 0x0) 09:59:50 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 09:59:50 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 09:59:50 executing program 2: unshare(0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0x9, 0x7ff}) unshare(0x22000000) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) unshare(0x400) unshare(0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000040)={0x9, 0x7ff}) (async) unshare(0x22000000) (async) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) (async) unshare(0x400) (async) 09:59:50 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@loopback, @dev}, &(0x7f0000000040)=0x8) unshare(0x24040400) unshare(0x22000000) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000180)={@empty, @multicast1}, &(0x7f00000001c0)=0x8) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, &(0x7f0000000080)={0x2, 0x100, 0x3f, 0x8000, 0x0, 0x8}) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000140)={0x6, [0x200, 0x4, 0x4, 0x9, 0x7ff, 0x6]}) 09:59:50 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 09:59:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x16, 0x8e, 0x40, 0x6, 0x24, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7800, 0x8000, 0x4559, 0x6}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:50 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) (async) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@loopback, @dev}, &(0x7f0000000040)=0x8) unshare(0x24040400) (async) unshare(0x22000000) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000180)={@empty, @multicast1}, &(0x7f00000001c0)=0x8) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, &(0x7f0000000080)={0x2, 0x100, 0x3f, 0x8000, 0x0, 0x8}) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000140)={0x6, [0x200, 0x4, 0x4, 0x9, 0x7ff, 0x6]}) 09:59:50 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) 09:59:50 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 09:59:50 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) 09:59:50 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 09:59:50 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 09:59:50 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000100)=0x1e) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@loopback, @dev}, &(0x7f0000000040)=0x8) (async) unshare(0x24040400) unshare(0x22000000) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000180)={@empty, @multicast1}, &(0x7f00000001c0)=0x8) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, &(0x7f0000000080)={0x2, 0x100, 0x3f, 0x8000, 0x0, 0x8}) (async) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000140)={0x6, [0x200, 0x4, 0x4, 0x9, 0x7ff, 0x6]}) 09:59:50 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 09:59:50 executing program 2: unshare(0x24040400) unshare(0x48061680) 09:59:51 executing program 2: unshare(0x24040400) unshare(0x48061680) unshare(0x24040400) (async) unshare(0x48061680) (async) 09:59:51 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 09:59:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x16, 0x8e, 0x40, 0x6, 0x24, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7800, 0x8000, 0x4559, 0x6}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r1, 0x89f4, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x16, 0x8e, 0x40, 0x6, 0x24, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7800, 0x8000, 0x4559, 0x6}}) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 09:59:51 executing program 2: unshare(0x24040400) (async) unshare(0x48061680) 09:59:51 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 09:59:51 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) 09:59:51 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 09:59:51 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x40000000, 0x0, 0x0, 0x0) 09:59:51 executing program 2: unshare(0x24040400) unshare(0x12000000) unshare(0x10c00) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x1ff) 09:59:51 executing program 2: unshare(0x24040400) (async) unshare(0x12000000) unshare(0x10c00) (async) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x1ff) 09:59:51 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x8235000000000000, 0x0, 0x0, 0x0) 09:59:51 executing program 2: unshare(0x24040400) (async) unshare(0x12000000) (async) unshare(0x10c00) (async, rerun: 64) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x1ff) (rerun: 64) 09:59:51 executing program 2: unshare(0x24040400) unshare(0x22000000) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f0000000000)={0x4, 0x0, [{}, {}, {}, {}]}) 09:59:51 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0) 09:59:52 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xffff030000000000, 0x0, 0x0, 0x0) 09:59:52 executing program 2: unshare(0x24040400) unshare(0x22000000) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f0000000000)={0x4, 0x0, [{}, {}, {}, {}]}) unshare(0x24040400) (async) unshare(0x22000000) (async) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f0000000000)={0x4, 0x0, [{}, {}, {}, {}]}) (async) 09:59:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f00000023c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000002400)='cgroup.controllers\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000140)={0x3, 0x1, &(0x7f0000000040)=""/220, &(0x7f00000021c0)=""/218, &(0x7f00000022c0)=""/194}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:52 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) 09:59:52 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 09:59:52 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x1b0de1f000, 0x0, 0x0, 0x0) 09:59:52 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) (async, rerun: 64) ioctl$KVM_GET_CPUID2(0xffffffffffffffff, 0xc008ae91, &(0x7f0000000000)={0x4, 0x0, [{}, {}, {}, {}]}) (rerun: 64) 09:59:52 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 09:59:52 executing program 2: unshare(0x24040400) unshare(0x22000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) unshare(0x38000200) unshare(0x40000) 09:59:52 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000080)=')/{\x00'}, 0x30) getpgid(r0) 09:59:52 executing program 2: unshare(0x24040400) unshare(0x22000000) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) (async) unshare(0x38000200) (async) unshare(0x40000) 09:59:52 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000080)=')/{\x00'}, 0x30) getpgid(r0) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpgid(0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000080)=')/{\x00'}, 0x30) (async) getpgid(r0) (async) 09:59:52 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) (async, rerun: 32) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) (async, rerun: 32) unshare(0x38000200) unshare(0x40000) 09:59:52 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x59, @dev={0xfe, 0x80, '\x00', 0xb}, @ipv4={'\x00', '\xff\xff', @local}, 0x7800, 0x700, 0x6, 0x5}}) unshare(0x24040400) unshare(0x22000000) 09:59:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f00000023c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000002400)='cgroup.controllers\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000140)={0x3, 0x1, &(0x7f0000000040)=""/220, &(0x7f00000021c0)=""/218, &(0x7f00000022c0)=""/194}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:53 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) (async) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000080)=')/{\x00'}, 0x30) getpgid(r0) 09:59:53 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x59, @dev={0xfe, 0x80, '\x00', 0xb}, @ipv4={'\x00', '\xff\xff', @local}, 0x7800, 0x700, 0x6, 0x5}}) unshare(0x24040400) unshare(0x22000000) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x59, @dev={0xfe, 0x80, '\x00', 0xb}, @ipv4={'\x00', '\xff\xff', @local}, 0x7800, 0x700, 0x6, 0x5}}) (async) unshare(0x24040400) (async) unshare(0x22000000) (async) 09:59:53 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 09:59:53 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x29d71992d000, 0x0, 0x0, 0x0) 09:59:53 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 09:59:53 executing program 2: ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x59, @dev={0xfe, 0x80, '\x00', 0xb}, @ipv4={'\x00', '\xff\xff', @local}, 0x7800, 0x700, 0x6, 0x5}}) unshare(0x24040400) unshare(0x22000000) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x59, @dev={0xfe, 0x80, '\x00', 0xb}, @ipv4={'\x00', '\xff\xff', @local}, 0x7800, 0x700, 0x6, 0x5}}) (async) unshare(0x24040400) (async) unshare(0x22000000) (async) 09:59:53 executing program 4: r0 = syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) getpgid(r0) 09:59:53 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0xfffffffffffffff5, r0, {0x0, 0xc}}, 0x20) unshare(0x24040400) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) unshare(0x22000000) unshare(0x10000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @broadcast}, &(0x7f0000000040)=0xc) 09:59:53 executing program 4: r0 = syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) getpgid(r0) 09:59:53 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0xfffffffffffffff5, r0, {0x0, 0xc}}, 0x20) unshare(0x24040400) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) unshare(0x22000000) unshare(0x10000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @broadcast}, &(0x7f0000000040)=0xc) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0xfffffffffffffff5, r0, {0x0, 0xc}}, 0x20) (async) unshare(0x24040400) (async) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) (async) unshare(0x22000000) (async) unshare(0x10000000) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @broadcast}, &(0x7f0000000040)=0xc) (async) 09:59:53 executing program 4: r0 = syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) (async) getpgid(r0) 09:59:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r2 = openat$cgroup(r1, &(0x7f00000023c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r2, &(0x7f0000002400)='cgroup.controllers\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000140)={0x3, 0x1, &(0x7f0000000040)=""/220, &(0x7f00000021c0)=""/218, &(0x7f00000022c0)=""/194}) (async, rerun: 32) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (rerun: 32) 09:59:54 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0xfffffffffffffff5, r0, {0x0, 0xc}}, 0x20) unshare(0x24040400) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) unshare(0x22000000) unshare(0x10000000) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @broadcast}, &(0x7f0000000040)=0xc) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) (async) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0xfffffffffffffff5, r0, {0x0, 0xc}}, 0x20) (async) unshare(0x24040400) (async) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) (async) unshare(0x22000000) (async) unshare(0x10000000) (async) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @remote, @broadcast}, &(0x7f0000000040)=0xc) (async) 09:59:54 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080), 0x101, 0x210000) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000000c0)=0x8) bind$inet(r0, 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0x5, 0x0, [{}, {}, {}, {}, {}]}) 09:59:54 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 09:59:54 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x553a27484000, 0x0, 0x0, 0x0) 09:59:54 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 09:59:54 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) r1 = syz_open_dev$mouse(&(0x7f0000000080), 0x101, 0x210000) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000000c0)=0x8) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0x5, 0x0, [{}, {}, {}, {}, {}]}) 09:59:54 executing program 2: unshare(0x24040400) unshare(0x0) 09:59:54 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080), 0x101, 0x210000) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000000c0)=0x8) bind$inet(r0, 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000000)={0x5, 0x0, [{}, {}, {}, {}, {}]}) 09:59:54 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x64010101}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x880) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:54 executing program 2: unshare(0x24040400) unshare(0x0) unshare(0x24040400) (async) unshare(0x0) (async) 09:59:54 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x64010101}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x880) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x64010101}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x880) (async) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 09:59:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000080)={0x90, 0x0, 0x0, {0x6, 0x3, 0x8001, 0x9, 0x3, 0x39, {0x6, 0x9, 0x5, 0x80, 0x8, 0x8, 0x3ff, 0x101, 0x5, 0xc000, 0x6, 0xffffffffffffffff, 0xee01, 0xffff, 0x4}}}, 0x90) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 09:59:55 executing program 2: unshare(0x24040400) unshare(0x0) 09:59:55 executing program 4: sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x64010101}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x880) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x8, 0x70bd2d, 0x25dfdbfc, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}, @FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x64010101}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x880) (async) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 09:59:55 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) 09:59:55 executing program 1: mlockall(0x3) syz_clone(0x10010800, 0x0, 0xfffffffffffffd1e, 0x0, 0x0, 0x0) 09:59:55 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 09:59:55 executing program 2: unshare(0x24040400) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="6a61cae9c1f82dd23516efe728182fc71a42c2e427bad8f1a47f1772f1c1fab5af09c87ced9b707be291218b8308bd819bc42f0154293aec", 0x38) unshare(0x10200) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=""/60, &(0x7f00000000c0)=""/229, &(0x7f00000001c0)=""/154, 0xf000}) unshare(0x22000000) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040)={0xfffffb21}, 0x4) 09:59:55 executing program 2: unshare(0x24040400) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="6a61cae9c1f82dd23516efe728182fc71a42c2e427bad8f1a47f1772f1c1fab5af09c87ced9b707be291218b8308bd819bc42f0154293aec", 0x38) (async) unshare(0x10200) (async) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=""/60, &(0x7f00000000c0)=""/229, &(0x7f00000001c0)=""/154, 0xf000}) (async) unshare(0x22000000) (async) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040)={0xfffffb21}, 0x4) 09:59:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000080)={0x90, 0x0, 0x0, {0x6, 0x3, 0x8001, 0x9, 0x3, 0x39, {0x6, 0x9, 0x5, 0x80, 0x8, 0x8, 0x3ff, 0x101, 0x5, 0xc000, 0x6, 0xffffffffffffffff, 0xee01, 0xffff, 0x4}}}, 0x90) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), 0xffffffffffffffff) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_ENTRY(r1, &(0x7f0000000080)={0x90, 0x0, 0x0, {0x6, 0x3, 0x8001, 0x9, 0x3, 0x39, {0x6, 0x9, 0x5, 0x80, 0x8, 0x8, 0x3ff, 0x101, 0x5, 0xc000, 0x6, 0xffffffffffffffff, 0xee01, 0xffff, 0x4}}}, 0x90) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) (async) 09:59:55 executing program 4: r0 = syz_clone(0x509b821eaa0180, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="609cd30715199862aa3701d6c73a8dd65c3aa430951d62379020154f530ab307fc5360e19205ccf24d000000b342aa30cdb0878d7a0691b024c43cc0926f298a62ae76549b5472e6aec7b82da4b70613deaecf2c7d0c366dabb336f04c41e181efc4374972883e9dfaf5e7c6a00966e1ddc390760e3946dd8f4a7cbaaae4bfd2128d0d5b2d6d3c916240b156", 0xffffffffffffff9d, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000004c0)="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") sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x1f, 0x8, 0x9, 0x9, 0x0, 0x437, 0x400, 0x6}, 0x0) 09:59:55 executing program 2: unshare(0x24040400) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="6a61cae9c1f82dd23516efe728182fc71a42c2e427bad8f1a47f1772f1c1fab5af09c87ced9b707be291218b8308bd819bc42f0154293aec", 0x38) (async) unshare(0x10200) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)=""/60, &(0x7f00000000c0)=""/229, &(0x7f00000001c0)=""/154, 0xf000}) (async) unshare(0x22000000) (async) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040)={0xfffffb21}, 0x4) 09:59:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140), 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_ENTRY(r1, &(0x7f0000000080)={0x90, 0x0, 0x0, {0x6, 0x3, 0x8001, 0x9, 0x3, 0x39, {0x6, 0x9, 0x5, 0x80, 0x8, 0x8, 0x3ff, 0x101, 0x5, 0xc000, 0x6, 0xffffffffffffffff, 0xee01, 0xffff, 0x4}}}, 0x90) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000140), 0xffffffffffffffff) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) write$FUSE_ENTRY(r1, &(0x7f0000000080)={0x90, 0x0, 0x0, {0x6, 0x3, 0x8001, 0x9, 0x3, 0x39, {0x6, 0x9, 0x5, 0x80, 0x8, 0x8, 0x3ff, 0x101, 0x5, 0xc000, 0x6, 0xffffffffffffffff, 0xee01, 0xffff, 0x4}}}, 0x90) (async) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) (async) 09:59:55 executing program 4: r0 = syz_clone(0x509b821eaa0180, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="609cd30715199862aa3701d6c73a8dd65c3aa430951d62379020154f530ab307fc5360e19205ccf24d000000b342aa30cdb0878d7a0691b024c43cc0926f298a62ae76549b5472e6aec7b82da4b70613deaecf2c7d0c366dabb336f04c41e181efc4374972883e9dfaf5e7c6a00966e1ddc390760e3946dd8f4a7cbaaae4bfd2128d0d5b2d6d3c916240b156", 0xffffffffffffff9d, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000004c0)="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") sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x1f, 0x8, 0x9, 0x9, 0x0, 0x437, 0x400, 0x6}, 0x0) syz_clone(0x509b821eaa0180, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x0, &(0x7f0000000400)="609cd30715199862aa3701d6c73a8dd65c3aa430951d62379020154f530ab307fc5360e19205ccf24d000000b342aa30cdb0878d7a0691b024c43cc0926f298a62ae76549b5472e6aec7b82da4b70613deaecf2c7d0c366dabb336f04c41e181efc4374972883e9dfaf5e7c6a00966e1ddc390760e3946dd8f4a7cbaaae4bfd2128d0d5b2d6d3c916240b156", 0xffffffffffffff9d, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000004c0)="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") (async) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x1f, 0x8, 0x9, 0x9, 0x0, 0x437, 0x400, 0x6}, 0x0) (async) 09:59:55 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:55 executing program 2: unshare(0x24040400) unshare(0xe050000) unshare(0x40000000) 09:59:55 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) 09:59:55 executing program 4: r0 = syz_clone(0x509b821eaa0180, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, &(0x7f0000000400)="609cd30715199862aa3701d6c73a8dd65c3aa430951d62379020154f530ab307fc5360e19205ccf24d000000b342aa30cdb0878d7a0691b024c43cc0926f298a62ae76549b5472e6aec7b82da4b70613deaecf2c7d0c366dabb336f04c41e181efc4374972883e9dfaf5e7c6a00966e1ddc390760e3946dd8f4a7cbaaae4bfd2128d0d5b2d6d3c916240b156", 0xffffffffffffff9d, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000004c0)="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") sched_setattr(r0, &(0x7f0000000140)={0x38, 0x0, 0x1f, 0x8, 0x9, 0x9, 0x0, 0x437, 0x400, 0x6}, 0x0) 09:59:55 executing program 0: mlockall(0x2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:55 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:55 executing program 2: unshare(0x24040400) unshare(0xe050000) unshare(0x40000000) unshare(0x24040400) (async) unshare(0xe050000) (async) unshare(0x40000000) (async) 09:59:55 executing program 1: mlockall(0x3) syz_clone(0x10010800, 0x0, 0xfffffffffffffd1e, 0x0, 0x0, 0x0) mlockall(0x3) (async) syz_clone(0x10010800, 0x0, 0xfffffffffffffd1e, 0x0, 0x0, 0x0) (async) 09:59:55 executing program 4: syz_clone(0x509b825f2f7580, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:55 executing program 4: syz_clone(0x509b825f2f7580, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x509b825f2f7580, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 09:59:55 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x8, &(0x7f0000000200)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) socket$inet6_udplite(0xa, 0x2, 0x88) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:55 executing program 0: mlockall(0x2) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x20, 0x2400) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 09:59:55 executing program 4: syz_clone(0x509b825f2f7580, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:55 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) 09:59:55 executing program 0: mlockall(0x2) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mlockall(0x2) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 09:59:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x20, 0x2400) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 09:59:55 executing program 4: prctl$PR_SVE_SET_VL(0x32, 0x1c52c) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) 09:59:55 executing program 2: unshare(0x24040400) (async, rerun: 32) unshare(0xe050000) (async, rerun: 32) unshare(0x40000000) 09:59:55 executing program 1: mlockall(0x3) syz_clone(0x10010800, 0x0, 0xfffffffffffffd1e, 0x0, 0x0, 0x0) mlockall(0x3) (async) syz_clone(0x10010800, 0x0, 0xfffffffffffffd1e, 0x0, 0x0, 0x0) (async) 09:59:55 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x20, 0x2400) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 09:59:55 executing program 4: prctl$PR_SVE_SET_VL(0x32, 0x1c52c) (async) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpgid(0xffffffffffffffff) 09:59:55 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={r1, @multicast1, @dev={0xac, 0x14, 0x14, 0x37}}, 0xc) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002040)={0x2020}, 0xffffffee) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x40a40, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r3, 0xc0104811, &(0x7f0000000380)={0x5c854813, 0x8c, 0x20, 0x6}) 09:59:55 executing program 2: r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0xba, 0x480080) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000000040)) unshare(0x40880) unshare(0x8000000) unshare(0xc000000) 09:59:55 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={r1, @multicast1, @dev={0xac, 0x14, 0x14, 0x37}}, 0xc) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) read$FUSE(r2, &(0x7f0000002040)={0x2020}, 0xffffffee) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x40a40, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r3, 0xc0104811, &(0x7f0000000380)={0x5c854813, 0x8c, 0x20, 0x6}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) (async) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={r1, @multicast1, @dev={0xac, 0x14, 0x14, 0x37}}, 0xc) (async) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r2, 0x0, 0x0) (async) read$FUSE(r2, &(0x7f0000002040)={0x2020}, 0xffffffee) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x40a40, 0x0) (async) ioctl$HIDIOCGCOLLECTIONINFO(r3, 0xc0104811, &(0x7f0000000380)={0x5c854813, 0x8c, 0x20, 0x6}) (async) 09:59:55 executing program 2: r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0xba, 0x480080) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000000040)) unshare(0x40880) unshare(0x8000000) unshare(0xc000000) syz_open_dev$hiddev(&(0x7f0000000000), 0xba, 0x480080) (async) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000000040)) (async) unshare(0x40880) (async) unshare(0x8000000) (async) unshare(0xc000000) (async) 09:59:56 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x4048273a550000, 0x0, 0x0, 0x0) 09:59:56 executing program 4: prctl$PR_SVE_SET_VL(0x32, 0x1c52c) (async) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) 09:59:56 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000300)={r1, @multicast1, @dev={0xac, 0x14, 0x14, 0x37}}, 0xc) (async) socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) (async, rerun: 32) read$FUSE(r2, &(0x7f0000002040)={0x2020}, 0xffffffee) (rerun: 32) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x40a40, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r3, 0xc0104811, &(0x7f0000000380)={0x5c854813, 0x8c, 0x20, 0x6}) 09:59:56 executing program 2: r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0xba, 0x480080) ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000000040)) unshare(0x40880) (async) unshare(0x8000000) (async) unshare(0xc000000) 09:59:56 executing program 0: mlockall(0x3) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r1 = getuid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x6, 0x1, 0x8, 0xae19, 0x4, 0x80000001, {0x0, 0x200, 0x4, 0x5, 0x0, 0x8d4, 0x3, 0x1, 0xff, 0xa000, 0x0, r1, 0xee01, 0x10000, 0x9}}}, 0x90) 09:59:56 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)) mlockall(0x6) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000001c0)={0x5e, @empty, 0x4e24, 0x0, 'ovf\x00', 0x6, 0x5, 0x70}, 0x2c) r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x2, @loopback, 0x4e23, 0x0, 'lblcr\x00', 0x3a, 0x5, 0x7f}, 0x2c) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @local}, 0x10) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000140)={0x10}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0xb0, 0x0, 0x8, 0x52, @dev={0xfe, 0x80, '\x00', 0x28}, @empty, 0x10, 0x40, 0x10003f8a, 0x77}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000180)={'wg2\x00'}) 09:59:56 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:56 executing program 4: r0 = syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) r2 = getpgid(r0) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x0, {{0x8, 0xb2, 0x0, r2}}}, 0x28) 09:59:56 executing program 2: unshare(0x72060880) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000002080)={0x18, 0x0, r0, {0xa013}}, 0x18) unshare(0x22000200) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x5, 0x5000}) pselect6(0x40, &(0x7f00000020c0)={0x4, 0x80, 0x5, 0x8, 0x8000000000000000, 0x7ff, 0x3, 0xfffffffffffffffa}, &(0x7f0000002100)={0xf80c, 0x1, 0x5, 0x10000, 0x1, 0x9, 0x0, 0x4}, &(0x7f0000002140)={0x8, 0x7, 0x101, 0x9, 0xf9, 0xfffffffffffffffd, 0xa56, 0x872}, &(0x7f0000002180)={0x0, 0x989680}, &(0x7f0000002200)={&(0x7f00000021c0)={[0x8]}, 0x8}) 09:59:56 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:56 executing program 2: unshare(0x72060880) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000002080)={0x18, 0x0, r0, {0xa013}}, 0x18) unshare(0x22000200) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x5, 0x5000}) pselect6(0x40, &(0x7f00000020c0)={0x4, 0x80, 0x5, 0x8, 0x8000000000000000, 0x7ff, 0x3, 0xfffffffffffffffa}, &(0x7f0000002100)={0xf80c, 0x1, 0x5, 0x10000, 0x1, 0x9, 0x0, 0x4}, &(0x7f0000002140)={0x8, 0x7, 0x101, 0x9, 0xf9, 0xfffffffffffffffd, 0xa56, 0x872}, &(0x7f0000002180)={0x0, 0x989680}, &(0x7f0000002200)={&(0x7f00000021c0)={[0x8]}, 0x8}) unshare(0x72060880) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020}, 0x2020) (async) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000002080)={0x18, 0x0, r0, {0xa013}}, 0x18) (async) unshare(0x22000200) (async) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x5, 0x5000}) (async) pselect6(0x40, &(0x7f00000020c0)={0x4, 0x80, 0x5, 0x8, 0x8000000000000000, 0x7ff, 0x3, 0xfffffffffffffffa}, &(0x7f0000002100)={0xf80c, 0x1, 0x5, 0x10000, 0x1, 0x9, 0x0, 0x4}, &(0x7f0000002140)={0x8, 0x7, 0x101, 0x9, 0xf9, 0xfffffffffffffffd, 0xa56, 0x872}, &(0x7f0000002180)={0x0, 0x989680}, &(0x7f0000002200)={&(0x7f00000021c0)={[0x8]}, 0x8}) (async) 09:59:56 executing program 4: r0 = syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) (async) r2 = getpgid(r0) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x0, {{0x8, 0xb2, 0x0, r2}}}, 0x28) 09:59:56 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0xd09219d7290000, 0x0, 0x0, 0x0) 09:59:56 executing program 3: read$FUSE(0xffffffffffffffff, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:56 executing program 2: unshare(0x72060880) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000002080)={0x18, 0x0, r0, {0xa013}}, 0x18) (async) unshare(0x22000200) (async) ioctl$KVM_ARM_SET_DEVICE_ADDR(0xffffffffffffffff, 0x4010aeab, &(0x7f0000000000)={0x5, 0x5000}) pselect6(0x40, &(0x7f00000020c0)={0x4, 0x80, 0x5, 0x8, 0x8000000000000000, 0x7ff, 0x3, 0xfffffffffffffffa}, &(0x7f0000002100)={0xf80c, 0x1, 0x5, 0x10000, 0x1, 0x9, 0x0, 0x4}, &(0x7f0000002140)={0x8, 0x7, 0x101, 0x9, 0xf9, 0xfffffffffffffffd, 0xa56, 0x872}, &(0x7f0000002180)={0x0, 0x989680}, &(0x7f0000002200)={&(0x7f00000021c0)={[0x8]}, 0x8}) 09:59:56 executing program 4: r0 = syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) r2 = getpgid(r0) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x0, {{0x8, 0xb2, 0x0, r2}}}, 0x28) 09:59:56 executing program 0: mlockall(0x3) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r1 = getuid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x6, 0x1, 0x8, 0xae19, 0x4, 0x80000001, {0x0, 0x200, 0x4, 0x5, 0x0, 0x8d4, 0x3, 0x1, 0xff, 0xa000, 0x0, r1, 0xee01, 0x10000, 0x9}}}, 0x90) mlockall(0x3) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpgid(r0) (async) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) (async) getuid() (async) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x6, 0x1, 0x8, 0xae19, 0x4, 0x80000001, {0x0, 0x200, 0x4, 0x5, 0x0, 0x8d4, 0x3, 0x1, 0xff, 0xa000, 0x0, r1, 0xee01, 0x10000, 0x9}}}, 0x90) (async) 09:59:56 executing program 1: mlockall(0x3) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)) mlockall(0x6) (async) bind$inet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000001c0)={0x5e, @empty, 0x4e24, 0x0, 'ovf\x00', 0x6, 0x5, 0x70}, 0x2c) (async) r0 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x2, @loopback, 0x4e23, 0x0, 'lblcr\x00', 0x3a, 0x5, 0x7f}, 0x2c) (async) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @local}, 0x10) (async, rerun: 64) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000140)={0x10}, 0x10) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0xb0, 0x0, 0x8, 0x52, @dev={0xfe, 0x80, '\x00', 0x28}, @empty, 0x10, 0x40, 0x10003f8a, 0x77}}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000180)={'wg2\x00'}) 09:59:56 executing program 2: unshare(0x24040400) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)) unshare(0x22000000) 09:59:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f00000021c0)={0x8, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e21, @loopback}}}, 0x108) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r4, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) r5 = syz_open_dev$mouse(&(0x7f0000000040), 0x20, 0x80000) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f0000002300)) read$FUSE(r3, &(0x7f0000000180)={0x2020}, 0xffffffda) 09:59:56 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000040)={0x1, 0x0, 0x15}) 09:59:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f00000021c0)={0x8, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e21, @loopback}}}, 0x108) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r4, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) r5 = syz_open_dev$mouse(&(0x7f0000000040), 0x20, 0x80000) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f0000002300)) read$FUSE(r3, &(0x7f0000000180)={0x2020}, 0xffffffda) socket$inet6_udp(0xa, 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f00000021c0)={0x8, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e21, @loopback}}}, 0x108) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r2, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) (async) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r4, 0x0, 0x0) (async) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) (async) syz_open_dev$mouse(&(0x7f0000000040), 0x20, 0x80000) (async) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f0000002300)) (async) read$FUSE(r3, &(0x7f0000000180)={0x2020}, 0xffffffda) (async) 09:59:56 executing program 2: unshare(0x24040400) (async, rerun: 64) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)) (async, rerun: 64) unshare(0x22000000) 09:59:56 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000040)={0x1, 0x0, 0x15}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) (async) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000040)={0x1, 0x0, 0x15}) (async) 09:59:56 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0xf0e10d1b000000, 0x0, 0x0, 0x0) 09:59:56 executing program 2: unshare(0x24040400) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000000)) unshare(0x22000000) 09:59:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) (async) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f00000021c0)={0x8, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e21, @loopback}}}, 0x108) (async, rerun: 64) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 64) bind$inet(r2, 0x0, 0x0) (async) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x2) (async, rerun: 32) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 32) bind$inet(r4, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x1) (async) r5 = syz_open_dev$mouse(&(0x7f0000000040), 0x20, 0x80000) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f0000002300)) read$FUSE(r3, &(0x7f0000000180)={0x2020}, 0xffffffda) 09:59:56 executing program 4: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000040)={0x1, 0x0, 0x15}) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000000)) (async) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000040)={0x1, 0x0, 0x15}) (async) 09:59:56 executing program 1: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000100)) (async, rerun: 32) mlockall(0x6) (async, rerun: 32) bind$inet(0xffffffffffffffff, 0x0, 0x0) (async) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f00000001c0)={0x5e, @empty, 0x4e24, 0x0, 'ovf\x00', 0x6, 0x5, 0x70}, 0x2c) (async, rerun: 64) r0 = socket$inet_icmp(0x2, 0x2, 0x1) (rerun: 64) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000000)={0x2, @loopback, 0x4e23, 0x0, 'lblcr\x00', 0x3a, 0x5, 0x7f}, 0x2c) connect$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @local}, 0x10) (async) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000140)={0x10}, 0x10) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0xb0, 0x0, 0x8, 0x52, @dev={0xfe, 0x80, '\x00', 0x28}, @empty, 0x10, 0x40, 0x10003f8a, 0x77}}) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000180)={'wg2\x00'}) 09:59:56 executing program 0: mlockall(0x3) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) (async) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r1 = getuid() write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x6, 0x1, 0x8, 0xae19, 0x4, 0x80000001, {0x0, 0x200, 0x4, 0x5, 0x0, 0x8d4, 0x3, 0x1, 0xff, 0xa000, 0x0, r1, 0xee01, 0x10000, 0x9}}}, 0x90) 09:59:56 executing program 2: unshare(0x24040400) unshare(0x22000000) unshare(0x28010880) 09:59:56 executing program 2: unshare(0x24040400) unshare(0x22000000) unshare(0x28010880) unshare(0x24040400) (async) unshare(0x22000000) (async) unshare(0x28010880) (async) 09:59:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:56 executing program 4: syz_clone(0x509b827e284000, 0x0, 0xfffffffffffffc71, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x27) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) 09:59:56 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async, rerun: 32) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (rerun: 32) 09:59:56 executing program 2: unshare(0x24040400) unshare(0x22000000) unshare(0x28010880) 09:59:57 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 09:59:57 executing program 2: unshare(0x24040400) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x2, 0x0) r1 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000000c0)='cpu.pressure\x00', 0x2, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cpu.idle\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0xec, 0x0, &(0x7f0000000540)=[@request_death={0x400c630e, 0x2}, @release={0x40046306, 0x3}, @clear_death, @enter_looper, @decrefs={0x40046307, 0x3}, @acquire={0x40046305, 0x2}, @decrefs={0x40046307, 0x1}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000003c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32, @ANYBLOB="0000000000000000000000008561646600000000061400000000000000000000000000003d00000000000000852a646600000000", @ANYRES32=r1, @ANYBLOB="0000203b067161092c7900001e127b8c18433b336df0118d578724ad784f4382f2b6db454c4341d90288cc66cd"], &(0x7f0000000180)={0x0, 0x18, 0x38}}}, @clear_death={0x400c630f, 0x2}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x60, 0x18, &(0x7f00000002c0)={@ptr={0x70742a85, 0x0, &(0x7f00000001c0)=""/153, 0x99, 0x0, 0x13}, @fda={0x66646185, 0x1, 0x1, 0x25}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000000380)={0x0, 0x28, 0x48}}}], 0x65, 0x0, &(0x7f0000000480)="e960521804d0a94a4e6789833c73e1fc0ebb3ca692faf445874d482346ff1a0ebe741cc64f65a7eb39d8350a99889d3a6a240d28114371bd869819a40c6bece52b955961b3de5beb23218447fd3b75ed9c59b0d71456b2423174f477624710a391515a9be3"}) unshare(0x22000000) 09:59:57 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async, rerun: 32) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (rerun: 32) 09:59:57 executing program 4: syz_clone(0x509b827e284000, 0x0, 0xfffffffffffffc71, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x27) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) syz_clone(0x509b827e284000, 0x0, 0xfffffffffffffc71, 0x0, 0x0, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x27) (async) getpgid(0x0) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r2, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) (async) 09:59:57 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2300, 0x0) mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:57 executing program 0: mlockall(0x3) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002080), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002040)) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) 09:59:57 executing program 2: unshare(0x24040400) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x2, 0x0) (async) r1 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000000c0)='cpu.pressure\x00', 0x2, 0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cpu.idle\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0xec, 0x0, &(0x7f0000000540)=[@request_death={0x400c630e, 0x2}, @release={0x40046306, 0x3}, @clear_death, @enter_looper, @decrefs={0x40046307, 0x3}, @acquire={0x40046305, 0x2}, @decrefs={0x40046307, 0x1}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000003c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32, @ANYBLOB="0000000000000000000000008561646600000000061400000000000000000000000000003d00000000000000852a646600000000", @ANYRES32=r1, @ANYBLOB="0000203b067161092c7900001e127b8c18433b336df0118d578724ad784f4382f2b6db454c4341d90288cc66cd"], &(0x7f0000000180)={0x0, 0x18, 0x38}}}, @clear_death={0x400c630f, 0x2}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x60, 0x18, &(0x7f00000002c0)={@ptr={0x70742a85, 0x0, &(0x7f00000001c0)=""/153, 0x99, 0x0, 0x13}, @fda={0x66646185, 0x1, 0x1, 0x25}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000000380)={0x0, 0x28, 0x48}}}], 0x65, 0x0, &(0x7f0000000480)="e960521804d0a94a4e6789833c73e1fc0ebb3ca692faf445874d482346ff1a0ebe741cc64f65a7eb39d8350a99889d3a6a240d28114371bd869819a40c6bece52b955961b3de5beb23218447fd3b75ed9c59b0d71456b2423174f477624710a391515a9be3"}) (async) unshare(0x22000000) 09:59:57 executing program 4: syz_clone(0x509b827e284000, 0x0, 0xfffffffffffffc71, 0x0, 0x0, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x27) (async) r1 = getpgid(0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x0, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r2, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) 09:59:57 executing program 2: unshare(0x24040400) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs/binder1\x00', 0x2, 0x0) (async) r1 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f00000000c0)='cpu.pressure\x00', 0x2, 0x0) (async) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cpu.idle\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0xec, 0x0, &(0x7f0000000540)=[@request_death={0x400c630e, 0x2}, @release={0x40046306, 0x3}, @clear_death, @enter_looper, @decrefs={0x40046307, 0x3}, @acquire={0x40046305, 0x2}, @decrefs={0x40046307, 0x1}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f00000003c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32, @ANYBLOB="0000000000000000000000008561646600000000061400000000000000000000000000003d00000000000000852a646600000000", @ANYRES32=r1, @ANYBLOB="0000203b067161092c7900001e127b8c18433b336df0118d578724ad784f4382f2b6db454c4341d90288cc66cd"], &(0x7f0000000180)={0x0, 0x18, 0x38}}}, @clear_death={0x400c630f, 0x2}, @transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x60, 0x18, &(0x7f00000002c0)={@ptr={0x70742a85, 0x0, &(0x7f00000001c0)=""/153, 0x99, 0x0, 0x13}, @fda={0x66646185, 0x1, 0x1, 0x25}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000000380)={0x0, 0x28, 0x48}}}], 0x65, 0x0, &(0x7f0000000480)="e960521804d0a94a4e6789833c73e1fc0ebb3ca692faf445874d482346ff1a0ebe741cc64f65a7eb39d8350a99889d3a6a240d28114371bd869819a40c6bece52b955961b3de5beb23218447fd3b75ed9c59b0d71456b2423174f477624710a391515a9be3"}) (async) unshare(0x22000000) 09:59:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) syz_genetlink_get_family_id$fou(&(0x7f0000000000), 0xffffffffffffffff) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x81, 0x5, 0x9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}, @local, 0x40, 0x1, 0xfffffffe, 0xfffffff8}}) 09:59:57 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x115000, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000002080), r2) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000020c0), 0x0, 0x101000) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002300), 0x40001, 0x0) bind$inet(r4, 0x0, 0x0) write$FUSE_WRITE(r1, &(0x7f0000002240)={0x18, 0x0, 0x0, {0xfff}}, 0x18) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x141082, 0x0) bind$inet(r5, 0x0, 0x0) mkdirat$cgroup(r5, &(0x7f0000002280)='syz1\x00', 0x1ff) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @private=0xa010102}, 0x10) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) read$FUSE(r6, &(0x7f0000002340)={0x2020}, 0x2020) socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'geneve0\x00', 0x6}, 0x18) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:57 executing program 2: unshare(0x24040400) unshare(0x22000000) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 09:59:57 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 09:59:57 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x115000, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000002080), r2) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000020c0), 0x0, 0x101000) (async) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002300), 0x40001, 0x0) bind$inet(r4, 0x0, 0x0) (async) write$FUSE_WRITE(r1, &(0x7f0000002240)={0x18, 0x0, 0x0, {0xfff}}, 0x18) (async, rerun: 64) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x141082, 0x0) (rerun: 64) bind$inet(r5, 0x0, 0x0) (async) mkdirat$cgroup(r5, &(0x7f0000002280)='syz1\x00', 0x1ff) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @private=0xa010102}, 0x10) (async, rerun: 64) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) (rerun: 64) read$FUSE(r6, &(0x7f0000002340)={0x2020}, 0x2020) (async, rerun: 64) socket$inet_icmp(0x2, 0x2, 0x1) (async, rerun: 64) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'geneve0\x00', 0x6}, 0x18) (async, rerun: 64) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) (async, rerun: 64) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:57 executing program 2: unshare(0x24040400) unshare(0x22000000) (async, rerun: 64) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (rerun: 64) 09:59:57 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2300, 0x0) mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:57 executing program 0: mlockall(0x3) (async) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002080), 0x0, 0x0) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002040)) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) 09:59:57 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) (async) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 09:59:57 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x115000, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000002080), r2) (async) ioctl$VHOST_RESET_OWNER(r1, 0xaf02, 0x0) r3 = syz_open_dev$mouse(&(0x7f00000020c0), 0x0, 0x101000) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000002300), 0x40001, 0x0) bind$inet(r4, 0x0, 0x0) write$FUSE_WRITE(r1, &(0x7f0000002240)={0x18, 0x0, 0x0, {0xfff}}, 0x18) (async) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x141082, 0x0) bind$inet(r5, 0x0, 0x0) (async) mkdirat$cgroup(r5, &(0x7f0000002280)='syz1\x00', 0x1ff) (async) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @private=0xa010102}, 0x10) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002100), 0x2, 0x0) read$FUSE(r6, &(0x7f0000002340)={0x2020}, 0x2020) socket$inet_icmp(0x2, 0x2, 0x1) (async) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'geneve0\x00', 0x6}, 0x18) (async) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) (async) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:57 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x44101, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', 0x0, 0x2f, 0x90, 0x6, 0x80000000, 0x29, @loopback, @empty, 0x10, 0x1, 0x3, 0x5}}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x100, 0x0) unshare(0x24040400) unshare(0x80) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=""/28, &(0x7f0000000040)=""/181, &(0x7f0000000100)=""/40, 0x6000}) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 09:59:57 executing program 4: r0 = syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) 09:59:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000000), 0xffffffffffffffff) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x81, 0x5, 0x9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}, @local, 0x40, 0x1, 0xfffffffe, 0xfffffff8}}) 09:59:58 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x44101, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', 0x0, 0x2f, 0x90, 0x6, 0x80000000, 0x29, @loopback, @empty, 0x10, 0x1, 0x3, 0x5}}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x100, 0x0) unshare(0x24040400) (async, rerun: 32) unshare(0x80) (rerun: 32) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=""/28, &(0x7f0000000040)=""/181, &(0x7f0000000100)=""/40, 0x6000}) (async) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 09:59:58 executing program 4: r0 = syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpgid(r0) (async) 09:59:58 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2300, 0x0) mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2300, 0x0) (async) mlockall(0x3) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 09:59:58 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 09:59:58 executing program 0: mlockall(0x3) (async, rerun: 64) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) (rerun: 64) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002080), 0x0, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002040)) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) 09:59:58 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x44101, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', 0x0, 0x2f, 0x90, 0x6, 0x80000000, 0x29, @loopback, @empty, 0x10, 0x1, 0x3, 0x5}}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x100, 0x0) (async) unshare(0x24040400) (async) unshare(0x80) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=""/28, &(0x7f0000000040)=""/181, &(0x7f0000000100)=""/40, 0x6000}) (async) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 09:59:58 executing program 2: unshare(0x76040080) r0 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000000)={0x60171a62, r0}, &(0x7f0000000040)={0x0, 0x9, 0xffffffff, 0x792, 0x5, 0x3}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x14020000) bind$inet(r1, 0x0, 0x0) r2 = getpgid(r0) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, {{0x5, 0x7, 0x2, r2}}}, 0x28) unshare(0x22000000) 09:59:58 executing program 4: r0 = syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpgid(r0) (async) 09:59:58 executing program 2: unshare(0x76040080) (async) r0 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000000)={0x60171a62, r0}, &(0x7f0000000040)={0x0, 0x9, 0xffffffff, 0x792, 0x5, 0x3}) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x14020000) (async) bind$inet(r1, 0x0, 0x0) (async) r2 = getpgid(r0) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, {{0x5, 0x7, 0x2, r2}}}, 0x28) (async) unshare(0x22000000) 09:59:58 executing program 2: unshare(0x76040080) r0 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000000)={0x60171a62, r0}, &(0x7f0000000040)={0x0, 0x9, 0xffffffff, 0x792, 0x5, 0x3}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) unshare(0x14020000) bind$inet(r1, 0x0, 0x0) r2 = getpgid(r0) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, {{0x5, 0x7, 0x2, r2}}}, 0x28) unshare(0x22000000) unshare(0x76040080) (async) getpgid(0xffffffffffffffff) (async) capget(&(0x7f0000000000)={0x60171a62, r0}, &(0x7f0000000040)={0x0, 0x9, 0xffffffff, 0x792, 0x5, 0x3}) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) unshare(0x14020000) (async) bind$inet(r1, 0x0, 0x0) (async) getpgid(r0) (async) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, {{0x5, 0x7, 0x2, r2}}}, 0x28) (async) unshare(0x22000000) (async) 09:59:58 executing program 2: write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0xffffffffffffff6c}}, 0x18) unshare(0x0) unshare(0x24000980) 09:59:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) syz_genetlink_get_family_id$fou(&(0x7f0000000000), 0xffffffffffffffff) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r1, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x81, 0x5, 0x9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}, @local, 0x40, 0x1, 0xfffffffe, 0xfffffff8}}) socket$inet6_udp(0xa, 0x2, 0x0) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) syz_genetlink_get_family_id$fou(&(0x7f0000000000), 0xffffffffffffffff) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r1, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000000c0)={'ip6gre0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x29, 0x81, 0x5, 0x9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}, @local, 0x40, 0x1, 0xfffffffe, 0xfffffff8}}) (async) 09:59:58 executing program 4: syz_clone(0x509b827d0a4000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0xbc, 0x5, 0x4, 0x22, @mcast1, @loopback, 0x8000, 0x8000, 0x8, 0x8}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x140, r1, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x124, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8, 0x0, 0x7, 0x9}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x2, 0x3, 0x3f, 0x9}, {0x101, 0x7f, 0x0, 0x14733646}, {0x9, 0x9, 0x0, 0x623}, {0xe93, 0x0, 0x0, 0x9}, {0x7, 0x53, 0x8, 0x2}, {0x5, 0x9, 0x6, 0x3a}, {0x5, 0x0, 0xca, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xab2e}}}]}}]}, 0x140}, 0x1, 0x0, 0x0, 0x48000}, 0x2000000) 09:59:58 executing program 2: write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0xffffffffffffff6c}}, 0x18) (async) unshare(0x0) (async) unshare(0x24000980) 09:59:58 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) 09:59:58 executing program 1: mlockall(0x3) 09:59:58 executing program 0: mlockall(0x3) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r0, 0xc0104811, &(0x7f0000000000)={0x5, 0x4, 0x3, 0x5}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@private}, &(0x7f0000000080)=0xc) syz_clone(0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:58 executing program 2: write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, 0x0, {0xffffffffffffff6c}}, 0x18) (async) unshare(0x0) (async, rerun: 32) unshare(0x24000980) (rerun: 32) 09:59:58 executing program 4: syz_clone(0x509b827d0a4000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0xbc, 0x5, 0x4, 0x22, @mcast1, @loopback, 0x8000, 0x8000, 0x8, 0x8}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x140, r1, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x124, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8, 0x0, 0x7, 0x9}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x2, 0x3, 0x3f, 0x9}, {0x101, 0x7f, 0x0, 0x14733646}, {0x9, 0x9, 0x0, 0x623}, {0xe93, 0x0, 0x0, 0x9}, {0x7, 0x53, 0x8, 0x2}, {0x5, 0x9, 0x6, 0x3a}, {0x5, 0x0, 0xca, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xab2e}}}]}}]}, 0x140}, 0x1, 0x0, 0x0, 0x48000}, 0x2000000) syz_clone(0x509b827d0a4000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0xbc, 0x5, 0x4, 0x22, @mcast1, @loopback, 0x8000, 0x8000, 0x8, 0x8}}) (async) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x140, r1, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x124, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8, 0x0, 0x7, 0x9}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x2, 0x3, 0x3f, 0x9}, {0x101, 0x7f, 0x0, 0x14733646}, {0x9, 0x9, 0x0, 0x623}, {0xe93, 0x0, 0x0, 0x9}, {0x7, 0x53, 0x8, 0x2}, {0x5, 0x9, 0x6, 0x3a}, {0x5, 0x0, 0xca, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xab2e}}}]}}]}, 0x140}, 0x1, 0x0, 0x0, 0x48000}, 0x2000000) (async) 09:59:59 executing program 2: unshare(0x5f46394f4cf1e566) unshare(0x22000000) syz_clone(0x81b3c40, &(0x7f0000000000)="61731712abfb221c3773be", 0xb, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="c7a567c95a78a778001ed914ff48493a46e7e2700248cd4b665ab0fa35f173adf57f45d4283fc88dbb257cbffd1aea734e9b1d1aeb17c9e876ecd5e456558407c10ff9efa369151d0e2e827e5a47d3407a429af1d9ea11b17fad2a11c68831d70dc9ffbca75311") unshare(0x80) unshare(0x40200) 09:59:59 executing program 2: unshare(0x5f46394f4cf1e566) (async) unshare(0x22000000) (async) syz_clone(0x81b3c40, &(0x7f0000000000)="61731712abfb221c3773be", 0xb, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="c7a567c95a78a778001ed914ff48493a46e7e2700248cd4b665ab0fa35f173adf57f45d4283fc88dbb257cbffd1aea734e9b1d1aeb17c9e876ecd5e456558407c10ff9efa369151d0e2e827e5a47d3407a429af1d9ea11b17fad2a11c68831d70dc9ffbca75311") unshare(0x80) (async) unshare(0x40200) 09:59:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x81, 0x1, 0x1, 0xc, @empty, @local, 0x10, 0x7800, 0x20, 0x4b4b}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) 09:59:59 executing program 4: syz_clone(0x509b827d0a4000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0xbc, 0x5, 0x4, 0x22, @mcast1, @loopback, 0x8000, 0x8000, 0x8, 0x8}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x140, r1, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r2}, {0x124, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8, 0x0, 0x7, 0x9}]}}}, {0x6c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x3c, 0x4, [{0x2, 0x3, 0x3f, 0x9}, {0x101, 0x7f, 0x0, 0x14733646}, {0x9, 0x9, 0x0, 0x623}, {0xe93, 0x0, 0x0, 0x9}, {0x7, 0x53, 0x8, 0x2}, {0x5, 0x9, 0x6, 0x3a}, {0x5, 0x0, 0xca, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xab2e}}}]}}]}, 0x140}, 0x1, 0x0, 0x0, 0x48000}, 0x2000000) 09:59:59 executing program 2: unshare(0x5f46394f4cf1e566) (async) unshare(0x22000000) (async) syz_clone(0x81b3c40, &(0x7f0000000000)="61731712abfb221c3773be", 0xb, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="c7a567c95a78a778001ed914ff48493a46e7e2700248cd4b665ab0fa35f173adf57f45d4283fc88dbb257cbffd1aea734e9b1d1aeb17c9e876ecd5e456558407c10ff9efa369151d0e2e827e5a47d3407a429af1d9ea11b17fad2a11c68831d70dc9ffbca75311") (async) unshare(0x80) (async) unshare(0x40200) 09:59:59 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 09:59:59 executing program 2: unshare(0x24040400) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000400), 0x4, 0x60000) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000440)={"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"}) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2/custom1\x00', 0x802, 0x0) r3 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x8001) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x200000, 0x0) ioctl$HIDIOCGREPORT(r4, 0x400c4807, &(0x7f0000000280)={0x2, 0x1, 0x9}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000200)={0x20, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06001040030000000363084094bf5736f2aacaa67c2dc95c60c20e043cafe478782a1e1e946246540793ce0e2e0725f7732e288c1174a2d82932b342bbc2832085782ccd036e35ad1e5b4f1c784e8e2546cb214751125c1c2e5f4852c3ec1a1155870c200f000078f5f1961fa7b3c75067b22cdba2bf18d71fb5cb75018e1858d2e1557a80dfcee9601acc58f465ca6749c381a5dfcfd6570ea2246e921721d1a6c98543f59da14d5bf9fa71a79d51330362948c2775406cd749ec3d2cf1045952a700389e7cb6cdf45a4664d239f36a7d6712", @ANYRES64=0x0, @ANYBLOB="03630840", @ANYRES64=r3], 0xa2, 0x0, &(0x7f0000000140)="5669c4ec6691caf34dbbd8d163b1a1635c07bb53c30f874913df4222e0b89e3e756106811d9504368f10a03b15f1e259af281062e124c38e389cd75e78816985422993d474b17c6fba95848de023d98d0c2d3bb85112c3e45ace3d0af27bcb2ca8968e15e65f6a38bdce180e0f5fc2acdae1d9df7f921ed97b9f29d35dd7f06970baa115c4c1bfad3825b4fa1af68f52eb58e58c91d0cfe644c5b5247f443b16870a"}) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)={0x5e80000000000000, 0x10000, 0xffffffffffffffff, 0x8, 0x1d}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) 09:59:59 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 09:59:59 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) (async) 09:59:59 executing program 2: unshare(0x24040400) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000400), 0x4, 0x60000) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000440)={"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"}) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2/custom1\x00', 0x802, 0x0) r3 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x8001) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x200000, 0x0) ioctl$HIDIOCGREPORT(r4, 0x400c4807, &(0x7f0000000280)={0x2, 0x1, 0x9}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000200)={0x20, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06001040030000000363084094bf5736f2aacaa67c2dc95c60c20e043cafe478782a1e1e946246540793ce0e2e0725f7732e288c1174a2d82932b342bbc2832085782ccd036e35ad1e5b4f1c784e8e2546cb214751125c1c2e5f4852c3ec1a1155870c200f000078f5f1961fa7b3c75067b22cdba2bf18d71fb5cb75018e1858d2e1557a80dfcee9601acc58f465ca6749c381a5dfcfd6570ea2246e921721d1a6c98543f59da14d5bf9fa71a79d51330362948c2775406cd749ec3d2cf1045952a700389e7cb6cdf45a4664d239f36a7d6712", @ANYRES64=0x0, @ANYBLOB="03630840", @ANYRES64=r3], 0xa2, 0x0, &(0x7f0000000140)="5669c4ec6691caf34dbbd8d163b1a1635c07bb53c30f874913df4222e0b89e3e756106811d9504368f10a03b15f1e259af281062e124c38e389cd75e78816985422993d474b17c6fba95848de023d98d0c2d3bb85112c3e45ace3d0af27bcb2ca8968e15e65f6a38bdce180e0f5fc2acdae1d9df7f921ed97b9f29d35dd7f06970baa115c4c1bfad3825b4fa1af68f52eb58e58c91d0cfe644c5b5247f443b16870a"}) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)={0x5e80000000000000, 0x10000, 0xffffffffffffffff, 0x8, 0x1d}) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) unshare(0x24040400) (async) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) syz_open_dev$mouse(&(0x7f0000000400), 0x4, 0x60000) (async) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000440)={"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"}) (async) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2/custom1\x00', 0x802, 0x0) (async) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x8001) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x200000, 0x0) (async) ioctl$HIDIOCGREPORT(r4, 0x400c4807, &(0x7f0000000280)={0x2, 0x1, 0x9}) (async) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000200)={0x20, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06001040030000000363084094bf5736f2aacaa67c2dc95c60c20e043cafe478782a1e1e946246540793ce0e2e0725f7732e288c1174a2d82932b342bbc2832085782ccd036e35ad1e5b4f1c784e8e2546cb214751125c1c2e5f4852c3ec1a1155870c200f000078f5f1961fa7b3c75067b22cdba2bf18d71fb5cb75018e1858d2e1557a80dfcee9601acc58f465ca6749c381a5dfcfd6570ea2246e921721d1a6c98543f59da14d5bf9fa71a79d51330362948c2775406cd749ec3d2cf1045952a700389e7cb6cdf45a4664d239f36a7d6712", @ANYRES64=0x0, @ANYBLOB="03630840", @ANYRES64=r3], 0xa2, 0x0, &(0x7f0000000140)="5669c4ec6691caf34dbbd8d163b1a1635c07bb53c30f874913df4222e0b89e3e756106811d9504368f10a03b15f1e259af281062e124c38e389cd75e78816985422993d474b17c6fba95848de023d98d0c2d3bb85112c3e45ace3d0af27bcb2ca8968e15e65f6a38bdce180e0f5fc2acdae1d9df7f921ed97b9f29d35dd7f06970baa115c4c1bfad3825b4fa1af68f52eb58e58c91d0cfe644c5b5247f443b16870a"}) (async) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)={0x5e80000000000000, 0x10000, 0xffffffffffffffff, 0x8, 0x1d}) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r5, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) (async) 09:59:59 executing program 1: mlockall(0x3) 09:59:59 executing program 0: mlockall(0x3) (async, rerun: 64) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 64) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r0, 0xc0104811, &(0x7f0000000000)={0x5, 0x4, 0x3, 0x5}) (async) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@private}, &(0x7f0000000080)=0xc) (async) syz_clone(0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0) 09:59:59 executing program 2: unshare(0x24040400) (async) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) (async) r1 = syz_open_dev$mouse(&(0x7f0000000400), 0x4, 0x60000) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000440)={"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"}) (async) openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2/custom1\x00', 0x802, 0x0) (async) r3 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x8001) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x200000, 0x0) ioctl$HIDIOCGREPORT(r4, 0x400c4807, &(0x7f0000000280)={0x2, 0x1, 0x9}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000200)={0x20, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="06001040030000000363084094bf5736f2aacaa67c2dc95c60c20e043cafe478782a1e1e946246540793ce0e2e0725f7732e288c1174a2d82932b342bbc2832085782ccd036e35ad1e5b4f1c784e8e2546cb214751125c1c2e5f4852c3ec1a1155870c200f000078f5f1961fa7b3c75067b22cdba2bf18d71fb5cb75018e1858d2e1557a80dfcee9601acc58f465ca6749c381a5dfcfd6570ea2246e921721d1a6c98543f59da14d5bf9fa71a79d51330362948c2775406cd749ec3d2cf1045952a700389e7cb6cdf45a4664d239f36a7d6712", @ANYRES64=0x0, @ANYBLOB="03630840", @ANYRES64=r3], 0xa2, 0x0, &(0x7f0000000140)="5669c4ec6691caf34dbbd8d163b1a1635c07bb53c30f874913df4222e0b89e3e756106811d9504368f10a03b15f1e259af281062e124c38e389cd75e78816985422993d474b17c6fba95848de023d98d0c2d3bb85112c3e45ace3d0af27bcb2ca8968e15e65f6a38bdce180e0f5fc2acdae1d9df7f921ed97b9f29d35dd7f06970baa115c4c1bfad3825b4fa1af68f52eb58e58c91d0cfe644c5b5247f443b16870a"}) (async) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000080)={0x5e80000000000000, 0x10000, 0xffffffffffffffff, 0x8, 0x1d}) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r5, &(0x7f00000003c0)='cgroup.stat\x00', 0x0, 0x0) 09:59:59 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) (async) 09:59:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x81, 0x1, 0x1, 0xc, @empty, @local, 0x10, 0x7800, 0x20, 0x4b4b}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x81, 0x1, 0x1, 0xc, @empty, @local, 0x10, 0x7800, 0x20, 0x4b4b}}) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 09:59:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6gre0\x00', 0x0, 0x4, 0x40, 0x1b, 0x2, 0xc, @dev={0xfe, 0x80, '\x00', 0x24}, @mcast2, 0x20, 0x20, 0x9, 0x4}}) unshare(0x24040400) prctl$PR_SET_SECUREBITS(0x1c, 0x1b) unshare(0x22000000) prctl$PR_SET_SECUREBITS(0x1c, 0x1a) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast}, 0xc) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x408900, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x44602, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x29, 0x1, 0x3, 0x8, 0x5, @local, @rand_addr=' \x01\x00', 0x700, 0x80, 0x1, 0x80}}) unshare(0x300) 09:59:59 executing program 4: syz_clone(0x114138a80, 0x0, 0x48, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000002040)={0x5}) 09:59:59 executing program 5: mlockall(0x3) syz_clone(0x1100, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 09:59:59 executing program 1: mlockall(0x3) mlockall(0x3) (async) 09:59:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6gre0\x00', 0x0, 0x4, 0x40, 0x1b, 0x2, 0xc, @dev={0xfe, 0x80, '\x00', 0x24}, @mcast2, 0x20, 0x20, 0x9, 0x4}}) (async) unshare(0x24040400) prctl$PR_SET_SECUREBITS(0x1c, 0x1b) unshare(0x22000000) prctl$PR_SET_SECUREBITS(0x1c, 0x1a) r1 = socket$inet_udp(0x2, 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async, rerun: 64) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast}, 0xc) (async, rerun: 64) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x408900, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x44602, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x29, 0x1, 0x3, 0x8, 0x5, @local, @rand_addr=' \x01\x00', 0x700, 0x80, 0x1, 0x80}}) (async) unshare(0x300) 09:59:59 executing program 4: syz_clone(0x114138a80, 0x0, 0x48, 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000002040)={0x5}) syz_clone(0x114138a80, 0x0, 0x48, 0x0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020}, 0x2020) (async) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000002040)={0x5}) (async) 09:59:59 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6gre0\x00', 0x0, 0x4, 0x40, 0x1b, 0x2, 0xc, @dev={0xfe, 0x80, '\x00', 0x24}, @mcast2, 0x20, 0x20, 0x9, 0x4}}) unshare(0x24040400) prctl$PR_SET_SECUREBITS(0x1c, 0x1b) unshare(0x22000000) prctl$PR_SET_SECUREBITS(0x1c, 0x1a) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast}, 0xc) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x408900, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x44602, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x29, 0x1, 0x3, 0x8, 0x5, @local, @rand_addr=' \x01\x00', 0x700, 0x80, 0x1, 0x80}}) unshare(0x300) socket$inet6_udplite(0xa, 0x2, 0x88) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000240)={'syztnl2\x00', &(0x7f00000001c0)={'ip6gre0\x00', 0x0, 0x4, 0x40, 0x1b, 0x2, 0xc, @dev={0xfe, 0x80, '\x00', 0x24}, @mcast2, 0x20, 0x20, 0x9, 0x4}}) (async) unshare(0x24040400) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x1b) (async) unshare(0x22000000) (async) prctl$PR_SET_SECUREBITS(0x1c, 0x1a) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000000)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast}, 0xc) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x408900, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x44602, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x29, 0x1, 0x3, 0x8, 0x5, @local, @rand_addr=' \x01\x00', 0x700, 0x80, 0x1, 0x80}}) (async) unshare(0x300) (async) 09:59:59 executing program 4: syz_clone(0x114138a80, 0x0, 0x48, 0x0, 0x0, 0x0) (async) read$FUSE(0xffffffffffffffff, &(0x7f0000000000)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000002040)={0x5}) 10:00:00 executing program 0: mlockall(0x3) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCGCOLLECTIONINFO(r0, 0xc0104811, &(0x7f0000000000)={0x5, 0x4, 0x3, 0x5}) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000040)={@private}, &(0x7f0000000080)=0xc) syz_clone(0x2080000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:00:00 executing program 2: unshare(0x24040400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCINITREPORT(r0, 0x4805, 0x0) unshare(0x22000000) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 10:00:00 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000000)) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, &(0x7f0000000040)={0x2, 0x81, 0xffffff63, 0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioprio_set$pid(0x1, r0, 0x6009) syz_clone(0x2000500, &(0x7f0000000100), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="213b427b3e1dc3a62eb0b36255eb8e6e3cd3f6d285fbb0bb8584829bed9f2fae054640bf8d08760088a57a6db9b63ef73f5bca48f1ea9ca3a2514dd698f9a686b50141ff9318ac58fd90b8a5b3223936ea551a1b775cda38d228a98e87cafe21e1f4216b42a3d47c60ac9b5081d0c9eb132ce72982fe4b9dd851c4759c62c86dc91eb406e203e5be21729a49d515203d8b1e54c1b4e37713c9b65de42642475e0590") 10:00:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x81, 0x1, 0x1, 0xc, @empty, @local, 0x10, 0x7800, 0x20, 0x4b4b}}) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) socket$inet6_udp(0xa, 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x2f, 0x81, 0x1, 0x1, 0xc, @empty, @local, 0x10, 0x7800, 0x20, 0x4b4b}}) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) 10:00:00 executing program 2: unshare(0x24040400) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) (async) ioctl$HIDIOCINITREPORT(r0, 0x4805, 0x0) unshare(0x22000000) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 10:00:00 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000000)) (async, rerun: 32) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, &(0x7f0000000040)={0x2, 0x81, 0xffffff63, 0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioprio_set$pid(0x1, r0, 0x6009) syz_clone(0x2000500, &(0x7f0000000100), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="213b427b3e1dc3a62eb0b36255eb8e6e3cd3f6d285fbb0bb8584829bed9f2fae054640bf8d08760088a57a6db9b63ef73f5bca48f1ea9ca3a2514dd698f9a686b50141ff9318ac58fd90b8a5b3223936ea551a1b775cda38d228a98e87cafe21e1f4216b42a3d47c60ac9b5081d0c9eb132ce72982fe4b9dd851c4759c62c86dc91eb406e203e5be21729a49d515203d8b1e54c1b4e37713c9b65de42642475e0590") 10:00:00 executing program 5: mlockall(0x3) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 10:00:00 executing program 1: mlockall(0x3) r0 = syz_clone(0x4c000900, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpgid(r0) ptrace$getenv(0x4201, r1, 0x5, &(0x7f0000000000)) getegid() mlockall(0x4) 10:00:00 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)) 10:00:00 executing program 2: unshare(0x24040400) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$HIDIOCINITREPORT(r0, 0x4805, 0x0) unshare(0x22000000) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) unshare(0x24040400) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) bind$inet(r0, 0x0, 0x0) (async) ioctl$HIDIOCINITREPORT(r0, 0x4805, 0x0) (async) unshare(0x22000000) (async) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) (async) 10:00:00 executing program 2: r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0x676, 0xc0101) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) ioctl$HIDIOCGNAME(r2, 0x80404806, &(0x7f00000000c0)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000180)={0x3, 0xfff}) bind$inet(r1, 0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4044) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f0000000040)={0x1, 0x100, 0x3, 0x26bb, 0x20, 0x6, 0x7, 0xfffffffc, 0x100000, 0x10000, 0x8, 0x1, 0xffffffff}) unshare(0x24040400) unshare(0x2040600) 10:00:00 executing program 2: r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0x676, 0xc0101) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) ioctl$HIDIOCGNAME(r2, 0x80404806, &(0x7f00000000c0)) (async, rerun: 32) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000180)={0x3, 0xfff}) (rerun: 32) bind$inet(r1, 0x0, 0x0) (async) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4044) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f0000000040)={0x1, 0x100, 0x3, 0x26bb, 0x20, 0x6, 0x7, 0xfffffffc, 0x100000, 0x10000, 0x8, 0x1, 0xffffffff}) (async) unshare(0x24040400) unshare(0x2040600) 10:00:00 executing program 2: r0 = syz_open_dev$hiddev(&(0x7f0000000000), 0x676, 0xc0101) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (async, rerun: 32) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) (rerun: 32) bind$inet(r2, 0x0, 0x0) ioctl$HIDIOCGNAME(r2, 0x80404806, &(0x7f00000000c0)) ioctl$VHOST_SET_VRING_BASE(r2, 0x4008af12, &(0x7f0000000180)={0x3, 0xfff}) bind$inet(r1, 0x0, 0x0) (async) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4044) (async, rerun: 64) ioctl$HIDIOCGFIELDINFO(r0, 0xc038480a, &(0x7f0000000040)={0x1, 0x100, 0x3, 0x26bb, 0x20, 0x6, 0x7, 0xfffffffc, 0x100000, 0x10000, 0x8, 0x1, 0xffffffff}) (async, rerun: 64) unshare(0x24040400) unshare(0x2040600) 10:00:00 executing program 2: unshare(0x24040400) unshare(0x22000000) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'netpci0\x00', 0x2002}, 0x18) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffff5}, 0x10) 10:00:00 executing program 2: unshare(0x24040400) (async, rerun: 32) unshare(0x22000000) (async, rerun: 32) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'netpci0\x00', 0x2002}, 0x18) (async) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffff5}, 0x10) 10:00:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x90000, 0x0) read$FUSE(r1, &(0x7f00000021c0)={0x2020}, 0x2020) 10:00:01 executing program 2: unshare(0x24040400) unshare(0x22000000) (async) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'netpci0\x00', 0x2002}, 0x18) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0xfffffffffffffff5}, 0x10) 10:00:01 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$HIDIOCGPHYS(0xffffffffffffffff, 0x80404812, &(0x7f0000000000)) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, &(0x7f0000000040)={0x2, 0x81, 0xffffff63, 0x4}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioprio_set$pid(0x1, r0, 0x6009) (async) syz_clone(0x2000500, &(0x7f0000000100), 0x0, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="213b427b3e1dc3a62eb0b36255eb8e6e3cd3f6d285fbb0bb8584829bed9f2fae054640bf8d08760088a57a6db9b63ef73f5bca48f1ea9ca3a2514dd698f9a686b50141ff9318ac58fd90b8a5b3223936ea551a1b775cda38d228a98e87cafe21e1f4216b42a3d47c60ac9b5081d0c9eb132ce72982fe4b9dd851c4759c62c86dc91eb406e203e5be21729a49d515203d8b1e54c1b4e37713c9b65de42642475e0590") 10:00:01 executing program 0: mlockall(0x3) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)) 10:00:01 executing program 1: mlockall(0x3) (async) r0 = syz_clone(0x4c000900, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpgid(r0) ptrace$getenv(0x4201, r1, 0x5, &(0x7f0000000000)) (async) getegid() (async) mlockall(0x4) 10:00:01 executing program 5: mlockall(0x3) (async) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 10:00:01 executing program 2: unshare(0x24040400) unshare(0x22000000) unshare(0x4000000) unshare(0x0) 10:00:01 executing program 2: unshare(0x24040400) unshare(0x22000000) unshare(0x4000000) unshare(0x0) unshare(0x24040400) (async) unshare(0x22000000) (async) unshare(0x4000000) (async) unshare(0x0) (async) 10:00:01 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) rt_sigreturn() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) r1 = getpgid(r0) ioprio_set$pid(0x2, r1, 0x2004) 10:00:01 executing program 2: unshare(0x24040400) unshare(0x22000000) (async) unshare(0x4000000) unshare(0x0) 10:00:01 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgid(0x0) rt_sigreturn() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) (async) r1 = getpgid(r0) ioprio_set$pid(0x2, r1, 0x2004) 10:00:01 executing program 2: unshare(0x24040400) unshare(0x2030000) 10:00:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) (async) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x90000, 0x0) read$FUSE(r1, &(0x7f00000021c0)={0x2020}, 0x2020) 10:00:02 executing program 4: syz_clone(0x509b827e2a0000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = getpgid(0x0) rt_sigreturn() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x0, 0x0) (async) r1 = getpgid(r0) ioprio_set$pid(0x2, r1, 0x2004) 10:00:02 executing program 2: unshare(0x24040400) unshare(0x2030000) 10:00:02 executing program 0: mlockall(0x3) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)) mlockall(0x3) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000040)) (async) 10:00:02 executing program 1: mlockall(0x3) r0 = syz_clone(0x4c000900, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getpgid(r0) ptrace$getenv(0x4201, r1, 0x5, &(0x7f0000000000)) getegid() mlockall(0x4) mlockall(0x3) (async) syz_clone(0x4c000900, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpgid(r0) (async) ptrace$getenv(0x4201, r1, 0x5, &(0x7f0000000000)) (async) getegid() (async) mlockall(0x4) (async) 10:00:02 executing program 5: mlockall(0x3) (async) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) (async) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 10:00:02 executing program 2: unshare(0x24040400) unshare(0x2030000) unshare(0x24040400) (async) unshare(0x2030000) (async) 10:00:02 executing program 2: unshare(0x24040400) unshare(0x22000000) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x884}, 0x4000000) 10:00:02 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) (async) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x884}, 0x4000000) 10:00:02 executing program 2: unshare(0x24040400) unshare(0x22000000) r0 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x884}, 0x4000000) unshare(0x24040400) (async) unshare(0x22000000) (async) syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x400, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x884}, 0x4000000) (async) 10:00:02 executing program 2: unshare(0x24040400) unshare(0x22000000) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x35e0, 0x2e29c2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r4, 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000000c0)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c142, 0x0) 10:00:02 executing program 2: unshare(0x24040400) (async) unshare(0x22000000) (async) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) (async) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x35e0, 0x2e29c2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r2, 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r3, 0x0, 0x0) (async) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000008b80), 0x0, 0x0) bind$inet(r4, 0x0, 0x0) (async) openat$cgroup_ro(r4, &(0x7f0000000140)='pids.events\x00', 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r3, 0x8080aea1, &(0x7f00000000c0)) (async) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1c142, 0x0) [ 2826.847238][ T856] device bridge_slave_1 left promiscuous mode [ 2826.853407][ T856] bridge0: port 2(bridge_slave_1) entered disabled state [ 2826.860891][ T856] device bridge_slave_0 left promiscuous mode [ 2826.866978][ T856] bridge0: port 1(bridge_slave_0) entered disabled state 10:00:03 executing program 1: syz_open_dev$mouse(&(0x7f0000000000), 0x973, 0x8800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) write$FUSE_CREATE_OPEN(r2, &(0x7f00000000c0)={0xa0, 0x0, 0x0, {{0x5, 0x3, 0x3, 0x3a4, 0x6, 0x1ff, {0x5, 0xfffffffffffffeff, 0x6bfbc1c4, 0x9b, 0x0, 0x20000000000003, 0x6d, 0x81, 0x2, 0x8000, 0x3, r0, r1, 0x9, 0xb}}, {0x0, 0x15}}}, 0xa0) mlockall(0x3) socket(0x18, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2827.691699][T28270] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.698779][T28270] bridge0: port 1(bridge_slave_0) entered disabled state [ 2827.706080][T28270] device bridge_slave_0 entered promiscuous mode [ 2827.713248][T28270] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.720324][T28270] bridge0: port 2(bridge_slave_1) entered disabled state [ 2827.727693][T28270] device bridge_slave_1 entered promiscuous mode [ 2827.763277][T28270] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.770315][T28270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2827.777581][T28270] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.784584][T28270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2827.804440][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2827.812363][ T3586] bridge0: port 1(bridge_slave_0) entered disabled state [ 2827.820684][ T3586] bridge0: port 2(bridge_slave_1) entered disabled state [ 2827.830402][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2827.838583][ T7463] bridge0: port 1(bridge_slave_0) entered blocking state [ 2827.845578][ T7463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2827.867752][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2827.876025][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2827.884066][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2827.892971][T25185] bridge0: port 2(bridge_slave_1) entered blocking state [ 2827.899998][T25185] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2827.907285][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2827.915181][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2827.927144][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2827.941956][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2827.951389][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2828.707574][ T8602] device bridge_slave_1 left promiscuous mode [ 2828.713698][ T8602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2828.721189][ T8602] device bridge_slave_0 left promiscuous mode [ 2828.727368][ T8602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2829.146761][T28279] bridge0: port 1(bridge_slave_0) entered blocking state [ 2829.153803][T28279] bridge0: port 1(bridge_slave_0) entered disabled state [ 2829.161605][T28279] device bridge_slave_0 entered promiscuous mode [ 2829.168465][T28279] bridge0: port 2(bridge_slave_1) entered blocking state [ 2829.175461][T28279] bridge0: port 2(bridge_slave_1) entered disabled state [ 2829.182967][T28279] device bridge_slave_1 entered promiscuous mode [ 2829.219150][T28279] bridge0: port 2(bridge_slave_1) entered blocking state [ 2829.226174][T28279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2829.233445][T28279] bridge0: port 1(bridge_slave_0) entered blocking state [ 2829.240459][T28279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2829.260176][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2829.267679][T22190] bridge0: port 1(bridge_slave_0) entered disabled state [ 2829.274801][T22190] bridge0: port 2(bridge_slave_1) entered disabled state [ 2829.284395][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2829.292819][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2829.301218][T16550] bridge0: port 1(bridge_slave_0) entered blocking state [ 2829.308245][T16550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2829.327131][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2829.335357][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2829.343642][T16550] bridge0: port 2(bridge_slave_1) entered blocking state [ 2829.350679][T16550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2829.358241][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2829.366244][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2829.374248][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2829.382219][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2829.390199][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2829.398430][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2829.417055][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2829.424846][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2829.433011][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2829.441482][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2829.449652][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2829.458016][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2829.466227][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2829.474985][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2830.267267][ T856] device bridge_slave_1 left promiscuous mode [ 2830.273391][ T856] bridge0: port 2(bridge_slave_1) entered disabled state [ 2830.280977][ T856] device bridge_slave_0 left promiscuous mode [ 2830.287129][ T856] bridge0: port 1(bridge_slave_0) entered disabled state [ 2830.641830][T28288] bridge0: port 1(bridge_slave_0) entered blocking state [ 2830.648896][T28288] bridge0: port 1(bridge_slave_0) entered disabled state [ 2830.656196][T28288] device bridge_slave_0 entered promiscuous mode [ 2830.663337][T28288] bridge0: port 2(bridge_slave_1) entered blocking state [ 2830.670391][T28288] bridge0: port 2(bridge_slave_1) entered disabled state [ 2830.677711][T28288] device bridge_slave_1 entered promiscuous mode [ 2830.725246][T28288] bridge0: port 2(bridge_slave_1) entered blocking state [ 2830.732281][T28288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2830.739547][T28288] bridge0: port 1(bridge_slave_0) entered blocking state [ 2830.746542][T28288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2830.766036][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2830.773737][ T3586] bridge0: port 1(bridge_slave_0) entered disabled state [ 2830.782352][ T3586] bridge0: port 2(bridge_slave_1) entered disabled state [ 2830.798733][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2830.806815][T16550] bridge0: port 1(bridge_slave_0) entered blocking state [ 2830.813835][T16550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2830.821358][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2830.830070][T16550] bridge0: port 2(bridge_slave_1) entered blocking state [ 2830.837117][T16550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2830.844395][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2830.852479][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2830.867199][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2830.877493][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2830.895772][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2830.904558][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2830.913073][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2830.997479][T28288] syz-executor.4 (28288) used greatest stack depth: 24912 bytes left [ 2831.669843][ T856] device bridge_slave_1 left promiscuous mode [ 2831.675949][ T856] bridge0: port 2(bridge_slave_1) entered disabled state [ 2831.683328][ T856] device bridge_slave_0 left promiscuous mode [ 2831.689478][ T856] bridge0: port 1(bridge_slave_0) entered disabled state [ 2832.101233][T28297] bridge0: port 1(bridge_slave_0) entered blocking state [ 2832.108664][T28297] bridge0: port 1(bridge_slave_0) entered disabled state [ 2832.115975][T28297] device bridge_slave_0 entered promiscuous mode [ 2832.123182][T28297] bridge0: port 2(bridge_slave_1) entered blocking state [ 2832.130456][T28297] bridge0: port 2(bridge_slave_1) entered disabled state [ 2832.137850][T28297] device bridge_slave_1 entered promiscuous mode [ 2832.174174][T28297] bridge0: port 2(bridge_slave_1) entered blocking state [ 2832.181207][T28297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2832.188502][T28297] bridge0: port 1(bridge_slave_0) entered blocking state [ 2832.195498][T28297] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2832.214909][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2832.222441][T25165] bridge0: port 1(bridge_slave_0) entered disabled state [ 2832.231103][T25165] bridge0: port 2(bridge_slave_1) entered disabled state [ 2832.240075][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2832.248204][T25185] bridge0: port 1(bridge_slave_0) entered blocking state [ 2832.255194][T25185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2832.267607][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2832.275709][T25165] bridge0: port 2(bridge_slave_1) entered blocking state [ 2832.282730][T25165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2832.297635][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2832.305508][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2832.327591][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2832.335910][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2832.344633][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2832.352714][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2832.360887][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2833.187510][ T8602] device bridge_slave_1 left promiscuous mode [ 2833.193613][ T8602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2833.201022][ T8602] device bridge_slave_0 left promiscuous mode [ 2833.207158][ T8602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2833.629463][T28306] bridge0: port 1(bridge_slave_0) entered blocking state [ 2833.636494][T28306] bridge0: port 1(bridge_slave_0) entered disabled state [ 2833.644296][T28306] device bridge_slave_0 entered promiscuous mode [ 2833.651377][T28306] bridge0: port 2(bridge_slave_1) entered blocking state [ 2833.658480][T28306] bridge0: port 2(bridge_slave_1) entered disabled state [ 2833.665758][T28306] device bridge_slave_1 entered promiscuous mode [ 2833.701228][T28306] bridge0: port 2(bridge_slave_1) entered blocking state [ 2833.708250][T28306] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2833.715478][T28306] bridge0: port 1(bridge_slave_0) entered blocking state [ 2833.722521][T28306] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2833.742232][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2833.749887][T22190] bridge0: port 1(bridge_slave_0) entered disabled state [ 2833.757453][T22190] bridge0: port 2(bridge_slave_1) entered disabled state [ 2833.778764][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2833.787242][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2833.795362][ T7463] bridge0: port 1(bridge_slave_0) entered blocking state [ 2833.802382][ T7463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2833.811126][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2833.819342][ T7463] bridge0: port 2(bridge_slave_1) entered blocking state [ 2833.826335][ T7463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2833.833668][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2833.841626][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2833.852556][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2833.867421][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2833.880037][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2833.888378][T16550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2834.747229][ T856] device bridge_slave_1 left promiscuous mode [ 2834.753341][ T856] bridge0: port 2(bridge_slave_1) entered disabled state [ 2834.760750][ T856] device bridge_slave_0 left promiscuous mode [ 2834.766842][ T856] bridge0: port 1(bridge_slave_0) entered disabled state [ 2835.065080][T28315] bridge0: port 1(bridge_slave_0) entered blocking state [ 2835.072113][T28315] bridge0: port 1(bridge_slave_0) entered disabled state [ 2835.079585][T28315] device bridge_slave_0 entered promiscuous mode [ 2835.086275][T28315] bridge0: port 2(bridge_slave_1) entered blocking state [ 2835.093292][T28315] bridge0: port 2(bridge_slave_1) entered disabled state [ 2835.100599][T28315] device bridge_slave_1 entered promiscuous mode [ 2835.147725][T28315] bridge0: port 2(bridge_slave_1) entered blocking state [ 2835.154736][T28315] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2835.161995][T28315] bridge0: port 1(bridge_slave_0) entered blocking state [ 2835.169005][T28315] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2835.188580][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2835.196139][ T3586] bridge0: port 1(bridge_slave_0) entered disabled state [ 2835.204600][ T3586] bridge0: port 2(bridge_slave_1) entered disabled state [ 2835.227788][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2835.236038][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2835.243998][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2835.252169][ T3586] bridge0: port 1(bridge_slave_0) entered blocking state [ 2835.259172][ T3586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2835.266502][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2835.274736][ T3586] bridge0: port 2(bridge_slave_1) entered blocking state [ 2835.281765][ T3586] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2835.289080][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2835.296966][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2835.309016][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2835.324345][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2835.332965][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2835.907338][ T856] device bridge_slave_1 left promiscuous mode [ 2835.913453][ T856] bridge0: port 2(bridge_slave_1) entered disabled state [ 2835.920905][ T856] device bridge_slave_0 left promiscuous mode [ 2835.927248][ T856] bridge0: port 1(bridge_slave_0) entered disabled state [ 2836.483237][T28324] bridge0: port 1(bridge_slave_0) entered blocking state [ 2836.490446][T28324] bridge0: port 1(bridge_slave_0) entered disabled state [ 2836.497918][T28324] device bridge_slave_0 entered promiscuous mode [ 2836.504661][T28324] bridge0: port 2(bridge_slave_1) entered blocking state [ 2836.511682][T28324] bridge0: port 2(bridge_slave_1) entered disabled state [ 2836.518991][T28324] device bridge_slave_1 entered promiscuous mode [ 2836.555446][T28324] bridge0: port 2(bridge_slave_1) entered blocking state [ 2836.562481][T28324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2836.569758][T28324] bridge0: port 1(bridge_slave_0) entered blocking state [ 2836.576757][T28324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2836.595947][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2836.603428][ T7463] bridge0: port 1(bridge_slave_0) entered disabled state [ 2836.611550][ T7463] bridge0: port 2(bridge_slave_1) entered disabled state [ 2836.627640][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2836.635750][ T7463] bridge0: port 1(bridge_slave_0) entered blocking state [ 2836.642773][ T7463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2836.650269][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2836.658496][ T7463] bridge0: port 2(bridge_slave_1) entered blocking state [ 2836.665490][ T7463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2836.672815][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2836.680725][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2836.694934][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2836.707288][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2836.724739][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2836.733319][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2836.742046][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2837.507998][ T856] device bridge_slave_1 left promiscuous mode [ 2837.514106][ T856] bridge0: port 2(bridge_slave_1) entered disabled state [ 2837.521527][ T856] device bridge_slave_0 left promiscuous mode [ 2837.527671][ T856] bridge0: port 1(bridge_slave_0) entered disabled state [ 2837.930960][T28333] bridge0: port 1(bridge_slave_0) entered blocking state [ 2837.938513][T28333] bridge0: port 1(bridge_slave_0) entered disabled state [ 2837.945814][T28333] device bridge_slave_0 entered promiscuous mode [ 2837.952691][T28333] bridge0: port 2(bridge_slave_1) entered blocking state [ 2837.959717][T28333] bridge0: port 2(bridge_slave_1) entered disabled state [ 2837.967048][T28333] device bridge_slave_1 entered promiscuous mode [ 2838.003187][T28333] bridge0: port 2(bridge_slave_1) entered blocking state [ 2838.010209][T28333] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2838.017474][T28333] bridge0: port 1(bridge_slave_0) entered blocking state [ 2838.024471][T28333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2838.043640][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2838.051548][T25165] bridge0: port 1(bridge_slave_0) entered disabled state [ 2838.059440][T25165] bridge0: port 2(bridge_slave_1) entered disabled state [ 2838.068287][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2838.076366][ T5397] bridge0: port 1(bridge_slave_0) entered blocking state [ 2838.083410][ T5397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2838.097497][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2838.105580][T25165] bridge0: port 2(bridge_slave_1) entered blocking state [ 2838.112604][T25165] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2838.119964][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2838.128365][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2838.142555][ T3586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2838.157148][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2838.164998][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2838.177380][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2838.189066][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2838.967242][ T8602] device bridge_slave_1 left promiscuous mode [ 2838.973355][ T8602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2838.980834][ T8602] device bridge_slave_0 left promiscuous mode [ 2838.986913][ T8602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2839.397058][T28342] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.404095][T28342] bridge0: port 1(bridge_slave_0) entered disabled state [ 2839.411935][T28342] device bridge_slave_0 entered promiscuous mode [ 2839.418947][T28342] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.425959][T28342] bridge0: port 2(bridge_slave_1) entered disabled state [ 2839.433471][T28342] device bridge_slave_1 entered promiscuous mode [ 2839.470555][T28342] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.477610][T28342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2839.484821][T28342] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.491837][T28342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2839.511874][T25185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2839.519805][T25185] bridge0: port 1(bridge_slave_0) entered disabled state [ 2839.526915][T25185] bridge0: port 2(bridge_slave_1) entered disabled state [ 2839.536625][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2839.545029][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2839.553416][ T7463] bridge0: port 1(bridge_slave_0) entered blocking state [ 2839.560435][ T7463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2839.577210][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2839.585441][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2839.593804][ T7463] bridge0: port 2(bridge_slave_1) entered blocking state [ 2839.600829][ T7463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2839.608356][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2839.616306][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2839.624298][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2839.632267][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2839.642874][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2839.651330][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2839.667065][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2839.674878][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2839.682849][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2839.691022][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2839.703822][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2839.712119][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2839.720426][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2839.728729][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2840.537221][ T8602] device bridge_slave_1 left promiscuous mode [ 2840.543334][ T8602] bridge0: port 2(bridge_slave_1) entered disabled state [ 2840.550761][ T8602] device bridge_slave_0 left promiscuous mode [ 2840.556840][ T8602] bridge0: port 1(bridge_slave_0) entered disabled state [ 2840.910799][T28351] bridge0: port 1(bridge_slave_0) entered blocking state [ 2840.917901][T28351] bridge0: port 1(bridge_slave_0) entered disabled state [ 2840.925180][T28351] device bridge_slave_0 entered promiscuous mode [ 2840.932489][T28351] bridge0: port 2(bridge_slave_1) entered blocking state [ 2840.939633][T28351] bridge0: port 2(bridge_slave_1) entered disabled state [ 2840.946938][T28351] device bridge_slave_1 entered promiscuous mode [ 2840.982716][T28351] bridge0: port 2(bridge_slave_1) entered blocking state [ 2840.989737][T28351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2840.996947][T28351] bridge0: port 1(bridge_slave_0) entered blocking state [ 2841.003958][T28351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2841.023498][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2841.030972][ T5397] bridge0: port 1(bridge_slave_0) entered disabled state [ 2841.038828][ T5397] bridge0: port 2(bridge_slave_1) entered disabled state [ 2841.047669][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2841.055755][T25165] bridge0: port 1(bridge_slave_0) entered blocking state [ 2841.062767][T25165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2841.077572][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2841.086022][ T5397] bridge0: port 2(bridge_slave_1) entered blocking state [ 2841.093045][ T5397] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2841.100419][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2841.108408][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2841.121105][T25165] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2841.137953][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2841.145752][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2841.159136][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2841.167545][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2841.947295][ T856] device bridge_slave_1 left promiscuous mode [ 2841.953415][ T856] bridge0: port 2(bridge_slave_1) entered disabled state [ 2841.960950][ T856] device bridge_slave_0 left promiscuous mode [ 2841.967118][ T856] bridge0: port 1(bridge_slave_0) entered disabled state [ 2842.375547][T28360] bridge0: port 1(bridge_slave_0) entered blocking state [ 2842.382996][T28360] bridge0: port 1(bridge_slave_0) entered disabled state [ 2842.390631][T28360] device bridge_slave_0 entered promiscuous mode [ 2842.397479][T28360] bridge0: port 2(bridge_slave_1) entered blocking state [ 2842.404473][T28360] bridge0: port 2(bridge_slave_1) entered disabled state [ 2842.411906][T28360] device bridge_slave_1 entered promiscuous mode [ 2842.447911][T28360] bridge0: port 2(bridge_slave_1) entered blocking state [ 2842.454926][T28360] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2842.462210][T28360] bridge0: port 1(bridge_slave_0) entered blocking state [ 2842.469227][T28360] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2842.489141][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2842.496747][ T7463] bridge0: port 1(bridge_slave_0) entered disabled state [ 2842.504121][ T7463] bridge0: port 2(bridge_slave_1) entered disabled state [ 2842.527631][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2842.535900][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2842.544122][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2842.552292][ T7463] bridge0: port 1(bridge_slave_0) entered blocking state [ 2842.559299][ T7463] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2842.567429][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2842.575562][ T7463] bridge0: port 2(bridge_slave_1) entered blocking state [ 2842.582586][ T7463] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2842.589891][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2842.597867][ T7463] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2842.610249][ T5397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2842.624985][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2842.634597][T22190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2022/04/14 10:00:19 executor 4 failed 11 times: executor 4: exit status 67 SYZFAIL: event already set (errno 22: Invalid argument) SYZFAIL: child failed (errno 0: Success) loop exited with status 67